Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Guard Online virus how to remove?


  • Please log in to reply
11 replies to this topic

#1 fecomputerproblems

fecomputerproblems

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 PM

Posted 07 October 2011 - 09:54 AM

A friend checked their email on my computer and clicked on a link in an e-mail and Guard Online AV popped up all over my computer. I'm totally clueless as to where to begin to remove it. My sons friend suggested I come here and ask for help. Can anyone help me out? I'm not very computer savvy.

Thank you!

Edit: Moved topic from Virus, Trojan, Spyware, and Malware Removal Logs to the more appropriate forum, due to the absence of any malware logs in the topic. ~ Animal

BC AdBot (Login to Remove)

 


#2 Animal

Animal

    Bleepin' Animinion


  • Site Admin
  • 35,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Where You Least Expect Me To Be
  • Local time:09:48 AM

Posted 07 October 2011 - 10:00 AM

Welcome to Bleeping Computer. Please take a look here: Remove AV Guard Online (Uninstall Guide)

The Internet is so big, so powerful and pointless that for some people it is a complete substitute for life.
Andrew Brown (1938-1994)


A learning experience is one of those things that say, "You know that thing you just did? Don't do that." Douglas Adams (1952-2001)


"Imagination is more important than knowledge. Knowledge is limited. Imagination circles the world." Albert Einstein (1879-1955)


Follow BleepingComputer on: Facebook | Twitter | Google+

#3 fecomputerproblems

fecomputerproblems
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 PM

Posted 07 October 2011 - 12:36 PM

Thank you soooooo much!!!! It took a bit of figuring... but I did it!!!

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:48 PM

Posted 07 October 2011 - 03:37 PM

Nice job!! As there may be others lingering....
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 zerostar

zerostar

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 10 October 2011 - 11:54 PM

I tried the malware bites method and was unable to get it to run, even after using all the versions of rkill in safe mode with networking.

I just did the ESET online scan and it ran smoothly, finding 35 infected files and supposedly deleting them. This was done in safe mode with networking. Following the scan I restarted the computer in the normal way, and the virus is still there, seemingly the same as before.

Is there an extra step I'm missing or something? Here is the log file from the ESET scan.

Thanks.

C:\Documents and Settings\Administrator\Desktop\SmitfraudFix.exe multiple threats deleted - quarantined
C:\Documents and Settings\Administrator\Desktop\SmitfraudFix\Process.exe Win32/PrcView application cleaned by deleting - quarantined
C:\Documents and Settings\Administrator\Desktop\SmitfraudFix\restart.exe Win32/Shutdown.NAA application cleaned by deleting - quarantined
C:\Documents and Settings\Sabrina\~.exe a variant of Win32/Kryptik.BC trojan cleaned by deleting - quarantined
C:\Documents and Settings\Sabrina\Local Settings\temp\12371619870.exe a variant of Win32/BHO.NMM trojan cleaned by deleting - quarantined
C:\Documents and Settings\Sabrina\Local Settings\temp\12397542880.exe a variant of Win32/BHO.NMM trojan cleaned by deleting - quarantined
C:\Documents and Settings\Sabrina\Local Settings\temp\DXAB.tmp.exe Win32/Agent.TDD trojan cleaned by deleting - quarantined
C:\Documents and Settings\Sabrina\Local Settings\Temporary Internet Files\Content.IE5\IJALKRYF\sc73r[1].mpg a variant of Win32/Kryptik.TSR trojan cleaned by deleting - quarantined
C:\Documents and Settings\Sabrina\Local Settings\Temporary Internet Files\Content.IE5\PWHPB95N\884[1].pdf PDF/Exploit.Gen trojan cleaned by deleting - quarantined
C:\Documents and Settings\Sabrina\My Documents\Downloads\IZArc4.1.2.exe Win32/OpenCandy application deleted - quarantined
C:\Documents and Settings\Sabrina\Start Menu\Programs\Startup\crss.exe Win32/Agent.TDD trojan cleaned by deleting - quarantined
C:\Program Files\Common\helper.dll a variant of Win32/BHO.NMM trojan cleaned by deleting - quarantined
C:\Program Files\Common\_helper.dll Win32/BHO.NMM trojan cleaned by deleting - quarantined
C:\Program Files\Shared\lib.dll Win32/BHO.NMM trojan cleaned by deleting - quarantined
C:\Program Files\Shared\_lib.dll Win32/BHO.NMM trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Sabrina\Application Data\Facegame\Facegame.exe.vir Win32/TrojanDownloader.Agent.OKL trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Program Files\GetModule\GetModule25.exe.vir a variant of Win32/Adware.ISM application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Program Files\GetModule\GetModule26.exe.vir a variant of Win32/Adware.ISM application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\brastk.exe.vir a variant of Win32/TrojanDownloader.FakeAlert.MV trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\karna.dat.vir Win32/TrojanProxy.Agent.NER trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\brastk.exe.vir a variant of Win32/TrojanDownloader.FakeAlert.MV trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\getsn32.dll.vir Win32/TrojanDownloader.FakeAlert.OG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\karna.dat.vir Win32/TrojanProxy.Agent.NER trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\msansspc.dll.vir a variant of Win32/Kryptik.BC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\smwin32.dll.vir Win32/TrojanDownloader.FakeAlert.OG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\TDSSoiqh.dll.vir Win32/Agent.ODG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\TDSSrhym.dll.vir Win32/Agent.OIO trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\TDSSriqp.dll.vir Win32/Agent.OIK trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\TDSSxfum.dll.vir Win32/Agent.ODG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\uesiuqcr.exe.vir Win32/TrojanDownloader.FakeAlert.OG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\wini10803.exe.vir Win32/Adware.XPAntiSpyware.AA application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\wpv207.cpx.vir a variant of Win32/Adware.ISM application deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\wpv477.cpx.vir a variant of Win32/Adware.ISM application deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\dllcache\beep.sys.vir a variant of Win32/UltimateDefender.A trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\TDSSpqlt.sys.vir Win32/Agent.ODG trojan cleaned by deleting - quarantined



#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:48 PM

Posted 11 October 2011 - 09:23 AM

Have you tried RKill /MBAM now after ESET as it removed several trouble makers..
Are you getting an error message?
Try it again ,then run SAS or if needed do SAS and try MBAM again.


Run TFC by OT (Temp File Cleaner)
Please download TFC by Old Timer and save it to your desktop.
alternate download link

Save any unsaved work. TFC will close ALL open programs including your browser!
Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.

Next run Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
  • List Minidump Files
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 zerostar

zerostar

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 16 October 2011 - 10:00 PM

I tried the Rkill/Malware bytes again but rkill doesn't seem to do anything, I think the virus may be blocking it. When I try to run malware bytes, it scans for a few seconds and then closes, and the .exe is unopenable after that, I have to reinstall to try again.

I can't run ESET anymore as well, it goes to update the files and stops right away, saying there is unexpected error 101. I tried this is IE and Firefox.

I tried the SAS as well, it scans for about 10 seconds then automatically closes. Seems like once something starts scanning the virus picks up on it and shuts it down. I tried the portable version as well, same thing.

I ran the TFC, it worked fine and cleaned a lot of files out of the temp areas.

Any ideas to get one of these scanners working? I think if I can do that I can fix it.

Thanks again, here is the minitoolbox result file.

MiniToolBox by Farbar
Ran by Derek (administrator) on 16-10-2011 at 19:45:05
Microsoft Windows XP Service Pack 2 (X86)

***************************************************************************

========================= Flush DNS: ===================================


Windows IP Configuration



Successfully flushed the DNS Resolver Cache.


========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.

========================= FF Proxy Settings: ==============================


"Reset FF Proxy Settings": Firefox Proxy settings were reset.

========================= Hosts content: =================================

127.0.0.1 localhost

========================= IP Configuration: ================================The following helper DLL cannot be loaded: IFMON.DLL.
The following command was not found: int ip dump.


Windows IP Configuration



Host Name . . . . . . . . . . . . : Sabrina

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : ph.cox.net



Ethernet adapter Local Area Connection:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Intel® PRO/100 VE Network Connection

Physical Address. . . . . . . . . : 00-A0-D1-48-25-FD



Ethernet adapter Wireless Network Connection:



Connection-specific DNS Suffix . : ph.cox.net

Description . . . . . . . . . . . : Intel® PRO/Wireless 3945ABG Network Connection

Physical Address. . . . . . . . . : 00-13-02-A7-48-CE

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.1.115

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

DHCP Server . . . . . . . . . . . : 192.168.1.1

DNS Servers . . . . . . . . . . . : 68.105.28.11

68.105.29.11

68.105.28.12

Lease Obtained. . . . . . . . . . : Sunday, October 16, 2011 7:42:53 PM

Lease Expires . . . . . . . . . . : Monday, October 17, 2011 7:42:53 PM



Pinging google.com [74.125.73.147] with 32 bytes of data:



Reply from 74.125.73.147: bytes=32 time=54ms TTL=54

Reply from 74.125.73.147: bytes=32 time=57ms TTL=54



Ping statistics for 74.125.73.147:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 54ms, Maximum = 57ms, Average = 55ms



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:



Reply from 209.191.122.70: bytes=32 time=54ms TTL=56

Reply from 209.191.122.70: bytes=32 time=51ms TTL=56



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 51ms, Maximum = 54ms, Average = 52ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 a0 d1 48 25 fd ...... Intel® PRO/100 VE Network Connection - Packet Scheduler Miniport
0x3 ...00 13 02 a7 48 ce ...... Intel® PRO/Wireless 3945ABG Network Connection - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.115 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.115 192.168.1.115 25
192.168.1.115 255.255.255.255 127.0.0.1 127.0.0.1 25
192.168.1.255 255.255.255.255 192.168.1.115 192.168.1.115 25
224.0.0.0 240.0.0.0 192.168.1.115 192.168.1.115 25
255.255.255.255 255.255.255.255 192.168.1.115 2 1
255.255.255.255 255.255.255.255 192.168.1.115 192.168.1.115 1
Default Gateway: 192.168.1.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] ()
Catalog5 04 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 mswsock.dll [File Not found] ()
Catalog9 02 mswsock.dll [File Not found] ()
Catalog9 03 mswsock.dll [File Not found] ()
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 mswsock.dll [File Not found] ()
Catalog9 07 mswsock.dll [File Not found] ()
Catalog9 08 mswsock.dll [File Not found] ()
Catalog9 09 mswsock.dll [File Not found] ()
Catalog9 10 mswsock.dll [File Not found] ()
Catalog9 11 mswsock.dll [File Not found] ()
Catalog9 12 mswsock.dll [File Not found] ()
Catalog9 13 mswsock.dll [File Not found] ()
Catalog9 14 mswsock.dll [File Not found] ()
Catalog9 15 mswsock.dll [File Not found] ()

========================= Event log errors: ===============================

Application errors:
==================
Error: (10/10/2011 07:36:18 PM) (Source: pctsSvc.exe) (User: )
Description: The service process could not connect to the service controller

Error: (10/09/2011 07:29:53 PM) (Source: Application Error) (User: )
Description: Fault bucket 751825680.
The Wep key exchange did not result in a secure connection setup after 802.1x authentication. The current setting has been marked as failed and the Wireless connection will be disconnected.

Error: (10/09/2011 07:29:40 PM) (Source: Application Error) (User: )
Description: Faulting application update.exe, version 6.3.13.0, faulting module unknown, version 0.0.0.0, fault address 0xffbadd11.
Processing media-specific event for [update.exe!ws!]

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service) (User: )
Description: 208: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service) (User: )
Description: 416: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service) (User: )
Description: 396: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service) (User: )
Description: 212: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:01:57 PM) (Source: Application Hang) (User: )
Description: Hanging application iTunes.exe, version 10.4.1.10, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (10/09/2011 03:39:44 PM) (Source: Application Hang) (User: )
Description: Fault bucket -1719407900.

Error: (10/09/2011 03:39:43 PM) (Source: Application Hang) (User: )
Description: Fault bucket -1719407900.


System errors:
=============
Error: (10/16/2011 07:28:25 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
Fips
intelppm

Error: (10/16/2011 07:27:15 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1084" attempting to start the service EventSystem with arguments ""
in order to run the server:
{1BE1F766-5536-11D1-B726-00C04FB926AF}

Error: (10/16/2011 07:24:22 PM) (Source: Dhcp) (User: )
Description: The IP address lease 192.168.1.115 for the Network Card with network address 001302A748CE has been
denied by the DHCP server 192.168.33.1 (The DHCP Server sent a DHCPNACK message).

Error: (10/16/2011 07:23:27 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1084" attempting to start the service EventSystem with arguments ""
in order to run the server:
{1BE1F766-5536-11D1-B726-00C04FB926AF}

Error: (10/16/2011 07:22:55 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1084" attempting to start the service EventSystem with arguments ""
in order to run the server:
{1BE1F766-5536-11D1-B726-00C04FB926AF}

Error: (10/16/2011 07:21:23 PM) (Source: Dhcp) (User: )
Description: The IP address lease 192.168.1.115 for the Network Card with network address 001302A748CE has been
denied by the DHCP server 192.168.33.1 (The DHCP Server sent a DHCPNACK message).

Error: (10/16/2011 07:06:51 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1084" attempting to start the service EventSystem with arguments ""
in order to run the server:
{1BE1F766-5536-11D1-B726-00C04FB926AF}

Error: (10/16/2011 06:57:31 PM) (Source: Service Control Manager) (User: )
Description: The Lavasoft Ad-Aware Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 5000 milliseconds: Restart the service.

Error: (10/16/2011 06:48:27 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
Fips
intelppm

Error: (10/16/2011 06:47:12 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1084" attempting to start the service EventSystem with arguments ""
in order to run the server:
{1BE1F766-5536-11D1-B726-00C04FB926AF}


Microsoft Office Sessions:
=========================
Error: (10/10/2011 07:36:18 PM) (Source: pctsSvc.exe)(User: )
Description: The service process could not connect to the service controller

Error: (10/09/2011 07:29:53 PM) (Source: Application Error)(User: )
Description: 751825680

Error: (10/09/2011 07:29:40 PM) (Source: Application Error)(User: )
Description: update.exe6.3.13.0unknown0.0.0.0ffbadd11

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service)(User: )
Description: 208: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service)(User: )
Description: 416: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service)(User: )
Description: 396: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:02:06 PM) (Source: Bonjour Service)(User: )
Description: 212: ERROR: read_msg errno 10054 (An existing connection was forcibly closed by the remote host.)

Error: (10/09/2011 04:01:57 PM) (Source: Application Hang)(User: )
Description: iTunes.exe10.4.1.10hungapp0.0.0.000000000

Error: (10/09/2011 03:39:44 PM) (Source: Application Hang)(User: )
Description: -1719407900

Error: (10/09/2011 03:39:43 PM) (Source: Application Hang)(User: )
Description: -1719407900


=========================== Installed Programs ============================

Acrobat.com (Version: 2.1.0)
Acrobat.com (Version: 2.1.0.0)
Ad-Aware (Version: 7.1.0.7)
Adobe AIR (Version: 2.0.2.12610)
Adobe Flash Player 10 Plugin (Version: 10.0.45.2)
Adobe Flash Player ActiveX (Version: 9.0.115.0)
Adobe Reader 9.3 (Version: 9.3.0)
AOL Coach Version 2.0(Build:20041026.5 en)
AOL Uninstaller (Choose which Products to Remove)
Apple Application Support (Version: 1.5.2)
Apple Mobile Device Support (Version: 3.4.1.2)
Apple Software Update (Version: 2.1.3.127)
ArcSoft Panorama Maker 3
Ares 2.1.7 (Version: 2.1.7-Build#3041)
Avira AntiVir PersonalEdition Classic
Bluetooth Stack for Windows by Toshiba (Version: v4.00.23(T))
Bonjour (Version: 3.0.0.2)
CD/DVD Drive Acoustic Silencer (Version: 1.00.008)
Citrix Presentation Server Client - Web Only (Version: 10.100.55836)
DVD-RAM Driver (Version: 5.0.2.5)
ESET Online Scanner v3
Google Toolbar for Internet Explorer (Version: 1.0.0)
High Definition Audio Driver Package - KB888111 (Version: 20040219.000000)
Intel® Graphics Media Accelerator Driver (Version: 6.14.10.4436)
Intel® PRO Network Connections Drivers
Intel® PROSet/Wireless Software (Version: 10.01.0000)
InterVideo WinDVD Creator 2 (Version: 2.0.14.376)
InterVideo WinDVD for TOSHIBA (Version: 5.0-B11.533)
iPod for Windows 2006-06-28 (Version: 4.7.0)
iTunes (Version: 10.4.1.10)
IZArc 4.1.2 (Version: 4.1.2)
Java™ 6 Update 4 (Version: 1.6.0.40)
Macromedia Flash Player 8 (Version: 8.0.22.0)
Magic Workstation 0.94f
Malwarebytes' Anti-Malware version 1.51.2.1300 (Version: 1.51.2.1300)
mCore (Version: 5.40.0000)
mDrWiFi (Version: 5.40.0000)
Metamail (Toshiba Registration Utility) (Version: 4.5)
mHelp (Version: 5.40.0000)
Microsoft .NET Framework 1.0 Hotfix (KB887998)
Microsoft .NET Framework 1.0 Hotfix (KB930494)
Microsoft .NET Framework 1.0 Hotfix (KB953295)
Microsoft .NET Framework 1.0 Hotfix (KB979904)
Microsoft .NET Framework 1.1 (Version: 1.1.4322)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft Office Professional Edition 2003 (Version: 11.0.5614.0)
Microsoft Works (Version: 08.05.0818)
mIWA (Version: 5.40.0000)
mLogView (Version: 5.40.0000)
mMHouse (Version: 5.40.0000)
Mozilla Firefox (3.6.21) (Version: 3.6.21 (en-US))
mPfMgr (Version: 5.40.0000)
mPfWiz (Version: 5.40.0000)
mProSafe (Version: 9.00.0000)
MSXML 4.0 SP2 (KB927978) (Version: 4.20.9841.0)
MSXML 4.0 SP2 (KB936181) (Version: 4.20.9848.0)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
MTG GamePack for Magic Workstation
mWlsSafe (Version: 9.00.0000)
mXML (Version: 5.40.0000)
mZConfig (Version: 5.40.0000)
Netscape (7.2)
Nikon Message Center (Version: 0.91.000)
Office 2003 Trial Assistant (Version: 1.0.0)
Oracle IRM Desktop 5.5.18 10gR3 PR5 (Version: 5.5.18)
Otto
PMB (Version: 5.2.00.03250)
QuickTime (Version: 7.70.80.34)
RealPlayer Basic
Realtek High Definition Audio Driver (Version: 5.10.0.5523)
SD Secure Module (Version: 1.0.3)
Sonic DLA (Version: 5.2.0)
Sonic Encoders (Version: 1.00)
SUPERAntiSpyware (Version: 5.0.1132)
Synaptics Pointing Device Driver (Version: 8.2.9.0)
Texas Instruments PCIxx21/x515/xx12 drivers. (Version: 1.16.0000)
TIPCI (Version: 1.16.0000)
TOSHIBA Assist
TOSHIBA ConfigFree (Version: 5.90.05)
TOSHIBA Controls
TOSHIBA Game Console
TOSHIBA Hotkey Utility (Version: 1.00.01ST)
TOSHIBA PC Diagnostic Tool
TOSHIBA Power Saver (Version: 7.03.07.I)
TOSHIBA SD Memory Card Format
TOSHIBA Software Modem (Version: 2.1.62 (SM2162ALD04))
TOSHIBA Software Upgrades
TOSHIBA Speech System Applications
TOSHIBA Speech System SR Engine(U.S.) Version1.0
TOSHIBA Speech System TTS Engine(U.S.) Version1.0
TOSHIBA TouchPad ON/Off Utility (Version: 1.00.01ST)
TOSHIBA TV Tuner 4.0.12.73 (Version: 4.0.12.73)
TOSHIBA Utilities (Version: 1.00.07ST)
TOSHIBA Virtual Sound
TOSHIBA Zooming Utility
Update Rollup 2 for Windows XP Media Center Edition 2005
Viewpoint Media Player
WebFldrs XP (Version: 9.50.7523)
WildTangent Web Driver
Windows Genuine Advantage Notifications (KB905474) (Version: 1.5.0540.0)
Windows Installer 3.1 (KB893803) (Version: 3.1)
Windows Media Format Runtime
Windows XP Hotfix - KB873333 (Version: 20050114.005213)
Windows XP Hotfix - KB873339 (Version: 20041117.092459)
Windows XP Hotfix - KB884018 (Version: 20040812.132033)
Windows XP Hotfix - KB885250 (Version: 20050118.202711)
Windows XP Hotfix - KB885835 (Version: 20041027.181713)
Windows XP Hotfix - KB885836 (Version: 20041028.173203)
Windows XP Hotfix - KB885855 (Version: 20040930.104104)
Windows XP Hotfix - KB886185 (Version: 20041021.090540)
Windows XP Hotfix - KB887472 (Version: 20041014.162858)
Windows XP Hotfix - KB888113 (Version: 20041116.131036)
Windows XP Hotfix - KB888302 (Version: 20041207.111426)
Windows XP Hotfix - KB889673 (Version: 20041116.085848)
Windows XP Hotfix - KB890175 (Version: 20041201.233338)
Windows XP Hotfix - KB890546 (Version: 20041208.112932)
Windows XP Hotfix - KB890859 (Version: 1)
Windows XP Hotfix - KB891781 (Version: 20050110.165439)
Windows XP Hotfix - KB893056 (Version: 20050126.164313)
Windows XP Media Center Edition 2005 KB2502898
Windows XP Media Center Edition 2005 KB888316
Windows XP Media Center Edition 2005 KB894553
Windows XP Media Center Edition 2005 KB895678
Windows XP Media Center Edition 2005 KB908250
Windows XP Media Center Edition 2005 KB973768
Windows XP Service Pack 3 (Version: 20080414.031525)
WinRAR archiver

========================= Memory info: ===================================

Percentage of memory in use: 40%
Total physical RAM: 501.98 MB
Available physical RAM: 296.32 MB
Total Pagefile: 1226.12 MB
Available Pagefile: 1070.97 MB
Total Virtual: 2047.88 MB
Available Virtual: 2003.77 MB

========================= Partitions: =====================================

1 Drive c: (SQ004126P01) (Fixed) (Total:111.54 GB) (Free:86.62 GB) NTFS

========================= Users: ========================================

User accounts for \\

Administrator ASPNET Derek
Guest HelpAssistant Sabrina
SUPPORT_388945a0 This Guy

========================= Minidump Files ==================================

No minidump file found

**** End of log ****



#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:48 PM

Posted 17 October 2011 - 08:53 PM

OKay I see a ZeroAccess root kit at work.
Let's see if we can get it here.

Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.6.4.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to these[/color] instructions. [color=green]In some cases it may be necessary to redownload TDSSKiller and randomly rename it before downloading and saving to the computer.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 zerostar

zerostar

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 18 October 2011 - 07:51 PM

OK, I ran that rootkit removal tool and it removed 4 files. Here is the text log.

17:45:43.0375 2036 TDSS rootkit removing tool 2.6.10.0 Oct 17 2011 15:43:23
17:45:43.0843 2036 ============================================================
17:45:43.0843 2036 Current date / time: 2011/10/18 17:45:43.0843
17:45:43.0843 2036 SystemInfo:
17:45:43.0843 2036
17:45:43.0843 2036 OS Version: 5.1.2600 ServicePack: 2.0
17:45:43.0843 2036 Product type: Workstation
17:45:43.0843 2036 ComputerName: SABRINA
17:45:43.0843 2036 UserName: Derek
17:45:43.0843 2036 Windows directory: C:\WINDOWS
17:45:43.0843 2036 System windows directory: C:\WINDOWS
17:45:43.0843 2036 Processor architecture: Intel x86
17:45:43.0843 2036 Number of processors: 2
17:45:43.0843 2036 Page size: 0x1000
17:45:43.0843 2036 Boot type: Safe boot with network
17:45:43.0843 2036 ============================================================
17:45:45.0796 2036 Initialize success
17:46:00.0421 0728 ============================================================
17:46:00.0421 0728 Scan started
17:46:00.0421 0728 Mode: Manual;
17:46:00.0421 0728 ============================================================
17:46:01.0468 0728 195bab8f-8330-457f-b4c6-73660ca980e7 - ok
17:46:01.0671 0728 Abiosdsk - ok
17:46:01.0703 0728 abp480n5 - ok
17:46:01.0750 0728 ACPI (a10c7534f7223f4a73a948967d00e69b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
17:46:01.0765 0728 ACPI - ok
17:46:01.0781 0728 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
17:46:01.0781 0728 ACPIEC - ok
17:46:01.0796 0728 adpu160m - ok
17:46:01.0859 0728 aec (1ee7b434ba961ef845de136224c30fec) C:\WINDOWS\system32\drivers\aec.sys
17:46:01.0859 0728 aec - ok
17:46:01.0906 0728 AegisP (12dafd934641dcf61e446313bc261ec2) C:\WINDOWS\system32\DRIVERS\AegisP.sys
17:46:01.0906 0728 AegisP - ok
17:46:02.0125 0728 AFD (55e6e1c51b6d30e54335750955453702) C:\WINDOWS\System32\drivers\afd.sys
17:46:02.0125 0728 AFD - ok
17:46:02.0218 0728 AgereSoftModem (b3192376c7a3814b5341efc2202022f8) C:\WINDOWS\system32\DRIVERS\AGRSM.sys
17:46:02.0234 0728 AgereSoftModem - ok
17:46:02.0406 0728 Aha154x - ok
17:46:02.0437 0728 aic78u2 - ok
17:46:02.0453 0728 aic78xx - ok
17:46:02.0500 0728 AliIde - ok
17:46:02.0515 0728 amsint - ok
17:46:02.0625 0728 Arp1394 (f0d692b0bffb46e30eb3cea168bbc49f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
17:46:02.0625 0728 Arp1394 - ok
17:46:02.0640 0728 asc - ok
17:46:02.0671 0728 asc3350p - ok
17:46:02.0703 0728 asc3550 - ok
17:46:02.0734 0728 ASCTRM (d880831279ed91f9a4190a2db9539ea9) C:\WINDOWS\system32\drivers\ASCTRM.sys
17:46:02.0734 0728 ASCTRM - ok
17:46:02.0796 0728 AsyncMac (02000abf34af4c218c35d257024807d6) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
17:46:02.0796 0728 AsyncMac - ok
17:46:02.0984 0728 atapi (cdfe4411a69c224bd1d11b2da92dac51) C:\WINDOWS\system32\DRIVERS\atapi.sys
17:46:02.0984 0728 atapi - ok
17:46:03.0015 0728 Atdisk - ok
17:46:03.0046 0728 Atmarpc (ec88da854ab7d7752ec8be11a741bb7f) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
17:46:03.0046 0728 Atmarpc - ok
17:46:03.0062 0728 ATMFBUS - ok
17:46:03.0093 0728 ATMFCVsp - ok
17:46:03.0125 0728 ATMFMdm - ok
17:46:03.0140 0728 ATMFNET - ok
17:46:03.0171 0728 ATMFNVsp - ok
17:46:03.0203 0728 ATMFVsp - ok
17:46:03.0250 0728 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
17:46:03.0250 0728 audstub - ok
17:46:03.0328 0728 avgntflt (baf1d28f302d2d750c9c3b1b06304390) C:\Program Files\AntiVir PersonalEdition Classic\avgntflt.sys
17:46:03.0328 0728 avgntflt - ok
17:46:03.0531 0728 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
17:46:03.0531 0728 Beep - ok
17:46:03.0640 0728 BVRPMPR5 (51b327292408b5f3a42e295bce055859) C:\WINDOWS\system32\drivers\BVRPMPR5.SYS
17:46:03.0640 0728 BVRPMPR5 - ok
17:46:03.0656 0728 catchme - ok
17:46:03.0906 0728 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
17:46:03.0921 0728 cbidf2k - ok
17:46:03.0921 0728 cd20xrnt - ok
17:46:03.0984 0728 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
17:46:03.0984 0728 Cdaudio - ok
17:46:04.0015 0728 Cdfs (cd7d5152df32b47f4e36f710b35aae02) C:\WINDOWS\system32\drivers\Cdfs.sys
17:46:04.0015 0728 Cdfs - ok
17:46:04.0046 0728 Cdrom (af9c19b3100fe010496b1a27181fbf72) C:\WINDOWS\system32\DRIVERS\cdrom.sys
17:46:04.0046 0728 Cdrom - ok
17:46:04.0062 0728 Changer - ok
17:46:04.0125 0728 CmBatt (4266be808f85826aedf3c64c1e240203) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
17:46:04.0125 0728 CmBatt - ok
17:46:04.0156 0728 CmdIde - ok
17:46:04.0187 0728 Compbatt (df1b1a24bf52d0ebc01ed4ece8979f50) C:\WINDOWS\system32\DRIVERS\compbatt.sys
17:46:04.0187 0728 Compbatt - ok
17:46:04.0406 0728 Cpqarray - ok
17:46:04.0437 0728 dac2w2k - ok
17:46:04.0453 0728 dac960nt - ok
17:46:04.0531 0728 dd7be328 (e9dc74e24ae56e36e0dc2b7c04900325) C:\WINDOWS\685997021:579083479.exe
17:46:06.0218 0728 Suspicious file (Hidden): C:\WINDOWS\685997021:579083479.exe. md5: e9dc74e24ae56e36e0dc2b7c04900325
17:46:06.0218 0728 dd7be328 ( HiddenFile.Multi.Generic ) - warning
17:46:06.0218 0728 dd7be328 - detected HiddenFile.Multi.Generic (1)
17:46:06.0390 0728 Disk (00ca44e4534865f8a3b64f7c0984bff0) C:\WINDOWS\system32\DRIVERS\disk.sys
17:46:06.0390 0728 Disk - ok
17:46:06.0468 0728 DLABOIOM (ee4325becef51b8c32b4329097e4f301) C:\WINDOWS\system32\DLA\DLABOIOM.SYS
17:46:06.0468 0728 DLABOIOM - ok
17:46:06.0500 0728 DLACDBHM (d979bebcf7edcc9c9ee1857d1a68c67b) C:\WINDOWS\system32\Drivers\DLACDBHM.SYS
17:46:06.0500 0728 DLACDBHM - ok
17:46:06.0546 0728 DLADResN (1e6c6597833a04c2157be7b39ea92ce1) C:\WINDOWS\system32\DLA\DLADResN.SYS
17:46:06.0546 0728 DLADResN - ok
17:46:06.0562 0728 DLAIFS_M (752376e109a090970bfa9722f0f40b03) C:\WINDOWS\system32\DLA\DLAIFS_M.SYS
17:46:06.0562 0728 DLAIFS_M - ok
17:46:06.0593 0728 DLAOPIOM (62ee7902e74b90bf1ccc4643fc6c07a7) C:\WINDOWS\system32\DLA\DLAOPIOM.SYS
17:46:06.0593 0728 DLAOPIOM - ok
17:46:06.0609 0728 DLAPoolM (5c220124c5afeaee84a9bb89d685c17b) C:\WINDOWS\system32\DLA\DLAPoolM.SYS
17:46:06.0609 0728 DLAPoolM - ok
17:46:06.0656 0728 DLARTL_N (7ee0852ae8907689df25049dcd2342e8) C:\WINDOWS\system32\Drivers\DLARTL_N.SYS
17:46:06.0656 0728 DLARTL_N - ok
17:46:06.0703 0728 DLAUDFAM (4ebb78d9bbf072119363b35b9b3e518f) C:\WINDOWS\system32\DLA\DLAUDFAM.SYS
17:46:06.0703 0728 DLAUDFAM - ok
17:46:06.0734 0728 DLAUDF_M (333b770e52d2cea7bd86391120466e43) C:\WINDOWS\system32\DLA\DLAUDF_M.SYS
17:46:06.0734 0728 DLAUDF_M - ok
17:46:06.0937 0728 dmboot (c0fbb516e06e243f0cf31f597e7ebf7d) C:\WINDOWS\system32\drivers\dmboot.sys
17:46:06.0953 0728 dmboot - ok
17:46:07.0000 0728 dmio (f5e7b358a732d09f4bcf2824b88b9e28) C:\WINDOWS\system32\drivers\dmio.sys
17:46:07.0000 0728 dmio - ok
17:46:07.0031 0728 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
17:46:07.0031 0728 dmload - ok
17:46:07.0218 0728 DMusic (a6f881284ac1150e37d9ae47ff601267) C:\WINDOWS\system32\drivers\DMusic.sys
17:46:07.0218 0728 DMusic - ok
17:46:07.0250 0728 dpti2o - ok
17:46:07.0281 0728 drmkaud (1ed4dbbae9f5d558dbba4cc450e3eb2e) C:\WINDOWS\system32\drivers\drmkaud.sys
17:46:07.0281 0728 drmkaud - ok
17:46:07.0296 0728 DRVMCDB (fd0f95981fef9073659d8ec58e40aa3c) C:\WINDOWS\system32\Drivers\DRVMCDB.SYS
17:46:07.0296 0728 DRVMCDB - ok
17:46:07.0328 0728 DRVNDDM (b4869d320428cdc5ec4d7f5e808e99b5) C:\WINDOWS\system32\Drivers\DRVNDDM.SYS
17:46:07.0328 0728 DRVNDDM - ok
17:46:07.0406 0728 E100B (2646883e6dd867cd872d5b51b6036710) C:\WINDOWS\system32\DRIVERS\e100b325.sys
17:46:07.0406 0728 E100B - ok
17:46:07.0453 0728 e1express (e1fa10ed8f9f700c1be1eae05a80ef57) C:\WINDOWS\system32\DRIVERS\e1e5132.sys
17:46:07.0453 0728 e1express - ok
17:46:07.0578 0728 Fastfat (3117f595e9615e04f05a54fc15a03b20) C:\WINDOWS\system32\drivers\Fastfat.sys
17:46:07.0578 0728 Fastfat - ok
17:46:07.0765 0728 Fdc (ced2e8396a8838e59d8fd529c680e02c) C:\WINDOWS\system32\drivers\Fdc.sys
17:46:07.0765 0728 Fdc - ok
17:46:07.0796 0728 Fips (e153ab8a11de5452bcf5ac7652dbf3ed) C:\WINDOWS\system32\drivers\Fips.sys
17:46:07.0796 0728 Fips - ok
17:46:07.0812 0728 Flpydisk (0dd1de43115b93f4d85e889d7a86f548) C:\WINDOWS\system32\drivers\Flpydisk.sys
17:46:07.0812 0728 Flpydisk - ok
17:46:07.0875 0728 FltMgr (3d234fb6d6ee875eb009864a299bea29) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
17:46:07.0875 0728 FltMgr - ok
17:46:07.0906 0728 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
17:46:07.0906 0728 Fs_Rec - ok
17:46:07.0968 0728 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
17:46:07.0968 0728 Ftdisk - ok
17:46:08.0031 0728 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\Drivers\GEARAspiWDM.sys
17:46:08.0031 0728 GEARAspiWDM - ok
17:46:08.0203 0728 Gpc (c0f1d4a21de5a415df8170616703debf) C:\WINDOWS\system32\DRIVERS\msgpc.sys
17:46:08.0203 0728 Gpc - ok
17:46:08.0250 0728 HDAudBus (3fcc124b6e08ee0e9351f717dd136939) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
17:46:08.0265 0728 HDAudBus - ok
17:46:08.0375 0728 HidUsb (1de6783b918f540149aa69943bdfeba8) C:\WINDOWS\system32\DRIVERS\hidusb.sys
17:46:08.0375 0728 HidUsb - ok
17:46:08.0515 0728 hpn - ok
17:46:08.0578 0728 HPZid412 (d03d10f7ded688fecf50f8fbf1ea9b8a) C:\WINDOWS\system32\DRIVERS\HPZid412.sys
17:46:08.0578 0728 HPZid412 - ok
17:46:08.0625 0728 HPZipr12 (89f41658929393487b6b7d13c8528ce3) C:\WINDOWS\system32\DRIVERS\HPZipr12.sys
17:46:08.0625 0728 HPZipr12 - ok
17:46:08.0718 0728 HPZius12 (abcb05ccdbf03000354b9553820e39f8) C:\WINDOWS\system32\DRIVERS\HPZius12.sys
17:46:08.0718 0728 HPZius12 - ok
17:46:08.0906 0728 HTTP (9f8b0f4276f618964fd118be4289b7cd) C:\WINDOWS\system32\Drivers\HTTP.sys
17:46:08.0906 0728 HTTP - ok
17:46:08.0937 0728 i2omgmt - ok
17:46:08.0953 0728 i2omp - ok
17:46:09.0000 0728 i8042prt (5502b58eef7486ee6f93f3f164dcb808) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
17:46:09.0000 0728 i8042prt - ok
17:46:09.0093 0728 ialm (bc1f1ff8d5800398937966cdb0a97fdc) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
17:46:09.0125 0728 ialm - ok
17:46:09.0312 0728 Imapi (f8aa320c6a0409c0380e5d8a99d76ec6) C:\WINDOWS\system32\DRIVERS\imapi.sys
17:46:09.0312 0728 Imapi - ok
17:46:09.0359 0728 ini910u - ok
17:46:09.0593 0728 IntcAzAudAddService (6400500a8431aea157e230f57f06352e) C:\WINDOWS\system32\drivers\RtkHDAud.sys
17:46:09.0796 0728 IntcAzAudAddService - ok
17:46:10.0015 0728 IntelIde - ok
17:46:10.0046 0728 intelppm (279fb78702454dff2bb445f238c048d2) C:\WINDOWS\system32\DRIVERS\intelppm.sys
17:46:10.0046 0728 intelppm - ok
17:46:10.0078 0728 Ip6Fw (4448006b6bc60e6c027932cfc38d6855) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
17:46:10.0078 0728 Ip6Fw - ok
17:46:10.0109 0728 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
17:46:10.0109 0728 IpFilterDriver - ok
17:46:10.0125 0728 IpInIp (e1ec7f5da720b640cd8fb8424f1b14bb) C:\WINDOWS\system32\DRIVERS\ipinip.sys
17:46:10.0125 0728 IpInIp - ok
17:46:10.0156 0728 IpNat (e2168cbc7098ffe963c6f23f472a3593) C:\WINDOWS\system32\DRIVERS\ipnat.sys
17:46:10.0171 0728 IpNat - ok
17:46:10.0359 0728 IPSec (64537aa5c003a6afeee1df819062d0d1) C:\WINDOWS\system32\DRIVERS\ipsec.sys
17:46:10.0359 0728 IPSec - ok
17:46:10.0390 0728 IRENUM (50708daa1b1cbb7d6ac1cf8f56a24410) C:\WINDOWS\system32\DRIVERS\irenum.sys
17:46:10.0390 0728 IRENUM - ok
17:46:10.0437 0728 isapnp (e504f706ccb699c2596e9a3da1596e87) C:\WINDOWS\system32\DRIVERS\isapnp.sys
17:46:10.0437 0728 isapnp - ok
17:46:10.0468 0728 Iviaspi (f59c3569a2f2c464bb78cb1bdcdca55e) C:\WINDOWS\system32\drivers\iviaspi.sys
17:46:10.0468 0728 Iviaspi - ok
17:46:10.0484 0728 Kbdclass (ebdee8a2ee5393890a1acee971c4c246) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
17:46:10.0484 0728 Kbdclass - ok
17:46:10.0531 0728 kmixer (ba5deda4d934e6288c2f66caf58d2562) C:\WINDOWS\system32\drivers\kmixer.sys
17:46:10.0546 0728 kmixer - ok
17:46:10.0734 0728 KR10N (00c1ea8decf810b8eccb5c5a8186a96e) C:\WINDOWS\system32\drivers\KR10N.sys
17:46:10.0734 0728 KR10N - ok
17:46:10.0781 0728 KSecDD (1be7cc2535d760ae4d481576eb789f24) C:\WINDOWS\system32\drivers\KSecDD.sys
17:46:10.0781 0728 KSecDD - ok
17:46:10.0828 0728 kungsfrlnmbnmy ( Rootkit.Win32.TDSS.tdl2 ) - infected
17:46:10.0828 0728 kungsfrlnmbnmy - detected Rootkit.Win32.TDSS.tdl2 (0)
17:46:10.0859 0728 lbrtfdc - ok
17:46:10.0968 0728 meiudf (7efac183a25b30fb5d64cc9d484b1eb6) C:\WINDOWS\system32\Drivers\meiudf.sys
17:46:10.0968 0728 meiudf - ok
17:46:11.0171 0728 MHNDRV (7f2f1d2815a6449d346fcccbc569fbd6) C:\WINDOWS\system32\DRIVERS\mhndrv.sys
17:46:11.0171 0728 MHNDRV - ok
17:46:11.0203 0728 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
17:46:11.0203 0728 mnmdd - ok
17:46:11.0250 0728 Modem (6fc6f9d7acc36dca9b914565a3aeda05) C:\WINDOWS\system32\drivers\Modem.sys
17:46:11.0250 0728 Modem - ok
17:46:11.0265 0728 Mouclass (34e1f0031153e491910e12551400192c) C:\WINDOWS\system32\DRIVERS\mouclass.sys
17:46:11.0265 0728 Mouclass - ok
17:46:11.0312 0728 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
17:46:11.0312 0728 mouhid - ok
17:46:11.0343 0728 MountMgr (65653f3b4477f3c63e68a9659f85ee2e) C:\WINDOWS\system32\drivers\MountMgr.sys
17:46:11.0343 0728 MountMgr - ok
17:46:11.0453 0728 mraid35x - ok
17:46:11.0578 0728 MRxDAV (29414447eb5bde2f8397dc965dbb3156) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
17:46:11.0578 0728 MRxDAV - ok
17:46:11.0609 0728 Msfs (561b3a4333ca2dbdba28b5b956822519) C:\WINDOWS\system32\drivers\Msfs.sys
17:46:11.0609 0728 Msfs - ok
17:46:11.0687 0728 MSKSSRV (ae431a8dd3c1d0d0610cdbac16057ad0) C:\WINDOWS\system32\drivers\MSKSSRV.sys
17:46:11.0687 0728 MSKSSRV - ok
17:46:11.0718 0728 MSPCLOCK (13e75fef9dfeb08eeded9d0246e1f448) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
17:46:11.0718 0728 MSPCLOCK - ok
17:46:11.0734 0728 MSPQM (1988a33ff19242576c3d0ef9ce785da7) C:\WINDOWS\system32\drivers\MSPQM.sys
17:46:11.0734 0728 MSPQM - ok
17:46:11.0812 0728 mssmbios (469541f8bfd2b32659d5d463a6714bce) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
17:46:11.0812 0728 mssmbios - ok
17:46:11.0937 0728 Mup (82035e0f41c2dd05ae41d27fe6cf7de1) C:\WINDOWS\system32\drivers\Mup.sys
17:46:11.0937 0728 Mup - ok
17:46:11.0968 0728 NDIS (558635d3af1c7546d26067d5d9b6959e) C:\WINDOWS\system32\drivers\NDIS.sys
17:46:11.0984 0728 NDIS - ok
17:46:12.0015 0728 NdisTapi (08d43bbdacdf23f34d79e44ed35c1b4c) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
17:46:12.0015 0728 NdisTapi - ok
17:46:12.0062 0728 Ndisuio (eefa1ce63805d2145978621be5c6d955) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
17:46:12.0062 0728 Ndisuio - ok
17:46:12.0078 0728 NdisWan (0b90e255a9490166ab368cd55a529893) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
17:46:12.0078 0728 NdisWan - ok
17:46:12.0109 0728 NDProxy (59fc3fb44d2669bc144fd87826bb571f) C:\WINDOWS\system32\drivers\NDProxy.sys
17:46:12.0109 0728 NDProxy - ok
17:46:12.0140 0728 NetBT (564e2b63ddb0c156a1b21e9eb9dbaa8f) C:\WINDOWS\system32\DRIVERS\netbt.sys
17:46:12.0140 0728 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\netbt.sys. Real md5: 564e2b63ddb0c156a1b21e9eb9dbaa8f, Fake md5: 0c80e410cd2f47134407ee7dd19cc86b
17:46:12.0156 0728 NetBT ( Rootkit.Win32.ZAccess.j ) - infected
17:46:12.0156 0728 NetBT - detected Rootkit.Win32.ZAccess.j (0)
17:46:12.0359 0728 Netdevio (1265eb253ed4ebe4acb3bd5f548ff796) C:\WINDOWS\system32\DRIVERS\netdevio.sys
17:46:12.0359 0728 Netdevio - ok
17:46:12.0421 0728 NIC1394 (5c5c53db4fef16cf87b9911c7e8c6fbc) C:\WINDOWS\system32\DRIVERS\nic1394.sys
17:46:12.0421 0728 NIC1394 - ok
17:46:12.0484 0728 Npfs (4f601bcb8f64ea3ac0994f98fed03f8e) C:\WINDOWS\system32\drivers\Npfs.sys
17:46:12.0484 0728 Npfs - ok
17:46:12.0546 0728 Ntfs (19a811ef5f1ed5c926a028ce107ff1af) C:\WINDOWS\system32\drivers\Ntfs.sys
17:46:12.0562 0728 Ntfs - ok
17:46:12.0796 0728 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
17:46:12.0796 0728 Null - ok
17:46:12.0812 0728 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
17:46:12.0812 0728 NwlnkFlt - ok
17:46:12.0843 0728 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
17:46:12.0843 0728 NwlnkFwd - ok
17:46:12.0875 0728 ohci1394 (0951db8e5823ea366b0e408d71e1ba2a) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
17:46:12.0875 0728 ohci1394 - ok
17:46:13.0109 0728 Parport (29744eb4ce659dfe3b4122deb45bc478) C:\WINDOWS\system32\drivers\Parport.sys
17:46:13.0109 0728 Parport - ok
17:46:13.0125 0728 PartMgr (3334430c29dc338092f79c38ef7b4cd0) C:\WINDOWS\system32\drivers\PartMgr.sys
17:46:13.0140 0728 PartMgr - ok
17:46:13.0171 0728 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
17:46:13.0171 0728 ParVdm - ok
17:46:13.0203 0728 PCI (8086d9979234b603ad5bc2f5d890b234) C:\WINDOWS\system32\DRIVERS\pci.sys
17:46:13.0218 0728 PCI - ok
17:46:13.0218 0728 PCIDump - ok
17:46:13.0250 0728 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
17:46:13.0250 0728 PCIIde - ok
17:46:13.0281 0728 Pcmcia (82a087207decec8456fbe8537947d579) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
17:46:13.0281 0728 Pcmcia - ok
17:46:13.0296 0728 PDCOMP - ok
17:46:13.0328 0728 PDFRAME - ok
17:46:13.0343 0728 PDRELI - ok
17:46:13.0375 0728 PDRFRAME - ok
17:46:13.0406 0728 perc2 - ok
17:46:13.0421 0728 perc2hib - ok
17:46:13.0515 0728 Pfc (444f122e68db44c0589227781f3c8b3f) C:\WINDOWS\system32\drivers\pfc.sys
17:46:13.0515 0728 Pfc - ok
17:46:13.0625 0728 PptpMiniport (1c5cc65aac0783c344f16353e60b72ac) C:\WINDOWS\system32\DRIVERS\raspptp.sys
17:46:13.0625 0728 PptpMiniport - ok
17:46:13.0781 0728 PSched (48671f327553dcf1d27f6197f622a668) C:\WINDOWS\system32\DRIVERS\psched.sys
17:46:13.0781 0728 PSched - ok
17:46:13.0796 0728 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
17:46:13.0796 0728 Ptilink - ok
17:46:13.0828 0728 PxHelp20 (86724469cd077901706854974cd13c3e) C:\WINDOWS\system32\Drivers\PxHelp20.sys
17:46:13.0828 0728 PxHelp20 - ok
17:46:13.0859 0728 ql1080 - ok
17:46:13.0875 0728 Ql10wnt - ok
17:46:13.0906 0728 ql12160 - ok
17:46:13.0921 0728 ql1240 - ok
17:46:13.0953 0728 ql1280 - ok
17:46:14.0000 0728 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
17:46:14.0000 0728 RasAcd - ok
17:46:14.0031 0728 Rasl2tp (98faeb4a4dcf812ba1c6fca4aa3e115c) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
17:46:14.0031 0728 Rasl2tp - ok
17:46:14.0062 0728 RasPppoe (7306eeed8895454cbed4669be9f79faa) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
17:46:14.0062 0728 RasPppoe - ok
17:46:14.0078 0728 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
17:46:14.0093 0728 Raspti - ok
17:46:14.0109 0728 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
17:46:14.0109 0728 RDPCDD - ok
17:46:14.0156 0728 rdpdr (a2cae2c60bc37e0751ef9dda7ceaf4ad) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
17:46:14.0171 0728 rdpdr - ok
17:46:14.0203 0728 RDPWD (b54cd38a9ebfbf2b3561426e3fe26f62) C:\WINDOWS\system32\drivers\RDPWD.sys
17:46:14.0203 0728 RDPWD - ok
17:46:14.0281 0728 redbook (b31b4588e4086d8d84adbf9845c2402b) C:\WINDOWS\system32\DRIVERS\redbook.sys
17:46:14.0296 0728 redbook - ok
17:46:14.0531 0728 s24trans (1cc074e0d48383d4e9bffc6a26c2a58a) C:\WINDOWS\system32\DRIVERS\s24trans.sys
17:46:14.0531 0728 s24trans - ok
17:46:14.0656 0728 SASDIFSV (39763504067962108505bff25f024345) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS
17:46:14.0671 0728 SASDIFSV - ok
17:46:14.0687 0728 SASKUTIL (77b9fc20084b48408ad3e87570eb4a85) C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS
17:46:14.0687 0728 SASKUTIL - ok
17:46:14.0921 0728 sdbus (02fc71b020ec8700ee8a46c58bc6f276) C:\WINDOWS\system32\DRIVERS\sdbus.sys
17:46:14.0921 0728 sdbus - ok
17:46:15.0000 0728 sdcplh (b7ea2f12416693d2d9bffaaa5eff7037) C:\WINDOWS\system32\drivers\sdcplh.sys
17:46:15.0000 0728 sdcplh - ok
17:46:15.0046 0728 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
17:46:15.0046 0728 Secdrv - ok
17:46:15.0125 0728 Serial (cd9404d115a00d249f70a371b46d5a26) C:\WINDOWS\system32\drivers\Serial.sys
17:46:15.0125 0728 Serial - ok
17:46:15.0312 0728 Sfloppy (0d13b6df6e9e101013a7afb0ce629fe0) C:\WINDOWS\system32\DRIVERS\sfloppy.sys
17:46:15.0312 0728 Sfloppy - ok
17:46:15.0343 0728 Simbad - ok
17:46:15.0390 0728 Suspicious service (Hidden): SKYNETfwxbqfgn
17:46:15.0437 0728 SKYNETfwxbqfgn (575b6855c83018396b295e8492f42968) C:\WINDOWS\system32\drivers\SKYNETwevpwivx.sys
17:46:15.0437 0728 Suspicious file (Hidden): C:\WINDOWS\system32\drivers\SKYNETwevpwivx.sys. md5: 575b6855c83018396b295e8492f42968
17:46:15.0437 0728 SKYNETfwxbqfgn ( Rootkit.Win32.TDSS.tdl2 ) - infected
17:46:15.0437 0728 SKYNETfwxbqfgn - detected Rootkit.Win32.TDSS.tdl2 (0)
17:46:15.0453 0728 Sparrow - ok
17:46:15.0515 0728 splitter (0ce218578fff5f4f7e4201539c45c78f) C:\WINDOWS\system32\drivers\splitter.sys
17:46:15.0515 0728 splitter - ok
17:46:15.0562 0728 sr (e41b6d037d6cd08461470af04500dc24) C:\WINDOWS\system32\DRIVERS\sr.sys
17:46:15.0562 0728 sr - ok
17:46:15.0765 0728 Srv (7a4f147cc6b133f905f6e65e2f8669fb) C:\WINDOWS\system32\DRIVERS\srv.sys
17:46:15.0781 0728 Srv - ok
17:46:15.0843 0728 swenum (03c1bae4766e2450219d20b993d6e046) C:\WINDOWS\system32\DRIVERS\swenum.sys
17:46:15.0843 0728 swenum - ok
17:46:15.0890 0728 swmidi (94abc808fc4b6d7d2bbf42b85e25bb4d) C:\WINDOWS\system32\drivers\swmidi.sys
17:46:15.0890 0728 swmidi - ok
17:46:15.0937 0728 symc810 - ok
17:46:15.0968 0728 symc8xx - ok
17:46:15.0984 0728 sym_hi - ok
17:46:16.0015 0728 sym_u3 - ok
17:46:16.0062 0728 SynTP (e295fffff3aaf9a6a40b29497901908f) C:\WINDOWS\system32\DRIVERS\SynTP.sys
17:46:16.0062 0728 SynTP - ok
17:46:16.0218 0728 sysaudio (650ad082d46bac0e64c9c0e0928492fd) C:\WINDOWS\system32\drivers\sysaudio.sys
17:46:16.0218 0728 sysaudio - ok
17:46:16.0296 0728 tbiosdrv (7147b0575bcc93a6ab7d5c90f47c0b9f) C:\WINDOWS\system32\DRIVERS\tbiosdrv.sys
17:46:16.0312 0728 tbiosdrv - ok
17:46:16.0375 0728 Tcpip (2a5554fc5b1e04e131230e3ce035c3f9) C:\WINDOWS\system32\DRIVERS\tcpip.sys
17:46:16.0390 0728 Tcpip - ok
17:46:16.0421 0728 TDPIPE (38d437cf2d98965f239b0abcd66dcb0f) C:\WINDOWS\system32\drivers\TDPIPE.sys
17:46:16.0421 0728 TDPIPE - ok
17:46:16.0468 0728 TDTCP (ed0580af02502d00ad8c4c066b156be9) C:\WINDOWS\system32\drivers\TDTCP.sys
17:46:16.0468 0728 TDTCP - ok
17:46:16.0515 0728 TermDD (a540a99c281d933f3d69d55e48727f47) C:\WINDOWS\system32\DRIVERS\termdd.sys
17:46:16.0515 0728 TermDD - ok
17:46:16.0703 0728 tifm21 (244cfbffdefb77f3df571a8cd108fc06) C:\WINDOWS\system32\drivers\tifm21.sys
17:46:16.0703 0728 tifm21 - ok
17:46:16.0734 0728 TosIde - ok
17:46:16.0796 0728 tosrfec (cc069342ee0eae55b32a0ae99cf6185c) C:\WINDOWS\system32\DRIVERS\tosrfec.sys
17:46:16.0796 0728 tosrfec - ok
17:46:16.0859 0728 TVALD (676db15ddf2e0ff6ec03068dea428b8b) C:\WINDOWS\system32\DRIVERS\NBSMI.sys
17:46:16.0859 0728 TVALD - ok
17:46:16.0890 0728 Tvs (cc6763889198ef975b143d49789bcfa9) C:\WINDOWS\system32\DRIVERS\Tvs.sys
17:46:16.0890 0728 Tvs - ok
17:46:16.0984 0728 Udfs (12f70256f140cd7d52c58c7048fde657) C:\WINDOWS\system32\drivers\Udfs.sys
17:46:16.0984 0728 Udfs - ok
17:46:17.0000 0728 ultra - ok
17:46:17.0109 0728 Update (ced744117e91bdc0beb810f7d8608183) C:\WINDOWS\system32\DRIVERS\update.sys
17:46:17.0109 0728 Update - ok
17:46:17.0281 0728 USBAAPL (83cafcb53201bbac04d822f32438e244) C:\WINDOWS\system32\Drivers\usbaapl.sys
17:46:17.0281 0728 USBAAPL - ok
17:46:17.0406 0728 usbccgp (bffd9f120cc63bcbaa3d840f3eef9f79) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
17:46:17.0421 0728 usbccgp - ok
17:46:17.0500 0728 usbehci (15e993ba2f6946b2bfbbfcd30398621e) C:\WINDOWS\system32\DRIVERS\usbehci.sys
17:46:17.0500 0728 usbehci - ok
17:46:17.0593 0728 usbhub (c72f40947f92cea56a8fb532edf025f1) C:\WINDOWS\system32\DRIVERS\usbhub.sys
17:46:17.0593 0728 usbhub - ok
17:46:17.0656 0728 usbprint (a42369b7cd8886cd7c70f33da6fcbcf5) C:\WINDOWS\system32\DRIVERS\usbprint.sys
17:46:17.0656 0728 usbprint - ok
17:46:17.0796 0728 USBSTOR (6cd7b22193718f1d17a47a1cd6d37e75) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
17:46:17.0796 0728 USBSTOR - ok
17:46:17.0828 0728 usbuhci (f8fd1400092e23c8f2f31406ef06167b) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
17:46:17.0828 0728 usbuhci - ok
17:46:17.0906 0728 VgaSave (8a60edd72b4ea5aea8202daf0e427925) C:\WINDOWS\System32\drivers\vga.sys
17:46:17.0921 0728 VgaSave - ok
17:46:17.0937 0728 ViaIde - ok
17:46:18.0000 0728 VolSnap (ee4660083deba849ff6c485d944b379b) C:\WINDOWS\system32\drivers\VolSnap.sys
17:46:18.0000 0728 VolSnap - ok
17:46:18.0109 0728 w39n51 (b1f126e7e28877106d60e6ff3998d033) C:\WINDOWS\system32\DRIVERS\w39n51.sys
17:46:18.0140 0728 w39n51 - ok
17:46:18.0343 0728 Wanarp (984ef0b9788abf89974cfed4bfbaacbc) C:\WINDOWS\system32\DRIVERS\wanarp.sys
17:46:18.0343 0728 Wanarp - ok
17:46:18.0390 0728 wanatw (0a716c08cb13c3a8f4f51e882dbf7416) C:\WINDOWS\system32\DRIVERS\wanatw4.sys
17:46:18.0390 0728 wanatw - ok
17:46:18.0406 0728 WDICA - ok
17:46:18.0468 0728 wdmaud (efd235ca22b57c81118c1aeb4798f1c1) C:\WINDOWS\system32\drivers\wdmaud.sys
17:46:18.0468 0728 wdmaud - ok
17:46:18.0703 0728 MBR (0x1B8) (09ce7397af23d4c0b331b89d0297cc7e) \Device\Harddisk0\DR0
17:46:18.0812 0728 \Device\Harddisk0\DR0 - ok
17:46:18.0828 0728 Boot (0x1200) (c885456e27f14a7231ef9fc5932be1ee) \Device\Harddisk0\DR0\Partition0
17:46:18.0828 0728 \Device\Harddisk0\DR0\Partition0 - ok
17:46:18.0843 0728 ============================================================
17:46:18.0843 0728 Scan finished
17:46:18.0843 0728 ============================================================
17:46:18.0890 0720 Detected object count: 4
17:46:18.0890 0720 Actual detected object count: 4
17:47:13.0531 0720 HKLM\SYSTEM\ControlSet001\services\dd7be328 - will be deleted on reboot
17:47:13.0578 0720 HKLM\SYSTEM\ControlSet003\services\dd7be328 - will be deleted on reboot
17:47:13.0578 0720 C:\WINDOWS\685997021:579083479.exe - will be deleted on reboot
17:47:13.0578 0720 dd7be328 ( HiddenFile.Multi.Generic ) - User select action: Delete
17:47:13.0609 0720 C:\WINDOWS\system32\drivers\kungsfbxvypevp.sys - will be deleted on reboot
17:47:13.0609 0720 C:\WINDOWS\system32\kungsfphemodmt.dll - will be deleted on reboot
17:47:13.0609 0720 C:\WINDOWS\system32\kungsftcqjwcty.dat - will be deleted on reboot
17:47:13.0609 0720 C:\WINDOWS\system32\kungsfltfqrgwu.dll - will be deleted on reboot
17:47:13.0609 0720 C:\WINDOWS\system32\kungsfypibevxu.dat - will be deleted on reboot
17:47:13.0609 0720 HKLM\SYSTEM\ControlSet001\services\kungsfrlnmbnmy - will be deleted on reboot
17:47:13.0609 0720 HKLM\SYSTEM\ControlSet003\services\kungsfrlnmbnmy - will be deleted on reboot
17:47:13.0609 0720 C:\WINDOWS\system32\drivers\kungsfbxvypevp.sys - will be deleted on reboot
17:47:13.0609 0720 kungsfrlnmbnmy ( Rootkit.Win32.TDSS.tdl2 ) - User select action: Delete
17:47:15.0953 0720 Backup copy found, using it..
17:47:15.0968 0720 C:\WINDOWS\system32\DRIVERS\netbt.sys - will be cured on reboot
17:47:15.0968 0720 NetBT ( Rootkit.Win32.ZAccess.j ) - User select action: Cure
17:47:16.0000 0720 C:\WINDOWS\system32\drivers\SKYNETwevpwivx.sys - will be deleted on reboot
17:47:16.0000 0720 C:\WINDOWS\system32\SKYNETvmbabvtj.dll - will be deleted on reboot
17:47:16.0000 0720 HKLM\SYSTEM\ControlSet001\services\SKYNETfwxbqfgn - will be deleted on reboot
17:47:16.0000 0720 HKLM\SYSTEM\ControlSet003\services\SKYNETfwxbqfgn - will be deleted on reboot
17:47:16.0000 0720 C:\WINDOWS\system32\drivers\SKYNETwevpwivx.sys - will be deleted on reboot
17:47:16.0000 0720 SKYNETfwxbqfgn ( Rootkit.Win32.TDSS.tdl2 ) - User select action: Delete
17:47:32.0203 0704 Deinitialize success



#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:48 PM

Posted 18 October 2011 - 08:57 PM

You have rebooted after that,very important.

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 zerostar

zerostar

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 19 October 2011 - 12:10 AM

OK, I think that did it. Everything seems normal as far as I can tell.

Here is the log from Malware Bytes in case anyone was curious what was all there.

Thanks boopme, I probably would have had to reformat if I hadn't found this forum.

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7977

Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

10/18/2011 9:51:02 PM
mbam-log-2011-10-18 (21-50-57).txt

Scan type: Full scan (C:\|)
Objects scanned: 263880
Time elapsed: 42 minute(s), 57 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 3
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 13

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\AppID\{A0E1054B-01EE-4D57-A059-4D99F339709F} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{8E3C68CD-F500-4A2A-8CB9-132BB38C3573} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{986A8AC1-AB4D-4F41-9068-4B01C0197867} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\main.BHO.1 (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\main.BHO (Trojan.BHO) -> No action taken.

Registry Values Infected:
HKEY_CLASSES_ROOT\main.BHO.1\CLSID\(default) (Adware.DeepDive) -> Value: (default) -> No action taken.
HKEY_CLASSES_ROOT\main.BHO\CLSID\(default) (Adware.DeepDive) -> Value: (default) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BssWWJ7dEL8gZ8234A (Trojan.FakeAlert.CLGen) -> Value: BssWWJ7dEL8gZ8234A -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Qoobox\quarantine\C\program files\iCheck\icheck.exe.vir (Adware.ISM) -> No action taken.
c:\system volume information\_restore{4b1aea69-b95e-4955-a6a6-502cd89cda69}\RP164\A0023889.exe (Backdoor.Bot) -> No action taken.
c:\program files\Common\_helper.sig (Malware.Trace) -> No action taken.
c:\program files\Common\helper.sig (Trojan.Agent) -> No action taken.
c:\program files\Shared\_lib.sig (Adware.Deepdive) -> No action taken.
c:\program files\Shared\lib.sig (Adware.Deepdive) -> No action taken.
c:\WINDOWS\system32\LoveFly.dll (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\mst122.dll (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\smart.dll (Trojan.Agent) -> No action taken.
c:\documents and settings\Derek\application data\ldr.ini (Malware.Trace) -> No action taken.
c:\documents and settings\Sabrina\application data\ldr.ini (Malware.Trace) -> No action taken.
c:\WINDOWS\system32\TDSSnrse.dll (Rootkit.TDSS) -> No action taken.
c:\WINDOWS\system32\TDSSosvn.dll (Rootkit.TDSS) -> No action taken.



#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:48 PM

Posted 19 October 2011 - 11:00 AM

Did you run ComboFix before this issue or because of it.

MBAM log shows No action taken did you Remove the Selected items?

We need to update Java and Adobe Reader.



Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7u1-windows-i586-s.exe (or jre-7u1-windows-x64.exe for 64-bit) to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.

Similarly Update to Adobe Reader X (10.1.0)
Note UN check the box so you do not install the toolbar,unless you really want it..

Free! Google Toolbar search Google from any web page, block pop-ups

Yes, install Google Toolbar - optional




Not installing XP's Service Pack 3 thru Windows Update leaves you vulnerable to future infections.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users