Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

browser re-directs


  • This topic is locked This topic is locked
15 replies to this topic

#1 rays1

rays1

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 03 November 2011 - 11:14 AM

Hello, forum,

Apologies in advance if I repeat questions answered elsewhere but, I’ll try to post
in the correct section – which this seems to be?. I’ve not posted here before

It seems I have a determined computer ‘bug’ that causes my browser to intermittently
but continuously re-direct to different sites without my input. It’s usually a bookseller
site but can be any amount of others as well. I’ve wiped my hard drive but, when I
re-load windows, it still happens – which is something I’ve never came across before.

I’ve tried running spybot-search and destroy and hitman pro but they don’t seem to work
although spybot did first identify 2 trojans called Vodon (or something like that)
Does anybody recognise these symptoms?
Is it possible for virus’ to somehow embed themselves in your hard drive and so survive
a hard drive wipe?. If so, would wiping it several times with ‘killdisk’ or similar
cure this, maybe?

I have 2 comps running Vista and Win7 and have heard that there is a program called
‘Combofix’ that may do the trick but, I’m told that I MUST NOT run it alone since it
requires expert help from yourselves - which would be much appreciated

Thanks,

Ray

Please feel free to email direct to me at ray@rays1.co.uk

BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:31 AM

Posted 03 November 2011 - 12:50 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here. If you have 2 computers on the same router they can reinfect each other. Please disconnect both from the internet and will will take care of one of them at a time. Only connect them to the net when we need to download tools.

Please take note:

  • If you have since resolved the original problem you were having, we would appreciate you letting us know.
  • If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
  • If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
  • If you have already posted a DDS log, please do so again, as your situation may have changed.
  • Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step. Then proceed to run aswMbr.exe as noted below.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Note:
If you are unable to run a Gmer scan due the fact you are running a 64bit machine please run the following tool and post its log.

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.



Thanks and again sorry for the delay.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 rays1

rays1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 03 November 2011 - 04:46 PM

Your response was quick and nothing to apologise about!

I did the dds thing but, I've no idea what it means. I'm posting it below
and thank you, fireman for your help!..................

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 7.0.6001.18000
Run by Ray at 21:31:24 on 2011-11-03
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.44.1033.18.2047.1199 [GMT 0:00]
.
AV: AVG Anti-Virus Free Edition 2012 *Enabled/Updated* {5A2746B1-DEE9-F85A-FBCD-ADB11639C5F0}
SP: AVG Anti-Virus Free Edition 2012 *Enabled/Updated* {E146A755-F8D3-F7D4-C17D-96C36DBE8F4D}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\PROGRA~1\AVG\AVG2012\avgrsx.exe
C:\Program Files\AVG\AVG2012\avgcsrvx.exe
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\AVG\AVG2012\avgtray.exe
C:\Program Files\AVG\AVG2012\avgwdsvc.exe
C:\Program Files\Roxio\CinePlayer\DMXLauncher.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Common Files\Roxio Shared\10.0\SharedCOM\RoxWatch10.exe
C:\Program Files\AVG\AVG2012\avgnsx.exe
C:\Program Files\AVG\AVG2012\avgemcx.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\AVG\AVG2012\AVGIDSAgent.exe
C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
mWindow Title =
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [AVG_TRAY] "c:\program files\avg\avg2012\avgtray.exe"
mRun: [LXCCCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\LXCCtime.dll,_RunDLLEntry@16
mRun: [<NO NAME>]
mRun: [DMXLauncher] "c:\program files\roxio\cineplayer\DMXLauncher.exe"
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {76577871-04EC-495E-A12B-91F7C3600AFA} - http://rover.ebay.com/rover/1/710-44557-9400-3/4
IE: {8A918C1D-E123-4E36-B562-5C1519E434CE} - http://www.amazon.co.uk/exec/obidos/redirect-home?tag=Toshibaukbholink-21&site=home
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0\bin\npjpi160.dll
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
TCP: DhcpNameServer = 95.168.162.12 95.168.162.22
TCP: Interfaces\{0C3370BB-9079-4CAA-8284-EFAFBB50AC8C} : DhcpNameServer = 95.168.162.12 95.168.162.22
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg2012\avgpp.dll
Notify: igfxcui - igfxdev.dll
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\ray\appdata\roaming\mozilla\firefox\profiles\x8zseaao.default\
.
============= SERVICES / DRIVERS ===============
.
R0 AVGIDSEH;AVGIDSEH;c:\windows\system32\drivers\AVGIDSEH.sys [2011-7-11 23120]
R0 Avgrkx86;AVG Anti-Rootkit Driver;c:\windows\system32\drivers\avgrkx86.sys [2011-9-13 32592]
R1 Avgldx86;AVG AVI Loader Driver;c:\windows\system32\drivers\avgldx86.sys [2011-7-11 229840]
R1 Avgmfx86;AVG Mini-Filter Resident Anti-Virus Shield;c:\windows\system32\drivers\avgmfx86.sys [2011-8-8 40016]
R1 Avgtdix;AVG TDI Driver;c:\windows\system32\drivers\avgtdix.sys [2011-7-11 295248]
R2 AVGIDSAgent;AVGIDSAgent;c:\program files\avg\avg2012\AVGIDSAgent.exe [2011-9-12 5265248]
R2 avgwd;AVG WatchDog;c:\program files\avg\avg2012\avgwdsvc.exe [2011-8-2 192776]
R2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxWatch10.exe [2007-8-24 166384]
R2 SBSDWSCService;SBSD Security Center Service;c:\program files\spybot - search & destroy\SDWinSec.exe [2011-11-1 1153368]
R3 AVGIDSDriver;AVGIDSDriver;c:\windows\system32\drivers\AVGIDSDriver.sys [2011-7-11 134736]
R3 AVGIDSFilter;AVGIDSFilter;c:\windows\system32\drivers\AVGIDSFilter.sys [2011-7-11 24272]
R3 AVGIDSShim;AVGIDSShim;c:\windows\system32\drivers\AVGIDSShim.sys [2011-7-11 16720]
S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\roxio\digital home 10\RoxioUpnpService10.exe [2007-8-24 362992]
S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxLiveShare10.exe [2007-8-24 309744]
S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\roxio\digital home 10\RoxioUPnPRenderer10.exe [2007-8-24 72176]
S3 RoxMediaDB10;RoxMediaDB10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxMediaDB10.exe [2007-8-24 1083888]
.
=============== Created Last 30 ================
.
2011-11-03 14:10:47 -------- d-----w- c:\users\ray\Tracing
2011-11-03 14:09:56 -------- d-----w- c:\program files\Microsoft
2011-11-03 14:09:39 -------- d-----w- c:\program files\Windows Live SkyDrive
2011-11-03 14:08:19 83249512 ----a-w- c:\program files\common files\windows live\.cache\wlc39A6.tmp
2011-11-03 14:07:57 -------- d-----w- c:\program files\common files\Windows Live
2011-11-02 19:41:55 134464 ----a-w- c:\windows\system32\LnkProtect.dll
2011-11-02 19:40:31 12872 ----a-w- c:\windows\system32\bootdelete.exe
2011-11-02 19:38:57 23624 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2011-11-02 19:38:56 -------- d-----w- c:\program files\Hitman Pro 3.5
2011-11-02 19:38:11 -------- d-----w- c:\programdata\Hitman Pro
2011-11-02 18:17:04 -------- d-----w- c:\program files\Free Text Pad
2011-11-02 17:02:02 -------- d-----w- c:\users\ray\appdata\roaming\PCF-VLC
2011-11-02 16:17:11 -------- d-----w- c:\users\ray\appdata\roaming\Participatory Culture Foundation
2011-11-02 16:16:44 -------- d-----w- c:\program files\Participatory Culture Foundation
2011-11-02 15:10:49 -------- d-----w- c:\program files\InterActual
2011-11-02 14:26:36 -------- d-----w- c:\program files\common files\PX Storage Engine
2011-11-02 14:26:34 -------- d-----w- c:\program files\common files\Sonic Shared
2011-11-02 14:24:31 -------- d-----w- c:\programdata\eSellerate
2011-11-02 14:24:30 -------- d-----w- c:\programdata\SmartSound Software Inc
2011-11-02 14:24:29 -------- d-----w- c:\program files\SmartSound Software
2011-11-02 14:23:14 -------- d-----w- c:\program files\Roxio
2011-11-02 14:22:23 443752 ----a-w- c:\windows\system32\d3dx10_33.dll
2011-11-02 14:22:23 3495784 ----a-w- c:\windows\system32\d3dx9_33.dll
2011-11-02 14:22:23 1123696 ----a-w- c:\windows\system32\D3DCompiler_33.dll
2011-11-02 14:20:40 -------- d-----w- c:\windows\system32\URTTEMP
2011-11-02 13:21:52 -------- d-----w- c:\program files\directx
2011-11-02 13:20:10 -------- d-----w- C:\Sierra
2011-11-02 13:19:41 77824 ----a-w- c:\program files\common files\installshield\engine\6\intel 32\ctor.dll
2011-11-02 13:19:41 32768 ------w- c:\program files\common files\installshield\engine\6\intel 32\objectps.dll
2011-11-02 13:19:41 225280 ------w- c:\program files\common files\installshield\iscript\iscript.dll
2011-11-02 13:19:41 176128 ------w- c:\program files\common files\installshield\engine\6\intel 32\iuser.dll
2011-11-02 10:44:26 -------- d-----w- c:\program files\Lexmark Fax Solutions
2011-11-02 10:43:59 -------- d-----w- c:\program files\Lx_cats
2011-11-02 10:43:39 72192 ----a-w- c:\windows\system32\spool\prtprocs\w32x86\lxccpp5c.dll
2011-11-02 10:39:01 65536 ----a-w- c:\windows\system32\lxcccfg.dll
2011-11-02 10:38:49 -------- d-----w- c:\program files\Lexmark 3300 Series
2011-11-02 10:38:42 -------- d-----w- C:\Temp
2011-11-02 01:21:14 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-02 01:18:46 -------- d-----w- c:\program files\YahELite
2011-11-02 00:26:43 9488 ----a-w- c:\windows\system32\tssoft32.acm
2011-11-02 00:26:43 16144 ----a-w- c:\windows\system32\tsd32.dll
2011-11-02 00:26:43 -------- d-----w- c:\program files\Bytescribe
2011-11-02 00:25:46 274432 ----a-w- c:\windows\system32\yacscom.dll
2011-11-02 00:25:46 200704 ----a-w- c:\windows\system32\yacsui.dll
2011-11-02 00:25:45 260880 ----a-w- c:\windows\system32\MSFLXGRD.OCX
2011-11-02 00:25:45 224016 ----a-w- c:\windows\system32\TABCTL32.OCX
2011-11-02 00:25:45 139264 ----a-w- c:\windows\system32\ywcvwr.dll
2011-11-02 00:25:45 101888 ----a-w- c:\windows\system32\vb6stkit.dll
2011-11-02 00:25:45 -------- d-----w- c:\program files\Dream
2011-11-02 00:20:56 212240 ------w- c:\windows\system32\Richtx32.ocx
2011-11-02 00:20:56 132880 ------w- c:\windows\system32\MSINET.OCX
2011-11-02 00:20:56 124688 ------w- c:\windows\system32\Mswinsck.ocx
2011-11-02 00:20:55 152848 ------w- c:\windows\system32\comdlg32.ocx
2011-11-02 00:20:36 -------- d-----w- c:\program files\ZakFromAnotherPlanet
2011-11-01 20:56:28 -------- d-----w- c:\program files\VideoLAN
2011-11-01 18:27:14 -------- d-----w- c:\users\ray\appdata\roaming\Malwarebytes
2011-11-01 18:26:46 -------- d-----w- c:\programdata\Malwarebytes
2011-11-01 18:26:42 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-01 18:26:42 -------- d-----w- C:\Malware
2011-11-01 16:51:34 -------- d-----w- c:\users\ray\appdata\local\Microsoft Help
2011-11-01 15:49:39 -------- d--h--w- C:\$AVG
2011-11-01 14:39:54 -------- d-----w- c:\users\ray\appdata\roaming\AVG2012
2011-11-01 14:38:27 -------- d-----w- c:\windows\system32\drivers\AVG
2011-11-01 14:38:27 -------- d-----w- c:\programdata\AVG2012
2011-11-01 14:37:09 -------- d-----w- c:\program files\AVG
2011-11-01 14:34:03 -------- d--h--w- c:\programdata\Common Files
2011-11-01 14:33:48 -------- d-----w- c:\programdata\MFAData
2011-11-01 14:29:30 -------- d-----w- c:\windows\pss
2011-11-01 13:49:10 -------- d-----w- C:\PerfLogs
2011-11-01 13:26:54 47560 ----a-w- c:\windows\system32\SPReview.exe
2011-11-01 13:26:54 152576 ----a-w- c:\windows\system32\SPWizUI.dll
2011-11-01 13:16:16 193024 ----a-w- c:\windows\system32\recdisc.exe
2011-11-01 13:16:14 6656 ----a-w- c:\windows\system32\sdspres.dll
2011-11-01 13:14:59 81408 ----a-w- c:\windows\system32\bootcfg.exe
2011-11-01 13:12:47 6656 ----a-w- c:\windows\system32\kbd106n.dll
2011-11-01 13:12:00 44032 ----a-w- c:\windows\system32\cbsra.exe
2011-11-01 12:16:01 -------- d-----w- c:\program files\CCleaner
2011-11-01 12:13:13 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2011-11-01 12:13:13 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-11-01 11:53:10 -------- d-----w- c:\windows\system32\AGEIA
2011-11-01 11:51:33 457248 ----a-w- c:\windows\system32\NVUNINST.EXE
2011-11-01 11:35:05 -------- d-----w- c:\users\ray\appdata\local\Toshiba
2011-11-01 11:34:51 -------- d-----w- c:\users\ray\appdata\local\Adobe
2011-11-01 11:34:35 -------- d-----w- c:\users\ray\appdata\local\VirtualStore
.
==================== Find3M ====================
.
2011-11-01 13:38:04 101888 ----a-w- c:\windows\system32\ifxcardm.dll
2011-11-01 13:38:03 82432 ----a-w- c:\windows\system32\axaltocm.dll
2011-09-13 06:30:10 32592 ----a-w- c:\windows\system32\drivers\avgrkx86.sys
.
============= FINISH: 21:33:20.57 ===============

#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:31 AM

Posted 03 November 2011 - 08:58 PM

Hello rays1,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.

1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not an option, Skip instead, do not choose Delete unless instructed.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.



2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
TdssKiller log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 rays1

rays1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 04 November 2011 - 11:42 AM

Fireman,

I ran combofix but it didn’t restart the comp so, does this mean it found no malware?
I’m wondering how this thing came back after a hard disk wipe; is it possible for the
bug to survive a wipe? And if so, would several disk wipes with ‘Killdisk’ finally remove it?

The comp now seems to be running Ok but, thre re-direct was unpredictable and
intermittent before so, I’m not sure if it gone or not at this time.


TDS log is....


15:30:08.0901 3436 TDSS rootkit removing tool 2.6.15.0 Nov 3 2011 17:15:49
15:30:09.0057 3436 ============================================================
15:30:09.0057 3436 Current date / time: 2011/11/03 15:30:09.0057
15:30:09.0057 3436 SystemInfo:
15:30:09.0057 3436
15:30:09.0057 3436 OS Version: 6.0.6001 ServicePack: 1.0
15:30:09.0057 3436 Product type: Workstation
15:30:09.0057 3436 ComputerName: RAYS1-PC
15:30:09.0057 3436 UserName: Ray
15:30:09.0057 3436 Windows directory: C:\Windows
15:30:09.0057 3436 System windows directory: C:\Windows
15:30:09.0057 3436 Processor architecture: Intel x86
15:30:09.0057 3436 Number of processors: 2
15:30:09.0057 3436 Page size: 0x1000
15:30:09.0057 3436 Boot type: Normal boot
15:30:09.0057 3436 ============================================================
15:30:09.0963 3436 Initialize success
15:30:31.0276 2624 ============================================================
15:30:31.0276 2624 Scan started
15:30:31.0276 2624 Mode: Manual;
15:30:31.0276 2624 ============================================================
15:30:31.0495 2624 ACPI (fcb8c7210f0135e24c6580f7f649c73c) C:\Windows\system32\drivers\acpi.sys
15:30:31.0495 2624 ACPI - ok
15:30:31.0542 2624 adp94xx (2edc5bbac6c651ece337bde8ed97c9fb) C:\Windows\system32\drivers\adp94xx.sys
15:30:31.0542 2624 adp94xx - ok
15:30:31.0557 2624 adpahci (b84088ca3cdca97da44a984c6ce1ccad) C:\Windows\system32\drivers\adpahci.sys
15:30:31.0557 2624 adpahci - ok
15:30:31.0573 2624 adpu160m (7880c67bccc27c86fd05aa2afb5ea469) C:\Windows\system32\drivers\adpu160m.sys
15:30:31.0573 2624 adpu160m - ok
15:30:31.0588 2624 adpu320 (9ae713f8e30efc2abccd84904333df4d) C:\Windows\system32\drivers\adpu320.sys
15:30:31.0588 2624 adpu320 - ok
15:30:31.0635 2624 AFD (763e172a55177e478cb419f88fd0ba03) C:\Windows\system32\drivers\afd.sys
15:30:31.0635 2624 AFD - ok
15:30:31.0651 2624 AgereSoftModem - ok
15:30:31.0682 2624 agp440 (ef23439cdd587f64c2c1b8825cead7d8) C:\Windows\system32\drivers\agp440.sys
15:30:31.0682 2624 agp440 - ok
15:30:31.0698 2624 aic78xx (ae1fdf7bf7bb6c6a70f67699d880592a) C:\Windows\system32\drivers\djsvs.sys
15:30:31.0698 2624 aic78xx - ok
15:30:31.0729 2624 aliide (90395b64600ebb4552e26e178c94b2e4) C:\Windows\system32\drivers\aliide.sys
15:30:31.0729 2624 aliide - ok
15:30:31.0729 2624 amdagp (2b13e304c9dfdfa5eb582f6a149fa2c7) C:\Windows\system32\drivers\amdagp.sys
15:30:31.0729 2624 amdagp - ok
15:30:31.0745 2624 amdide (0577df1d323fe75a739c787893d300ea) C:\Windows\system32\drivers\amdide.sys
15:30:31.0745 2624 amdide - ok
15:30:31.0760 2624 AmdK7 (dc487885bcef9f28eece6fac0e5ddfc5) C:\Windows\system32\drivers\amdk7.sys
15:30:31.0760 2624 AmdK7 - ok
15:30:31.0776 2624 AmdK8 (0ca0071da4315b00fc1328ca86b425da) C:\Windows\system32\drivers\amdk8.sys
15:30:31.0776 2624 AmdK8 - ok
15:30:31.0807 2624 arc (5f673180268bb1fdb69c99b6619fe379) C:\Windows\system32\drivers\arc.sys
15:30:31.0807 2624 arc - ok
15:30:31.0838 2624 arcsas (957f7540b5e7f602e44648c7de5a1c05) C:\Windows\system32\drivers\arcsas.sys
15:30:31.0838 2624 arcsas - ok
15:30:31.0885 2624 AsyncMac (53b202abee6455406254444303e87be1) C:\Windows\system32\DRIVERS\asyncmac.sys
15:30:31.0885 2624 AsyncMac - ok
15:30:31.0885 2624 atapi (2d9c903dc76a66813d350a562de40ed9) C:\Windows\system32\drivers\atapi.sys
15:30:31.0885 2624 atapi - ok
15:30:31.0948 2624 AVGIDSDriver (4cbb56fbc9c0cbc517e6e3a6889ebddc) C:\Windows\system32\DRIVERS\AVGIDSDriver.Sys
15:30:31.0948 2624 AVGIDSDriver - ok
15:30:31.0963 2624 AVGIDSEH (459bce188232e2fe6152423efef65d76) C:\Windows\system32\DRIVERS\AVGIDSEH.Sys
15:30:31.0963 2624 AVGIDSEH - ok
15:30:31.0979 2624 AVGIDSFilter (91d9abe7e88eac7c167cba4ed4d983bf) C:\Windows\system32\DRIVERS\AVGIDSFilter.Sys
15:30:31.0979 2624 AVGIDSFilter - ok
15:30:31.0995 2624 AVGIDSShim (54d710b7d2e30e1ddc8ce2c6e685576b) C:\Windows\system32\DRIVERS\AVGIDSShim.Sys
15:30:31.0995 2624 AVGIDSShim - ok
15:30:32.0026 2624 Avgldx86 (f4dbbc8d3c5338693da23c59a50f8abc) C:\Windows\system32\DRIVERS\avgldx86.sys
15:30:32.0026 2624 Avgldx86 - ok
15:30:32.0042 2624 Avgmfx86 (1c77ef67f196466adc9924cb288afe87) C:\Windows\system32\DRIVERS\avgmfx86.sys
15:30:32.0042 2624 Avgmfx86 - ok
15:30:32.0073 2624 Avgrkx86 (f2038ed7284b79dcef581468121192a9) C:\Windows\system32\DRIVERS\avgrkx86.sys
15:30:32.0073 2624 Avgrkx86 - ok
15:30:32.0104 2624 Avgtdix (a6d562b612216d8d02a35ebeb92366bd) C:\Windows\system32\DRIVERS\avgtdix.sys
15:30:32.0104 2624 Avgtdix - ok
15:30:32.0167 2624 Beep (67e506b75bd5326a3ec7b70bd014dfb6) C:\Windows\system32\drivers\Beep.sys
15:30:32.0167 2624 Beep - ok
15:30:32.0182 2624 blbdrive - ok
15:30:32.0229 2624 bowser (74b442b2be1260b7588c136177ceac66) C:\Windows\system32\DRIVERS\bowser.sys
15:30:32.0229 2624 bowser - ok
15:30:32.0276 2624 BrFiltLo (9f9acc7f7ccde8a15c282d3f88b43309) C:\Windows\system32\drivers\brfiltlo.sys
15:30:32.0276 2624 BrFiltLo - ok
15:30:32.0292 2624 BrFiltUp (56801ad62213a41f6497f96dee83755a) C:\Windows\system32\drivers\brfiltup.sys
15:30:32.0292 2624 BrFiltUp - ok
15:30:32.0307 2624 Brserid (b304e75cff293029eddf094246747113) C:\Windows\system32\drivers\brserid.sys
15:30:32.0307 2624 Brserid - ok
15:30:32.0323 2624 BrSerWdm (203f0b1e73adadbbb7b7b1fabd901f6b) C:\Windows\system32\drivers\brserwdm.sys
15:30:32.0323 2624 BrSerWdm - ok
15:30:32.0338 2624 BrUsbMdm (bd456606156ba17e60a04e18016ae54b) C:\Windows\system32\drivers\brusbmdm.sys
15:30:32.0338 2624 BrUsbMdm - ok
15:30:32.0354 2624 BrUsbSer (af72ed54503f717a43268b3cc5faec2e) C:\Windows\system32\drivers\brusbser.sys
15:30:32.0354 2624 BrUsbSer - ok
15:30:32.0370 2624 BTHMODEM (ad07c1ec6665b8b35741ab91200c6b68) C:\Windows\system32\drivers\bthmodem.sys
15:30:32.0370 2624 BTHMODEM - ok
15:30:32.0385 2624 cdfs (7add03e75beb9e6dd102c3081d29840a) C:\Windows\system32\DRIVERS\cdfs.sys
15:30:32.0385 2624 cdfs - ok
15:30:32.0401 2624 cdrom (1ec25cea0de6ac4718bf89f9e1778b57) C:\Windows\system32\DRIVERS\cdrom.sys
15:30:32.0401 2624 cdrom - ok
15:30:32.0417 2624 circlass (da8e0afc7baa226c538ef53ac2f90897) C:\Windows\system32\drivers\circlass.sys
15:30:32.0417 2624 circlass - ok
15:30:32.0448 2624 CLFS (465745561c832b29f7c48b488aab3842) C:\Windows\system32\CLFS.sys
15:30:32.0448 2624 CLFS - ok
15:30:32.0479 2624 CmBatt (0fed59edb4a83ff17f1778827b88ab1a) C:\Windows\system32\DRIVERS\CmBatt.sys
15:30:32.0479 2624 CmBatt - ok
15:30:32.0495 2624 cmdide (45201046c776ffdaf3fc8a0029c581c8) C:\Windows\system32\drivers\cmdide.sys
15:30:32.0495 2624 cmdide - ok
15:30:32.0526 2624 Compbatt (6afef0b60fa25de07c0968983ee4f60a) C:\Windows\system32\DRIVERS\compbatt.sys
15:30:32.0526 2624 Compbatt - ok
15:30:32.0542 2624 crcdisk (2a213ae086bbec5e937553c7d9a2b22c) C:\Windows\system32\drivers\crcdisk.sys
15:30:32.0542 2624 crcdisk - ok
15:30:32.0557 2624 Crusoe (22a7f883508176489f559ee745b5bf5d) C:\Windows\system32\drivers\crusoe.sys
15:30:32.0557 2624 Crusoe - ok
15:30:32.0588 2624 DfsC (9e635ae5e8ad93e2b5989e2e23679f97) C:\Windows\system32\Drivers\dfsc.sys
15:30:32.0588 2624 DfsC - ok
15:30:32.0635 2624 disk (64109e623abd6955c8fb110b592e68b7) C:\Windows\system32\drivers\disk.sys
15:30:32.0635 2624 disk - ok
15:30:32.0667 2624 drmkaud (97fef831ab90bee128c9af390e243f80) C:\Windows\system32\drivers\drmkaud.sys
15:30:32.0667 2624 drmkaud - ok
15:30:32.0713 2624 DXGKrnl (f8bf50a8d862f8cc089080bec509bca6) C:\Windows\System32\drivers\dxgkrnl.sys
15:30:32.0713 2624 DXGKrnl - ok
15:30:32.0745 2624 E1G60 (f88fb26547fd2ce6d0a5af2985892c48) C:\Windows\system32\DRIVERS\E1G60I32.sys
15:30:32.0745 2624 E1G60 - ok
15:30:32.0760 2624 Ecache (dd2cd259d83d8b72c02c5f2331ff9d68) C:\Windows\system32\drivers\ecache.sys
15:30:32.0776 2624 Ecache - ok
15:30:32.0807 2624 elxstor (e8f3f21a71720c84bcf423b80028359f) C:\Windows\system32\drivers\elxstor.sys
15:30:32.0807 2624 elxstor - ok
15:30:32.0854 2624 exfat (0d858eb20589a34efb25695acaa6aa2d) C:\Windows\system32\drivers\exfat.sys
15:30:32.0854 2624 exfat - ok
15:30:32.0885 2624 fastfat (3c489390c2e2064563727752af8eab9e) C:\Windows\system32\drivers\fastfat.sys
15:30:32.0885 2624 fastfat - ok
15:30:32.0917 2624 fdc (afe1e8b9782a0dd7fb46bbd88e43f89a) C:\Windows\system32\DRIVERS\fdc.sys
15:30:32.0917 2624 fdc - ok
15:30:32.0932 2624 FileInfo (a8c0139a884861e3aae9cfe73b208a9f) C:\Windows\system32\drivers\fileinfo.sys
15:30:32.0932 2624 FileInfo - ok
15:30:32.0963 2624 Filetrace (0ae429a696aecbc5970e3cf2c62635ae) C:\Windows\system32\drivers\filetrace.sys
15:30:32.0963 2624 Filetrace - ok
15:30:32.0995 2624 flpydisk (85b7cf99d532820495d68d747fda9ebd) C:\Windows\system32\DRIVERS\flpydisk.sys
15:30:32.0995 2624 flpydisk - ok
15:30:33.0010 2624 FltMgr (05ea53afe985443011e36dab07343b46) C:\Windows\system32\drivers\fltmgr.sys
15:30:33.0010 2624 FltMgr - ok
15:30:33.0026 2624 Fs_Rec (65ea8b77b5851854f0c55c43fa51a198) C:\Windows\system32\drivers\Fs_Rec.sys
15:30:33.0026 2624 Fs_Rec - ok
15:30:33.0057 2624 gagp30kx (4e1cd0a45c50a8882616cae5bf82f3c5) C:\Windows\system32\drivers\gagp30kx.sys
15:30:33.0057 2624 gagp30kx - ok
15:30:33.0073 2624 GMSIPCI - ok
15:30:33.0104 2624 HdAudAddService (cb04c744be0a61b1d648faed182c3b59) C:\Windows\system32\drivers\HdAudio.sys
15:30:33.0104 2624 HdAudAddService - ok
15:30:33.0120 2624 HDAudBus (c87b1ee051c0464491c1a7b03fa0bc99) C:\Windows\system32\DRIVERS\HDAudBus.sys
15:30:33.0120 2624 HDAudBus - ok
15:30:33.0135 2624 HidBth (1338520e78d90154ed6be8f84de5fceb) C:\Windows\system32\drivers\hidbth.sys
15:30:33.0135 2624 HidBth - ok
15:30:33.0151 2624 HidIr (ff3160c3a2445128c5a6d9b076da519e) C:\Windows\system32\drivers\hidir.sys
15:30:33.0151 2624 HidIr - ok
15:30:33.0198 2624 HidUsb (854ca287ab7faf949617a788306d967e) C:\Windows\system32\DRIVERS\hidusb.sys
15:30:33.0198 2624 HidUsb - ok
15:30:33.0213 2624 HpCISSs (df353b401001246853763c4b7aaa6f50) C:\Windows\system32\drivers\hpcisss.sys
15:30:33.0213 2624 HpCISSs - ok
15:30:33.0245 2624 HTTP (406c027c18e98a396faa1963dad5ff70) C:\Windows\system32\drivers\HTTP.sys
15:30:33.0245 2624 HTTP - ok
15:30:33.0260 2624 i2omp (324c2152ff2c61abae92d09f3cca4d63) C:\Windows\system32\drivers\i2omp.sys
15:30:33.0260 2624 i2omp - ok
15:30:33.0292 2624 i8042prt (22d56c8184586b7a1f6fa60be5f5a2bd) C:\Windows\system32\DRIVERS\i8042prt.sys
15:30:33.0292 2624 i8042prt - ok
15:30:33.0323 2624 iaStor (997e8f5939f2d12cd9f2e6b395724c16) C:\Windows\system32\DRIVERS\iaStor.sys
15:30:33.0323 2624 iaStor - ok
15:30:33.0354 2624 iaStorV (c957bf4b5d80b46c5017bf0101e6c906) C:\Windows\system32\drivers\iastorv.sys
15:30:33.0354 2624 iaStorV - ok
15:30:33.0385 2624 igfx - ok
15:30:33.0401 2624 iirsp (2d077bf86e843f901d8db709c95b49a5) C:\Windows\system32\drivers\iirsp.sys
15:30:33.0401 2624 iirsp - ok
15:30:33.0463 2624 IntcAzAudAddService (6f62bafe6150f3952f877051c65786fe) C:\Windows\system32\drivers\RTKVHDA.sys
15:30:33.0479 2624 IntcAzAudAddService - ok
15:30:33.0510 2624 intelide (83aa759f3189e6370c30de5dc5590718) C:\Windows\system32\drivers\intelide.sys
15:30:33.0510 2624 intelide - ok
15:30:33.0542 2624 intelppm (224191001e78c89dfa78924c3ea595ff) C:\Windows\system32\DRIVERS\intelppm.sys
15:30:33.0542 2624 intelppm - ok
15:30:33.0588 2624 IpFilterDriver (62c265c38769b864cb25b4bcf62df6c3) C:\Windows\system32\DRIVERS\ipfltdrv.sys
15:30:33.0588 2624 IpFilterDriver - ok
15:30:33.0604 2624 IpInIp - ok
15:30:33.0604 2624 IPMIDRV (40f34f8aba2a015d780e4b09138b6c17) C:\Windows\system32\drivers\ipmidrv.sys
15:30:33.0620 2624 IPMIDRV - ok
15:30:33.0635 2624 IPNAT (8793643a67b42cec66490b2a0cf92d68) C:\Windows\system32\DRIVERS\ipnat.sys
15:30:33.0635 2624 IPNAT - ok
15:30:33.0667 2624 IRENUM (109c0dfb82c3632fbd11949b73aeeac9) C:\Windows\system32\drivers\irenum.sys
15:30:33.0667 2624 IRENUM - ok
15:30:33.0682 2624 isapnp (350fca7e73cf65bcef43fae1e4e91293) C:\Windows\system32\drivers\isapnp.sys
15:30:33.0682 2624 isapnp - ok
15:30:33.0713 2624 iScsiPrt (f247eec28317f6c739c16de420097301) C:\Windows\system32\DRIVERS\msiscsi.sys
15:30:33.0713 2624 iScsiPrt - ok
15:30:33.0729 2624 iteatapi (bced60d16156e428f8df8cf27b0df150) C:\Windows\system32\drivers\iteatapi.sys
15:30:33.0729 2624 iteatapi - ok
15:30:33.0760 2624 iteraid (06fa654504a498c30adca8bec4e87e7e) C:\Windows\system32\drivers\iteraid.sys
15:30:33.0760 2624 iteraid - ok
15:30:33.0792 2624 kbdclass (37605e0a8cf00cbba538e753e4344c6e) C:\Windows\system32\DRIVERS\kbdclass.sys
15:30:33.0792 2624 kbdclass - ok
15:30:33.0807 2624 kbdhid (d2600cb17b7408b4a83f231dc9a11ac3) C:\Windows\system32\drivers\kbdhid.sys
15:30:33.0807 2624 kbdhid - ok
15:30:33.0838 2624 KR10I (a383f2cea0a8f4e76e71abc869bd5748) C:\Windows\system32\drivers\kr10i.sys
15:30:33.0838 2624 KR10I - ok
15:30:33.0870 2624 KR10N (6e9922332386c2a49936b30b2b6fd298) C:\Windows\system32\drivers\kr10n.sys
15:30:33.0870 2624 KR10N - ok
15:30:33.0901 2624 KSecDD (5367dc846cae9639b899bfd13b97a8c9) C:\Windows\system32\Drivers\ksecdd.sys
15:30:33.0901 2624 KSecDD - ok
15:30:33.0932 2624 lltdio (d1c5883087a0c3f1344d9d55a44901f6) C:\Windows\system32\DRIVERS\lltdio.sys
15:30:33.0932 2624 lltdio - ok
15:30:33.0963 2624 LSI_FC (a2262fb9f28935e862b4db46438c80d2) C:\Windows\system32\drivers\lsi_fc.sys
15:30:33.0963 2624 LSI_FC - ok
15:30:33.0979 2624 LSI_SAS (30d73327d390f72a62f32c103daf1d6d) C:\Windows\system32\drivers\lsi_sas.sys
15:30:33.0979 2624 LSI_SAS - ok
15:30:33.0995 2624 LSI_SCSI (e1e36fefd45849a95f1ab81de0159fe3) C:\Windows\system32\drivers\lsi_scsi.sys
15:30:33.0995 2624 LSI_SCSI - ok
15:30:34.0010 2624 luafv (8f5c7426567798e62a3b3614965d62cc) C:\Windows\system32\drivers\luafv.sys
15:30:34.0026 2624 luafv - ok
15:30:34.0057 2624 megasas (d153b14fc6598eae8422a2037553adce) C:\Windows\system32\drivers\megasas.sys
15:30:34.0057 2624 megasas - ok
15:30:34.0088 2624 Modem (e13b5ea0f51ba5b1512ec671393d09ba) C:\Windows\system32\drivers\modem.sys
15:30:34.0088 2624 Modem - ok
15:30:34.0120 2624 monitor (0a9bb33b56e294f686abb7c1e4e2d8a8) C:\Windows\system32\DRIVERS\monitor.sys
15:30:34.0120 2624 monitor - ok
15:30:34.0151 2624 mouclass (5bf6a1326a335c5298477754a506d263) C:\Windows\system32\DRIVERS\mouclass.sys
15:30:34.0151 2624 mouclass - ok
15:30:34.0182 2624 mouhid (93b8d4869e12cfbe663915502900876f) C:\Windows\system32\DRIVERS\mouhid.sys
15:30:34.0182 2624 mouhid - ok
15:30:34.0198 2624 MountMgr (bdafc88aa6b92f7842416ea6a48e1600) C:\Windows\system32\drivers\mountmgr.sys
15:30:34.0198 2624 MountMgr - ok
15:30:34.0213 2624 mpio (583a41f26278d9e0ea548163d6139397) C:\Windows\system32\drivers\mpio.sys
15:30:34.0213 2624 mpio - ok
15:30:34.0245 2624 mpsdrv (22241feba9b2defa669c8cb0a8dd7d2e) C:\Windows\system32\drivers\mpsdrv.sys
15:30:34.0245 2624 mpsdrv - ok
15:30:34.0260 2624 Mraid35x (4fbbb70d30fd20ec51f80061703b001e) C:\Windows\system32\drivers\mraid35x.sys
15:30:34.0260 2624 Mraid35x - ok
15:30:34.0276 2624 MRxDAV (ae3de84536b6799d2267443cec8edbb9) C:\Windows\system32\drivers\mrxdav.sys
15:30:34.0276 2624 MRxDAV - ok
15:30:34.0292 2624 mrxsmb (c4ad205530888404e2b5fc8d9319b119) C:\Windows\system32\DRIVERS\mrxsmb.sys
15:30:34.0292 2624 mrxsmb - ok
15:30:34.0307 2624 mrxsmb10 (67e55ced3fc143c82a8197988bfc1f9a) C:\Windows\system32\DRIVERS\mrxsmb10.sys
15:30:34.0307 2624 mrxsmb10 - ok
15:30:34.0323 2624 mrxsmb20 (3268b8c3fa92bfc086355c39b45e9cc9) C:\Windows\system32\DRIVERS\mrxsmb20.sys
15:30:34.0323 2624 mrxsmb20 - ok
15:30:34.0354 2624 msahci (742aed7939e734c36b7e8d6228ce26b7) C:\Windows\system32\drivers\msahci.sys
15:30:34.0354 2624 msahci - ok
15:30:34.0370 2624 msdsm (3fc82a2ae4cc149165a94699183d3028) C:\Windows\system32\drivers\msdsm.sys
15:30:34.0370 2624 msdsm - ok
15:30:34.0401 2624 Msfs (a9927f4a46b816c92f461acb90cf8515) C:\Windows\system32\drivers\Msfs.sys
15:30:34.0401 2624 Msfs - ok
15:30:34.0417 2624 msisadrv (0f400e306f385c56317357d6dea56f62) C:\Windows\system32\drivers\msisadrv.sys
15:30:34.0417 2624 msisadrv - ok
15:30:34.0448 2624 MSKSSRV (d8c63d34d9c9e56c059e24ec7185cc07) C:\Windows\system32\drivers\MSKSSRV.sys
15:30:34.0448 2624 MSKSSRV - ok
15:30:34.0463 2624 MSPCLOCK (1d373c90d62ddb641d50e55b9e78d65e) C:\Windows\system32\drivers\MSPCLOCK.sys
15:30:34.0479 2624 MSPCLOCK - ok
15:30:34.0510 2624 MSPQM (b572da05bf4e098d4bba3a4734fb505b) C:\Windows\system32\drivers\MSPQM.sys
15:30:34.0510 2624 MSPQM - ok
15:30:34.0526 2624 MsRPC (b5614aecb05a9340aa0fb55bf561cc63) C:\Windows\system32\drivers\MsRPC.sys
15:30:34.0526 2624 MsRPC - ok
15:30:34.0542 2624 mssmbios (e384487cb84be41d09711c30ca79646c) C:\Windows\system32\DRIVERS\mssmbios.sys
15:30:34.0542 2624 mssmbios - ok
15:30:34.0573 2624 MSTEE (7199c1eec1e4993caf96b8c0a26bd58a) C:\Windows\system32\drivers\MSTEE.sys
15:30:34.0573 2624 MSTEE - ok
15:30:34.0604 2624 MTsensor (97affa9d95ffe20eee6229bc6be166cf) C:\Windows\system32\DRIVERS\ATKACPI.sys
15:30:34.0604 2624 MTsensor - ok
15:30:34.0620 2624 Mup (6dfd1d322de55b0b7db7d21b90bec49c) C:\Windows\system32\Drivers\mup.sys
15:30:34.0635 2624 Mup - ok
15:30:34.0682 2624 NativeWifiP (dd721f8635191132992e7ceaa3c43c84) C:\Windows\system32\DRIVERS\nwifi.sys
15:30:34.0682 2624 NativeWifiP - ok
15:30:34.0729 2624 NDIS (9bdc71790fa08f0a0b5f10462b1bd0b1) C:\Windows\system32\drivers\ndis.sys
15:30:34.0729 2624 NDIS - ok
15:30:34.0776 2624 NdisTapi (0e186e90404980569fb449ba7519ae61) C:\Windows\system32\DRIVERS\ndistapi.sys
15:30:34.0776 2624 NdisTapi - ok
15:30:34.0807 2624 Ndisuio (d6973aa34c4d5d76c0430b181c3cd389) C:\Windows\system32\DRIVERS\ndisuio.sys
15:30:34.0807 2624 Ndisuio - ok
15:30:34.0807 2624 NdisWan (3d14c3b3496f88890d431e8aa022a411) C:\Windows\system32\DRIVERS\ndiswan.sys
15:30:34.0823 2624 NdisWan - ok
15:30:34.0838 2624 NDProxy (71dab552b41936358f3b541ae5997fb3) C:\Windows\system32\drivers\NDProxy.sys
15:30:34.0854 2624 NDProxy - ok
15:30:34.0854 2624 NetBIOS (bcd093a5a6777cf626434568dc7dba78) C:\Windows\system32\DRIVERS\netbios.sys
15:30:34.0854 2624 NetBIOS - ok
15:30:34.0885 2624 netbt (7c5fee5b1c5728507cd96fb4a13e7a02) C:\Windows\system32\DRIVERS\netbt.sys
15:30:34.0885 2624 netbt - ok
15:30:34.0932 2624 nfrd960 (2e7fb731d4790a1bc6270accefacb36e) C:\Windows\system32\drivers\nfrd960.sys
15:30:34.0932 2624 nfrd960 - ok
15:30:34.0948 2624 Npfs (ecb5003f484f9ed6c608d6d6c7886cbb) C:\Windows\system32\drivers\Npfs.sys
15:30:34.0948 2624 Npfs - ok
15:30:34.0963 2624 nsiproxy (609773e344a97410ce4ebf74a8914fcf) C:\Windows\system32\drivers\nsiproxy.sys
15:30:34.0963 2624 nsiproxy - ok
15:30:34.0963 2624 NTACCESS - ok
15:30:35.0010 2624 Ntfs (b4effe29eb4f15538fd8a9681108492d) C:\Windows\system32\drivers\Ntfs.sys
15:30:35.0010 2624 Ntfs - ok
15:30:35.0042 2624 ntrigdigi (e875c093aec0c978a90f30c9e0dfbb72) C:\Windows\system32\drivers\ntrigdigi.sys
15:30:35.0042 2624 ntrigdigi - ok
15:30:35.0057 2624 Null (c5dbbcda07d780bda9b685df333bb41e) C:\Windows\system32\drivers\Null.sys
15:30:35.0057 2624 Null - ok
15:30:35.0307 2624 nvlddmkm (b6b0ce8024432d39e88694676d3c9937) C:\Windows\system32\DRIVERS\nvlddmkm.sys
15:30:35.0354 2624 nvlddmkm - ok
15:30:35.0370 2624 nvraid (e69e946f80c1c31c53003bfbf50cbb7c) C:\Windows\system32\drivers\nvraid.sys
15:30:35.0370 2624 nvraid - ok
15:30:35.0385 2624 nvstor (9e0ba19a28c498a6d323d065db76dffc) C:\Windows\system32\drivers\nvstor.sys
15:30:35.0385 2624 nvstor - ok
15:30:35.0417 2624 nv_agp (07c186427eb8fcc3d8d7927187f260f7) C:\Windows\system32\drivers\nv_agp.sys
15:30:35.0417 2624 nv_agp - ok
15:30:35.0432 2624 NwlnkFlt - ok
15:30:35.0448 2624 NwlnkFwd - ok
15:30:35.0495 2624 ohci1394 (be32da025a0be1878f0ee8d6d9386cd5) C:\Windows\system32\drivers\ohci1394.sys
15:30:35.0495 2624 ohci1394 - ok
15:30:35.0542 2624 Parport (8a79fdf04a73428597e2caf9d0d67850) C:\Windows\system32\DRIVERS\parport.sys
15:30:35.0542 2624 Parport - ok
15:30:35.0557 2624 partmgr (3b38467e7c3daed009dfe359e17f139f) C:\Windows\system32\drivers\partmgr.sys
15:30:35.0557 2624 partmgr - ok
15:30:35.0573 2624 Parvdm (6c580025c81caf3ae9e3617c22cad00e) C:\Windows\system32\DRIVERS\parvdm.sys
15:30:35.0573 2624 Parvdm - ok
15:30:35.0604 2624 pci (01b94418deb235dff777cc80076354b4) C:\Windows\system32\drivers\pci.sys
15:30:35.0604 2624 pci - ok
15:30:35.0620 2624 pciide (3b1901e401473e03eb8c874271e50c26) C:\Windows\system32\drivers\pciide.sys
15:30:35.0620 2624 pciide - ok
15:30:35.0651 2624 pcmcia (e6f3fb1b86aa519e7698ad05e58b04e5) C:\Windows\system32\DRIVERS\pcmcia.sys
15:30:35.0651 2624 pcmcia - ok
15:30:35.0698 2624 PEAUTH (6349f6ed9c623b44b52ea3c63c831a92) C:\Windows\system32\drivers\peauth.sys
15:30:35.0698 2624 PEAUTH - ok
15:30:35.0760 2624 PptpMiniport (ecfffaec0c1ecd8dbc77f39070ea1db1) C:\Windows\system32\DRIVERS\raspptp.sys
15:30:35.0760 2624 PptpMiniport - ok
15:30:35.0792 2624 Processor (0e3cef5d28b40cf273281d620c50700a) C:\Windows\system32\drivers\processr.sys
15:30:35.0792 2624 Processor - ok
15:30:35.0823 2624 PSched (a114cfe308c24b8235b03cfdffe11e99) C:\Windows\system32\DRIVERS\pacer.sys
15:30:35.0823 2624 PSched - ok
15:30:35.0854 2624 PxHelp20 (49452bfcec22f36a7a9b9c2181bc3042) C:\Windows\system32\Drivers\PxHelp20.sys
15:30:35.0854 2624 PxHelp20 - ok
15:30:35.0901 2624 ql2300 (ccdac889326317792480c0a67156a1ec) C:\Windows\system32\drivers\ql2300.sys
15:30:35.0917 2624 ql2300 - ok
15:30:35.0917 2624 ql40xx (81a7e5c076e59995d54bc1ed3a16e60b) C:\Windows\system32\drivers\ql40xx.sys
15:30:35.0917 2624 ql40xx - ok
15:30:35.0948 2624 QWAVEdrv (9f5e0e1926014d17486901c88eca2db7) C:\Windows\system32\drivers\qwavedrv.sys
15:30:35.0948 2624 QWAVEdrv - ok
15:30:35.0979 2624 RasAcd (147d7f9c556d259924351feb0de606c3) C:\Windows\system32\DRIVERS\rasacd.sys
15:30:35.0979 2624 RasAcd - ok
15:30:35.0995 2624 Rasl2tp (a214adbaf4cb47dd2728859ef31f26b0) C:\Windows\system32\DRIVERS\rasl2tp.sys
15:30:35.0995 2624 Rasl2tp - ok
15:30:36.0010 2624 RasPppoe (3e9d9b048107b40d87b97df2e48e0744) C:\Windows\system32\DRIVERS\raspppoe.sys
15:30:36.0026 2624 RasPppoe - ok
15:30:36.0026 2624 RasSstp (a7d141684e9500ac928a772ed8e6b671) C:\Windows\system32\DRIVERS\rassstp.sys
15:30:36.0026 2624 RasSstp - ok
15:30:36.0057 2624 rdbss (6e1c5d0457622f9ee35f683110e93d14) C:\Windows\system32\DRIVERS\rdbss.sys
15:30:36.0057 2624 rdbss - ok
15:30:36.0073 2624 RDPCDD (89e59be9a564262a3fb6c4f4f1cd9899) C:\Windows\system32\DRIVERS\RDPCDD.sys
15:30:36.0073 2624 RDPCDD - ok
15:30:36.0104 2624 rdpdr (e8bd98d46f2ed77132ba927fccb47d8b) C:\Windows\system32\drivers\rdpdr.sys
15:30:36.0104 2624 rdpdr - ok
15:30:36.0120 2624 RDPENCDD (9d91fe5286f748862ecffa05f8a0710c) C:\Windows\system32\drivers\rdpencdd.sys
15:30:36.0120 2624 RDPENCDD - ok
15:30:36.0167 2624 RDPWD (e1c18f4097a5abcec941dc4b2f99db7e) C:\Windows\system32\drivers\RDPWD.sys
15:30:36.0167 2624 RDPWD - ok
15:30:36.0213 2624 rimmptsk (355aac141b214bef1dbc1483afd9bd50) C:\Windows\system32\DRIVERS\rimmptsk.sys
15:30:36.0213 2624 rimmptsk - ok
15:30:36.0229 2624 rimsptsk (a4216c71dd4f60b26418ccfd99cd0815) C:\Windows\system32\DRIVERS\rimsptsk.sys
15:30:36.0229 2624 rimsptsk - ok
15:30:36.0245 2624 rismxdp (2a2554cb24506e0a0508fc395c4a1b42) C:\Windows\system32\DRIVERS\rixdptsk.sys
15:30:36.0245 2624 rismxdp - ok
15:30:36.0292 2624 rspndr (9c508f4074a39e8b4b31d27198146fad) C:\Windows\system32\DRIVERS\rspndr.sys
15:30:36.0292 2624 rspndr - ok
15:30:36.0338 2624 RTL8023xp (5c5612756b380bcedbf566a780ff9afe) C:\Windows\system32\DRIVERS\Rtnicxp.sys
15:30:36.0338 2624 RTL8023xp - ok
15:30:36.0354 2624 RTL8169 (283392af1860ecdb5e0f8ebd7f3d72df) C:\Windows\system32\DRIVERS\Rtlh86.sys
15:30:36.0354 2624 RTL8169 - ok
15:30:36.0401 2624 RxFilter (80cae340f37b52d1cb75ff74e6a087cd) C:\Windows\system32\DRIVERS\RxFilter.sys
15:30:36.0417 2624 RxFilter - ok
15:30:36.0448 2624 sbp2port (3ce8f073a557e172b330109436984e30) C:\Windows\system32\drivers\sbp2port.sys
15:30:36.0448 2624 sbp2port - ok
15:30:36.0495 2624 sdbus (7b3973cc28b8aa3e9e2e5d53e720e2c9) C:\Windows\system32\DRIVERS\sdbus.sys
15:30:36.0495 2624 sdbus - ok
15:30:36.0526 2624 secdrv (90a3935d05b494a5a39d37e71f09a677) C:\Windows\system32\drivers\secdrv.sys
15:30:36.0526 2624 secdrv - ok
15:30:36.0557 2624 Serenum (ce9ec966638ef0b10b864ddedf62a099) C:\Windows\system32\DRIVERS\serenum.sys
15:30:36.0557 2624 Serenum - ok
15:30:36.0573 2624 Serial (6d663022db3e7058907784ae14b69898) C:\Windows\system32\DRIVERS\serial.sys
15:30:36.0573 2624 Serial - ok
15:30:36.0604 2624 sermouse (8af3d28a879bf75db53a0ee7a4289624) C:\Windows\system32\drivers\sermouse.sys
15:30:36.0604 2624 sermouse - ok
15:30:36.0620 2624 SetupNTGLM7X - ok
15:30:36.0635 2624 sffdisk (103b79418da647736ee95645f305f68a) C:\Windows\system32\drivers\sffdisk.sys
15:30:36.0635 2624 sffdisk - ok
15:30:36.0651 2624 sffp_mmc (8fd08a310645fe872eeec6e08c6bf3ee) C:\Windows\system32\drivers\sffp_mmc.sys
15:30:36.0651 2624 sffp_mmc - ok
15:30:36.0667 2624 sffp_sd (9cfa05fcfcb7124e69cfc812b72f9614) C:\Windows\system32\drivers\sffp_sd.sys
15:30:36.0667 2624 sffp_sd - ok
15:30:36.0682 2624 sfloppy (46ed8e91793b2e6f848015445a0ac188) C:\Windows\system32\drivers\sfloppy.sys
15:30:36.0682 2624 sfloppy - ok
15:30:36.0729 2624 sisagp (d2a595d6eebeeaf4334f8e50efbc9931) C:\Windows\system32\drivers\sisagp.sys
15:30:36.0729 2624 sisagp - ok
15:30:36.0745 2624 SiSRaid2 (cedd6f4e7d84e9f98b34b3fe988373aa) C:\Windows\system32\drivers\sisraid2.sys
15:30:36.0745 2624 SiSRaid2 - ok
15:30:36.0760 2624 SiSRaid4 (df843c528c4f69d12ce41ce462e973a7) C:\Windows\system32\drivers\sisraid4.sys
15:30:36.0760 2624 SiSRaid4 - ok
15:30:36.0807 2624 Smb (031e6bcd53c9b2b9ace111eafec347b6) C:\Windows\system32\DRIVERS\smb.sys
15:30:36.0807 2624 Smb - ok
15:30:36.0838 2624 spldr (7aebdeef071fe28b0eef2cdd69102bff) C:\Windows\system32\drivers\spldr.sys
15:30:36.0838 2624 spldr - ok
15:30:36.0854 2624 srv (3d7c04aba41ac96ba7e9d123ec8f7fa3) C:\Windows\system32\DRIVERS\srv.sys
15:30:36.0870 2624 srv - ok
15:30:36.0885 2624 srv2 (805fac010405ad3f82ef8df0bb035d81) C:\Windows\system32\DRIVERS\srv2.sys
15:30:36.0885 2624 srv2 - ok
15:30:36.0901 2624 srvnet (f63a0a58aafe34d7a1a0a74abccdd9c0) C:\Windows\system32\DRIVERS\srvnet.sys
15:30:36.0901 2624 srvnet - ok
15:30:36.0932 2624 swenum (7ba58ecf0c0a9a69d44b3dca62becf56) C:\Windows\system32\DRIVERS\swenum.sys
15:30:36.0932 2624 swenum - ok
15:30:36.0963 2624 Symc8xx (192aa3ac01df071b541094f251deed10) C:\Windows\system32\drivers\symc8xx.sys
15:30:36.0963 2624 Symc8xx - ok
15:30:36.0979 2624 Sym_hi (8c8eb8c76736ebaf3b13b633b2e64125) C:\Windows\system32\drivers\sym_hi.sys
15:30:36.0979 2624 Sym_hi - ok
15:30:36.0995 2624 Sym_u3 (8072af52b5fd103bbba387a1e49f62cb) C:\Windows\system32\drivers\sym_u3.sys
15:30:36.0995 2624 Sym_u3 - ok
15:30:37.0042 2624 Tcpip (fc6e2835d667774d409c7c7021eaf9c4) C:\Windows\system32\drivers\tcpip.sys
15:30:37.0057 2624 Tcpip - ok
15:30:37.0073 2624 Tcpip6 (fc6e2835d667774d409c7c7021eaf9c4) C:\Windows\system32\DRIVERS\tcpip.sys
15:30:37.0088 2624 Tcpip6 - ok
15:30:37.0104 2624 tcpipreg (d4a2e4a4b011f3a883af77315a5ae76b) C:\Windows\system32\drivers\tcpipreg.sys
15:30:37.0104 2624 tcpipreg - ok
15:30:37.0135 2624 TDPIPE (5dcf5e267be67a1ae926f2df77fbcc56) C:\Windows\system32\drivers\tdpipe.sys
15:30:37.0135 2624 TDPIPE - ok
15:30:37.0167 2624 TDTCP (389c63e32b3cefed425b61ed92d3f021) C:\Windows\system32\drivers\tdtcp.sys
15:30:37.0167 2624 TDTCP - ok
15:30:37.0167 2624 tdx (d09276b1fab033ce1d40dcbdf303d10f) C:\Windows\system32\DRIVERS\tdx.sys
15:30:37.0182 2624 tdx - ok
15:30:37.0213 2624 TermDD (a048056f5e1a96a9bf3071b91741a5aa) C:\Windows\system32\DRIVERS\termdd.sys
15:30:37.0213 2624 TermDD - ok
15:30:37.0245 2624 tos_sps32 (1ea5f27c29405bf49799feca77186da9) C:\Windows\system32\DRIVERS\tos_sps32.sys
15:30:37.0245 2624 tos_sps32 - ok
15:30:37.0307 2624 tssecsrv (dcf0f056a2e4f52287264f5ab29cf206) C:\Windows\system32\DRIVERS\tssecsrv.sys
15:30:37.0307 2624 tssecsrv - ok
15:30:37.0354 2624 tunmp (caecc0120ac49e3d2f758b9169872d38) C:\Windows\system32\DRIVERS\tunmp.sys
15:30:37.0354 2624 tunmp - ok
15:30:37.0370 2624 tunnel (119b8184e106baedc83fce5ddf3950da) C:\Windows\system32\DRIVERS\tunnel.sys
15:30:37.0370 2624 tunnel - ok
15:30:37.0385 2624 uagp35 (c3ade15414120033a36c0f293d4a4121) C:\Windows\system32\drivers\uagp35.sys
15:30:37.0385 2624 uagp35 - ok
15:30:37.0417 2624 udfs (8b5088058fa1d1cd897a2113ccff6c58) C:\Windows\system32\DRIVERS\udfs.sys
15:30:37.0417 2624 udfs - ok
15:30:37.0448 2624 uliagpkx (75e6890ebfce0841d3291b02e7a8bdb0) C:\Windows\system32\drivers\uliagpkx.sys
15:30:37.0448 2624 uliagpkx - ok
15:30:37.0463 2624 uliahci (3cd4ea35a6221b85dcc25daa46313f8d) C:\Windows\system32\drivers\uliahci.sys
15:30:37.0463 2624 uliahci - ok
15:30:37.0479 2624 UlSata (8514d0e5cd0534467c5fc61be94a569f) C:\Windows\system32\drivers\ulsata.sys
15:30:37.0479 2624 UlSata - ok
15:30:37.0495 2624 ulsata2 (38c3c6e62b157a6bc46594fada45c62b) C:\Windows\system32\drivers\ulsata2.sys
15:30:37.0495 2624 ulsata2 - ok
15:30:37.0526 2624 umbus (32cff9f809ae9aed85464492bf3e32d2) C:\Windows\system32\DRIVERS\umbus.sys
15:30:37.0526 2624 umbus - ok
15:30:37.0557 2624 usbccgp (caf811ae4c147ffcd5b51750c7f09142) C:\Windows\system32\DRIVERS\usbccgp.sys
15:30:37.0557 2624 usbccgp - ok
15:30:37.0588 2624 usbcir (e9476e6c486e76bc4898074768fb7131) C:\Windows\system32\drivers\usbcir.sys
15:30:37.0588 2624 usbcir - ok
15:30:37.0635 2624 usbehci (cebe90821810e76320155beba722fcf9) C:\Windows\system32\DRIVERS\usbehci.sys
15:30:37.0635 2624 usbehci - ok
15:30:37.0651 2624 usbhub (cc6b28e4ce39951357963119ce47b143) C:\Windows\system32\DRIVERS\usbhub.sys
15:30:37.0651 2624 usbhub - ok
15:30:37.0667 2624 usbohci (38dbc7dd6cc5a72011f187425384388b) C:\Windows\system32\drivers\usbohci.sys
15:30:37.0667 2624 usbohci - ok
15:30:37.0682 2624 usbprint (e75c4b5269091d15a2e7dc0b6d35f2f5) C:\Windows\system32\DRIVERS\usbprint.sys
15:30:37.0682 2624 usbprint - ok
15:30:37.0713 2624 usbscan (a508c9bd8724980512136b039bba65e9) C:\Windows\system32\DRIVERS\usbscan.sys
15:30:37.0713 2624 usbscan - ok
15:30:37.0745 2624 USBSTOR (87ba6b83c5d19b69160968d07d6e2982) C:\Windows\system32\DRIVERS\USBSTOR.SYS
15:30:37.0745 2624 USBSTOR - ok
15:30:37.0745 2624 usbuhci (814d653efc4d48be3b04a307eceff56f) C:\Windows\system32\DRIVERS\usbuhci.sys
15:30:37.0760 2624 usbuhci - ok
15:30:37.0807 2624 vga (7d92be0028ecdedec74617009084b5ef) C:\Windows\system32\DRIVERS\vgapnp.sys
15:30:37.0807 2624 vga - ok
15:30:37.0823 2624 VgaSave (2e93ac0a1d8c79d019db6c51f036636c) C:\Windows\System32\drivers\vga.sys
15:30:37.0838 2624 VgaSave - ok
15:30:37.0838 2624 viaagp (045d9961e591cf0674a920b6ba3ba5cb) C:\Windows\system32\drivers\viaagp.sys
15:30:37.0838 2624 viaagp - ok
15:30:37.0854 2624 ViaC7 (56a4de5f02f2e88182b0981119b4dd98) C:\Windows\system32\drivers\viac7.sys
15:30:37.0854 2624 ViaC7 - ok
15:30:37.0870 2624 viaide (fd2e3175fcada350c7ab4521dca187ec) C:\Windows\system32\drivers\viaide.sys
15:30:37.0870 2624 viaide - ok
15:30:37.0901 2624 volmgr (69503668ac66c77c6cd7af86fbdf8c43) C:\Windows\system32\drivers\volmgr.sys
15:30:37.0917 2624 volmgr - ok
15:30:37.0932 2624 volmgrx (98f5ffe6316bd74e9e2c97206c190196) C:\Windows\system32\drivers\volmgrx.sys
15:30:37.0932 2624 volmgrx - ok
15:30:37.0948 2624 volsnap (d8b4a53dd2769f226b3eb374374987c9) C:\Windows\system32\drivers\volsnap.sys
15:30:37.0948 2624 volsnap - ok
15:30:37.0963 2624 vsmraid (d984439746d42b30fc65a4c3546c6829) C:\Windows\system32\drivers\vsmraid.sys
15:30:37.0979 2624 vsmraid - ok
15:30:37.0995 2624 WacomPen (48dfee8f1af7c8235d4e626f0c4fe031) C:\Windows\system32\drivers\wacompen.sys
15:30:37.0995 2624 WacomPen - ok
15:30:38.0026 2624 Wanarp (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
15:30:38.0026 2624 Wanarp - ok
15:30:38.0042 2624 Wanarpv6 (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
15:30:38.0042 2624 Wanarpv6 - ok
15:30:38.0057 2624 Wd (afc5ad65b991c1e205cf25cfdbf7a6f4) C:\Windows\system32\drivers\wd.sys
15:30:38.0057 2624 Wd - ok
15:30:38.0104 2624 Wdf01000 (b6f0a7ad6d4bd325fbcd8bac96cd8d96) C:\Windows\system32\drivers\Wdf01000.sys
15:30:38.0104 2624 Wdf01000 - ok
15:30:38.0182 2624 WmiAcpi (701a9f884a294327e9141d73746ee279) C:\Windows\system32\drivers\wmiacpi.sys
15:30:38.0182 2624 WmiAcpi - ok
15:30:38.0229 2624 ws2ifsl (e3a3cb253c0ec2494d4a61f5e43a389c) C:\Windows\system32\drivers\ws2ifsl.sys
15:30:38.0229 2624 ws2ifsl - ok
15:30:38.0276 2624 WUDFRd (ac13cb789d93412106b0fb6c7eb2bcb6) C:\Windows\system32\DRIVERS\WUDFRd.sys
15:30:38.0276 2624 WUDFRd - ok
15:30:38.0307 2624 MBR (0x1B8) (5c616939100b85e558da92b899a0fc36) \Device\Harddisk0\DR0
15:30:38.0307 2624 \Device\Harddisk0\DR0 - ok
15:30:38.0323 2624 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk5\DR5
15:30:38.0323 2624 \Device\Harddisk5\DR5 - ok
15:30:38.0323 2624 Boot (0x1200) (4d3bed65cc310a6b5c97c1b2f483a821) \Device\Harddisk0\DR0\Partition0
15:30:38.0323 2624 \Device\Harddisk0\DR0\Partition0 - ok
15:30:38.0338 2624 Boot (0x1200) (c016699f286bf6e60ae5ff306f6f773f) \Device\Harddisk5\DR5\Partition0
15:30:38.0338 2624 \Device\Harddisk5\DR5\Partition0 - ok
15:30:38.0338 2624 ============================================================
15:30:38.0338 2624 Scan finished
15:30:38.0338 2624 ============================================================
15:30:38.0354 0124 Detected object count: 0
15:30:38.0354 0124 Actual detected object count: 0
15:30:40.0698 1420 Deinitialize success

The combofix log is.....

ComboFix 11-11-04.02 - Ray 04/11/2011 16:02:41.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.44.1033.18.2047.1451 [GMT 0:00]
Running from: c:\users\Ray\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2011-10-04 to 2011-11-04 )))))))))))))))))))))))))))))))
.
.
2011-11-04 16:12 . 2011-11-04 16:12 -------- d-----w- c:\users\Default\AppData\Local\temp
2011-11-03 14:09 . 2011-11-03 14:09 -------- d-----w- c:\program files\Microsoft
2011-11-03 14:09 . 2011-11-03 14:09 -------- d-----w- c:\program files\Windows Live SkyDrive
2011-11-03 14:09 . 2011-11-03 14:09 -------- d-----w- c:\program files\Windows Live
2011-11-03 14:07 . 2011-11-03 14:07 -------- d-----w- c:\program files\Common Files\Windows Live
2011-11-02 19:41 . 2011-11-02 19:41 134464 ----a-w- c:\windows\system32\LnkProtect.dll
2011-11-02 19:40 . 2011-11-02 19:40 12872 ----a-w- c:\windows\system32\bootdelete.exe
2011-11-02 19:38 . 2011-11-02 19:42 23624 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2011-11-02 19:38 . 2011-11-02 19:38 -------- d-----w- c:\program files\Hitman Pro 3.5
2011-11-02 19:38 . 2011-11-02 19:40 -------- d-----w- c:\programdata\Hitman Pro
2011-11-02 18:17 . 2011-11-02 18:17 -------- d-----w- c:\program files\Free Text Pad
2011-11-02 16:16 . 2011-11-02 16:16 -------- d-----w- c:\program files\Participatory Culture Foundation
2011-11-02 15:10 . 2011-11-02 15:12 -------- d-----w- c:\program files\InterActual
2011-11-02 14:35 . 2011-11-02 14:35 -------- d-----w- c:\programdata\Sonic
2011-11-02 14:32 . 2011-11-02 15:10 -------- d-----w- c:\programdata\Roxio
2011-11-02 14:26 . 2011-11-02 14:40 -------- d-----w- c:\program files\Common Files\PX Storage Engine
2011-11-02 14:26 . 2011-11-02 14:37 -------- d-----w- c:\program files\Common Files\Sonic Shared
2011-11-02 14:25 . 2011-11-02 14:36 -------- d-----w- c:\program files\Common Files\Roxio Shared
2011-11-02 14:24 . 2011-11-02 14:24 -------- d-----w- c:\programdata\eSellerate
2011-11-02 14:24 . 2011-11-02 14:43 -------- d-----w- c:\programdata\SmartSound Software Inc
2011-11-02 14:24 . 2011-11-02 14:24 -------- d-----w- c:\program files\SmartSound Software
2011-11-02 14:23 . 2011-11-02 14:23 -------- d-----w- c:\programdata\InstallShield
2011-11-02 14:23 . 2011-11-02 14:39 -------- d-----w- c:\program files\Roxio
2011-11-02 14:22 . 2007-03-15 16:57 443752 ----a-w- c:\windows\system32\d3dx10_33.dll
2011-11-02 14:22 . 2007-03-12 16:42 3495784 ----a-w- c:\windows\system32\d3dx9_33.dll
2011-11-02 14:22 . 2007-03-12 16:42 1123696 ----a-w- c:\windows\system32\D3DCompiler_33.dll
2011-11-02 14:20 . 2011-11-02 14:20 -------- d-----w- c:\windows\system32\URTTEMP
2011-11-02 13:21 . 2011-11-02 13:21 -------- d-----w- c:\program files\directx
2011-11-02 13:20 . 2011-11-02 13:20 -------- d-----w- C:\Sierra
2011-11-02 13:19 . 2001-04-11 18:25 77824 ----a-w- c:\program files\Common Files\InstallShield\engine\6\Intel 32\ctor.dll
2011-11-02 13:19 . 2001-04-11 18:25 225280 ------w- c:\program files\Common Files\InstallShield\IScript\iscript.dll
2011-11-02 13:19 . 2001-04-11 18:21 176128 ------w- c:\program files\Common Files\InstallShield\engine\6\Intel 32\iuser.dll
2011-11-02 13:19 . 2001-04-11 18:20 32768 ------w- c:\program files\Common Files\InstallShield\engine\6\Intel 32\objectps.dll
2011-11-02 10:44 . 2011-11-02 10:44 -------- d-----w- c:\program files\Lexmark Fax Solutions
2011-11-02 10:43 . 2011-11-04 14:50 -------- d-----w- c:\program files\Lx_cats
2011-11-02 10:43 . 2005-07-25 00:59 72192 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\lxccpp5c.dll
2011-11-02 10:39 . 2005-04-28 06:07 65536 ----a-w- c:\windows\system32\lxcccfg.dll
2011-11-02 10:38 . 2011-11-02 10:44 -------- d-----w- c:\program files\Lexmark 3300 Series
2011-11-02 10:38 . 2011-11-02 10:38 -------- d-----w- C:\Temp
2011-11-02 01:21 . 2011-11-02 01:21 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-02 01:18 . 2011-11-02 19:40 -------- d-----w- c:\program files\YahELite
2011-11-02 00:26 . 2011-11-02 00:26 -------- d-----w- c:\program files\Bytescribe
2011-11-02 00:26 . 2001-05-08 06:00 9488 ----a-w- c:\windows\system32\tssoft32.acm
2011-11-02 00:26 . 2001-05-08 06:00 16144 ----a-w- c:\windows\system32\tsd32.dll
2011-11-02 00:25 . 2008-03-29 08:19 274432 ----a-w- c:\windows\system32\yacscom.dll
2011-11-02 00:25 . 2005-02-24 11:11 200704 ----a-w- c:\windows\system32\yacsui.dll
2011-11-02 00:25 . 2011-11-02 00:25 -------- d-----w- c:\program files\Dream
2011-11-02 00:25 . 2005-02-24 11:11 139264 ----a-w- c:\windows\system32\ywcvwr.dll
2011-11-02 00:25 . 2004-03-09 18:00 260880 ----a-w- c:\windows\system32\MSFLXGRD.OCX
2011-11-02 00:25 . 2004-03-09 18:00 224016 ----a-w- c:\windows\system32\TABCTL32.OCX
2011-11-02 00:25 . 1999-03-26 23:38 101888 ----a-w- c:\windows\system32\vb6stkit.dll
2011-11-02 00:20 . 2004-08-06 16:23 132880 ------w- c:\windows\system32\MSINET.OCX
2011-11-02 00:20 . 2004-03-09 00:00 212240 ------w- c:\windows\system32\Richtx32.ocx
2011-11-02 00:20 . 2004-03-09 00:00 124688 ------w- c:\windows\system32\Mswinsck.ocx
2011-11-02 00:20 . 2004-03-09 00:00 152848 ------w- c:\windows\system32\comdlg32.ocx
2011-11-02 00:20 . 2011-11-02 00:20 -------- d-----w- c:\program files\ZakFromAnotherPlanet
2011-11-01 20:56 . 2011-11-01 20:56 -------- d-----w- c:\program files\VideoLAN
2011-11-01 18:26 . 2011-11-01 18:26 -------- d-----w- c:\programdata\Malwarebytes
2011-11-01 18:26 . 2011-11-01 18:26 -------- d-----w- C:\Malware
2011-11-01 18:26 . 2011-08-31 17:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-01 16:51 . 2011-11-01 17:52 -------- d-----w- c:\programdata\Microsoft Help
2011-11-01 16:50 . 2011-11-01 16:50 -------- d-----r- C:\MSOCache
2011-11-01 14:34 . 2011-11-01 14:34 -------- d--h--w- c:\programdata\Common Files
2011-11-01 14:33 . 2011-11-04 15:54 -------- d-----w- c:\programdata\MFAData
2011-11-01 13:49 . 2011-11-01 13:49 -------- d-----w- C:\PerfLogs
2011-11-01 13:26 . 2011-11-01 13:10 47560 ----a-w- c:\windows\system32\SPReview.exe
2011-11-01 13:26 . 2011-11-01 13:10 152576 ----a-w- c:\windows\system32\SPWizUI.dll
2011-11-01 13:16 . 2008-01-18 23:33 193024 ----a-w- c:\windows\system32\recdisc.exe
2011-11-01 13:16 . 2008-01-18 23:36 6656 ----a-w- c:\windows\system32\sdspres.dll
2011-11-01 13:14 . 2008-01-18 23:34 6103040 ----a-w- c:\windows\system32\chtbrkr.dll
2011-11-01 13:12 . 2007-12-06 04:04 6656 ----a-w- c:\windows\system32\kbd106n.dll
2011-11-01 13:12 . 2008-01-18 23:33 44032 ----a-w- c:\windows\system32\cbsra.exe
2011-11-01 12:16 . 2011-11-01 12:16 -------- d-----w- c:\program files\CCleaner
2011-11-01 12:13 . 2011-11-03 16:33 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2011-11-01 12:13 . 2011-11-02 19:47 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-11-01 11:56 . 2011-11-01 11:57 -------- d-----w- c:\programdata\NVIDIA
2011-11-01 11:53 . 2011-11-01 11:53 -------- d-----w- c:\program files\AGEIA Technologies
2011-11-01 11:53 . 2011-11-01 11:53 -------- d-----w- c:\windows\system32\AGEIA
2011-11-01 11:51 . 2009-04-27 00:42 457248 ----a-w- c:\windows\system32\NVUNINST.EXE
2011-11-01 11:28 . 2011-11-01 11:28 -------- d-----w- c:\programdata\ToshibaEurope
2011-11-01 11:28 . 2011-11-03 14:10 -------- d-----w- c:\users\Ray
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-11-01 13:38 . 2006-11-02 10:32 101888 ----a-w- c:\windows\system32\ifxcardm.dll
2011-11-01 13:38 . 2006-11-02 10:32 82432 ----a-w- c:\windows\system32\axaltocm.dll
2011-09-29 07:09 . 2011-11-01 12:08 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="RtHDVCpl.exe" [2007-07-06 4669440]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-05-01 13781536]
"LXCCCATS"="c:\windows\system32\spool\DRIVERS\W32X86\3\LXCCtime.dll" [2005-07-20 73728]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=c:\windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Synchronizer.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Synchronizer.lnk
backup=c:\windows\pss\Adobe Reader Synchronizer.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DMXLauncher]
2007-08-14 03:44 113136 ----a-w- c:\program files\Roxio\CinePlayer\DMXLauncher.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LXCCCATS]
2005-07-20 13:44 73728 ----a-w- c:\windows\System32\spool\drivers\w32x86\3\lxcctime.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
2009-03-05 16:07 2260480 --sha-r- c:\program files\Spybot - Search & Destroy\TeaTimer.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
2008-01-18 23:38 1008184 ----a-w- c:\program files\Windows Defender\MSASCui.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"AntiVirusOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-4073646296-272367730-306578577-1000]
"EnableNotificationsRef"=dword:00000001
.
R2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\Roxio\Digital Home 10\RoxioUpnpService10.exe [2007-08-24 362992]
R2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxLiveShare10.exe [2007-08-24 309744]
R3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\Roxio\Digital Home 10\RoxioUPnPRenderer10.exe [2007-08-24 72176]
R3 RoxMediaDB10;RoxMediaDB10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxMediaDB10.exe [2007-08-24 1083888]
R3 SetupNTGLM7X;SetupNTGLM7X;E:\NTGLM7X.sys [x]
S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxWatch10.exe [2007-08-24 166384]
S2 SBSDWSCService;SBSD Security Center Service;c:\program files\Spybot - Search & Destroy\SDWinSec.exe [2009-01-26 1153368]
.
.
.
------- Supplementary Scan -------
.
mWindow Title =
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 95.168.162.12 95.168.162.22
FF - ProfilePath - c:\users\Ray\AppData\Roaming\Mozilla\Firefox\Profiles\x8zseaao.default\
.
- - - - ORPHANS REMOVED - - - -
.
MSConfigStartUp-AVG_TRAY - c:\program files\AVG\AVG2012\avgtray.exe
MSConfigStartUp-MSServer - c:\windows\system32\mlJDsSkJ.dll
MSConfigStartUp-Toshiba Registration - c:\program files\Toshiba\Registration\ToshibaRegistration.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-11-04 16:12
Windows 6.0.6001 Service Pack 1 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
LXCCCATS = rundll32 c:\windows\system32\spool\DRIVERS\W32X86\3\LXCCtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
.
scanning hidden files ...
.
.
c:\windows\TEMP\TMP000000784F6F7D4E2C02C2B3 524288 bytes
.
scan completed successfully
hidden files: 1
.
**************************************************************************
.
Completion time: 2011-11-04 16:18:20
ComboFix-quarantined-files.txt 2011-11-04 16:18
.
Pre-Run: 449,791,225,856 bytes free
Post-Run: 448,744,550,400 bytes free
.
- - End Of File - - 8E46287F844DD88CC66CB663CFB4D82A

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:31 AM

Posted 04 November 2011 - 11:42 PM

Hello,

I’m wondering how this thing came back after a hard disk wipe; is it possible for the
bug to survive a wipe? And if so, would several disk wipes with ‘Killdisk’ finally remove it?

If both your machine are on the same router they could have been reinfecting each other. Also the router may need to be reset so lets do that also. Is the other machine also having redirects?

How to Reset your router.

1.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


2.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

Things to include in your next reply::
MBAm log
Eset log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 rays1

rays1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 05 November 2011 - 10:05 AM

Hi Firteman,

Attached is the mbam log.

The ETSscan log was accidentally deleted but, it did pick up 1 'infected' file called "Win32/PrcView application"
which is now deleted (I think)Have you heard of this infected file before?
My comp now seems to be working in that it has stayed on the same browser page for the last half hour without
being re-directed

It seems that it is now Ok but, I have disconnected my laptop from the router and if this problem reappears,
I'd assume that the best thing to do would be run thru these routines with each computer, one after the other,
whilst the other is disconnected?

Attached Files



#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:31 AM

Posted 05 November 2011 - 10:53 AM

Hello,

Lets go ahead and take a look at the laptop now to see if it is infected or not. It would save a great deal of time and effort in the future.


Please do the following on the laptop.

  • 1. Please download OTL from one of the following mirrors:
  • This is THE Mirror
    2. Save it to your desktop.
    3. Double click on the Posted Image icon on your desktop.
    4. Under the Custom Scan box paste this in
    netsvcs
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT

    5. Push the Quick Scan button.
    6. Two reports will open, copy and paste them in a reply here:
  • OTL.txt <-- Will be opened
  • Extra.txt <-- Will be minimized


2.
Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:31 AM

Posted 07 November 2011 - 10:03 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 3-5 days the topic will need to be closed.

Thanks for understanding :)

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#10 rays1

rays1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 08 November 2011 - 03:22 PM

Hi,

The log is pasted as requested. The asMBR dowmloaded Avast! compomnent and
that log file is attached. Seems like a lot of scans and trouble to do this?

I'm lost what ot al means now, if you'd advise me, please?

Attached Files



#11 rays1

rays1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 08 November 2011 - 03:25 PM

OTL log too

Attached Files

  • Attached File  OTL.Txt   323.41KB   1 downloads


#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:31 AM

Posted 08 November 2011 - 04:37 PM

Hello,

Seems like a lot of scans and trouble to do this?

Yes some time it takes multiple tools along with multiple scans to fix some infections. In our case a good thing we scanned this laptop because it show signs of a previous infection that could possible reinfect you. We will however take care of that so it don't happen. :thumbup2:


1.
We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox. Do not include the word "Code"
    :Otl
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
    
    :Commands
    [EMPTYTEMP]
    [EMPTYFLASH]
    [EMPTYJAVA]
    [RESETHOSTS]
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click Posted Image.
  • A report will open. Copy and Paste that report in your next reply.



2.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.



Things to include in your next reply::
Otl fix log
MBAM log
A new OTl.txt

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 rays1

rays1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 08 November 2011 - 05:13 PM

Hi Fitreman,

I found that my comp suddenly shut down so, cleaned out fluff from
inside- just in case.
re-start showed 2 files on the desktop called 'desktop.ini' which
weren't there before!?

3 scan files attached
comp seems ok now...? but what if the other ones infected???

mbam files gives error "too big to upload" but shows no maliscious items detected

Ray

Attached Files



#14 rays1

rays1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:31 PM

Posted 08 November 2011 - 05:14 PM

OTL files is too big I meant to say!

#15 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:31 AM

Posted 08 November 2011 - 07:57 PM

Hello,

1.
Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".


2.

Congratulations! You now appear clean! :cool:

Are things running okay? Do you have any more questions?

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.


One of the most common questions found when cleaning malware is "how did my machine get infected?". There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.

Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.

Do not use P2P programs
Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

Practice Safe Internet
Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your computer clean and running securely:
  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.
    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. For a list of these types of programs we recommend you visit this link: Rogue/Suspect Anti-Spyware Products & Web Sites
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your http://en.wikipedia.org/wiki/Taskbar#Screenshots '>Taskbar, right click and chose close.
  • Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.
  • Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
    Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

  • Windows XP users
    You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
  • Windows Vista users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
  • Windows 7 users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here


Keep your browser secure
Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

The latest versions of the three common browsers can be found below:

Use an AntiVirus Software
It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.
See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

Use a Firewall
I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

In addition, if you connect to the internet via a router, this will normally have a firewall in-built.
Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one!
For a tutorial on Firewalls and a listing of some available ones see this link:
Understanding and Using Firewalls

Install an Anti-Malware program
Recommended, and free, Anti-Malware programs are Malwarebytes Anti-Malware, SuperAntiSpyware.

You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

Install SpywareBlaster
SpywareBlaster will add a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs. Note that the more modern browsers will have some form of this functionality built-in.

A tutorial on installing & using this product can be found here: Using SpywareBlaster to protect your computer from Spyware and Malware


Update all these programs regularly
Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.

Follow this list and your potential for being infected again will reduce dramatically.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users