Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Computer has malware, redirect virus, iexplore.exe auto runs etc..


  • This topic is locked This topic is locked
25 replies to this topic

#1 chadbao

chadbao

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 07 October 2011 - 10:59 PM

My computer first started to have a google redirect virus, where I click on a link I searched from google and then it goes to a different website. Soon after this started happening my desktop turned blue and all the icons were missing, and iexplore.exe started running on its own, but no iexplore.exe windows were open. and every time I ended it from the task manager it would just come back.
To solve the blue screen desktop, I deleted my user account and created a new one. and to avoid iexplore.exe from spawning I turned iexplore to work offline and only use firefox. Now my computer is still useable and not completely slow, but I still have the redirect problem with google searches, iexplore.exe still spawns but doesn't do much because it can't connect to websites, and sometimes I feel like firefox is running more than it should. I know I just found ways around my problem, but haven't eliminated them, and want to get them fixed before the computer gets worse.
so if there is a way to fix these problems I would greatly appreciate it if someone could help me.
Thanks
Chad

Edited by hamluis, 08 October 2011 - 08:23 AM.
Moved from XP to Am I Infected.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:26 PM

Posted 07 October 2011 - 11:29 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 12:13 AM

HI Broni,
thanks for the help. here is the security Check report:

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
Rising Antivirus
Antivirus up to date! (On Access scanning disabled!)
```````````````````````````````
Anti-malware/Other Utilities Check:

Java™ 6 Update 17
Out of date Java installed!
Adobe Flash Player 10.3.183.10
Adobe Reader 9.4.5
Out of date Adobe Reader installed!
Mozilla Firefox (x86 en-US..) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

``````````End of Log````````````

#4 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 12:15 AM

here is the minitoolbox report:

MiniToolBox by Farbar
Ran by Chad bao (administrator) on 07-10-2011 at 22:53:54
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp

# Interface IP Configuration for "Wireless Network Connection 2"

set address name="Wireless Network Connection 2" source=dhcp
set dns name="Wireless Network Connection 2" source=dhcp register=PRIMARY
set wins name="Wireless Network Connection 2" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : laptop

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : domain.actdsltmp



Ethernet adapter Local Area Connection:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Realtek RTL8139 Family PCI Fast Ethernet NIC

Physical Address. . . . . . . . . : 00-C0-9F-83-D2-82



Ethernet adapter Wireless Network Connection 2:



Connection-specific DNS Suffix . : domain.actdsltmp

Description . . . . . . . . . . . : Broadcom 802.11b/g WLAN

Physical Address. . . . . . . . . : 00-90-4B-F4-5A-3E

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.0.3

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.0.1

DHCP Server . . . . . . . . . . . : 192.168.0.1

DNS Servers . . . . . . . . . . . : 192.168.0.1

205.171.3.25

Lease Obtained. . . . . . . . . . : Friday, October 07, 2011 6:15:09 PM

Lease Expires . . . . . . . . . . : Saturday, October 08, 2011 6:15:09 PM

Server: qwestmodem.domain.actdsltmp
Address: 192.168.0.1

DNS request timed out.
timeout was 2 seconds.
Name: google.com
Addresses: 74.125.224.147, 74.125.224.148, 74.125.224.144, 74.125.224.145
74.125.224.146



Pinging google.com [74.125.224.148] with 32 bytes of data:



Reply from 74.125.224.148: bytes=32 time=61ms TTL=56

Reply from 74.125.224.148: bytes=32 time=61ms TTL=56



Ping statistics for 74.125.224.148:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 61ms, Maximum = 61ms, Average = 61ms

Server: qwestmodem.domain.actdsltmp
Address: 192.168.0.1

DNS request timed out.
timeout was 2 seconds.
Name: yahoo.com
Addresses: 72.30.2.43, 98.137.149.56, 98.139.180.149, 209.191.122.70
67.195.160.76



Pinging yahoo.com [98.137.149.56] with 32 bytes of data:



Reply from 98.137.149.56: bytes=32 time=72ms TTL=54

Reply from 98.137.149.56: bytes=32 time=71ms TTL=54



Ping statistics for 98.137.149.56:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 71ms, Maximum = 72ms, Average = 71ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 c0 9f 83 d2 82 ...... Realtek RTL8139 Family PCI Fast Ethernet NIC - Packet Scheduler Miniport
0x3 ...00 90 4b f4 5a 3e ...... Broadcom 802.11b/g WLAN - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.3 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.3 192.168.0.3 25
192.168.0.3 255.255.255.255 127.0.0.1 127.0.0.1 25
192.168.0.255 255.255.255.255 192.168.0.3 192.168.0.3 25
224.0.0.0 240.0.0.0 192.168.0.3 192.168.0.3 25
255.255.255.255 255.255.255.255 192.168.0.3 2 1
255.255.255.255 255.255.255.255 192.168.0.3 192.168.0.3 1
Default Gateway: 192.168.0.1
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (10/01/2011 09:29:48 AM) (Source: Application Error) (User: )
Description: Faulting application firefox.exe, version 6.0.0.4240, faulting module unknown, version 0.0.0.0, fault address 0x010b89f7.
Processing media-specific event for [firefox.exe!ws!]

Error: (10/01/2011 00:04:17 AM) (Source: Application Error) (User: )
Description: Faulting application rundll32.exe, version 5.1.2600.5512, faulting module unknown, version 0.0.0.0, fault address 0x715b9e59.
Processing media-specific event for [rundll32.exe!ws!]

Error: (09/30/2011 09:52:47 PM) (Source: Application Error) (User: )
Description: Fault bucket 223121472.
The Wep key exchange did not result in a secure connection setup after 802.1x authentication. The current setting has been marked as failed and the Wireless connection will be disconnected.

Error: (09/30/2011 09:52:28 PM) (Source: Application Error) (User: )
Description: Faulting application drwtsn32.exe, version 5.1.2600.0, faulting module dbghelp.dll, version 5.1.2600.5512, fault address 0x0001295d.
Processing media-specific event for [drwtsn32.exe!ws!]

Error: (09/30/2011 09:38:00 PM) (Source: Application Error) (User: )
Description: Faulting application rundll32.exe, version 5.1.2600.5512, faulting module unknown, version 0.0.0.0, fault address 0x715b9e59.
Processing media-specific event for [rundll32.exe!ws!]

Error: (09/30/2011 09:11:30 PM) (Source: Application Error) (User: )
Description: Faulting application rundll32.exe, version 5.1.2600.5512, faulting module unknown, version 0.0.0.0, fault address 0x715b9e59.
Processing media-specific event for [rundll32.exe!ws!]

Error: (09/30/2011 08:29:24 PM) (Source: Application Error) (User: )
Description: Faulting application rundll32.exe, version 5.1.2600.5512, faulting module unknown, version 0.0.0.0, fault address 0x715b9e59.
Processing media-specific event for [rundll32.exe!ws!]

Error: (09/30/2011 08:28:01 PM) (Source: Application Error) (User: )
Description: Faulting application rundll32.exe, version 5.1.2600.5512, faulting module unknown, version 0.0.0.0, fault address 0x715b9e59.
Processing media-specific event for [rundll32.exe!ws!]

Error: (09/30/2011 08:25:47 PM) (Source: Application Error) (User: )
Description: Faulting application rundll32.exe, version 5.1.2600.5512, faulting module unknown, version 0.0.0.0, fault address 0x715b9e59.
Processing media-specific event for [rundll32.exe!ws!]

Error: (09/30/2011 08:23:43 PM) (Source: Application Error) (User: )
Description: Faulting application rundll32.exe, version 5.1.2600.5512, faulting module unknown, version 0.0.0.0, fault address 0x715b9e59.
Processing media-specific event for [rundll32.exe!ws!]


System errors:
=============
Error: (09/07/2011 05:55:33 PM) (Source: Print) (User: SYSTEM)
Description: Sharing printer failed + 1722, Printer CAPTURE FAX BVRP share name Printer.

Error: (09/02/2011 10:41:38 PM) (Source: Service Control Manager) (User: )
Description: The Java Quick Starter service terminated unexpectedly. It has done this 1 time(s).

Error: (10/22/2011 06:52:45 AM) (Source: Dhcp) (User: )
Description: Your computer has lost the lease to its IP address 192.168.0.3 on the
Network Card with network address 00904BF45A3E.


Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================

??QQ2011 (Version: 1.61.2103.0)
Acrobat.com (Version: 1.7.186)
Active@ ISO Burner (Version: 2.1.0)
Adobe AIR (Version: 1.5.1.8210)
Adobe Download Manager (Version: 1.6.2.102)
Adobe Flash Player 10 ActiveX (Version: 10.3.183.5)
Adobe Flash Player 10 Plugin (Version: 10.3.183.10)
Adobe Reader 9.4.5 (Version: 9.4.5)
ArcSoft VideoImpression 2
AT&T Communication Manager (Version: 7.02.0610.0)
Broadcom 802.11 Driver
Conexant AC-Link Audio
Dragon NaturallySpeaking 7.0 (Version: 7.00.000.047)
Driver Installer (Version: 2.3.0.797)
DVDFab 7.0.4.0 (15/04/2010)
FaxTools (Version: 5.08)
Intel® Extreme Graphics 2 Driver
InterVideo DVD Check
InterVideo WinDVD (Version: 5.0-B11.662)
Java™ 6 Update 17 (Version: 6.0.170)
Microsoft .NET Framework 1.1 (Version: 1.1.4322)
Microsoft .NET Framework 1.1 Security Update (KB2416447)
Microsoft .NET Framework 2.0 Service Pack 2 (Version: 2.2.30729)
Microsoft .NET Framework 3.0 Service Pack 2 (Version: 3.2.30729)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft Office 2007 Service Pack 2 (SP2)
Microsoft Office Access MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Access Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Groove MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Groove Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office InfoPath MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office OneNote MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
Microsoft Office Publisher MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Ultimate 2007 (Version: 12.0.6425.1000)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Mozilla Firefox 7.0.1 (x86 en-US) (Version: 7.0.1)
ONES Trial (E)
PC VGA Camer@ Plus (Version: 1.0.0.19)
QQ?????4.2 (Version: 4.2)
QQ游戏 (Version: 2.5.101.51)
QVOD Safe Player(QVOD) 3.5 (Version: 3.5)
Qwest Installer (Version: 1.0)
Qwest QuickAssist Desktop Tools (Version: 23)
Qwest Quickcare 2.7 (Version: 2.7.1002.1512)
Rising Antivirus (Version: 23.00.45.98)
Rising Software Deployment System (Version: 23.00.00.36)
StreamTorrent 1.0
WebFldrs XP (Version: 9.50.7523)
Windows Genuine Advantage Notifications (KB905474) (Version: 1.9.0040.0)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Internet Explorer 8 Multilingual User Interface (MUI) (Version: 20090411.120000)

========================= Memory info: ===================================

Percentage of memory in use: 87%
Total physical RAM: 478.4 MB
Available physical RAM: 58.8 MB
Total Pagefile: 1123.96 MB
Available Pagefile: 413.14 MB
Total Virtual: 2047.88 MB
Available Virtual: 1993.72 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:37.25 GB) (Free:7.77 GB) NTFS

========================= Users: ========================================

User accounts for \\LAPTOP

Administrator Chad bao Guest
HelpAssistant SUPPORT_388945a0


**** End of log ****

#5 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 12:36 AM

here is the malwarebytes log. it said certain items cannot be removed. I am going to restart the computer and run the GMER, I will post that when I finish it. here is the log:


Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7898

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

10/7/2011 11:33:59 PM
mbam-log-2011-10-07 (23-33-59).txt

Scan type: Quick scan
Objects scanned: 172376
Time elapsed: 26 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 6
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\documents and settings\titus\local settings\application data\serviceuser.dll (Trojan.Tracur.VGen) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{0BE15BCB-E06D-48BC-977B-C8EA0C63DADe} (Trojan.Tracur.VGen) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0BE15BCB-E06D-48BC-977B-C8EA0C63DADE} (Trojan.Tracur.VGen) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{0BE15BCB-E06D-48BC-977B-C8EA0C63DADE} (Trojan.Tracur.VGen) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0BE15BCB-E06D-48BC-977B-C8EA0C63DADE} (Trojan.Tracur.VGen) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\.fsharproj (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\SogouExplorerHTML (Adware.Sogou) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\titus\local settings\application data\serviceuser.dll (Trojan.Tracur.VGen) -> Delete on reboot.
c:\documents and settings\all users\application data\applenotifierupdate.dll (Trojan.Tracur.VGen) -> Quarantined and deleted successfully.
c:\WINDOWS\bk23567.dat (KoobFace.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\fdgg34353edfgdfdf (KoobFace.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\lgo (Koobface.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\ligh (Koobface.Trace) -> Quarantined and deleted successfully.

#6 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 01:32 AM

when I clicked to open the gmer.exe an error came up: load driver ("c:\documen~1\CHADBA~1\LOCALS~1\Temp\uxtdapow.sys") error 0xC000010E: cannot create a stable subkey under a volatile parent key

I clicked ok then Gmer ran as normal here are the results:

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-10-08 00:14:56
Windows 5.1.2600 Service Pack 3
Running: s6iv7ek0.exe; Driver: C:\DOCUME~1\CHADBA~1\LOCALS~1\Temp\uxtdapow.sys


---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2 285507792

---- EOF - GMER 1.0.15 ----




Again thanks for the help. So what is the next step?

#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:26 PM

Posted 08 October 2011 - 09:37 AM

Please re-run Malwarebytes one more time and post fresh log.

Then....

Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/


  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • Super should automatically the program definitions. If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
  • Close SUPERAntiSpyware.
Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; pick Safe Mode; you'll see "Safe Mode" in all four corners of your screen

  • Open SUPERAntiSpyware.
  • Click on "Preferences" button.
  • Click the "Scanning Control" tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
  • Click the "Home" button to leave the control center screen.
  • Back on the main screen checkmark "Complete scan" and click "Scan your computer".
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Copy and paste the Scan Log results in your next reply with a new HijackThis log.
  • Click Close to exit the program.

Post SUPERAntiSpyware log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#8 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 12:24 PM

the Malwarebytes didn't find any problems this time here is the log and I will run the other spyware and post it:

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7898

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

10/8/2011 11:21:40 AM
mbam-log-2011-10-08 (11-21-40).txt

Scan type: Quick scan
Objects scanned: 171822
Time elapsed: 21 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#9 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 02:15 PM

here is the super anti spyware log. I don't have hijackthis where is a safe site to get it from?

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/08/2011 at 01:03 PM

Application Version : 5.0.1128

Core Rules Database Version : 7773
Trace Rules Database Version: 5585

Scan type : Complete Scan
Total Scan Time : 01:22:29

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 243
Memory threats detected : 0
Registry items scanned : 36153
Registry threats detected : 1
File items scanned : 49925
File threats detected : 52

Adware.Qvod
C:\PROGRAM FILES\QVODPLAYER\QVODPLAYER.EXE
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\QvodPlayer.exe
C:\PROGRAM FILES\QVODPLAYER\ADDIN\VISLRC.DLL
C:\PROGRAM FILES\QVODPLAYER\QVODBAND.DLL
C:\PROGRAM FILES\QVODPLAYER\QVODINSERT.DLL
C:\PROGRAM FILES\QVODPLAYER\QVODTERMINAL.EXE
C:\PROGRAM FILES\QVODPLAYER\QVODUNINST.EXE
C:\PROGRAM FILES\QVODPLAYER\SHAREMODULE.DLL
C:\WINDOWS\Prefetch\QVODPLAYER.EXE-2BFA4E11.pf
C:\WINDOWS\Prefetch\QVODTERMINAL.EXE-237DC49F.pf

Adware.Tencent
C:\PROGRAM FILES\腾讯游戏\QQGAME\BUGREPORT.EXE
C:\PROGRAM FILES\腾讯游戏\QQGAME\DAJIALAIZHAOCHA\SOUNDENGINE\AUDIOEDITOR.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\DAJIALAIZHAOCHA\SOUNDENGINE\TENFACT.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\DAJIALAIZHAOCHA\SOUNDENGINE\TIMER.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\DAJIALAIZHAOCHA\TERSAFE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\DDZRPG\DDZRPG.EXE
C:\PROGRAM FILES\腾讯游戏\QQGAME\DDZRPG\TENIO\AUDIOEDITOR.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\DDZRPG\TENIO\TENFACT.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\DDZRPG\TENIO\TIMER.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\544A57076381ACED786C074689842FCD\P2PAPI.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\544A57076381ACED786C074689842FCD\P2PAPP.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\544A57076381ACED786C074689842FCD\P2PCORE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\544A57076381ACED786C074689842FCD\P2PDATA.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\544A57076381ACED786C074689842FCD\P2PHTTP.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\544A57076381ACED786C074689842FCD\TENIODL_CORE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\9302E98FCB7C8282A18BE0D9BF506A6D\P2PAPP.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\9302E98FCB7C8282A18BE0D9BF506A6D\P2PCORE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\9302E98FCB7C8282A18BE0D9BF506A6D\P2PDATA.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\9302E98FCB7C8282A18BE0D9BF506A6D\P2PHTTP.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\9302E98FCB7C8282A18BE0D9BF506A6D\TENIODL.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\9302E98FCB7C8282A18BE0D9BF506A6D\TENIODL_CORE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\99D50987CF607B257F114551EC05A546\P2PAPP.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\99D50987CF607B257F114551EC05A546\TENIODL_CORE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\TENIODL\P2PAPP.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\TENIODL\P2PCORE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\TENIODL\P2PDATA.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\TENIODL\P2PHTTP.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\TENIODL\TENIODL.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\LOGIC\TENIODL\TENIODL_CORE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\NEWSJRPG\NEWSJRPG.EXE
C:\PROGRAM FILES\腾讯游戏\QQGAME\NEWSJRPG\TERSAFE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\PCMLOADER\QQDOWNLOAD.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\TENSLX.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\TERSAFE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\TXSSO\BIN\SSOCOMMON.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\TXSSO\BIN\SSOLUICONTROL.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\TXSSO\BIN\SSOPLATFORM.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\VIDEO\AUDIOENGINE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\VIDEO\VCODEC.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\VIDEO\VEXPRESSION.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\VIDEO\VIDEODEVICE.DLL
C:\PROGRAM FILES\腾讯游戏\QQGAME\VIDEO\VQQALLINONE.DLL
C:\WINDOWS\SYSTEM32\QQPINYIN.IME

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:26 PM

Posted 08 October 2011 - 02:52 PM

HJT is not allowed in this forum.
It's an outdated tool anyway.

How is computer doing?

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 03:52 PM

It seems to be running a little better, I turned IE back to work online, and iexplore.exe hasn't been spawning in the background and using up memory as much but I still see it there even though I don't open any IE windows. I will keep it on and see if it starts getting bad again. And I still have a problem when I search on google, if I click any search results it still redirects to other websites.

#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:26 PM

Posted 08 October 2011 - 03:57 PM

Download TDSSKiller and save it to your desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#13 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 09:06 PM

I cant get tdsskiller to work, I downloaded it, then when I double click it, a open file warning comes up, I click on run then nothing happens. I tried re downloading the file, same thing, I rebooted my computer still same thing, I tried booting in safe mode still nothing happens. So I am not sure why it will not run. I even tried downloading the file from a different website still same result.

#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:26 PM

Posted 08 October 2011 - 09:14 PM

Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can download, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#15 chadbao

chadbao
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:26 PM

Posted 08 October 2011 - 10:35 PM

here is the rootkit report:

RkU Version: 3.8.389.593, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0x804D7000 C:\WINDOWS\system32\ntoskrnl.exe 2192768 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2192768 bytes
0x804D7000 RAW 2192768 bytes
0x804D7000 WMIxWDM 2192768 bytes
0xBF800000 Win32k 1859584 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1859584 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF73DB000 PCI_PNP8752 995328 bytes
0xF73DB000 sprq.sys 995328 bytes
0xF73DB000 sptd 995328 bytes
0xBF064000 C:\WINDOWS\System32\ialmdd5.DLL 761856 bytes (Intel Corporation, DirectDraw® Driver for Intel® Graphics Technology)
0xF66F1000 C:\WINDOWS\system32\DRIVERS\ialmnt5.sys 712704 bytes (Intel Corporation, Intel Graphics Miniport Driver)
0xF7233000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xB96A7000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xF64B4000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xB97D6000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xB10CC000 C:\WINDOWS\system32\DRIVERS\srv.sys 360448 bytes (Microsoft Corporation, Server driver)
0xF6665000 C:\WINDOWS\system32\DRIVERS\bcmwl5.sys 344064 bytes (Broadcom Corporation, BCM 802.11g Network Adapter wireless driver)
0xF65B6000 C:\WINDOWS\system32\drivers\camcaud.sys 294912 bytes (Conexant Systems Inc., Conexant WDM AC97 Audio Driver)
0xBF11E000 C:\WINDOWS\System32\ATMFD.DLL 290816 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xF65FE000 C:\WINDOWS\system32\drivers\camchal.sys 278528 bytes (Conexant Systems Inc., Conexant AmcHal Driver)
0xB0D43000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF653A000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xF7395000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xB132C000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF7206000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xB973F000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xB962E000 C:\WINDOWS\system32\drivers\Hooksys.sys 167936 bytes (Beijing Rising Information Technology Co., Ltd., Hooksys.sys)
0xB97AE000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF7321000 dmio.sys 155648 bytes (Microsoft Corp., Veritas Software, NT Disk Manager I/O Driver)
0xB9608000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xBF040000 C:\WINDOWS\System32\ialmdev5.DLL 147456 bytes (Intel Corporation, Component GHAL Driver)
0xF6592000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF66B9000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF6642000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xB978C000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xB976A000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0x806EF000 ACPI_HAL 131840 bytes
0x806EF000 C:\WINDOWS\system32\hal.dll 131840 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF72E9000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xBF020000 C:\WINDOWS\System32\ialmdnt5.dll 131072 bytes (Intel Corporation, Controller Hub for Intel Graphics Driver)
0xF7347000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF7366000 pcmcia.sys 122880 bytes (Microsoft Corporation, PCMCIA Bus Driver)
0xF71EC000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF7309000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xB25BE000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xF73C3000 C:\WINDOWS\System32\Drivers\SCSIPORT.SYS 98304 bytes (Microsoft Corporation, SCSI Port Driver)
0xF72C0000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF657B000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xB1567000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF66DD000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xB982F000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF72D7000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xF7384000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF656A000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xB2C6E000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF772F000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF67BF000 C:\WINDOWS\system32\DRIVERS\nic1394.sys 65536 bytes (Microsoft Corporation, IEEE1394 Ndis Miniport and Call Manager)
0xF74EF000 ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0xF5CAE000 C:\WINDOWS\system32\DRIVERS\arp1394.sys 61440 bytes (Microsoft Corporation, IP/1394 Arp Client)
0xF767F000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF766F000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xF62E8000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF6348000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF74FF000 C:\WINDOWS\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xBF012000 C:\WINDOWS\System32\ialmrnt5.dll 57344 bytes (Intel Corporation, Controller Hub for Intel Graphics Driver)
0xF754F000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF67AF000 C:\WINDOWS\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF768F000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF752F000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF76CF000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF5CCE000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF679F000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF751F000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF769F000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF750F000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF681F000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF76EF000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xB31A1000 C:\WINDOWS\System32\Drivers\BlackBox.SYS 36864 bytes (RKU Driver)
0xF753F000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF75FF000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xF76DF000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF5CDE000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xF67CF000 C:\WINDOWS\System32\drivers\swmsflt.sys 36864 bytes (-, Sierra Wireless Filter Driver)
0xF5CBE000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF78DF000 C:\WINDOWS\system32\drivers\Afc.sys 32768 bytes (Arcsoft, Inc., Arcsoft® ASPI Shell)
0xECCEE000 C:\WINDOWS\system32\drivers\HOOKHELP.sys 32768 bytes (Beijing Rising Information Technology Co., Ltd., HookHelp.sys)
0xF78E7000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xF5E3C000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF78BF000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF5E54000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xECCFE000 C:\WINDOWS\system32\drivers\hvm.sys 28672 bytes (Beijing Rising Information Technology Co., Ltd., VM Monitor)
0xF776F000 C:\WINDOWS\System32\Drivers\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF77FF000 C:\WINDOWS\system32\PCTINDIS5.SYS 28672 bytes (Smith Micro Inc., Smith Micro NDIS 5.0 Protocol Driver)
0xF779F000 C:\WINDOWS\system32\DRIVERS\RimSerial.sys 28672 bytes (Research in Motion Ltd, RIM Virtual Serial Driver)
0xF78CF000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF78D7000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF78C7000 C:\WINDOWS\system32\DRIVERS\RTL8139.SYS 24576 bytes (Realtek Semiconductor Corporation, Realtek RTL8139 NDIS 5.0 Driver)
0xECD06000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xF78B7000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xF5E4C000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xECCF6000 C:\WINDOWS\system32\drivers\HookTdi.sys 20480 bytes (Beijing Rising Information Technology Co., Ltd., hooktdi.sys)
0xF5E44000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF7777000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF78F7000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7797000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xECD0E000 C:\WINDOWS\System32\Drivers\tcpipBM.SYS 20480 bytes (Bytemobile, Inc., Bytemobile Kernel Network Provider)
0xF78EF000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xB6B32000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF7907000 C:\WINDOWS\system32\DRIVERS\BATTC.SYS 16384 bytes (Microsoft Corporation, Battery Class Driver)
0xF7166000 C:\WINDOWS\system32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0xF79BB000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xB9AEC000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF790B000 ACPIEC.sys 12288 bytes (Microsoft Corporation, ACPI Embedded Controller Driver)
0xF78FF000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF7903000 compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver)
0xB2983000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF715E000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xB13A9000 C:\WINDOWS\system32\drivers\protreg.sys 12288 bytes (Beijing Rising Information Technology Co., Ltd., protectreg.sys)
0xF790F000 PzWDM.sys 12288 bytes (Prassi Technology, PzWDM.sys)
0xF6532000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xF7162000 C:\WINDOWS\system32\DRIVERS\wmiacpi.sys 12288 bytes (Microsoft Corporation, Windows Management Interface for ACPI)
0xF652A000 C:\WINDOWS\System32\drivers\ws2ifsl.sys 12288 bytes (Microsoft Corporation, Winsock2 IFS Layer)
0xF79EF000 00000264 8192 bytes
0xF7A8D000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF79F7000 BMLoad.sys 8192 bytes (Bytemobile, Inc., Bytemobile Kernel Driver Loader)
0xF79F5000 dmload.sys 8192 bytes (Microsoft Corp., Veritas Software., NT Disk Manager Startup Driver)
0xB2979000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xF7A8B000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF79F3000 intelide.sys 8192 bytes (Microsoft Corporation, Intel PCI IDE Driver)
0xF79EF000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7A8F000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7A91000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7A35000 C:\WINDOWS\System32\Drivers\RootMdm.sys 8192 bytes (Microsoft Corporation, Legacy Non-Pnp Modem Device Driver)
0xF7A37000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7A51000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF79F1000 C:\WINDOWS\System32\Drivers\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7B14000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7B8F000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xEC90B000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF7AB8000 C:\WINDOWS\system32\DRIVERS\OPRGHDLR.SYS 4096 bytes (Microsoft Corporation, ACPI Operation Registration Driver)
0xF7AB7000 PCIIde.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0x85B871F8 unknown_irp_handler 3592 bytes
0x850751F8 unknown_irp_handler 3592 bytes
0x85B8A1F8 unknown_irp_handler 3592 bytes
0x84FE21F8 unknown_irp_handler 3592 bytes
0x85B8B1F8 unknown_irp_handler 3592 bytes
0x84CA01F8 unknown_irp_handler 3592 bytes
0x84E0C1F8 unknown_irp_handler 3592 bytes
0x842E21F8 unknown_irp_handler 3592 bytes
0x84FC93F8 unknown_irp_handler 3080 bytes
!!!!!!!!!!!Hidden driver: 0x85B12F38 00000407 0 bytes
==============================================
>Stealth
==============================================
0x85B215F6 Unknown page with executable code, 2570 bytes
0x85B235AA Unknown page with executable code, 2646 bytes
0x85B20DBA Unknown page with executable code, 582 bytes
0x85B210C3 Unknown thread object [ ETHREAD 0x85B0EDA8 ] TID: 124, 600 bytes
0x85B22A11 Unknown thread object [ ETHREAD 0x85B0E640 ] TID: 136, 600 bytes
WARNING: File locked for read access [C:\WINDOWS\system32\drivers\sptd.sys]
0x85B20CDB Unknown page with executable code, 805 bytes




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users