Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Problem getting rid of search engine hijack


  • This topic is locked This topic is locked
13 replies to this topic

#1 miltonq

miltonq

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 AM

Posted 03 January 2012 - 11:55 AM

My search engines have all been hijacked. I search, it shows results, but no matter what I click on I get redirected to a different website than what I click on.
I have tried running all the usual tools/scans, but it's not getting rid of it.
Below is a HijackThis log on it. Can someone please assist?
Thanks!

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 11:53:26 AM, on 1/3/2012
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v9.00 (9.00.8112.16421)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Pogoplug\PPDrive.exe
C:\Program Files\Amazon\Amazon Unbox Video\ADVWindowsClientSystemTray.exe
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Trend Micro\UniClient\UiFrmWrk\uiSeAgnt.exe
C:\Program Files\Pogoplug\HBPLUG\HBWD.EXE
C:\Program Files\Pogoplug\HBPLUG\HBPLUG.EXE
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Pogoplug\PPFS.EXE
C:\Program Files\Common Files\Java\Java Update\jucheck.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\Macromed\Flash\FlashUtil11e_ActiveX.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\Madeline\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.gmail.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Trend Micro NSC BHO - {1CA1377B-DC1D-4A52-9585-6E06050FAC53} - C:\Program Files\Trend Micro\AMSP\Module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Windows Live Messenger Companion Helper - {9FDDE16B-836F-4806-AB1F-1455CBEFF289} - C:\Program Files\Windows Live\Companion\companioncore.dll
O2 - BHO: TmBpIeBHO - {BBACBAFD-FA5E-4079-8B33-00EB9F13D4AC} - C:\Program Files\Trend Micro\AMSP\Module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Trend Micro Titanium] "C:\Program Files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" -set Silent "1" SplashURL ""
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [Trend Micro Client Framework] "C:\Program Files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [bgzxkhgfng] rundll32 "C:\Users\Madeline\AppData\Roaming\odbcad32S.dll",Xmmf
O4 - HKCU\..\Run: [Pogoplug] "C:\Program Files\Pogoplug\PPDrive.exe"
O4 - Global Startup: Amazon Unbox.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: @C:\Program Files\Windows Live\Companion\companionlang.dll,-600 - {0000036B-C524-4050-81A0-243669A86B9F} - C:\Program Files\Windows Live\Companion\companioncore.dll
O9 - Extra button: @C:\Program Files\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1004 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: @C:\Program Files\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1003 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {7D2FB79E-E58C-4DB5-A36F-AC1C73967F4D} (Qualys BrowserCheck) - https://browsercheck.qualys.com/qbc_ax.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O18 - Protocol: tmbp - {1A77E7DC-C9A0-4110-8A37-2F36BAE71ECF} - C:\Program Files\Trend Micro\AMSP\Module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
O18 - Protocol: tmpx - {0E526CB5-7446-41D1-A403-19BFE95E8C23} - C:\Program Files\Trend Micro\AMSP\Module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
O18 - Protocol: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Amazon Unbox Video Service (ADVService) - Amazon.com - C:\Program Files\Amazon\Amazon Unbox Video\ADVWindowsClientService.exe
O23 - Service: Trend Micro Solution Platform (Amsp) - Trend Micro Inc. - C:\Program Files\Trend Micro\AMSP\coreServiceShell.exe
O23 - Service: DokanCEMounter - Cloud Engines - C:\Program Files\Pogoplug\dokanmnt.exe
O23 - Service: HBAdmin - Cloud Engines, Inc. - C:\Program Files\Pogoplug\HBPLUG\HBADMIN.exe

--
End of file - 7016 bytes

Edited by boopme, 03 January 2012 - 12:32 PM.


BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:28 AM

Posted 03 January 2012 - 01:03 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Please take note:

  • If you have since resolved the original problem you were having, we would appreciate you letting us know.
  • If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
  • If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
  • If you have already posted a DDS log, please do so again, as your situation may have changed.
  • Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step. Then proceed to run aswMbr.exe as noted below.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Note:
If you are unable to run a Gmer scan due the fact you are running a 64bit machine please run the following tool and post its log.

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.



Thanks and again sorry for the delay.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 miltonq

miltonq
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 AM

Posted 03 January 2012 - 04:01 PM

Thank you for your help!
The HijackThis log was in the opening thread I made, and no changes as I hadn't touched the computer all day today.
Below is the DDS log you requested, and attached DDS "attach" file you wanted. Also, below is the GMER log too.
Thanks again for your help with this issue!

DDS LOG:
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 9.0.8112.16421
Run by Madeline at 14:55:50 on 2012-01-03
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2038.951 [GMT -5:00]
.
AV: Trend Micro Titanium Internet Security *Disabled/Updated* {68F968AC-2AA0-091D-848C-803E83E35902}
SP: Trend Micro Titanium Internet Security *Disabled/Updated* {D3988948-0C9A-0693-BE3C-BB4CF86413BF}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Trend Micro\AMSP\coreServiceShell.exe
C:\Program Files\Trend Micro\UniClient\UiFrmWrk\uiWatchDog.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Trend Micro\AMSP\coreFrameworkHost.exe
C:\Program Files\Pogoplug\dokanmnt.exe
C:\Program Files\Pogoplug\HBPLUG\HBADMIN.exe
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\system32\Dwm.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\Explorer.EXE
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Amazon\Amazon Unbox Video\ADVWindowsClientService.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Pogoplug\PPDrive.exe
C:\Program Files\Amazon\Amazon Unbox Video\ADVWindowsClientSystemTray.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Trend Micro\UniClient\UiFrmWrk\uiSeAgnt.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\Pogoplug\HBPLUG\HBWD.EXE
C:\Program Files\Pogoplug\HBPLUG\HBPLUG.EXE
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Pogoplug\PPFS.EXE
C:\Windows\system32\svchost.exe -k HPService
C:\Program Files\Common Files\Java\Java Update\jucheck.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\Macromed\Flash\FlashUtil11e_ActiveX.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Program Files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.gmail.com/
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: TmIEPlugInBHO Class: {1ca1377b-dc1d-4a52-9585-6e06050fac53} - c:\program files\trend micro\amsp\module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Windows Live Messenger Companion Helper: {9fdde16b-836f-4806-ab1f-1455cbeff289} - c:\program files\windows live\companion\companioncore.dll
BHO: TmBpIeBHO Class: {bbacbafd-fa5e-4079-8b33-00eb9f13d4ac} - c:\program files\trend micro\amsp\module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [bgzxkhgfng] rundll32 "c:\users\madeline\appdata\roaming\odbcad32S.dll",Xmmf
uRun: [Pogoplug] "c:\program files\pogoplug\PPDrive.exe"
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [Trend Micro Titanium] "c:\program files\trend micro\titanium\uiframework\uiWinMgr.exe" -set Silent "1" SplashURL ""
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Trend Micro Client Framework] "c:\program files\trend micro\uniclient\uifrmwrk\UIWatchDog.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\amazon~1.lnk - c:\program files\amazon\amazon unbox video\ADVWindowsClientSystemTray.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {0000036B-C524-4050-81A0-243669A86B9F} - {B63DBA5F-523F-4B9C-A43D-65DF1977EAD3} - c:\program files\windows live\companion\companioncore.dll
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Trusted Zone: qualys.com\browsercheck
DPF: {7D2FB79E-E58C-4DB5-A36F-AC1C73967F4D} - hxxps://browsercheck.qualys.com/qbc_ax.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 216.144.187.37 204.186.0.201 207.44.96.129
TCP: Interfaces\{AE892D4D-16B9-4134-AA17-5DF1D6976D73} : DhcpNameServer = 216.144.187.37 204.186.0.201 207.44.96.129
TCP: Interfaces\{C585334C-A4A2-401B-96CF-6D08AF90DC30} : DhcpNameServer = 216.144.187.37 204.186.0.201 207.44.96.129
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: tmbp - {1A77E7DC-C9A0-4110-8A37-2F36BAE71ECF} - c:\program files\trend micro\amsp\module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
Handler: tmpx - {0E526CB5-7446-41D1-A403-19BFE95E8C23} - c:\program files\trend micro\amsp\module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - c:\program files\windows live\photo gallery\AlbumDownloadProtocolHandler.dll
Notify: igfxcui - igfxdev.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\madeline\appdata\roaming\mozilla\firefox\profiles\c7sn6ocw.default\
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft silverlight\4.0.60831.0\npctrlui.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll
.
============= SERVICES / DRIVERS ===============
.
R2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files\common files\adobe\arm\1.0\armsvc.exe [2011-6-6 64952]
R2 Amsp;Trend Micro Solution Platform;c:\program files\trend micro\amsp\coreServiceShell.exe [2010-11-30 188272]
R2 DokanCEDriver;DokanCEDriver;c:\program files\pogoplug\dokance.sys [2011-6-21 54592]
R2 DokanCEMounter;DokanCEMounter;c:\program files\pogoplug\dokanmnt.exe [2011-6-21 124736]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 HBAdmin;HBAdmin;c:\program files\pogoplug\hbplug\hbadmin.exe [2011-6-21 709952]
R2 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [2010-11-30 64080]
R3 WSDPrintDevice;WSD Print Support via UMB;c:\windows\system32\drivers\WSDPrint.sys [2008-1-20 16896]
R3 xcetap0;XCETAP0 Adapter;c:\windows\system32\drivers\xcetap0.sys [2011-5-27 34624]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S3 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr.sys [2010-11-30 39272]
S3 fsssvc;Windows Live Family Safety Service;c:\program files\windows live\family safety\fsssvc.exe [2010-9-23 1493352]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
S3 WsAudio_DeviceS(1);WsAudio_DeviceS(1);c:\windows\system32\drivers\WsAudio_DeviceS(1).sys [2011-11-7 25704]
S3 WsAudio_DeviceS(2);WsAudio_DeviceS(2);c:\windows\system32\drivers\WsAudio_DeviceS(2).sys [2011-11-7 25704]
S3 WsAudio_DeviceS(3);WsAudio_DeviceS(3);c:\windows\system32\drivers\WsAudio_DeviceS(3).sys [2011-11-7 25704]
S3 WsAudio_DeviceS(4);WsAudio_DeviceS(4);c:\windows\system32\drivers\WsAudio_DeviceS(4).sys [2011-11-7 25704]
S3 WsAudio_DeviceS(5);WsAudio_DeviceS(5);c:\windows\system32\drivers\WsAudio_DeviceS(5).sys [2011-11-7 25704]
S4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\windows live\mesh\wlcrasvc.exe [2010-9-22 51040]
.
=============== Created Last 30 ================
.
2012-01-02 02:04:23 -------- d-sh--w- C:\$RECYCLE.BIN
2012-01-02 01:08:20 98816 ----a-w- c:\windows\sed.exe
2012-01-02 01:08:20 518144 ----a-w- c:\windows\SWREG.exe
2012-01-02 01:08:20 256000 ----a-w- c:\windows\PEV.exe
2012-01-02 01:08:20 208896 ----a-w- c:\windows\MBR.exe
2012-01-02 01:07:56 -------- d-----w- C:\ComboFix
2012-01-02 00:58:20 -------- d-----w- c:\users\madeline\appdata\roaming\FixZeroAccess
2012-01-02 00:35:59 -------- d-----w- c:\users\madeline\appdata\roaming\Qualys
2011-12-15 17:58:27 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-12-15 17:58:27 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-12-15 17:58:25 429056 ----a-w- c:\windows\system32\EncDec.dll
2011-12-15 17:58:24 2043904 ----a-w- c:\windows\system32\win32k.sys
2011-12-15 17:58:22 2409784 ----a-w- c:\program files\windows mail\OESpamFilter.dat
2011-12-15 17:58:19 49152 ----a-w- c:\windows\system32\csrsrv.dll
2011-12-15 17:58:12 2048 ----a-w- c:\windows\system32\tzres.dll
.
==================== Find3M ====================
.
2011-12-02 20:59:58 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-08 16:11:06 68096 --sha-r- c:\users\madeline\appdata\roaming\odbcad32S.dll
2011-11-03 22:47:42 1798144 ----a-w- c:\windows\system32\jscript9.dll
2011-11-03 22:40:21 1427456 ----a-w- c:\windows\system32\inetcpl.cpl
2011-11-03 22:39:47 1127424 ----a-w- c:\windows\system32\wininet.dll
2011-11-03 22:31:57 2382848 ----a-w- c:\windows\system32\mshtml.tlb
.
============= FINISH: 14:56:25.20 ===============

GMER LOG:
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-01-03 15:54:15
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-4 FUJITSU_MHY2120BH rev.0040020B
Running: nmm9rwvq.exe; Driver: C:\Users\Madeline\AppData\Local\Temp\pxdyqkow.sys


---- System - GMER 1.0.15 ----

SSDT 842E8A20 ZwCreateKey
SSDT 842F1980 ZwCreateMutant
SSDT 842E7520 ZwCreateProcess
SSDT 842E7820 ZwCreateProcessEx
SSDT 842F1D40 ZwCreateSymbolicLinkObject
SSDT 842F12C0 ZwCreateThread
SSDT 842E9020 ZwDeleteKey
SSDT 842E9920 ZwDeleteValueKey
SSDT 842F1F20 ZwDuplicateObject
SSDT 842F1680 ZwLoadDriver
SSDT 842E7E20 ZwOpenProcess
SSDT 842E9F00 ZwOpenSection
SSDT 842E8120 ZwOpenThread
SSDT 842E9320 ZwRenameKey
SSDT 842E9620 ZwRestoreKey
SSDT 842F1B60 ZwSetSystemInformation
SSDT 842E8D20 ZwSetValueKey
SSDT 842E8420 ZwTerminateProcess
SSDT 842E8720 ZwTerminateThread
SSDT 842F1120 ZwWriteVirtualMemory
SSDT 842F14A0 ZwCreateThreadEx
SSDT 842E7B20 ZwCreateUserProcess

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!KeSetEvent + 1E9 81AB396C 4 Bytes [20, 8A, 2E, 84]
.text ntkrnlpa.exe!KeSetEvent + 1F5 81AB3978 4 Bytes [80, 19, 2F, 84]
.text ntkrnlpa.exe!KeSetEvent + 209 81AB398C 8 Bytes [20, 75, 2E, 84, 20, 78, 2E, ...]
.text ntkrnlpa.exe!KeSetEvent + 21D 81AB39A0 8 Bytes [40, 1D, 2F, 84, C0, 12, 2F, ...]
.text ntkrnlpa.exe!KeSetEvent + 2D5 81AB3A58 4 Bytes [20, 90, 2E, 84]
.text ...
? C:\Users\Madeline\AppData\Local\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[3556] ntdll.dll!NtQueryInformationProcess 77A64CA4 5 Bytes JMP 004321F9
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] kernel32.dll!CreateThread 7781CB2E 5 Bytes JMP 70097303 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!CreateDialogParamW 771172A2 5 Bytes JMP 70226628 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!GetAsyncKeyState 7711863C 5 Bytes JMP 7007DD8D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!SetWindowsHookExW 771187AD 5 Bytes JMP 700D2194 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!CallNextHookEx 77118E3B 5 Bytes JMP 700F7BB7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!UnhookWindowsHookEx 771198DB 3 Bytes JMP 7011EB74 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!UnhookWindowsHookEx + 4 771198DF 1 Byte [F9]
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!EnableWindow 7711CD8B 5 Bytes JMP 700D9A14 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DefWindowProcA 7711DB88 7 Bytes JMP 7009952D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!CreateWindowExA 7711DC2A 5 Bytes JMP 700A3363 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!CreateWindowExW 77121305 5 Bytes JMP 700FFF8F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!GetKeyState 77128CB1 5 Bytes JMP 7007DC67 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DrawTextExW 771291CE 5 Bytes JMP 0041D1AF
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DrawTextW 771297D3 5 Bytes JMP 0041CFED
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DefWindowProcW 771303B4 7 Bytes JMP 700F7C1A C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!IsDialogMessageW 77130745 5 Bytes JMP 70226D82 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!CreateDialogParamA 771317AA 5 Bytes JMP 702265F0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!IsDialogMessage 77131847 2 Bytes JMP 70226D5A C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!IsDialogMessage + 3 7713184A 2 Bytes [0F, F9]
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!CreateDialogIndirectParamA 771326F1 5 Bytes JMP 70226660 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DrawTextA 7713558D 5 Bytes JMP 0041CF12
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DrawTextExA 771355C4 1 Byte [E9]
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DrawTextExA 771355C4 5 Bytes JMP 0041D0C8
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!CreateDialogIndirectParamW 77139A62 5 Bytes JMP 70226698 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!SetKeyboardState 77140987 5 Bytes JMP 70227649 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DialogBoxParamW 771410B0 5 Bytes JMP 0041C0A2
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DialogBoxIndirectParamW 77142EF5 5 Bytes JMP 702262BE C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!SendInput 77142F75 5 Bytes JMP 702275F1 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!EndDialog 7714326E 5 Bytes JMP 7022702E C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!SetClipboardData 77156410 5 Bytes JMP 0041CC63
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!SetCursorPos 77156FB2 5 Bytes JMP 702276CA C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DialogBoxParamA 77158152 5 Bytes JMP 70226259 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!DialogBoxIndirectParamA 7715847D 5 Bytes JMP 70226323 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!MessageBoxIndirectA 7716D4D9 5 Bytes JMP 702261E0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!MessageBoxIndirectW 7716D5D3 5 Bytes JMP 70226167 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!MessageBoxExA 7716D639 5 Bytes JMP 70226103 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!MessageBoxExW 7716D65D 5 Bytes JMP 7022609F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] USER32.dll!keybd_event 7716D972 5 Bytes JMP 702275AE C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] GDI32.dll!ExtTextOutW 77B7872B 5 Bytes JMP 0041D37A
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] GDI32.dll!GetGlyphIndicesW 77B7B765 5 Bytes JMP 0041D807
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] GDI32.dll!ExtTextOutA 77B800A5 5 Bytes JMP 0041D296
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] GDI32.dll!TextOutA 77B80BAB 5 Bytes JMP 0041CD7A
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] GDI32.dll!TextOutW 77B80D6D 5 Bytes JMP 0041CE46
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] GDI32.dll!GetGlyphIndicesA 77B99DC0 5 Bytes JMP 0041D73A
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] SHELL32.dll!SHRestricted + D95 765789A8 4 Bytes [CF, 01, B7, 6C]
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] SHELL32.dll!SHRestricted + D9D 765789B0 8 Bytes [E0, 61, B6, 6C, 79, F7, B6, ...] {LOOPNZ 0x63; MOV DH, 0x6c; JNS 0xfffffffffffffffd; MOV DH, 0x6c}
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] ole32.dll!OleLoadFromStream 778D1E80 5 Bytes JMP 70226A8C C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WININET.dll!InternetCrackUrlW 771E2F2F 5 Bytes JMP 0041DC16
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!closesocket 77BC330C 5 Bytes JMP 0041CBBC
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!recv 77BC343A 5 Bytes JMP 0041C7D6
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!GetAddrInfoW 77BC3D12 5 Bytes JMP 0041BCDA
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!getaddrinfo 77BC418A 5 Bytes JMP 0041BBFA
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!WSASend 77BC4496 5 Bytes JMP 0041C884
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!send 77BC659B 5 Bytes JMP 0041C731
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!WSARecv 77BC8400 5 Bytes JMP 0041C958
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!WSAAsyncGetHostByName 77BD5FB9 5 Bytes JMP 0041BFC3
.text C:\Program Files\Internet Explorer\iexplore.exe[3556] WS2_32.dll!gethostbyname 77BD62D4 5 Bytes JMP 0041BB39
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] ntdll.dll!NtQueryInformationProcess 77A64CA4 5 Bytes JMP 002F21F9
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!EnableWindow 7711CD8B 5 Bytes JMP 700D9A14 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DrawTextExW 771291CE 5 Bytes JMP 002DD1AF
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DrawTextW 771297D3 5 Bytes JMP 002DCFED
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DrawTextA 7713558D 5 Bytes JMP 002DCF12
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DrawTextExA 771355C4 1 Byte [E9]
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DrawTextExA 771355C4 5 Bytes JMP 002DD0C8
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DialogBoxParamW 771410B0 5 Bytes JMP 002DC0A2
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DialogBoxIndirectParamW 77142EF5 5 Bytes JMP 702262BE C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!SetClipboardData 77156410 5 Bytes JMP 002DCC63
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DialogBoxParamA 77158152 5 Bytes JMP 70226259 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!DialogBoxIndirectParamA 7715847D 5 Bytes JMP 70226323 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!MessageBoxIndirectA 7716D4D9 5 Bytes JMP 702261E0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!MessageBoxIndirectW 7716D5D3 5 Bytes JMP 70226167 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!MessageBoxExA 7716D639 5 Bytes JMP 70226103 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] USER32.dll!MessageBoxExW 7716D65D 5 Bytes JMP 7022609F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] GDI32.dll!ExtTextOutW 77B7872B 5 Bytes JMP 002DD37A
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] GDI32.dll!GetGlyphIndicesW 77B7B765 5 Bytes JMP 002DD807
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] GDI32.dll!ExtTextOutA 77B800A5 5 Bytes JMP 002DD296
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] GDI32.dll!TextOutA 77B80BAB 5 Bytes JMP 002DCD7A
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] GDI32.dll!TextOutW 77B80D6D 5 Bytes JMP 002DCE46
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] GDI32.dll!GetGlyphIndicesA 77B99DC0 5 Bytes JMP 002DD73A
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WININET.dll!InternetCrackUrlW 771E2F2F 5 Bytes JMP 002DDC16
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!closesocket 77BC330C 5 Bytes JMP 002DCBBC
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!recv 77BC343A 5 Bytes JMP 002DC7D6
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!GetAddrInfoW 77BC3D12 5 Bytes JMP 002DBCDA
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!getaddrinfo 77BC418A 5 Bytes JMP 002DBBFA
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!WSASend 77BC4496 5 Bytes JMP 002DC884
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!send 77BC659B 5 Bytes JMP 002DC731
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!WSARecv 77BC8400 5 Bytes JMP 002DC958
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!WSAAsyncGetHostByName 77BD5FB9 5 Bytes JMP 002DBFC3
.text C:\Program Files\Internet Explorer\iexplore.exe[4400] WS2_32.dll!gethostbyname 77BD62D4 5 Bytes JMP 002DBB39

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\tdx \Device\Udp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)

---- EOF - GMER 1.0.15 ----
Attached File  Attach.zip   3.25KB   1 downloads

#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:28 AM

Posted 03 January 2012 - 04:58 PM

Hello miltonq,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.


1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not an option, Skip instead, do not choose Delete unless instructed.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
TdssKiller log
Combofix.txt
Are you able to burn CD's and have a Usb Flash Drive?
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 miltonq

miltonq
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 AM

Posted 03 January 2012 - 08:44 PM

Below is the log for TDSKiller.
During ComboFix, it threw an error "PEV.EXE not responding". Then, I couldn't open notepad or the internet! Rebooted the laptop and then all seemed to be working fine again. Whew! It still created a log file though and I have attached it below as well.
Search engine hijack still exists, no change yet.
Thanks again!

TDSKILLER:
17:03:48.0364 4872 TDSS rootkit removing tool 2.6.25.0 Dec 23 2011 14:51:16
17:03:48.0863 4872 ============================================================
17:03:48.0863 4872 Current date / time: 2012/01/03 17:03:48.0863
17:03:48.0863 4872 SystemInfo:
17:03:48.0863 4872
17:03:48.0863 4872 OS Version: 6.0.6002 ServicePack: 2.0
17:03:48.0863 4872 Product type: Workstation
17:03:48.0863 4872 ComputerName: MADELINE-PC
17:03:48.0863 4872 UserName: Madeline
17:03:48.0863 4872 Windows directory: C:\Windows
17:03:48.0863 4872 System windows directory: C:\Windows
17:03:48.0863 4872 Processor architecture: Intel x86
17:03:48.0864 4872 Number of processors: 1
17:03:48.0864 4872 Page size: 0x1000
17:03:48.0864 4872 Boot type: Normal boot
17:03:48.0864 4872 ============================================================
17:03:50.0317 4872 Initialize success
17:03:58.0654 4552 ============================================================
17:03:58.0654 4552 Scan started
17:03:58.0654 4552 Mode: Manual;
17:03:58.0654 4552 ============================================================
17:04:00.0070 4552 ACPI (82b296ae1892fe3dbee00c9cf92f8ac7) C:\Windows\system32\drivers\acpi.sys
17:04:00.0073 4552 ACPI - ok
17:04:00.0201 4552 adp94xx (04f0fcac69c7c71a3ac4eb97fafc8303) C:\Windows\system32\drivers\adp94xx.sys
17:04:00.0213 4552 adp94xx - ok
17:04:00.0269 4552 adpahci (60505e0041f7751bdbb80f88bf45c2ce) C:\Windows\system32\drivers\adpahci.sys
17:04:00.0273 4552 adpahci - ok
17:04:00.0367 4552 adpu160m (8a42779b02aec986eab64ecfc98f8bd7) C:\Windows\system32\drivers\adpu160m.sys
17:04:00.0374 4552 adpu160m - ok
17:04:00.0429 4552 adpu320 (241c9e37f8ce45ef51c3de27515ca4e5) C:\Windows\system32\drivers\adpu320.sys
17:04:00.0432 4552 adpu320 - ok
17:04:00.0565 4552 AFD (3911b972b55fea0478476b2e777b29fa) C:\Windows\system32\drivers\afd.sys
17:04:00.0584 4552 AFD - ok
17:04:00.0709 4552 AgereSoftModem (5d97943c128ed756d1b0a08302c1b1f8) C:\Windows\system32\DRIVERS\AGRSM.sys
17:04:00.0720 4552 AgereSoftModem - ok
17:04:00.0788 4552 agp440 (13f9e33747e6b41a3ff305c37db0d360) C:\Windows\system32\drivers\agp440.sys
17:04:00.0789 4552 agp440 - ok
17:04:00.0860 4552 aic78xx (ae1fdf7bf7bb6c6a70f67699d880592a) C:\Windows\system32\drivers\djsvs.sys
17:04:00.0861 4552 aic78xx - ok
17:04:00.0895 4552 aliide (9eaef5fc9b8e351afa7e78a6fae91f91) C:\Windows\system32\drivers\aliide.sys
17:04:00.0900 4552 aliide - ok
17:04:00.0937 4552 amdagp (c47344bc706e5f0b9dce369516661578) C:\Windows\system32\drivers\amdagp.sys
17:04:00.0939 4552 amdagp - ok
17:04:01.0001 4552 amdide (9b78a39a4c173fdbc1321e0dd659b34c) C:\Windows\system32\drivers\amdide.sys
17:04:01.0007 4552 amdide - ok
17:04:01.0039 4552 AmdK7 (18f29b49ad23ecee3d2a826c725c8d48) C:\Windows\system32\drivers\amdk7.sys
17:04:01.0045 4552 AmdK7 - ok
17:04:01.0089 4552 AmdK8 (93ae7f7dd54ab986a6f1a1b37be7442d) C:\Windows\system32\drivers\amdk8.sys
17:04:01.0091 4552 AmdK8 - ok
17:04:01.0174 4552 arc (5d2888182fb46632511acee92fdad522) C:\Windows\system32\drivers\arc.sys
17:04:01.0179 4552 arc - ok
17:04:01.0343 4552 arcsas (5e2a321bd7c8b3624e41fdec3e244945) C:\Windows\system32\drivers\arcsas.sys
17:04:01.0344 4552 arcsas - ok
17:04:01.0476 4552 AsyncMac (53b202abee6455406254444303e87be1) C:\Windows\system32\DRIVERS\asyncmac.sys
17:04:01.0478 4552 AsyncMac - ok
17:04:01.0513 4552 atapi (1f05b78ab91c9075565a9d8a4b880bc4) C:\Windows\system32\drivers\atapi.sys
17:04:01.0515 4552 atapi - ok
17:04:01.0600 4552 athr (8be56f8300e1c37b578da23c71816b7a) C:\Windows\system32\DRIVERS\athr.sys
17:04:01.0609 4552 athr - ok
17:04:01.0698 4552 Beep (67e506b75bd5326a3ec7b70bd014dfb6) C:\Windows\system32\drivers\Beep.sys
17:04:01.0700 4552 Beep - ok
17:04:01.0800 4552 blbdrive (d4df28447741fd3d953526e33a617397) C:\Windows\system32\drivers\blbdrive.sys
17:04:01.0802 4552 blbdrive - ok
17:04:01.0895 4552 bowser (35f376253f687bde63976ccb3f2108ca) C:\Windows\system32\DRIVERS\bowser.sys
17:04:01.0898 4552 bowser - ok
17:04:01.0949 4552 BrFiltLo (9f9acc7f7ccde8a15c282d3f88b43309) C:\Windows\system32\drivers\brfiltlo.sys
17:04:01.0951 4552 BrFiltLo - ok
17:04:01.0995 4552 BrFiltUp (56801ad62213a41f6497f96dee83755a) C:\Windows\system32\drivers\brfiltup.sys
17:04:02.0001 4552 BrFiltUp - ok
17:04:02.0090 4552 Brserid (b304e75cff293029eddf094246747113) C:\Windows\system32\drivers\brserid.sys
17:04:02.0092 4552 Brserid - ok
17:04:02.0147 4552 BrSerWdm (203f0b1e73adadbbb7b7b1fabd901f6b) C:\Windows\system32\drivers\brserwdm.sys
17:04:02.0152 4552 BrSerWdm - ok
17:04:02.0180 4552 BrUsbMdm (bd456606156ba17e60a04e18016ae54b) C:\Windows\system32\drivers\brusbmdm.sys
17:04:02.0186 4552 BrUsbMdm - ok
17:04:02.0200 4552 BrUsbSer (af72ed54503f717a43268b3cc5faec2e) C:\Windows\system32\drivers\brusbser.sys
17:04:02.0205 4552 BrUsbSer - ok
17:04:02.0243 4552 BTHMODEM (ad07c1ec6665b8b35741ab91200c6b68) C:\Windows\system32\drivers\bthmodem.sys
17:04:02.0244 4552 BTHMODEM - ok
17:04:02.0282 4552 catchme - ok
17:04:02.0310 4552 cdfs (7add03e75beb9e6dd102c3081d29840a) C:\Windows\system32\DRIVERS\cdfs.sys
17:04:02.0313 4552 cdfs - ok
17:04:02.0351 4552 cdrom (6b4bffb9becd728097024276430db314) C:\Windows\system32\DRIVERS\cdrom.sys
17:04:02.0354 4552 cdrom - ok
17:04:02.0417 4552 circlass (e5d4133f37219dbcfe102bc61072589d) C:\Windows\system32\drivers\circlass.sys
17:04:02.0418 4552 circlass - ok
17:04:02.0500 4552 CLFS (d7659d3b5b92c31e84e53c1431f35132) C:\Windows\system32\CLFS.sys
17:04:02.0503 4552 CLFS - ok
17:04:02.0598 4552 CmBatt (99afc3795b58cc478fbbbcdc658fcb56) C:\Windows\system32\DRIVERS\CmBatt.sys
17:04:02.0600 4552 CmBatt - ok
17:04:02.0667 4552 cmdide (0ca25e686a4928484e9fdabd168ab629) C:\Windows\system32\drivers\cmdide.sys
17:04:02.0668 4552 cmdide - ok
17:04:02.0717 4552 Compbatt (6afef0b60fa25de07c0968983ee4f60a) C:\Windows\system32\DRIVERS\compbatt.sys
17:04:02.0719 4552 Compbatt - ok
17:04:02.0762 4552 crcdisk (741e9dff4f42d2d8477d0fc1dc0df871) C:\Windows\system32\drivers\crcdisk.sys
17:04:02.0767 4552 crcdisk - ok
17:04:02.0805 4552 Crusoe (1f07becdca750766a96cda811ba86410) C:\Windows\system32\drivers\crusoe.sys
17:04:02.0808 4552 Crusoe - ok
17:04:02.0892 4552 DfsC (622c41a07ca7e6dd91770f50d532cb6c) C:\Windows\system32\Drivers\dfsc.sys
17:04:02.0899 4552 DfsC - ok
17:04:03.0026 4552 disk (5d4aefc3386920236a548271f8f1af6a) C:\Windows\system32\drivers\disk.sys
17:04:03.0028 4552 disk - ok
17:04:03.0142 4552 DokanCEDriver (b8e5cd476dec74cee14663c7d8dd7f1a) C:\Program Files\Pogoplug\dokance.sys
17:04:03.0157 4552 DokanCEDriver - ok
17:04:03.0251 4552 drmkaud (97fef831ab90bee128c9af390e243f80) C:\Windows\system32\drivers\drmkaud.sys
17:04:03.0253 4552 drmkaud - ok
17:04:03.0365 4552 DXGKrnl (c68ac676b0ef30cfbb1080adce49eb1f) C:\Windows\System32\drivers\dxgkrnl.sys
17:04:03.0371 4552 DXGKrnl - ok
17:04:03.0447 4552 E1G60 (5425f74ac0c1dbd96a1e04f17d63f94c) C:\Windows\system32\DRIVERS\E1G60I32.sys
17:04:03.0449 4552 E1G60 - ok
17:04:03.0528 4552 Ecache (7f64ea048dcfac7acf8b4d7b4e6fe371) C:\Windows\system32\drivers\ecache.sys
17:04:03.0533 4552 Ecache - ok
17:04:03.0627 4552 elxstor (23b62471681a124889978f6295b3f4c6) C:\Windows\system32\drivers\elxstor.sys
17:04:03.0631 4552 elxstor - ok
17:04:03.0706 4552 ErrDev (a81ab23eddb4693612014d87367d014c) C:\Windows\system32\drivers\errdev.sys
17:04:03.0711 4552 ErrDev - ok
17:04:03.0778 4552 exfat (22b408651f9123527bcee54b4f6c5cae) C:\Windows\system32\drivers\exfat.sys
17:04:03.0785 4552 exfat - ok
17:04:03.0830 4552 fastfat (1e9b9a70d332103c52995e957dc09ef8) C:\Windows\system32\drivers\fastfat.sys
17:04:03.0835 4552 fastfat - ok
17:04:03.0925 4552 fdc (afe1e8b9782a0dd7fb46bbd88e43f89a) C:\Windows\system32\DRIVERS\fdc.sys
17:04:03.0927 4552 fdc - ok
17:04:03.0995 4552 FileInfo (a8c0139a884861e3aae9cfe73b208a9f) C:\Windows\system32\drivers\fileinfo.sys
17:04:03.0998 4552 FileInfo - ok
17:04:04.0040 4552 Filetrace (0ae429a696aecbc5970e3cf2c62635ae) C:\Windows\system32\drivers\filetrace.sys
17:04:04.0046 4552 Filetrace - ok
17:04:04.0086 4552 flpydisk (85b7cf99d532820495d68d747fda9ebd) C:\Windows\system32\DRIVERS\flpydisk.sys
17:04:04.0091 4552 flpydisk - ok
17:04:04.0198 4552 FltMgr (01334f9ea68e6877c4ef05d3ea8abb05) C:\Windows\system32\drivers\fltmgr.sys
17:04:04.0203 4552 FltMgr - ok
17:04:04.0336 4552 fssfltr (d909075fa72c090f27aa926c32cb4612) C:\Windows\system32\DRIVERS\fssfltr.sys
17:04:04.0338 4552 fssfltr - ok
17:04:04.0406 4552 Fs_Rec (65ea8b77b5851854f0c55c43fa51a198) C:\Windows\system32\drivers\Fs_Rec.sys
17:04:04.0412 4552 Fs_Rec - ok
17:04:04.0455 4552 gagp30kx (34582a6e6573d54a07ece5fe24a126b5) C:\Windows\system32\drivers\gagp30kx.sys
17:04:04.0457 4552 gagp30kx - ok
17:04:04.0543 4552 HdAudAddService (3f90e001369a07243763bd5a523d8722) C:\Windows\system32\drivers\HdAudio.sys
17:04:04.0550 4552 HdAudAddService - ok
17:04:04.0658 4552 HDAudBus (062452b7ffd68c8c042a6261fe8dff4a) C:\Windows\system32\DRIVERS\HDAudBus.sys
17:04:04.0664 4552 HDAudBus - ok
17:04:04.0718 4552 HidBth (1338520e78d90154ed6be8f84de5fceb) C:\Windows\system32\drivers\hidbth.sys
17:04:04.0719 4552 HidBth - ok
17:04:04.0751 4552 HidIr (ff3160c3a2445128c5a6d9b076da519e) C:\Windows\system32\drivers\hidir.sys
17:04:04.0756 4552 HidIr - ok
17:04:04.0816 4552 HidUsb (cca4b519b17e23a00b826c55716809cc) C:\Windows\system32\DRIVERS\hidusb.sys
17:04:04.0818 4552 HidUsb - ok
17:04:04.0862 4552 HpCISSs (7ebec5eb56b90ed65a8bbd91464e5cfb) C:\Windows\system32\drivers\hpcisss.sys
17:04:04.0864 4552 HpCISSs - ok
17:04:04.0975 4552 HTTP (f870aa3e254628ebeafe754108d664de) C:\Windows\system32\drivers\HTTP.sys
17:04:04.0985 4552 HTTP - ok
17:04:05.0042 4552 i2omp (c6b032d69650985468160fc9937cf5b4) C:\Windows\system32\drivers\i2omp.sys
17:04:05.0048 4552 i2omp - ok
17:04:05.0111 4552 i8042prt (22d56c8184586b7a1f6fa60be5f5a2bd) C:\Windows\system32\DRIVERS\i8042prt.sys
17:04:05.0115 4552 i8042prt - ok
17:04:05.0175 4552 iaStorV (54155ea1b0df185878e0fc9ec3ac3a14) C:\Windows\system32\drivers\iastorv.sys
17:04:05.0178 4552 iaStorV - ok
17:04:05.0400 4552 igfx (9467514ea189475a6e7fdc5d7bde9d3f) C:\Windows\system32\DRIVERS\igdkmd32.sys
17:04:05.0439 4552 igfx - ok
17:04:05.0528 4552 iirsp (2d077bf86e843f901d8db709c95b49a5) C:\Windows\system32\drivers\iirsp.sys
17:04:05.0530 4552 iirsp - ok
17:04:05.0581 4552 intelide (83aa759f3189e6370c30de5dc5590718) C:\Windows\system32\drivers\intelide.sys
17:04:05.0582 4552 intelide - ok
17:04:05.0626 4552 intelppm (224191001e78c89dfa78924c3ea595ff) C:\Windows\system32\DRIVERS\intelppm.sys
17:04:05.0628 4552 intelppm - ok
17:04:05.0735 4552 IpFilterDriver (62c265c38769b864cb25b4bcf62df6c3) C:\Windows\system32\DRIVERS\ipfltdrv.sys
17:04:05.0738 4552 IpFilterDriver - ok
17:04:05.0812 4552 IpInIp - ok
17:04:05.0903 4552 IPMIDRV (4b9c0f4d4a3acc535f9771039ecd6365) C:\Windows\system32\drivers\ipmidrv.sys
17:04:05.0905 4552 IPMIDRV - ok
17:04:05.0960 4552 IPNAT (8793643a67b42cec66490b2a0cf92d68) C:\Windows\system32\DRIVERS\ipnat.sys
17:04:05.0964 4552 IPNAT - ok
17:04:06.0011 4552 IRENUM (109c0dfb82c3632fbd11949b73aeeac9) C:\Windows\system32\drivers\irenum.sys
17:04:06.0013 4552 IRENUM - ok
17:04:06.0106 4552 isapnp (6c70698a3e5c4376c6ab5c7c17fb0614) C:\Windows\system32\drivers\isapnp.sys
17:04:06.0108 4552 isapnp - ok
17:04:06.0166 4552 iScsiPrt (232fa340531d940aac623b121a595034) C:\Windows\system32\DRIVERS\msiscsi.sys
17:04:06.0169 4552 iScsiPrt - ok
17:04:06.0227 4552 iteatapi (bced60d16156e428f8df8cf27b0df150) C:\Windows\system32\drivers\iteatapi.sys
17:04:06.0228 4552 iteatapi - ok
17:04:06.0282 4552 iteraid (06fa654504a498c30adca8bec4e87e7e) C:\Windows\system32\drivers\iteraid.sys
17:04:06.0284 4552 iteraid - ok
17:04:06.0338 4552 kbdclass (37605e0a8cf00cbba538e753e4344c6e) C:\Windows\system32\DRIVERS\kbdclass.sys
17:04:06.0340 4552 kbdclass - ok
17:04:06.0399 4552 kbdhid (ede59ec70e25c24581add1fbec7325f7) C:\Windows\system32\DRIVERS\kbdhid.sys
17:04:06.0401 4552 kbdhid - ok
17:04:06.0679 4552 KSecDD (86165728af9bf72d6442a894fdfb4f8b) C:\Windows\system32\Drivers\ksecdd.sys
17:04:06.0702 4552 KSecDD - ok
17:04:06.0781 4552 lltdio (d1c5883087a0c3f1344d9d55a44901f6) C:\Windows\system32\DRIVERS\lltdio.sys
17:04:06.0784 4552 lltdio - ok
17:04:06.0868 4552 LSI_FC (c7e15e82879bf3235b559563d4185365) C:\Windows\system32\drivers\lsi_fc.sys
17:04:06.0870 4552 LSI_FC - ok
17:04:06.0923 4552 LSI_SAS (ee01ebae8c9bf0fa072e0ff68718920a) C:\Windows\system32\drivers\lsi_sas.sys
17:04:06.0924 4552 LSI_SAS - ok
17:04:07.0011 4552 LSI_SCSI (912a04696e9ca30146a62afa1463dd5c) C:\Windows\system32\drivers\lsi_scsi.sys
17:04:07.0013 4552 LSI_SCSI - ok
17:04:07.0149 4552 luafv (8f5c7426567798e62a3b3614965d62cc) C:\Windows\system32\drivers\luafv.sys
17:04:07.0153 4552 luafv - ok
17:04:07.0257 4552 megasas (0001ce609d66632fa17b84705f658879) C:\Windows\system32\drivers\megasas.sys
17:04:07.0259 4552 megasas - ok
17:04:07.0451 4552 MegaSR (c252f32cd9a49dbfc25ecf26ebd51a99) C:\Windows\system32\drivers\megasr.sys
17:04:07.0455 4552 MegaSR - ok
17:04:07.0557 4552 Modem (e13b5ea0f51ba5b1512ec671393d09ba) C:\Windows\system32\drivers\modem.sys
17:04:07.0558 4552 Modem - ok
17:04:07.0635 4552 monitor (0a9bb33b56e294f686abb7c1e4e2d8a8) C:\Windows\system32\DRIVERS\monitor.sys
17:04:07.0637 4552 monitor - ok
17:04:07.0815 4552 mouclass (5bf6a1326a335c5298477754a506d263) C:\Windows\system32\DRIVERS\mouclass.sys
17:04:07.0817 4552 mouclass - ok
17:04:07.0864 4552 mouhid (93b8d4869e12cfbe663915502900876f) C:\Windows\system32\DRIVERS\mouhid.sys
17:04:07.0866 4552 mouhid - ok
17:04:07.0900 4552 MountMgr (bdafc88aa6b92f7842416ea6a48e1600) C:\Windows\system32\drivers\mountmgr.sys
17:04:07.0913 4552 MountMgr - ok
17:04:07.0975 4552 mpio (5da347912fd3af24d7bfb3de519d4bd0) C:\Windows\system32\drivers\mpio.sys
17:04:07.0978 4552 mpio - ok
17:04:08.0043 4552 mpsdrv (22241feba9b2defa669c8cb0a8dd7d2e) C:\Windows\system32\drivers\mpsdrv.sys
17:04:08.0046 4552 mpsdrv - ok
17:04:08.0081 4552 Mraid35x (4fbbb70d30fd20ec51f80061703b001e) C:\Windows\system32\drivers\mraid35x.sys
17:04:08.0082 4552 Mraid35x - ok
17:04:08.0157 4552 MRxDAV (82cea0395524aacfeb58ba1448e8325c) C:\Windows\system32\drivers\mrxdav.sys
17:04:08.0161 4552 MRxDAV - ok
17:04:08.0243 4552 mrxsmb (1e94971c4b446ab2290deb71d01cf0c2) C:\Windows\system32\DRIVERS\mrxsmb.sys
17:04:08.0246 4552 mrxsmb - ok
17:04:08.0338 4552 mrxsmb10 (4fccb34d793b116423209c0f8b7a3b03) C:\Windows\system32\DRIVERS\mrxsmb10.sys
17:04:08.0341 4552 mrxsmb10 - ok
17:04:08.0389 4552 mrxsmb20 (c3cb1b40ad4a0124d617a1199b0b9d7c) C:\Windows\system32\DRIVERS\mrxsmb20.sys
17:04:08.0393 4552 mrxsmb20 - ok
17:04:08.0486 4552 msahci (5457dcfa7c0da43522f4d9d4049c1472) C:\Windows\system32\drivers\msahci.sys
17:04:08.0488 4552 msahci - ok
17:04:08.0555 4552 msdsm (2c563aef15b8d0014c36c5f27742ac7b) C:\Windows\system32\drivers\msdsm.sys
17:04:08.0556 4552 msdsm - ok
17:04:08.0611 4552 Msfs (a9927f4a46b816c92f461acb90cf8515) C:\Windows\system32\drivers\Msfs.sys
17:04:08.0613 4552 Msfs - ok
17:04:08.0702 4552 msisadrv (0f400e306f385c56317357d6dea56f62) C:\Windows\system32\drivers\msisadrv.sys
17:04:08.0704 4552 msisadrv - ok
17:04:08.0792 4552 MSKSSRV (d8c63d34d9c9e56c059e24ec7185cc07) C:\Windows\system32\drivers\MSKSSRV.sys
17:04:08.0794 4552 MSKSSRV - ok
17:04:08.0867 4552 MSPCLOCK (1d373c90d62ddb641d50e55b9e78d65e) C:\Windows\system32\drivers\MSPCLOCK.sys
17:04:08.0869 4552 MSPCLOCK - ok
17:04:08.0926 4552 MSPQM (b572da05bf4e098d4bba3a4734fb505b) C:\Windows\system32\drivers\MSPQM.sys
17:04:08.0929 4552 MSPQM - ok
17:04:08.0981 4552 MsRPC (b49456d70555de905c311bcda6ec6adb) C:\Windows\system32\drivers\MsRPC.sys
17:04:08.0986 4552 MsRPC - ok
17:04:09.0036 4552 mssmbios (e384487cb84be41d09711c30ca79646c) C:\Windows\system32\DRIVERS\mssmbios.sys
17:04:09.0038 4552 mssmbios - ok
17:04:09.0101 4552 MSTEE (7199c1eec1e4993caf96b8c0a26bd58a) C:\Windows\system32\drivers\MSTEE.sys
17:04:09.0104 4552 MSTEE - ok
17:04:09.0159 4552 Mup (6a57b5733d4cb702c8ea4542e836b96c) C:\Windows\system32\Drivers\mup.sys
17:04:09.0162 4552 Mup - ok
17:04:09.0275 4552 NativeWifiP (85c44fdff9cf7e72a40dcb7ec06a4416) C:\Windows\system32\DRIVERS\nwifi.sys
17:04:09.0280 4552 NativeWifiP - ok
17:04:09.0374 4552 NDIS (1357274d1883f68300aeadd15d7bbb42) C:\Windows\system32\drivers\ndis.sys
17:04:09.0379 4552 NDIS - ok
17:04:09.0429 4552 NdisTapi (0e186e90404980569fb449ba7519ae61) C:\Windows\system32\DRIVERS\ndistapi.sys
17:04:09.0432 4552 NdisTapi - ok
17:04:09.0470 4552 Ndisuio (d6973aa34c4d5d76c0430b181c3cd389) C:\Windows\system32\DRIVERS\ndisuio.sys
17:04:09.0472 4552 Ndisuio - ok
17:04:09.0557 4552 NdisWan (818f648618ae34f729fdb47ec68345c3) C:\Windows\system32\DRIVERS\ndiswan.sys
17:04:09.0562 4552 NdisWan - ok
17:04:09.0604 4552 NDProxy (71dab552b41936358f3b541ae5997fb3) C:\Windows\system32\drivers\NDProxy.sys
17:04:09.0607 4552 NDProxy - ok
17:04:09.0688 4552 NetBIOS (bcd093a5a6777cf626434568dc7dba78) C:\Windows\system32\DRIVERS\netbios.sys
17:04:09.0691 4552 NetBIOS - ok
17:04:09.0760 4552 netbt (ecd64230a59cbd93c85f1cd1cab9f3f6) C:\Windows\system32\DRIVERS\netbt.sys
17:04:09.0766 4552 netbt - ok
17:04:09.0838 4552 nfrd960 (2e7fb731d4790a1bc6270accefacb36e) C:\Windows\system32\drivers\nfrd960.sys
17:04:09.0840 4552 nfrd960 - ok
17:04:09.0943 4552 Npfs (d36f239d7cce1931598e8fb90a0dbc26) C:\Windows\system32\drivers\Npfs.sys
17:04:09.0945 4552 Npfs - ok
17:04:09.0997 4552 nsiproxy (609773e344a97410ce4ebf74a8914fcf) C:\Windows\system32\drivers\nsiproxy.sys
17:04:09.0999 4552 nsiproxy - ok
17:04:10.0074 4552 Ntfs (6a4a98cee84cf9e99564510dda4baa47) C:\Windows\system32\drivers\Ntfs.sys
17:04:10.0126 4552 Ntfs - ok
17:04:10.0226 4552 ntrigdigi (e875c093aec0c978a90f30c9e0dfbb72) C:\Windows\system32\drivers\ntrigdigi.sys
17:04:10.0227 4552 ntrigdigi - ok
17:04:10.0277 4552 Null (c5dbbcda07d780bda9b685df333bb41e) C:\Windows\system32\drivers\Null.sys
17:04:10.0279 4552 Null - ok
17:04:10.0355 4552 nvraid (2edf9e7751554b42cbb60116de727101) C:\Windows\system32\drivers\nvraid.sys
17:04:10.0357 4552 nvraid - ok
17:04:10.0400 4552 nvstor (abed0c09758d1d97db0042dbb2688177) C:\Windows\system32\drivers\nvstor.sys
17:04:10.0402 4552 nvstor - ok
17:04:10.0444 4552 nv_agp (18bbdf913916b71bd54575bdb6eeac0b) C:\Windows\system32\drivers\nv_agp.sys
17:04:10.0446 4552 nv_agp - ok
17:04:10.0520 4552 NwlnkFlt - ok
17:04:10.0553 4552 NwlnkFwd - ok
17:04:10.0620 4552 ohci1394 (6f310e890d46e246e0e261a63d9b36b4) C:\Windows\system32\DRIVERS\ohci1394.sys
17:04:10.0622 4552 ohci1394 - ok
17:04:10.0767 4552 Parport (0fa9b5055484649d63c303fe404e5f4d) C:\Windows\system32\drivers\parport.sys
17:04:10.0769 4552 Parport - ok
17:04:10.0882 4552 partmgr (57389fa59a36d96b3eb09d0cb91e9cdc) C:\Windows\system32\drivers\partmgr.sys
17:04:10.0885 4552 partmgr - ok
17:04:10.0934 4552 Parvdm (4f9a6a8a31413180d0fcb279ad5d8112) C:\Windows\system32\drivers\parvdm.sys
17:04:10.0935 4552 Parvdm - ok
17:04:10.0991 4552 pci (941dc1d19e7e8620f40bbc206981efdb) C:\Windows\system32\drivers\pci.sys
17:04:10.0996 4552 pci - ok
17:04:11.0066 4552 pciide (1636d43f10416aeb483bc6001097b26c) C:\Windows\system32\drivers\pciide.sys
17:04:11.0067 4552 pciide - ok
17:04:11.0225 4552 pcmcia (3bb2244f343b610c29c98035504c9b75) C:\Windows\system32\DRIVERS\pcmcia.sys
17:04:11.0228 4552 pcmcia - ok
17:04:11.0372 4552 PEAUTH (6349f6ed9c623b44b52ea3c63c831a92) C:\Windows\system32\drivers\peauth.sys
17:04:11.0380 4552 PEAUTH - ok
17:04:11.0539 4552 PptpMiniport (ecfffaec0c1ecd8dbc77f39070ea1db1) C:\Windows\system32\DRIVERS\raspptp.sys
17:04:11.0542 4552 PptpMiniport - ok
17:04:11.0638 4552 Processor (2027293619dd0f047c584cf2e7df4ffd) C:\Windows\system32\drivers\processr.sys
17:04:11.0640 4552 Processor - ok
17:04:11.0710 4552 PSched (99514faa8df93d34b5589187db3aa0ba) C:\Windows\system32\DRIVERS\pacer.sys
17:04:11.0712 4552 PSched - ok
17:04:11.0853 4552 ql2300 (0a6db55afb7820c99aa1f3a1d270f4f6) C:\Windows\system32\drivers\ql2300.sys
17:04:11.0863 4552 ql2300 - ok
17:04:11.0919 4552 ql40xx (81a7e5c076e59995d54bc1ed3a16e60b) C:\Windows\system32\drivers\ql40xx.sys
17:04:11.0921 4552 ql40xx - ok
17:04:11.0978 4552 QWAVEdrv (9f5e0e1926014d17486901c88eca2db7) C:\Windows\system32\drivers\qwavedrv.sys
17:04:11.0981 4552 QWAVEdrv - ok
17:04:12.0025 4552 RasAcd (147d7f9c556d259924351feb0de606c3) C:\Windows\system32\DRIVERS\rasacd.sys
17:04:12.0027 4552 RasAcd - ok
17:04:12.0086 4552 Rasl2tp (a214adbaf4cb47dd2728859ef31f26b0) C:\Windows\system32\DRIVERS\rasl2tp.sys
17:04:12.0090 4552 Rasl2tp - ok
17:04:12.0237 4552 RasPppoe (509a98dd18af4375e1fc40bc175f1def) C:\Windows\system32\DRIVERS\raspppoe.sys
17:04:12.0240 4552 RasPppoe - ok
17:04:12.0296 4552 RasSstp (2005f4a1e05fa09389ac85840f0a9e4d) C:\Windows\system32\DRIVERS\rassstp.sys
17:04:12.0299 4552 RasSstp - ok
17:04:12.0340 4552 rdbss (b14c9d5b9add2f84f70570bbbfaa7935) C:\Windows\system32\DRIVERS\rdbss.sys
17:04:12.0346 4552 rdbss - ok
17:04:12.0400 4552 RDPCDD (89e59be9a564262a3fb6c4f4f1cd9899) C:\Windows\system32\DRIVERS\RDPCDD.sys
17:04:12.0402 4552 RDPCDD - ok
17:04:12.0484 4552 rdpdr (943b18305eae3935598a9b4a3d560b4c) C:\Windows\system32\drivers\rdpdr.sys
17:04:12.0486 4552 rdpdr - ok
17:04:12.0541 4552 RDPENCDD (9d91fe5286f748862ecffa05f8a0710c) C:\Windows\system32\drivers\rdpencdd.sys
17:04:12.0543 4552 RDPENCDD - ok
17:04:12.0592 4552 RDPWD (30bfbdfb7f95559ede971f9ddb9a00ba) C:\Windows\system32\drivers\RDPWD.sys
17:04:12.0597 4552 RDPWD - ok
17:04:12.0687 4552 rspndr (9c508f4074a39e8b4b31d27198146fad) C:\Windows\system32\DRIVERS\rspndr.sys
17:04:12.0693 4552 rspndr - ok
17:04:12.0790 4552 RTL8169 (283392af1860ecdb5e0f8ebd7f3d72df) C:\Windows\system32\DRIVERS\Rtlh86.sys
17:04:12.0792 4552 RTL8169 - ok
17:04:12.0873 4552 sbp2port (3ce8f073a557e172b330109436984e30) C:\Windows\system32\drivers\sbp2port.sys
17:04:12.0875 4552 sbp2port - ok
17:04:12.0948 4552 sdbus (8f36b54688c31eed4580129040c6a3d3) C:\Windows\system32\DRIVERS\sdbus.sys
17:04:12.0952 4552 sdbus - ok
17:04:13.0032 4552 secdrv (90a3935d05b494a5a39d37e71f09a677) C:\Windows\system32\drivers\secdrv.sys
17:04:13.0034 4552 secdrv - ok
17:04:13.0114 4552 Serenum (68e44e331d46f0fb38f0863a84cd1a31) C:\Windows\system32\drivers\serenum.sys
17:04:13.0115 4552 Serenum - ok
17:04:13.0179 4552 Serial (c70d69a918b178d3c3b06339b40c2e1b) C:\Windows\system32\drivers\serial.sys
17:04:13.0181 4552 Serial - ok
17:04:13.0230 4552 sermouse (8af3d28a879bf75db53a0ee7a4289624) C:\Windows\system32\drivers\sermouse.sys
17:04:13.0232 4552 sermouse - ok
17:04:13.0331 4552 sffdisk (3efa810bdca87f6ecc24f9832243fe86) C:\Windows\system32\drivers\sffdisk.sys
17:04:13.0332 4552 sffdisk - ok
17:04:13.0367 4552 sffp_mmc (e5eafe85815bd89095fef3144a09ab68) C:\Windows\system32\drivers\sffp_mmc.sys
17:04:13.0368 4552 sffp_mmc - ok
17:04:13.0401 4552 sffp_sd (9f66a46c55d6f1ccabc79bb7afccc545) C:\Windows\system32\drivers\sffp_sd.sys
17:04:13.0403 4552 sffp_sd - ok
17:04:13.0456 4552 sfloppy (46ed8e91793b2e6f848015445a0ac188) C:\Windows\system32\drivers\sfloppy.sys
17:04:13.0458 4552 sfloppy - ok
17:04:13.0550 4552 sisagp (1d76624a09a054f682d746b924e2dbc3) C:\Windows\system32\drivers\sisagp.sys
17:04:13.0552 4552 sisagp - ok
17:04:13.0590 4552 SiSRaid2 (43cb7aa756c7db280d01da9b676cfde2) C:\Windows\system32\drivers\sisraid2.sys
17:04:13.0591 4552 SiSRaid2 - ok
17:04:13.0667 4552 SiSRaid4 (a99c6c8b0baa970d8aa59ddc50b57f94) C:\Windows\system32\drivers\sisraid4.sys
17:04:13.0669 4552 SiSRaid4 - ok
17:04:13.0761 4552 Smb (7b75299a4d201d6a6533603d6914ab04) C:\Windows\system32\DRIVERS\smb.sys
17:04:13.0764 4552 Smb - ok
17:04:13.0831 4552 spldr (7aebdeef071fe28b0eef2cdd69102bff) C:\Windows\system32\drivers\spldr.sys
17:04:13.0833 4552 spldr - ok
17:04:13.0989 4552 srv (41987f9fc0e61adf54f581e15029ad91) C:\Windows\system32\DRIVERS\srv.sys
17:04:13.0997 4552 srv - ok
17:04:14.0103 4552 srv2 (ff33aff99564b1aa534f58868cbe41ef) C:\Windows\system32\DRIVERS\srv2.sys
17:04:14.0106 4552 srv2 - ok
17:04:14.0194 4552 srvnet (7605c0e1d01a08f3ecd743f38b834a44) C:\Windows\system32\DRIVERS\srvnet.sys
17:04:14.0212 4552 srvnet - ok
17:04:14.0366 4552 StillCam (ef70b3d22b4bffda6ea851ecb063efaa) C:\Windows\system32\DRIVERS\serscan.sys
17:04:14.0368 4552 StillCam - ok
17:04:14.0432 4552 swenum (7ba58ecf0c0a9a69d44b3dca62becf56) C:\Windows\system32\DRIVERS\swenum.sys
17:04:14.0433 4552 swenum - ok
17:04:14.0505 4552 Symc8xx (192aa3ac01df071b541094f251deed10) C:\Windows\system32\drivers\symc8xx.sys
17:04:14.0506 4552 Symc8xx - ok
17:04:14.0545 4552 Sym_hi (8c8eb8c76736ebaf3b13b633b2e64125) C:\Windows\system32\drivers\sym_hi.sys
17:04:14.0546 4552 Sym_hi - ok
17:04:14.0634 4552 Sym_u3 (8072af52b5fd103bbba387a1e49f62cb) C:\Windows\system32\drivers\sym_u3.sys
17:04:14.0636 4552 Sym_u3 - ok
17:04:14.0722 4552 SynTP (5efcedcf3daf5c8d9e8b77a34a4eec99) C:\Windows\system32\DRIVERS\SynTP.sys
17:04:14.0725 4552 SynTP - ok
17:04:14.0846 4552 Tcpip (814a1c66fbd4e1b310a517221f1456bf) C:\Windows\system32\drivers\tcpip.sys
17:04:14.0889 4552 Tcpip - ok
17:04:15.0033 4552 Tcpip6 (814a1c66fbd4e1b310a517221f1456bf) C:\Windows\system32\DRIVERS\tcpip.sys
17:04:15.0041 4552 Tcpip6 - ok
17:04:15.0160 4552 tcpipreg (608c345a255d82a6289c2d468eb41fd7) C:\Windows\system32\drivers\tcpipreg.sys
17:04:15.0162 4552 tcpipreg - ok
17:04:15.0219 4552 TDPIPE (5dcf5e267be67a1ae926f2df77fbcc56) C:\Windows\system32\drivers\tdpipe.sys
17:04:15.0221 4552 TDPIPE - ok
17:04:15.0267 4552 TDTCP (389c63e32b3cefed425b61ed92d3f021) C:\Windows\system32\drivers\tdtcp.sys
17:04:15.0270 4552 TDTCP - ok
17:04:15.0366 4552 tdx (76b06eb8a01fc8624d699e7045303e54) C:\Windows\system32\DRIVERS\tdx.sys
17:04:15.0369 4552 tdx - ok
17:04:15.0428 4552 TermDD (3cad38910468eab9a6479e2f01db43c7) C:\Windows\system32\DRIVERS\termdd.sys
17:04:15.0431 4552 TermDD - ok
17:04:15.0566 4552 tifm21 (f779ba4cd37963ab4600c9871b7752a3) C:\Windows\system32\drivers\tifm21.sys
17:04:15.0568 4552 tifm21 - ok
17:04:15.0636 4552 tmactmon (de87a23d2ddc7378d1c7ab681e20de47) C:\Windows\system32\DRIVERS\tmactmon.sys
17:04:15.0638 4552 tmactmon - ok
17:04:15.0739 4552 tmcomm (540c2b5dc47651c572c2804dc72fdda8) C:\Windows\system32\DRIVERS\tmcomm.sys
17:04:15.0742 4552 tmcomm - ok
17:04:15.0878 4552 tmevtmgr (2de1fa64ebaff376f2c038f64492f62c) C:\Windows\system32\DRIVERS\tmevtmgr.sys
17:04:15.0880 4552 tmevtmgr - ok
17:04:15.0989 4552 tmtdi (5a61679b2277b9ad550e30479a69503b) C:\Windows\system32\DRIVERS\tmtdi.sys
17:04:15.0991 4552 tmtdi - ok
17:04:16.0072 4552 tssecsrv (dcf0f056a2e4f52287264f5ab29cf206) C:\Windows\system32\DRIVERS\tssecsrv.sys
17:04:16.0074 4552 tssecsrv - ok
17:04:16.0134 4552 tunmp (caecc0120ac49e3d2f758b9169872d38) C:\Windows\system32\DRIVERS\tunmp.sys
17:04:16.0136 4552 tunmp - ok
17:04:16.0185 4552 tunnel (119b8184e106baedc83fce5ddf3950da) C:\Windows\system32\DRIVERS\tunnel.sys
17:04:16.0188 4552 tunnel - ok
17:04:16.0245 4552 TVALZ (792a8b80f8188aba4b2be271583f3e46) C:\Windows\system32\DRIVERS\TVALZ_O.SYS
17:04:16.0247 4552 TVALZ - ok
17:04:16.0334 4552 uagp35 (7d33c4db2ce363c8518d2dfcf533941f) C:\Windows\system32\drivers\uagp35.sys
17:04:16.0336 4552 uagp35 - ok
17:04:16.0398 4552 udfs (d9728af68c4c7693cb100b8441cbdec6) C:\Windows\system32\DRIVERS\udfs.sys
17:04:16.0400 4552 udfs - ok
17:04:16.0556 4552 uliagpkx (b0acfdc9e4af279e9116c03e014b2b27) C:\Windows\system32\drivers\uliagpkx.sys
17:04:16.0558 4552 uliagpkx - ok
17:04:16.0805 4552 uliahci (9224bb254f591de4ca8d572a5f0d635c) C:\Windows\system32\drivers\uliahci.sys
17:04:16.0808 4552 uliahci - ok
17:04:17.0043 4552 UlSata (8514d0e5cd0534467c5fc61be94a569f) C:\Windows\system32\drivers\ulsata.sys
17:04:17.0045 4552 UlSata - ok
17:04:17.0094 4552 ulsata2 (38c3c6e62b157a6bc46594fada45c62b) C:\Windows\system32\drivers\ulsata2.sys
17:04:17.0096 4552 ulsata2 - ok
17:04:17.0198 4552 umbus (32cff9f809ae9aed85464492bf3e32d2) C:\Windows\system32\DRIVERS\umbus.sys
17:04:17.0212 4552 umbus - ok
17:04:17.0246 4552 usbccgp (8bd3ae150d97ba4e633c6c5c51b41ae1) C:\Windows\system32\drivers\usbccgp.sys
17:04:17.0248 4552 usbccgp - ok
17:04:17.0281 4552 usbcir (e9476e6c486e76bc4898074768fb7131) C:\Windows\system32\drivers\usbcir.sys
17:04:17.0283 4552 usbcir - ok
17:04:17.0356 4552 usbehci (79e96c23a97ce7b8f14d310da2db0c9b) C:\Windows\system32\DRIVERS\usbehci.sys
17:04:17.0358 4552 usbehci - ok
17:04:17.0440 4552 usbhub (4673bbcb006af60e7abddbe7a130ba42) C:\Windows\system32\DRIVERS\usbhub.sys
17:04:17.0442 4552 usbhub - ok
17:04:17.0638 4552 usbohci (38dbc7dd6cc5a72011f187425384388b) C:\Windows\system32\drivers\usbohci.sys
17:04:17.0640 4552 usbohci - ok
17:04:17.0817 4552 usbprint (b51e52acf758be00ef3a58ea452fe360) C:\Windows\system32\drivers\usbprint.sys
17:04:17.0819 4552 usbprint - ok
17:04:17.0979 4552 USBSTOR (be3da31c191bc222d9ad503c5224f2ad) C:\Windows\system32\DRIVERS\USBSTOR.SYS
17:04:17.0981 4552 USBSTOR - ok
17:04:18.0042 4552 usbuhci (814d653efc4d48be3b04a307eceff56f) C:\Windows\system32\DRIVERS\usbuhci.sys
17:04:18.0044 4552 usbuhci - ok
17:04:18.0222 4552 vga (87b06e1f30b749a114f74622d013f8d4) C:\Windows\system32\DRIVERS\vgapnp.sys
17:04:18.0224 4552 vga - ok
17:04:18.0301 4552 VgaSave (2e93ac0a1d8c79d019db6c51f036636c) C:\Windows\System32\drivers\vga.sys
17:04:18.0303 4552 VgaSave - ok
17:04:18.0347 4552 viaagp (5d7159def58a800d5781ba3a879627bc) C:\Windows\system32\drivers\viaagp.sys
17:04:18.0349 4552 viaagp - ok
17:04:18.0400 4552 ViaC7 (c4f3a691b5bad343e6249bd8c2d45dee) C:\Windows\system32\drivers\viac7.sys
17:04:18.0402 4552 ViaC7 - ok
17:04:18.0449 4552 viaide (aadf5587a4063f52c2c3fed7887426fc) C:\Windows\system32\drivers\viaide.sys
17:04:18.0451 4552 viaide - ok
17:04:18.0496 4552 volmgr (69503668ac66c77c6cd7af86fbdf8c43) C:\Windows\system32\drivers\volmgr.sys
17:04:18.0499 4552 volmgr - ok
17:04:18.0567 4552 volmgrx (23e41b834759917bfd6b9a0d625d0c28) C:\Windows\system32\drivers\volmgrx.sys
17:04:18.0570 4552 volmgrx - ok
17:04:18.0651 4552 volsnap (147281c01fcb1df9252de2a10d5e7093) C:\Windows\system32\drivers\volsnap.sys
17:04:18.0654 4552 volsnap - ok
17:04:18.0771 4552 vsmraid (587253e09325e6bf226b299774b728a9) C:\Windows\system32\drivers\vsmraid.sys
17:04:18.0773 4552 vsmraid - ok
17:04:18.0842 4552 WacomPen (48dfee8f1af7c8235d4e626f0c4fe031) C:\Windows\system32\drivers\wacompen.sys
17:04:18.0844 4552 WacomPen - ok
17:04:18.0925 4552 Wanarp (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
17:04:18.0928 4552 Wanarp - ok
17:04:18.0953 4552 Wanarpv6 (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
17:04:18.0955 4552 Wanarpv6 - ok
17:04:19.0142 4552 Wd (78fe9542363f297b18c027b2d7e7c07f) C:\Windows\system32\drivers\wd.sys
17:04:19.0149 4552 Wd - ok
17:04:19.0382 4552 Wdf01000 (b6f0a7ad6d4bd325fbcd8bac96cd8d96) C:\Windows\system32\drivers\Wdf01000.sys
17:04:19.0387 4552 Wdf01000 - ok
17:04:19.0577 4552 WmiAcpi (2e7255d172df0b8283cdfb7b433b864e) C:\Windows\system32\drivers\wmiacpi.sys
17:04:19.0578 4552 WmiAcpi - ok
17:04:19.0657 4552 ws2ifsl (e3a3cb253c0ec2494d4a61f5e43a389c) C:\Windows\system32\drivers\ws2ifsl.sys
17:04:19.0659 4552 ws2ifsl - ok
17:04:19.0720 4552 WsAudio_DeviceS(1) (4160cbe59d9b5be22e4c3897e8db9d56) C:\Windows\system32\drivers\WsAudio_DeviceS(1).sys
17:04:19.0742 4552 WsAudio_DeviceS(1) - ok
17:04:19.0808 4552 WsAudio_DeviceS(2) (4160cbe59d9b5be22e4c3897e8db9d56) C:\Windows\system32\drivers\WsAudio_DeviceS(2).sys
17:04:19.0820 4552 WsAudio_DeviceS(2) - ok
17:04:19.0990 4552 WsAudio_DeviceS(3) (4160cbe59d9b5be22e4c3897e8db9d56) C:\Windows\system32\drivers\WsAudio_DeviceS(3).sys
17:04:20.0003 4552 WsAudio_DeviceS(3) - ok
17:04:20.0087 4552 WsAudio_DeviceS(4) (4160cbe59d9b5be22e4c3897e8db9d56) C:\Windows\system32\drivers\WsAudio_DeviceS(4).sys
17:04:20.0100 4552 WsAudio_DeviceS(4) - ok
17:04:20.0172 4552 WsAudio_DeviceS(5) (4160cbe59d9b5be22e4c3897e8db9d56) C:\Windows\system32\drivers\WsAudio_DeviceS(5).sys
17:04:20.0185 4552 WsAudio_DeviceS(5) - ok
17:04:20.0307 4552 WSDPrintDevice (4422ac5ed8d4c2f0db63e71d4c069dd7) C:\Windows\system32\DRIVERS\WSDPrint.sys
17:04:20.0308 4552 WSDPrintDevice - ok
17:04:20.0412 4552 WUDFRd (ac13cb789d93412106b0fb6c7eb2bcb6) C:\Windows\system32\DRIVERS\WUDFRd.sys
17:04:20.0415 4552 WUDFRd - ok
17:04:20.0521 4552 xcetap0 (f1b0d70c41a7e604e5a4ef62dd2c65f6) C:\Windows\system32\DRIVERS\xcetap0.sys
17:04:20.0535 4552 xcetap0 - ok
17:04:20.0584 4552 MBR (0x1B8) (5c616939100b85e558da92b899a0fc36) \Device\Harddisk0\DR0
17:04:20.0648 4552 \Device\Harddisk0\DR0 - ok
17:04:20.0657 4552 Boot (0x1200) (87bd32f47130bdd314b637d7e271bb74) \Device\Harddisk0\DR0\Partition0
17:04:20.0658 4552 \Device\Harddisk0\DR0\Partition0 - ok
17:04:20.0662 4552 ============================================================
17:04:20.0662 4552 Scan finished
17:04:20.0662 4552 ============================================================
17:04:20.0680 2496 Detected object count: 0
17:04:20.0680 2496 Actual detected object count: 0
17:04:43.0277 0892 Deinitialize success

COMBOFIX:
ComboFix 12-01-03.07 - Madeline 01/03/2012 17:11:13.2.1 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2038.947 [GMT -5:00]
Running from: c:\users\Madeline\Desktop\ComboFix.exe
AV: Trend Micro Titanium Internet Security *Disabled/Updated* {68F968AC-2AA0-091D-848C-803E83E35902}
SP: Trend Micro Titanium Internet Security *Disabled/Updated* {D3988948-0C9A-0693-BE3C-BB4CF86413BF}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
* Created a new restore point
.
.
((((((((((((((((((((((((( Files Created from 2011-12-03 to 2012-01-03 )))))))))))))))))))))))))))))))
.
.
2012-01-03 22:25 . 2012-01-03 22:25 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-01-02 00:58 . 2012-01-02 00:58 -------- d-----w- c:\users\Madeline\AppData\Roaming\FixZeroAccess
2012-01-02 00:35 . 2012-01-02 00:35 -------- d-----w- c:\users\Madeline\AppData\Roaming\Qualys
2011-12-15 17:58 . 2011-10-27 08:01 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-12-15 17:58 . 2011-10-27 08:01 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-12-15 17:58 . 2011-10-14 16:02 429056 ----a-w- c:\windows\system32\EncDec.dll
2011-12-15 17:58 . 2011-11-23 13:37 2043904 ----a-w- c:\windows\system32\win32k.sys
2011-12-15 17:58 . 2011-11-08 12:10 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat
2011-12-15 17:58 . 2011-10-25 15:56 49152 ----a-w- c:\windows\system32\csrsrv.dll
2011-12-15 17:58 . 2011-11-08 14:42 2048 ----a-w- c:\windows\system32\tzres.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-02 20:59 . 2011-08-12 13:54 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-08 16:11 . 2011-11-08 16:11 68096 --sha-r- c:\users\Madeline\AppData\Roaming\odbcad32S.dll
2011-12-02 21:03 . 2011-08-12 13:57 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"bgzxkhgfng"="c:\users\Madeline\AppData\Roaming\odbcad32S.dll" [2011-11-08 68096]
"Pogoplug"="c:\program files\Pogoplug\PPDrive.exe" [2011-06-21 255296]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-03-20 1451304]
"Trend Micro Titanium"="c:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-10-08 1111568]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-10-02 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-10-02 173592]
"Persistence"="c:\windows\system32\igfxpers.exe" [2009-10-02 150552]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
"Trend Micro Client Framework"="c:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-02-10 116752]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-06-06 937920]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Amazon Unbox.lnk - c:\program files\Amazon\Amazon Unbox Video\ADVWindowsClientSystemTray.exe [2010-9-13 97384]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe [2011-06-06 64952]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - 94913579
*NewlyCreated* - PXDYQKOW
*Deregistered* - 94913579
*Deregistered* - pxdyqkow
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
HPService REG_MULTI_SZ HPSLPSVC
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.gmail.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
Trusted Zone: qualys.com\browsercheck
TCP: DhcpNameServer = 216.144.187.37 204.186.0.201 207.44.96.129
FF - ProfilePath - c:\users\Madeline\AppData\Roaming\Mozilla\Firefox\Profiles\c7sn6ocw.default\
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-01-03 17:25
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
Completion time: 2012-01-03 17:32:55
ComboFix-quarantined-files.txt 2012-01-03 22:32
ComboFix2.txt 2012-01-02 02:05
.
Pre-Run: 73,320,914,944 bytes free
Post-Run: 74,024,845,312 bytes free
.
- - End Of File - - F30DF9C7C45EC33E21C2A2ECCFDD6080

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:28 AM

Posted 04 January 2012 - 01:25 AM

Hello,

Are you able to Burn CD's and have a USb Flash drive you can use?



1.
We need to run a CFScript.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the codebox below into it:

Rootkit::
c:\users\Madeline\AppData\Roaming\odbcad32S.dll

Domains::

Registry::
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
bgzxkhgfng"=-

Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.



2.
Please download MBRCheck to your desktop.

1. Double click MBRCheck.exe to run it (Right click and run as Administrator for Vista).
2. It will open a black window, please do not fix anything (if it gives you an option).
3. Exit that window and it will produce a log (MBRCheck_date_time).
4. Please post that log when you reply.


3.
Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.


Things to include in your next reply::
Combofix.txt
MBRcheck log
aswMBR log
How is your machine running now?
Are you able to burn CD's and have a USB Flash drive you can use?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 miltonq

miltonq
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 AM

Posted 04 January 2012 - 11:05 AM

As requested:
1) My computer (search engine) seems to be working now!
2) Yes, I can burn cd's.
3) Yes, I can plug in a flash drive
4) Below are the logs for the 3 programs you had me run:

ComboFix 12-01-03.07 - Madeline 01/04/2012 10:19:52.3.1 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2038.1082 [GMT -5:00]
Running from: c:\users\Madeline\Desktop\ComboFix.exe
Command switches used :: c:\users\Madeline\Desktop\CFScript.txt
AV: Trend Micro Titanium Internet Security *Disabled/Updated* {68F968AC-2AA0-091D-848C-803E83E35902}
SP: Trend Micro Titanium Internet Security *Disabled/Updated* {D3988948-0C9A-0693-BE3C-BB4CF86413BF}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2011-12-04 to 2012-01-04 )))))))))))))))))))))))))))))))
.
.
2012-01-04 15:32 . 2012-01-04 15:32 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-01-02 00:58 . 2012-01-02 00:58 -------- d-----w- c:\users\Madeline\AppData\Roaming\FixZeroAccess
2012-01-02 00:35 . 2012-01-02 00:35 -------- d-----w- c:\users\Madeline\AppData\Roaming\Qualys
2011-12-15 17:58 . 2011-10-27 08:01 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-12-15 17:58 . 2011-10-27 08:01 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-12-15 17:58 . 2011-10-14 16:02 429056 ----a-w- c:\windows\system32\EncDec.dll
2011-12-15 17:58 . 2011-11-23 13:37 2043904 ----a-w- c:\windows\system32\win32k.sys
2011-12-15 17:58 . 2011-11-08 12:10 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat
2011-12-15 17:58 . 2011-10-25 15:56 49152 ----a-w- c:\windows\system32\csrsrv.dll
2011-12-15 17:58 . 2011-11-08 14:42 2048 ----a-w- c:\windows\system32\tzres.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-02 20:59 . 2011-08-12 13:54 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-08 16:11 . 2011-11-08 16:11 68096 --sha-r- c:\users\Madeline\AppData\Roaming\odbcad32S.dll
2011-12-02 21:03 . 2011-08-12 13:57 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"bgzxkhgfng"="c:\users\Madeline\AppData\Roaming\odbcad32S.dll" [2011-11-08 68096]
"Pogoplug"="c:\program files\Pogoplug\PPDrive.exe" [2011-06-21 255296]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-03-20 1451304]
"Trend Micro Titanium"="c:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-10-08 1111568]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-10-02 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-10-02 173592]
"Persistence"="c:\windows\system32\igfxpers.exe" [2009-10-02 150552]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
"Trend Micro Client Framework"="c:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-02-10 116752]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-06-06 937920]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Amazon Unbox.lnk - c:\program files\Amazon\Amazon Unbox Video\ADVWindowsClientSystemTray.exe [2010-9-13 97384]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe [2011-06-06 64952]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
HPService REG_MULTI_SZ HPSLPSVC
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.gmail.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 216.144.187.37 204.186.0.201 207.44.96.129
FF - ProfilePath - c:\users\Madeline\AppData\Roaming\Mozilla\Firefox\Profiles\c7sn6ocw.default\
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-01-04 10:35
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(3588)
c:\program files\WinSCP\DragExt.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Trend Micro\AMSP\coreServiceShell.exe
c:\program files\Pogoplug\dokanmnt.exe
c:\program files\Trend Micro\AMSP\coreFrameworkHost.exe
c:\program files\Pogoplug\HBPLUG\HBADMIN.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
c:\program files\Amazon\Amazon Unbox Video\ADVWindowsClientService.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Windows Media Player\wmpnetwk.exe
.
**************************************************************************
.
Completion time: 2012-01-04 10:42:45 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-04 15:42
ComboFix2.txt 2012-01-03 22:32
ComboFix3.txt 2012-01-02 02:05
.
Pre-Run: 74,563,604,480 bytes free
Post-Run: 74,343,395,328 bytes free
.
- - End Of File - - 314E8BDC4CD22E8163A57D645885DD0E


aswMBR version 0.9.9.1156 Copyright© 2011 AVAST Software
Run date: 2012-01-04 10:59:48
-----------------------------
10:59:48.398 OS Version: Windows 6.0.6002 Service Pack 2
10:59:48.399 Number of processors: 1 586 0x1601
10:59:48.402 ComputerName: MADELINE-PC UserName: Madeline
10:59:50.713 Initialize success
11:00:09.262 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-4
11:00:09.269 Disk 0 Vendor: FUJITSU_MHY2120BH 0040020B Size: 114473MB BusType: 3
11:00:09.288 Disk 0 MBR read successfully
11:00:09.291 Disk 0 MBR scan
11:00:09.298 Disk 0 Windows VISTA default MBR code
11:00:09.303 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 1500 MB offset 2048
11:00:09.315 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 112972 MB offset 3074048
11:00:09.322 Disk 0 scanning sectors +234440704
11:00:09.397 Disk 0 scanning C:\Windows\system32\drivers
11:00:16.391 Service scanning
11:00:18.322 Modules scanning
11:00:25.172 Disk 0 trace - called modules:
11:00:25.209 ntkrnlpa.exe CLASSPNP.SYS disk.sys ataport.SYS hal.dll PCIIDEX.SYS msahci.sys
11:00:25.214 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x84d18528]
11:00:25.220 3 CLASSPNP.SYS[87ba78b3] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-4[0x845f9030]
11:00:25.229 Scan finished successfully
11:01:51.725 Disk 0 MBR has been saved successfully to "C:\Users\Madeline\Desktop\Reply 2\MBR.dat"
11:01:51.741 The log file has been saved successfully to "C:\Users\Madeline\Desktop\Reply 2\aswMBR.txt"


MBRCheck, version 1.2.3
© 2010, AD

Command-line:
Windows Version: Windows Vista Home Premium Edition
Windows Information: Service Pack 2 (build 6002), 32-bit
Base Board Manufacturer: TOSHIBA
BIOS Manufacturer: TOSHIBA
System Manufacturer: TOSHIBA
System Product Name: Satellite A205
Logical Drives Mask: 0x0000000c

Kernel Drivers (total 151):
0x81A11000 \SystemRoot\system32\ntkrnlpa.exe
0x81DCB000 \SystemRoot\system32\hal.dll
0x8040A000 \SystemRoot\system32\kdcom.dll
0x80411000 \SystemRoot\system32\mcupdate_GenuineIntel.dll
0x80481000 \SystemRoot\system32\PSHED.dll
0x80492000 \SystemRoot\system32\BOOTVID.dll
0x8049A000 \SystemRoot\system32\CLFS.SYS
0x804DB000 \SystemRoot\system32\CI.dll
0x80600000 \SystemRoot\system32\drivers\Wdf01000.sys
0x8067C000 \SystemRoot\system32\drivers\WDFLDR.SYS
0x80689000 \SystemRoot\system32\drivers\acpi.sys
0x806CF000 \SystemRoot\system32\drivers\WMILIB.SYS
0x806D8000 \SystemRoot\system32\drivers\msisadrv.sys
0x806E0000 \SystemRoot\system32\drivers\pci.sys
0x80707000 \SystemRoot\System32\drivers\partmgr.sys
0x80716000 \SystemRoot\system32\DRIVERS\compbatt.sys
0x80719000 \SystemRoot\system32\DRIVERS\BATTC.SYS
0x80723000 \SystemRoot\system32\drivers\volmgr.sys
0x80732000 \SystemRoot\System32\drivers\volmgrx.sys
0x8077C000 \SystemRoot\system32\drivers\intelide.sys
0x80783000 \SystemRoot\system32\drivers\PCIIDEX.SYS
0x80791000 \SystemRoot\system32\DRIVERS\pcmcia.sys
0x807BE000 \SystemRoot\System32\drivers\mountmgr.sys
0x807CE000 \SystemRoot\system32\drivers\atapi.sys
0x807D6000 \SystemRoot\system32\drivers\ataport.SYS
0x807F4000 \SystemRoot\system32\drivers\msahci.sys
0x805BB000 \SystemRoot\system32\drivers\fltmgr.sys
0x805ED000 \SystemRoot\system32\drivers\fileinfo.sys
0x87602000 \SystemRoot\System32\Drivers\ksecdd.sys
0x87673000 \SystemRoot\system32\drivers\ndis.sys
0x8777E000 \SystemRoot\system32\drivers\msrpc.sys
0x877A9000 \SystemRoot\system32\drivers\NETIO.SYS
0x87802000 \SystemRoot\System32\drivers\tcpip.sys
0x878EC000 \SystemRoot\System32\drivers\fwpkclnt.sys
0x87A05000 \SystemRoot\System32\Drivers\Ntfs.sys
0x87B15000 \SystemRoot\system32\drivers\volsnap.sys
0x87B4E000 \SystemRoot\system32\DRIVERS\TVALZ_O.SYS
0x87B53000 \SystemRoot\System32\Drivers\spldr.sys
0x87B5B000 \SystemRoot\System32\Drivers\mup.sys
0x87B6A000 \SystemRoot\System32\drivers\ecache.sys
0x87B91000 \SystemRoot\system32\drivers\disk.sys
0x87BA2000 \SystemRoot\system32\drivers\CLASSPNP.SYS
0x87BC3000 \SystemRoot\system32\drivers\crcdisk.sys
0x87BEE000 \SystemRoot\system32\DRIVERS\tunnel.sys
0x87907000 \SystemRoot\system32\DRIVERS\tunmp.sys
0x87910000 \SystemRoot\system32\DRIVERS\intelppm.sys
0x8BC00000 \SystemRoot\system32\DRIVERS\igdkmd32.sys
0x8C109000 \SystemRoot\System32\drivers\dxgkrnl.sys
0x8C1A9000 \SystemRoot\System32\drivers\watchdog.sys
0x8C1B5000 \SystemRoot\system32\DRIVERS\usbuhci.sys
0x8C1C0000 \SystemRoot\system32\DRIVERS\USBPORT.SYS
0x8791F000 \SystemRoot\system32\DRIVERS\usbehci.sys
0x8792E000 \SystemRoot\system32\DRIVERS\HDAudBus.sys
0x879BB000 \SystemRoot\system32\DRIVERS\Rtlh86.sys
0x8B003000 \SystemRoot\system32\DRIVERS\athr.sys
0x8B0EA000 \SystemRoot\system32\DRIVERS\ohci1394.sys
0x8B0FA000 \SystemRoot\system32\DRIVERS\1394BUS.SYS
0x8B108000 \SystemRoot\system32\drivers\tifm21.sys
0x8B136000 \SystemRoot\system32\DRIVERS\sdbus.sys
0x8B150000 \SystemRoot\system32\DRIVERS\CmBatt.sys
0x8B154000 \SystemRoot\system32\DRIVERS\i8042prt.sys
0x8B167000 \SystemRoot\system32\DRIVERS\kbdclass.sys
0x8B172000 \SystemRoot\system32\DRIVERS\SynTP.sys
0x8B1A4000 \SystemRoot\system32\DRIVERS\USBD.SYS
0x8B1A6000 \SystemRoot\system32\DRIVERS\mouclass.sys
0x8B1B1000 \SystemRoot\system32\DRIVERS\cdrom.sys
0x8B1C9000 \SystemRoot\system32\DRIVERS\serscan.sys
0x8B1D1000 \SystemRoot\system32\DRIVERS\msiscsi.sys
0x8B605000 \SystemRoot\system32\DRIVERS\storport.sys
0x8B646000 \SystemRoot\system32\DRIVERS\TDI.SYS
0x8B651000 \SystemRoot\system32\DRIVERS\rasl2tp.sys
0x8B668000 \SystemRoot\system32\DRIVERS\ndistapi.sys
0x8B673000 \SystemRoot\system32\DRIVERS\ndiswan.sys
0x8B696000 \SystemRoot\system32\DRIVERS\raspppoe.sys
0x8B6A5000 \SystemRoot\system32\DRIVERS\raspptp.sys
0x8B6B9000 \SystemRoot\system32\DRIVERS\rassstp.sys
0x8B6CE000 \SystemRoot\system32\DRIVERS\xcetap0.sys
0x8B6D9000 \SystemRoot\system32\DRIVERS\termdd.sys
0x8B6E9000 \SystemRoot\system32\DRIVERS\swenum.sys
0x8B6EB000 \SystemRoot\system32\DRIVERS\ks.sys
0x8B715000 \SystemRoot\system32\DRIVERS\mssmbios.sys
0x8B71F000 \SystemRoot\system32\DRIVERS\umbus.sys
0x8B72C000 \SystemRoot\system32\DRIVERS\usbhub.sys
0x8B761000 \SystemRoot\System32\Drivers\NDProxy.SYS
0x8B772000 \SystemRoot\system32\drivers\HdAudio.sys
0x8B7B1000 \SystemRoot\system32\drivers\portcls.sys
0x879CA000 \SystemRoot\system32\drivers\drmk.sys
0x8B201000 \SystemRoot\system32\DRIVERS\AGRSM.sys
0x8B2FC000 \SystemRoot\system32\drivers\modem.sys
0x8B309000 \SystemRoot\System32\Drivers\Fs_Rec.SYS
0x8B312000 \SystemRoot\System32\Drivers\Null.SYS
0x8B319000 \SystemRoot\System32\Drivers\Beep.SYS
0x8B320000 \SystemRoot\System32\drivers\vga.sys
0x8B32C000 \SystemRoot\System32\drivers\VIDEOPRT.SYS
0x8B34D000 \SystemRoot\System32\DRIVERS\RDPCDD.sys
0x8B355000 \SystemRoot\system32\drivers\rdpencdd.sys
0x8B35D000 \SystemRoot\System32\Drivers\Msfs.SYS
0x8B368000 \SystemRoot\System32\Drivers\Npfs.SYS
0x8B376000 \SystemRoot\System32\DRIVERS\rasacd.sys
0x8B37F000 \SystemRoot\system32\DRIVERS\tdx.sys
0x8B395000 \SystemRoot\system32\DRIVERS\smb.sys
0x8B3A9000 \SystemRoot\system32\drivers\afd.sys
0x8B80D000 \SystemRoot\System32\DRIVERS\netbt.sys
0x8B83F000 \SystemRoot\system32\DRIVERS\pacer.sys
0x8B855000 \SystemRoot\system32\DRIVERS\netbios.sys
0x8B863000 \SystemRoot\system32\DRIVERS\wanarp.sys
0x8B876000 \SystemRoot\system32\DRIVERS\tmtdi.sys
0x8B88B000 \SystemRoot\system32\DRIVERS\rdbss.sys
0x8B8C7000 \SystemRoot\system32\drivers\nsiproxy.sys
0x8B8D1000 \SystemRoot\System32\Drivers\dfsc.sys
0x8B8E8000 \SystemRoot\System32\Drivers\crashdmp.sys
0x8B8F5000 \SystemRoot\System32\Drivers\dump_dumpata.sys
0x8B900000 \SystemRoot\System32\Drivers\dump_msahci.sys
0x8B90A000 \SystemRoot\system32\DRIVERS\hidusb.sys
0x8B913000 \SystemRoot\system32\DRIVERS\HIDCLASS.SYS
0x8B923000 \SystemRoot\system32\DRIVERS\HIDPARSE.SYS
0x8B92A000 \SystemRoot\system32\DRIVERS\mouhid.sys
0x92A50000 \SystemRoot\System32\win32k.sys
0x8B932000 \SystemRoot\System32\drivers\Dxapi.sys
0x8B93C000 \SystemRoot\system32\DRIVERS\monitor.sys
0x92C70000 \SystemRoot\System32\TSDDD.dll
0x92C90000 \SystemRoot\System32\cdd.dll
0x8B94B000 \SystemRoot\system32\drivers\luafv.sys
0xA480A000 \SystemRoot\system32\drivers\spsys.sys
0xA48BA000 \SystemRoot\system32\DRIVERS\lltdio.sys
0xA48CA000 \SystemRoot\system32\DRIVERS\nwifi.sys
0xA48F4000 \SystemRoot\system32\DRIVERS\ndisuio.sys
0xA48FE000 \SystemRoot\system32\DRIVERS\rspndr.sys
0xA4911000 \SystemRoot\system32\drivers\HTTP.sys
0xA497E000 \SystemRoot\System32\DRIVERS\srvnet.sys
0xA499B000 \SystemRoot\system32\DRIVERS\bowser.sys
0xA49B4000 \SystemRoot\System32\drivers\mpsdrv.sys
0xA49C9000 \SystemRoot\system32\drivers\mrxdav.sys
0x8B966000 \SystemRoot\system32\DRIVERS\mrxsmb.sys
0x8B985000 \SystemRoot\system32\DRIVERS\mrxsmb10.sys
0x8B9BE000 \SystemRoot\system32\DRIVERS\mrxsmb20.sys
0x8B9D6000 \SystemRoot\System32\DRIVERS\srv2.sys
0xA5607000 \SystemRoot\System32\DRIVERS\srv.sys
0xA566E000 \SystemRoot\system32\DRIVERS\tmcomm.sys
0xA56A2000 \SystemRoot\system32\DRIVERS\tmevtmgr.sys
0xA56B4000 \SystemRoot\system32\DRIVERS\tmactmon.sys
0xA56D1000 \??\C:\Program Files\Pogoplug\dokance.sys
0xA56E1000 \SystemRoot\system32\drivers\peauth.sys
0xA57BF000 \SystemRoot\System32\Drivers\secdrv.SYS
0xA57C9000 \SystemRoot\System32\drivers\tcpipreg.sys
0xA57D5000 \SystemRoot\system32\DRIVERS\asyncmac.sys
0xA57E5000 \SystemRoot\system32\DRIVERS\cdfs.sys
0xA5656000 \SystemRoot\system32\DRIVERS\WSDPrint.sys
0xA5660000 \??\C:\ComboFix\catchme.sys
0xA5668000 \??\C:\Windows\system32\Drivers\PROCEXP113.SYS
0x77D80000 \Windows\System32\ntdll.dll

Processes (total 52):
0 System Idle Process
4 System
396 C:\Windows\System32\smss.exe
468 csrss.exe
512 C:\Windows\System32\wininit.exe
520 csrss.exe
560 C:\Windows\System32\services.exe
572 C:\Windows\System32\lsass.exe
580 C:\Windows\System32\lsm.exe
604 C:\Windows\System32\winlogon.exe
772 C:\Windows\System32\svchost.exe
836 C:\Windows\System32\svchost.exe
952 C:\Windows\System32\svchost.exe
1032 C:\Windows\System32\svchost.exe
1044 C:\Windows\System32\svchost.exe
1124 C:\Windows\System32\audiodg.exe
1152 C:\Windows\System32\svchost.exe
1168 C:\Windows\System32\SLsvc.exe
1204 C:\Windows\System32\svchost.exe
1388 C:\Windows\System32\svchost.exe
1628 C:\Windows\System32\spoolsv.exe
1640 C:\Windows\System32\taskeng.exe
1676 C:\Windows\System32\svchost.exe
1884 C:\Program Files\Trend Micro\AMSP\coreServiceShell.exe
1944 C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
1952 C:\Program Files\Trend Micro\UniClient\UiFrmwrk\uiWatchDog.exe
1984 C:\Program Files\Pogoplug\dokanmnt.exe
2000 C:\Program Files\Trend Micro\AMSP\coreFrameworkHost.exe
2044 C:\Program Files\Pogoplug\HBPLUG\hbadmin.exe
312 C:\Windows\System32\svchost.exe
416 C:\Windows\System32\dwm.exe
508 C:\Windows\System32\svchost.exe
1060 C:\Windows\System32\svchost.exe
1348 C:\Windows\System32\svchost.exe
1752 C:\Windows\System32\svchost.exe
1512 C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVC.EXE
2080 C:\Windows\System32\SearchIndexer.exe
2128 C:\Program Files\Amazon\Amazon Unbox Video\ADVWindowsClientService.exe
2168 C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVCM.EXE
2500 C:\Windows\System32\taskeng.exe
3368 C:\Windows\System32\igfxsrvc.exe
3116 C:\Windows\System32\svchost.exe
3584 C:\Windows\System32\svchost.exe
2936 C:\Program Files\Windows Media Player\wmpnetwk.exe
3588 C:\Windows\explorer.exe
3192 C:\Windows\System32\notepad.exe
2188 C:\Program Files\Internet Explorer\iexplore.exe
2616 C:\Program Files\Internet Explorer\iexplore.exe
2952 C:\Windows\System32\Macromed\Flash\FlashUtil11e_ActiveX.exe
2956 C:\Windows\System32\SearchProtocolHost.exe
2908 C:\Windows\System32\SearchFilterHost.exe
2968 C:\Users\Madeline\Desktop\MBRCheck.exe

\\.\C: --> \\.\PhysicalDrive0 at offset 0x00000000`5dd00000 (NTFS)

PhysicalDrive0 Model Number: FUJITSUMHY2120BH, Rev: 0040020B

Size Device Name MBR Status
--------------------------------------------
111 GB \\.\PhysicalDrive0 Windows 2008 MBR code detected
SHA1: 8DF43F2BDE2D9451948FA14B5279969C777A7979


Done!

#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:28 AM

Posted 04 January 2012 - 02:40 PM

We need to run a CFScript.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the codebox below into it:

Killall::

File::
c:\users\Madeline\AppData\Roaming\odbcad32S.dll

Registry::
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"bgzxkhgfng"=-


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 miltonq

miltonq
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 AM

Posted 04 January 2012 - 10:13 PM

First time I tried to run it, it crashed my computer. When I came back to it, it had a fresh Windows screen up and said that windows recovered from a serious error. Not sure what that was about. I ran it again, and it ran just fine. Here is the log.
(search engines still appear to be working fine)

ComboFix 12-01-03.07 - Madeline 01/04/2012 19:48:37.5.1 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2038.931 [GMT -5:00]
Running from: c:\users\Madeline\Desktop\ComboFix.exe
Command switches used :: c:\users\Madeline\Desktop\CFScript.txt
AV: Trend Micro Titanium Internet Security *Disabled/Updated* {68F968AC-2AA0-091D-848C-803E83E35902}
SP: Trend Micro Titanium Internet Security *Disabled/Updated* {D3988948-0C9A-0693-BE3C-BB4CF86413BF}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
FILE ::
"c:\users\Madeline\AppData\Roaming\odbcad32S.dll"
.
.
((((((((((((((((((((((((( Files Created from 2011-12-05 to 2012-01-05 )))))))))))))))))))))))))))))))
.
.
2012-01-05 01:01 . 2012-01-05 01:02 -------- d-----w- c:\users\Madeline\AppData\Local\temp
2012-01-05 01:01 . 2012-01-05 01:01 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-01-02 00:58 . 2012-01-02 00:58 -------- d-----w- c:\users\Madeline\AppData\Roaming\FixZeroAccess
2012-01-02 00:35 . 2012-01-02 00:35 -------- d-----w- c:\users\Madeline\AppData\Roaming\Qualys
2011-12-15 17:58 . 2011-10-27 08:01 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-12-15 17:58 . 2011-10-27 08:01 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-12-15 17:58 . 2011-10-14 16:02 429056 ----a-w- c:\windows\system32\EncDec.dll
2011-12-15 17:58 . 2011-11-23 13:37 2043904 ----a-w- c:\windows\system32\win32k.sys
2011-12-15 17:58 . 2011-11-08 12:10 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat
2011-12-15 17:58 . 2011-10-25 15:56 49152 ----a-w- c:\windows\system32\csrsrv.dll
2011-12-15 17:58 . 2011-11-08 14:42 2048 ----a-w- c:\windows\system32\tzres.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-02 20:59 . 2011-08-12 13:54 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-08 16:11 . 2011-11-08 16:11 68096 --sha-r- c:\users\Madeline\AppData\Roaming\odbcad32S.dll
2011-12-02 21:03 . 2011-08-12 13:57 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"Pogoplug"="c:\program files\Pogoplug\PPDrive.exe" [2011-06-21 255296]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-03-20 1451304]
"Trend Micro Titanium"="c:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-10-08 1111568]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-10-02 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-10-02 173592]
"Persistence"="c:\windows\system32\igfxpers.exe" [2009-10-02 150552]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
"Trend Micro Client Framework"="c:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-02-10 116752]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-06-06 937920]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Amazon Unbox.lnk - c:\program files\Amazon\Amazon Unbox Video\ADVWindowsClientSystemTray.exe [2010-9-13 97384]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe [2011-06-06 64952]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
HPService REG_MULTI_SZ HPSLPSVC
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.gmail.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 216.144.187.37 204.186.0.201 207.44.96.129
FF - ProfilePath - c:\users\Madeline\AppData\Roaming\Mozilla\Firefox\Profiles\c7sn6ocw.default\
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-01-04 20:02
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(3088)
c:\program files\WinSCP\DragExt.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Trend Micro\AMSP\coreServiceShell.exe
c:\program files\Pogoplug\dokanmnt.exe
c:\program files\Trend Micro\AMSP\coreFrameworkHost.exe
c:\program files\Pogoplug\HBPLUG\HBADMIN.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
c:\program files\Amazon\Amazon Unbox Video\ADVWindowsClientService.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Windows Media Player\wmpnetwk.exe
.
**************************************************************************
.
Completion time: 2012-01-04 20:11:58 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-05 01:11
ComboFix2.txt 2012-01-04 15:42
ComboFix3.txt 2012-01-03 22:32
ComboFix4.txt 2012-01-02 02:05
.
Pre-Run: 73,282,875,392 bytes free
Post-Run: 73,156,075,520 bytes free
.
- - End Of File - - 1898B95A0D5846333284B4C3785F14C1

#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:28 AM

Posted 04 January 2012 - 10:36 PM

Hello,

Things look good lets run a couple other scanners to make sure nothing is leftover.

1.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


2.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

3.
Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7-windows-i586.exe to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.

Things to include in your next reply::
MBAM log
Eset log
How is your computer running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#11 miltonq

miltonq
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 AM

Posted 05 January 2012 - 01:40 PM

Sorry for the delay.
I ran the Malwarebytes program, and below is the log.
I ran the ESET program, however I have no log to provide. When it completed running, there was no option to "list threats" or "export". It just said infected files: 0 cleaned files: 0 and gave me checkboxes to uninstall application, delete quarantined files (there was 1 quarantined file), and a button to click "finish". I have attached a screen shot of what it looked like here, so you can see it.
As for how my computer is performing, I am seeing no issues.
Malwarebytes Anti-Malware 1.60.0.1800
www.malwarebytes.org

Database version: v2012.01.05.02

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Madeline :: MADELINE-PC [administrator]

1/5/2012 8:48:23 AM
mbam-log-2012-01-05 (08-48-23).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 164331
Time elapsed: 7 minute(s), 8 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

Attached Files



#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:28 AM

Posted 05 January 2012 - 06:00 PM

Hello, miltonq.
Congratulations! You now appear clean! :cool:


Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".



Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.

One of the most common questions found when cleaning malware is "how did my machine get infected?". There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.

Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.

Do not use P2P programs
Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

Practice Safe Internet
Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your computer clean and running securely:
  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.
    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your http://en.wikipedia.org/wiki/Taskbar#Screenshots '>Taskbar, right click and chose close.
  • Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.
  • Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
    Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

  • Windows XP users
    You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
  • Windows Vista users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
  • Windows 7 users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here


Keep your browser secure
Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

The latest versions of the three common browsers can be found below:

Use an AntiVirus Software
It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.
See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Use a Firewall
I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

Install an Anti-Malware program
Recommended, and free, Anti-Malware programs are Malwarebytes Anti-Malware and SuperAntiSpyware.

You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

Follow this list and your potential for being infected again will reduce dramatically.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 miltonq

miltonq
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 AM

Posted 05 January 2012 - 09:09 PM

You were awesome... thanks so much for everything you have done! All is working well...

#14 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:28 AM

Posted 05 January 2012 - 09:29 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users