Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Can't remove System Check malware


  • This topic is locked This topic is locked
9 replies to this topic

#1 letsgetitdone

letsgetitdone

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 23 February 2012 - 06:53 PM

Hi,

I am running a 32-bit version of Windows XP Media Center Edition.

I followed the guide for removing system check ( http://www.bleepingcomputer.com/virus-removal/remove-system-check ). The first time I ran MBAM, it caught several things, and did whichever default action to them. But the error messages and general unusability of my computer persisted after I rebooted. When I turn on my computer, after clicking my user profile, the screen is black. The taskbar appears, but when I click "Start", nothing shows up. Soon after, I am bombarded with error messages. I am only able to functionally use the computer in Safe Mode.

All the scans from the logs I am posting in this first post will be scans done in Safe Mode. I am carrying out the scans by putting the applications on a USB key from another computer, then transferring them to the infected computer, and running them there. I am not confident in using the internet on this infected computer. During my MBAM use, I could not update the database because I would always receive a "Access is denied" error.

I get the following error messages (the underlined text is what is displayed as the window's title of the error message. The rest is the body of error message):

Windows detected a hard disk problem

A potential disk failure may cause lose of files, applications and documents stored on the hard disk. It's highly recommended to scan and solve HDD problems before continue using this PC.
Scan and Fix - Cancel and reboot


Windows-delayed write fail

Failed to save all the components for the file \\system32\\0000431f. This file is corrupted or unreadable. This error may be caused by a PC hardware problem.


This bubble pops up from an yellow exclamation point in the bottom right corner of my screen:

Windows OS can't a detect a free hard drive space. Hard drive error.



I ran DDS and I will attach/paste the logs below.

I ran GMER three times. All three times my computer restarted during its scan after around 15 minutes. I don't know what's happening right before it restarts because I am not monitoring the scan personally. I see no logs.

I appreciate your help.

Here is the dds.txt log:

.
DDS (Ver_2011-08-26.01) - NTFSx86 MINIMAL
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_22
Run by Administrator at 19:36:22 on 2012-02-22
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.798 [GMT -5:00]
.
FW: Norton Internet Worm Protection *Disabled*
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Citrix\ICA Client\ssonsvr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\Program Files\Bell\Internet Service Advisor\ServicepointService.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.sony.com/vaiopeople
uURLSearchHooks: H - No File
uURLSearchHooks: AOLSearchHook Class: {54eb34ea-e6be-4cfd-9f4f-c4a0c2eafa22} - c:\program files\aol\aol search enhancement\AOLSearch.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: AOLSearchHook Class: {54eb34ea-e6be-4cfd-9f4f-c4a0c2eafa22} - c:\program files\aol\aol search enhancement\AOLSearch.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [SUPERAntiSpyware] d:\super anti\SUPERAntiSpyware.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [SkyTel] SkyTel.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [AzMixerSel] c:\program files\realtek\installshield\AzMixerSel.exe
mRun: [VAIO Recovery] c:\windows\sonysys\vaio recovery\PartSeal.exe
mRun: [SonyPowerCfg] "c:\program files\sony\vaio power management\SPMgr.exe"
mRun: [ISBMgr.exe] c:\program files\sony\isb utility\ISBMgr.exe
mRun: [Switcher.exe] c:\program files\sony\wireless switch setting utility\Switcher.exe
mRun: [DISCover] c:\program files\disc\DISCover.exe
mRun: [<NO NAME>]
mRun: [PartSeal] c:\windows\sonysys\vaio recovery\PartSeal.exe
mRun: [VAIO Update 3] "c:\program files\sony\vaio update 3\VAIOUpdt.exe" /Stationary
mRun: [Samsung PanelMgr] c:\windows\samsung\panelmgr\SSMMgr.exe /autorun
mRun: [BISA.exe] "c:\program files\bell\internet service advisor\BISA.exe" /AUTORUN
mRun: [BellCanada_McciTrayApp] "c:\program files\bellcanada\McciTrayApp.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [gYUFSGBPBg.exe] c:\documents and settings\all users\application data\gYUFSGBPBg.exe
IE: &AOL Toolbar Search - c:\program files\aol\aol toolbar 3.0\resources\en-us\local\search.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
LSP: c:\progra~1\whalec~1\client~1\31265d~1.0\WhlLSP.dll
DPF: {02CF1781-EA91-4FA5-A200-646E8241987C} - hxxp://esupport.sony.com/VaioInfo.CAB
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1201297081515
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
TCP: DhcpNameServer = 192.168.2.1
TCP: Interfaces\{EBA9D76C-395C-4163-9CAF-FA1F47277795} : DhcpNameServer = 192.168.2.1
Notify: !SASWinLogon - d:\super anti\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
Notify: VESWinlogon - VESWinlogon.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - d:\super anti\SASSEH.DLL
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath -
.
============= SERVICES / DRIVERS ===============
.
R2 aawservice;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\aawservice.exe [2008-5-12 611664]
R2 ServicepointService;ServicepointService;c:\program files\bell\internet service advisor\ServicepointService.exe [2011-2-27 689464]
S1 SASDIFSV;SASDIFSV;\??\g:\super anti spyware\sasdifsv.sys --> g:\super anti spyware\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\g:\super anti spyware\saskutil.sys --> g:\super anti spyware\SASKUTIL.SYS [?]
S2 !SASCORE;SAS Core Service;"g:\super anti spyware\sascore.exe" --> g:\super anti spyware\SASCORE.EXE [?]
S2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
S2 MSSQL$VAIO_VEDB;MSSQL$VAIO_VEDB;c:\program files\microsoft sql server\mssql$vaio_vedb\binn\sqlservr.exe -svaio_vedb --> c:\program files\microsoft sql server\mssql$vaio_vedb\binn\sqlservr.exe -sVAIO_VEDB [?]
S2 SSPORT;SSPORT;\??\c:\windows\system32\drivers\ssport.sys --> c:\windows\system32\drivers\SSPORT.sys [?]
S2 Symantec Core LC;Symantec Core LC;c:\program files\common files\symantec shared\ccpd-lc\symlcsvc.exe [2006-11-10 1120960]
S2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2007-10-29 24652]
S3 Samsung UPD Service;Samsung UPD Service;c:\windows\system32\SUPDSvc.exe [2010-2-23 127656]
S3 SASENUM;SASENUM;\??\g:\superanti\sasenum.sys --> g:\superanti\SASENUM.SYS [?]
S3 SQLAgent$VAIO_VEDB;SQLAgent$VAIO_VEDB;c:\program files\microsoft sql server\mssql$vaio_vedb\binn\sqlagent.exe -i vaio_vedb --> c:\program files\microsoft sql server\mssql$vaio_vedb\binn\sqlagent.EXE -i VAIO_VEDB [?]
S3 ti21sony;ti21sony;c:\windows\system32\drivers\ti21sony.sys [2006-9-1 226304]
.
=============== Created Last 30 ================
.
2012-02-18 05:22:46 -------- d-----w- C:\anti malware
2012-02-18 04:57:40 -------- d--h--w- c:\documents and settings\administrator\application data\SUPERAntiSpyware.com
2012-02-18 02:18:53 -------- d-----w- C:\TDSSKiller_Quarantine
2012-02-18 02:10:49 -------- d--h--w- c:\documents and settings\administrator\application data\Malwarebytes
2012-02-18 01:39:26 453632 ---ha-w- c:\documents and settings\all users\application data\gYUFSGBPBg.exe
2012-02-15 00:06:30 3072 -c----w- c:\windows\system32\dllcache\iacenc.dll
2012-02-15 00:06:30 3072 ------w- c:\windows\system32\iacenc.dll
2012-02-11 00:10:59 60032 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2012-02-11 00:10:59 60032 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
.
==================== Find3M ====================
.
2012-01-12 16:53:24 1859968 ----a-w- c:\windows\system32\win32k.sys
2011-12-19 08:13:37 832512 ----a-w- c:\windows\system32\wininet.dll
2011-12-19 08:13:37 1830912 ------w- c:\windows\system32\inetcpl.cpl
2011-12-19 08:13:36 78336 ----a-w- c:\windows\system32\ieencode.dll
2011-12-19 08:13:36 17408 ----a-w- c:\windows\system32\corpol.dll
2011-11-25 21:57:19 293376 ----a-w- c:\windows\system32\winsrv.dll
.
============= FINISH: 19:38:15.84 ===============

BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:06 AM

Posted 23 February 2012 - 06:58 PM

Hello letsgetitdone,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.

You can download and run both these in safemode.

1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not an option, Skip instead, do not choose Delete unless instructed.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.



2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


3.
Please download Listparts
Run the tool, click Scan and post the log (Result.txt) it makes.



Things to include in your next reply::
TdssKiller log
Combofix.txt
Results.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 letsgetitdone

letsgetitdone
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 23 February 2012 - 08:19 PM

Thank you for taking on my case, fireman4it.

I ran the tdsskiller, combofix, and listparts, as you requested. I rebooted my computer after the listparts scan (the last scan I did). I logged into my account in normal mode (i.e., not safe mode). Now there are no error messages from the malware. The desktop background is blue. There are no desktop icons. I did not try to use any internet browsing via Internet Explorer or Firefox. I can try to if you think it would be good to test. If I do further scans using programs from now, should I do them in this normal mode (i.e., not safe mode) since I now can access it?

Here are the logs in the order of tdsskiller, combofix, and then listparts (Result.txt).


19:20:25.0593 1856 TDSS rootkit removing tool 2.7.13.0 Feb 15 2012 19:33:14
19:20:25.0734 1856 ============================================================
19:20:25.0734 1856 Current date / time: 2012/02/23 19:20:25.0734
19:20:25.0734 1856 SystemInfo:
19:20:25.0734 1856
19:20:25.0734 1856 OS Version: 5.1.2600 ServicePack: 3.0
19:20:25.0734 1856 Product type: Workstation
19:20:25.0734 1856 ComputerName: LAPTOP
19:20:25.0734 1856 UserName: Administrator
19:20:25.0734 1856 Windows directory: C:\WINDOWS
19:20:25.0734 1856 System windows directory: C:\WINDOWS
19:20:25.0734 1856 Processor architecture: Intel x86
19:20:25.0734 1856 Number of processors: 2
19:20:25.0734 1856 Page size: 0x1000
19:20:25.0734 1856 Boot type: Safe boot
19:20:25.0734 1856 ============================================================
19:20:27.0562 1856 Drive \Device\Harddisk0\DR0 - Size: 0x12A1F16000 (74.53 Gb), SectorSize: 0x200, Cylinders: 0x2601, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000054
19:20:27.0562 1856 Drive \Device\Harddisk1\DR5 - Size: 0xEEE00000 (3.73 Gb), SectorSize: 0x200, Cylinders: 0x1E7, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'W'
19:20:27.0562 1856 \Device\Harddisk0\DR0:
19:20:27.0562 1856 MBR used
19:20:27.0562 1856 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0xAEC789, BlocksNum 0x8A21D38
19:20:27.0562 1856 \Device\Harddisk1\DR5:
19:20:27.0562 1856 MBR used
19:20:27.0562 1856 \Device\Harddisk1\DR5\Partition0: MBR, Type 0xB, StartLBA 0x438, BlocksNum 0x776BC8
19:20:27.0828 1856 Initialize success
19:20:27.0828 1856 ============================================================
19:20:32.0437 1892 ============================================================
19:20:32.0437 1892 Scan started
19:20:32.0437 1892 Mode: Manual;
19:20:32.0437 1892 ============================================================
19:20:33.0812 1892 Abiosdsk - ok
19:20:34.0203 1892 abp480n5 - ok
19:20:34.0718 1892 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
19:20:34.0796 1892 ACPI - ok
19:20:35.0218 1892 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
19:20:35.0218 1892 ACPIEC - ok
19:20:35.0593 1892 adpu160m - ok
19:20:36.0078 1892 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
19:20:36.0140 1892 aec - ok
19:20:36.0593 1892 AegisP (15e655baa989444f56787ef558823643) C:\WINDOWS\system32\DRIVERS\AegisP.sys
19:20:36.0593 1892 AegisP - ok
19:20:37.0125 1892 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
19:20:37.0187 1892 AFD - ok
19:20:37.0609 1892 Aha154x - ok
19:20:38.0015 1892 aic78u2 - ok
19:20:38.0390 1892 aic78xx - ok
19:20:38.0812 1892 AliIde - ok
19:20:39.0187 1892 amsint - ok
19:20:39.0671 1892 ApfiltrService (b21fcbc58cb13bac70f74b5ac5da7409) C:\WINDOWS\system32\DRIVERS\Apfiltr.sys
19:20:39.0718 1892 ApfiltrService - ok
19:20:40.0187 1892 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
19:20:40.0218 1892 Arp1394 - ok
19:20:40.0593 1892 asc - ok
19:20:40.0984 1892 asc3350p - ok
19:20:41.0375 1892 asc3550 - ok
19:20:41.0859 1892 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
19:20:41.0859 1892 AsyncMac - ok
19:20:42.0312 1892 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
19:20:42.0312 1892 atapi - ok
19:20:42.0703 1892 Atdisk - ok
19:20:43.0125 1892 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
19:20:43.0156 1892 Atmarpc - ok
19:20:43.0578 1892 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
19:20:43.0578 1892 audstub - ok
19:20:44.0078 1892 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
19:20:44.0078 1892 Beep - ok
19:20:44.0531 1892 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
19:20:44.0531 1892 cbidf2k - ok
19:20:44.0906 1892 cd20xrnt - ok
19:20:45.0343 1892 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
19:20:45.0343 1892 Cdaudio - ok
19:20:45.0796 1892 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
19:20:45.0828 1892 Cdfs - ok
19:20:46.0265 1892 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
19:20:46.0296 1892 Cdrom - ok
19:20:46.0765 1892 Changer - ok
19:20:47.0218 1892 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
19:20:47.0218 1892 CmBatt - ok
19:20:47.0593 1892 CmdIde - ok
19:20:48.0000 1892 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
19:20:48.0015 1892 Compbatt - ok
19:20:48.0437 1892 Cpqarray - ok
19:20:48.0828 1892 dac2w2k - ok
19:20:49.0218 1892 dac960nt - ok
19:20:49.0671 1892 DgiVecp - ok
19:20:50.0109 1892 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
19:20:50.0125 1892 Disk - ok
19:20:50.0937 1892 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
19:20:51.0343 1892 dmboot - ok
19:20:51.0859 1892 DMICall (526192bf7696f72e29777bf4a180513a) C:\WINDOWS\system32\DRIVERS\DMICall.sys
19:20:51.0859 1892 DMICall - ok
19:20:52.0343 1892 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
19:20:52.0406 1892 dmio - ok
19:20:52.0812 1892 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
19:20:52.0812 1892 dmload - ok
19:20:53.0281 1892 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
19:20:53.0296 1892 DMusic - ok
19:20:53.0765 1892 dpti2o - ok
19:20:54.0203 1892 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
19:20:54.0203 1892 drmkaud - ok
19:20:54.0718 1892 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
19:20:54.0781 1892 Fastfat - ok
19:20:55.0218 1892 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
19:20:55.0234 1892 Fdc - ok
19:20:55.0640 1892 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
19:20:55.0671 1892 Fips - ok
19:20:56.0062 1892 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
19:20:56.0078 1892 Flpydisk - ok
19:20:56.0578 1892 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
19:20:56.0640 1892 FltMgr - ok
19:20:57.0171 1892 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
19:20:57.0171 1892 Fs_Rec - ok
19:20:57.0625 1892 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
19:20:57.0687 1892 Ftdisk - ok
19:20:58.0140 1892 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
19:20:58.0156 1892 Gpc - ok
19:20:58.0625 1892 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
19:20:58.0625 1892 HDAudBus - ok
19:20:59.0046 1892 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
19:20:59.0046 1892 hidusb - ok
19:20:59.0453 1892 hpn - ok
19:21:00.0015 1892 HSFHWAZL (be0a81f4337367ce94bb20e65b3d57c8) C:\WINDOWS\system32\DRIVERS\HSFHWAZL.sys
19:21:00.0109 1892 HSFHWAZL - ok
19:21:01.0015 1892 HSF_DPV (b46aa158f25ccbf03b12971b4c7f4723) C:\WINDOWS\system32\DRIVERS\HSF_DPV.sys
19:21:01.0468 1892 HSF_DPV - ok
19:21:02.0031 1892 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
19:21:02.0171 1892 HTTP - ok
19:21:02.0593 1892 i2omgmt - ok
19:21:02.0984 1892 i2omp - ok
19:21:03.0437 1892 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
19:21:03.0453 1892 i8042prt - ok
19:21:04.0484 1892 ialm (0f0194c4b635c10c3f785e4fee52d641) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
19:21:05.0015 1892 ialm - ok
19:21:05.0562 1892 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
19:21:05.0578 1892 Imapi - ok
19:21:05.0968 1892 ini910u - ok
19:21:08.0546 1892 IntcAzAudAddService (ab2fe0faa519880bd16e4a0792d633d2) C:\WINDOWS\system32\drivers\RtkHDAud.sys
19:21:10.0656 1892 IntcAzAudAddService - ok
19:21:11.0078 1892 IntelIde - ok
19:21:11.0531 1892 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
19:21:11.0562 1892 intelppm - ok
19:21:11.0984 1892 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
19:21:12.0000 1892 Ip6Fw - ok
19:21:12.0437 1892 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
19:21:12.0453 1892 IpFilterDriver - ok
19:21:12.0843 1892 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
19:21:12.0859 1892 IpInIp - ok
19:21:13.0390 1892 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
19:21:13.0468 1892 IpNat - ok
19:21:13.0890 1892 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
19:21:13.0921 1892 IPSec - ok
19:21:14.0312 1892 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
19:21:14.0328 1892 IRENUM - ok
19:21:14.0765 1892 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
19:21:14.0781 1892 isapnp - ok
19:21:15.0265 1892 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
19:21:15.0281 1892 Kbdclass - ok
19:21:15.0703 1892 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
19:21:15.0718 1892 kbdhid - ok
19:21:16.0187 1892 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
19:21:16.0265 1892 kmixer - ok
19:21:16.0703 1892 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
19:21:16.0750 1892 KSecDD - ok
19:21:17.0171 1892 lbrtfdc - ok
19:21:17.0562 1892 LHidFlt2 - ok
19:21:18.0015 1892 LHidUsb (ff683c656ac51e28afe5ccb53a4bd247) C:\WINDOWS\system32\drivers\LHidUsb.Sys
19:21:18.0046 1892 LHidUsb - ok
19:21:18.0609 1892 mdmxsdk (74f4372af97a587ecec527ec34955712) C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys
19:21:18.0609 1892 mdmxsdk - ok
19:21:19.0046 1892 MHNDRV (7f2f1d2815a6449d346fcccbc569fbd6) C:\WINDOWS\system32\DRIVERS\mhndrv.sys
19:21:19.0046 1892 MHNDRV - ok
19:21:19.0515 1892 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
19:21:19.0515 1892 mnmdd - ok
19:21:19.0937 1892 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
19:21:19.0953 1892 Modem - ok
19:21:20.0375 1892 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
19:21:20.0375 1892 Mouclass - ok
19:21:20.0796 1892 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
19:21:20.0812 1892 mouhid - ok
19:21:21.0265 1892 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
19:21:21.0281 1892 MountMgr - ok
19:21:21.0671 1892 mraid35x - ok
19:21:21.0812 1892 MREMP50 (9bd4dcb5412921864a7aacdedfbd1923) C:\PROGRA~1\COMMON~1\Motive\MREMP50.SYS
19:21:21.0828 1892 MREMP50 - ok
19:21:21.0859 1892 MREMPR5 - ok
19:21:21.0906 1892 MRENDIS5 - ok
19:21:21.0984 1892 MRESP50 (07c02c892e8e1a72d6bf35004f0e9c5e) C:\PROGRA~1\COMMON~1\Motive\MRESP50.SYS
19:21:22.0000 1892 MRESP50 - ok
19:21:22.0515 1892 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
19:21:22.0593 1892 MRxDAV - ok
19:21:23.0218 1892 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
19:21:23.0437 1892 MRxSmb - ok
19:21:23.0921 1892 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
19:21:23.0921 1892 Msfs - ok
19:21:24.0343 1892 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
19:21:24.0359 1892 MSKSSRV - ok
19:21:24.0765 1892 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
19:21:24.0765 1892 MSPCLOCK - ok
19:21:25.0187 1892 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
19:21:25.0187 1892 MSPQM - ok
19:21:25.0609 1892 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
19:21:25.0609 1892 mssmbios - ok
19:21:26.0093 1892 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
19:21:26.0140 1892 Mup - ok
19:21:26.0703 1892 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
19:21:26.0796 1892 NDIS - ok
19:21:27.0250 1892 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
19:21:27.0250 1892 NdisTapi - ok
19:21:27.0656 1892 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
19:21:27.0671 1892 Ndisuio - ok
19:21:28.0140 1892 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
19:21:28.0171 1892 NdisWan - ok
19:21:28.0609 1892 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
19:21:28.0640 1892 NDProxy - ok
19:21:29.0093 1892 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
19:21:29.0109 1892 NetBIOS - ok
19:21:29.0578 1892 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
19:21:29.0656 1892 NetBT - ok
19:21:30.0984 1892 NETw3x32 (f886500c285af271fdd33bf8ba7b32ef) C:\WINDOWS\system32\DRIVERS\NETw3x32.sys
19:21:31.0781 1892 NETw3x32 - ok
19:21:32.0312 1892 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
19:21:32.0343 1892 NIC1394 - ok
19:21:32.0765 1892 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
19:21:32.0781 1892 Npfs - ok
19:21:33.0468 1892 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
19:21:33.0734 1892 Ntfs - ok
19:21:34.0187 1892 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
19:21:34.0203 1892 Null - ok
19:21:34.0750 1892 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
19:21:34.0765 1892 NwlnkFlt - ok
19:21:35.0156 1892 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
19:21:35.0171 1892 NwlnkFwd - ok
19:21:35.0609 1892 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
19:21:35.0640 1892 ohci1394 - ok
19:21:36.0140 1892 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
19:21:36.0187 1892 Parport - ok
19:21:36.0593 1892 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
19:21:36.0593 1892 PartMgr - ok
19:21:37.0015 1892 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
19:21:37.0015 1892 ParVdm - ok
19:21:37.0468 1892 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
19:21:37.0500 1892 PCI - ok
19:21:37.0921 1892 PCIDump - ok
19:21:38.0328 1892 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
19:21:38.0328 1892 PCIIde - ok
19:21:38.0781 1892 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
19:21:38.0828 1892 Pcmcia - ok
19:21:39.0203 1892 PDCOMP - ok
19:21:39.0593 1892 PDFRAME - ok
19:21:39.0984 1892 PDRELI - ok
19:21:40.0359 1892 PDRFRAME - ok
19:21:40.0750 1892 perc2 - ok
19:21:41.0140 1892 perc2hib - ok
19:21:41.0703 1892 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
19:21:41.0734 1892 PptpMiniport - ok
19:21:42.0171 1892 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
19:21:42.0203 1892 PSched - ok
19:21:42.0656 1892 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
19:21:42.0656 1892 Ptilink - ok
19:21:43.0093 1892 PxHelp20 (d86b4a68565e444d76457f14172c875a) C:\WINDOWS\system32\Drivers\PxHelp20.sys
19:21:43.0109 1892 PxHelp20 - ok
19:21:43.0546 1892 ql1080 - ok
19:21:44.0000 1892 Ql10wnt - ok
19:21:44.0500 1892 ql12160 - ok
19:21:45.0046 1892 ql1240 - ok
19:21:45.0609 1892 ql1280 - ok
19:21:46.0187 1892 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
19:21:46.0203 1892 RasAcd - ok
19:21:46.0984 1892 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
19:21:47.0031 1892 Rasl2tp - ok
19:21:47.0812 1892 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
19:21:47.0843 1892 RasPppoe - ok
19:21:48.0390 1892 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
19:21:48.0453 1892 Raspti - ok
19:21:49.0250 1892 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
19:21:49.0390 1892 Rdbss - ok
19:21:50.0171 1892 RDID1027 (63fc892ab2a23a806df61da66e9d68ea) C:\WINDOWS\system32\Drivers\rdwm1027.sys
19:21:50.0234 1892 RDID1027 - ok
19:21:50.0937 1892 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
19:21:50.0984 1892 RDPCDD - ok
19:21:51.0765 1892 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
19:21:51.0890 1892 rdpdr - ok
19:21:52.0765 1892 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
19:21:52.0875 1892 RDPWD - ok
19:21:54.0015 1892 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
19:21:54.0046 1892 redbook - ok
19:21:54.0718 1892 RVIEG01 (93f66faea8bf047d4242ac85aada403d) C:\Program Files\Cakewalk\Shared Dxi\Roland\RVIEg01.sys
19:21:54.0828 1892 RVIEG01 - ok
19:21:55.0640 1892 s24trans (d4661148e44816b6501be8f4466d65b0) C:\WINDOWS\system32\DRIVERS\s24trans.sys
19:21:55.0687 1892 s24trans - ok
19:21:55.0953 1892 SASDIFSV - ok
19:21:55.0984 1892 SASENUM - ok
19:21:56.0031 1892 SASKUTIL - ok
19:21:56.0937 1892 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
19:21:56.0968 1892 Secdrv - ok
19:21:57.0578 1892 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
19:21:57.0656 1892 Serial - ok
19:21:58.0468 1892 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\DRIVERS\sfloppy.sys
19:21:58.0515 1892 Sfloppy - ok
19:21:59.0328 1892 Simbad - ok
19:22:00.0796 1892 SNC (be6038e0a7d2e2fe69107e41a0265831) C:\WINDOWS\system32\Drivers\SonyNC.sys
19:22:00.0796 1892 SNC - ok
19:22:02.0093 1892 Sparrow - ok
19:22:03.0687 1892 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
19:22:03.0875 1892 splitter - ok
19:22:05.0734 1892 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
19:22:05.0875 1892 sr - ok
19:22:07.0484 1892 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
19:22:08.0000 1892 Srv - ok
19:22:09.0031 1892 SSPORT - ok
19:22:10.0156 1892 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
19:22:10.0250 1892 swenum - ok
19:22:11.0484 1892 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
19:22:11.0640 1892 swmidi - ok
19:22:14.0609 1892 symc810 - ok
19:22:15.0140 1892 symc8xx - ok
19:22:15.0859 1892 symlcbrd (b226f8a4d780acdf76145b58bb791d5b) C:\WINDOWS\system32\drivers\symlcbrd.sys
19:22:15.0906 1892 symlcbrd - ok
19:22:16.0500 1892 sym_hi - ok
19:22:17.0015 1892 sym_u3 - ok
19:22:17.0625 1892 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
19:22:17.0687 1892 sysaudio - ok
19:22:19.0000 1892 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
19:22:19.0312 1892 Tcpip - ok
19:22:20.0328 1892 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
19:22:20.0468 1892 TDPIPE - ok
19:22:21.0406 1892 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
19:22:21.0546 1892 TDTCP - ok
19:22:22.0765 1892 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
19:22:22.0828 1892 TermDD - ok
19:22:24.0203 1892 ti21sony (26587ce8e6c6f16b8b4e7e2c16fa00bf) C:\WINDOWS\system32\drivers\ti21sony.sys
19:22:24.0515 1892 ti21sony - ok
19:22:25.0687 1892 TosIde - ok
19:22:26.0406 1892 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
19:22:26.0453 1892 Udfs - ok
19:22:26.0921 1892 ultra - ok
19:22:27.0609 1892 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
19:22:27.0859 1892 Update - ok
19:22:28.0671 1892 usbaudio (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys
19:22:28.0703 1892 usbaudio - ok
19:22:29.0359 1892 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
19:22:29.0375 1892 usbccgp - ok
19:22:29.0890 1892 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
19:22:29.0921 1892 usbehci - ok
19:22:30.0468 1892 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
19:22:30.0515 1892 usbhub - ok
19:22:31.0187 1892 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
19:22:31.0234 1892 usbprint - ok
19:22:31.0750 1892 usbstor (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
19:22:31.0781 1892 usbstor - ok
19:22:32.0343 1892 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
19:22:32.0359 1892 usbuhci - ok
19:22:33.0171 1892 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
19:22:33.0187 1892 VgaSave - ok
19:22:33.0625 1892 ViaIde - ok
19:22:34.0109 1892 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
19:22:34.0125 1892 VolSnap - ok
19:22:34.0828 1892 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
19:22:35.0093 1892 Wanarp - ok
19:22:35.0562 1892 WDICA - ok
19:22:36.0062 1892 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
19:22:36.0265 1892 wdmaud - ok
19:22:37.0281 1892 winachsf (317dc24899ad7a06e3430bf45f292989) C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys
19:22:37.0671 1892 winachsf - ok
19:22:38.0343 1892 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
19:22:38.0343 1892 WS2IFSL - ok
19:22:38.0953 1892 yukonwxp (228d0403f0210d6d67a9acf907597efe) C:\WINDOWS\system32\DRIVERS\yk51x86.sys
19:22:39.0062 1892 yukonwxp - ok
19:22:39.0156 1892 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
19:22:39.0515 1892 \Device\Harddisk0\DR0 - ok
19:22:39.0531 1892 MBR (0x1B8) (66d0b28c8b44e531d0c19f436252abaa) \Device\Harddisk1\DR5
19:22:39.0531 1892 \Device\Harddisk1\DR5 - ok
19:22:39.0562 1892 Boot (0x1200) (b333a5a9cbb5b999b44c9c6c68137cea) \Device\Harddisk0\DR0\Partition0
19:22:39.0562 1892 \Device\Harddisk0\DR0\Partition0 - ok
19:22:39.0578 1892 Boot (0x1200) (6792f2b5c1eb7c5ccca544c544d1be27) \Device\Harddisk1\DR5\Partition0
19:22:39.0578 1892 \Device\Harddisk1\DR5\Partition0 - ok
19:22:39.0593 1892 ============================================================
19:22:39.0593 1892 Scan finished
19:22:39.0593 1892 ============================================================
19:22:39.0625 1884 Detected object count: 0
19:22:39.0625 1884 Actual detected object count: 0
19:22:57.0500 1852 Deinitialize success





ComboFix 12-02-23.02 - Administrator 02/23/2012 19:40:36.1.2 - x86 NETWORK
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.780 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
FW: Norton Internet Worm Protection *Disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\gYUFSGBPBg.exe
c:\documents and settings\YuriLaptop\WINDOWS
C:\DSCF4388.jpg
C:\s
c:\windows\kb835221.exe
c:\windows\kb913800.exe
c:\windows\setup.exe
c:\windows\system32\18467.exe
c:\windows\system32\6334.exe
c:\windows\system32\drivers\etc\lmhosts
c:\windows\system32\system
c:\windows\system32\Thumbs.db
c:\windows\windows-kb870669-x86-enu.exe
c:\windows\windowsinstaller-kb893803-v2-x86.exe
c:\windows\windowsmedia10-kb917734-x86-enu.exe
c:\windows\windowsxp-kb307154-x86-enu.exe
c:\windows\windowsxp-kb873339-x86-enu.exe
c:\windows\windowsxp-kb884018-x86-enu.exe
c:\windows\windowsxp-kb884575-x86-enu.exe
c:\windows\windowsxp-kb885250-x86-enu.exe
c:\windows\windowsxp-kb885835-x86-enu.exe
c:\windows\windowsxp-kb885836-x86-enu.exe
c:\windows\windowsxp-kb886185-x86-enu.exe
c:\windows\windowsxp-kb887472-x86-enu.exe
c:\windows\windowsxp-kb887742-x86-enu.exe
c:\windows\windowsxp-kb888113-x86-enu.exe
c:\windows\windowsxp-kb888239-x86-enu.exe
c:\windows\windowsxp-kb888302-x86-enu.exe
c:\windows\windowsxp-kb888321-x86-enu.exe
c:\windows\windowsxp-kb890046-x86-enu.exe
c:\windows\windowsxp-kb890859-x86-enu.exe
c:\windows\windowsxp-kb891781-x86-enu.exe
c:\windows\windowsxp-kb892130-enu-x86.exe
c:\windows\WindowsXP-KB893056-x86-ENU.exe
c:\windows\windowsxp-kb893066-v2-x86-enu.exe
c:\windows\windowsxp-kb893357-v2-x86-enu.exe
c:\windows\windowsxp-kb893756-x86-enu.exe
c:\windows\windowsxp-kb894391-x86-enu.exe
c:\windows\windowsxp-kb896358-x86-enu.exe
c:\windows\windowsxp-kb896422-x86-enu.exe
c:\windows\windowsxp-kb896423-x86-enu.exe
c:\windows\windowsxp-kb896424-x86-enu.exe
c:\windows\windowsxp-kb896428-x86-enu.exe
c:\windows\windowsxp-kb896688-x86-enu.exe
c:\windows\windowsxp-kb896727-x86-enu.exe
c:\windows\windowsxp-kb899587-x86-enu.exe
c:\windows\windowsxp-kb899588-x86-enu.exe
c:\windows\windowsxp-kb899589-x86-enu.exe
c:\windows\windowsxp-kb899591-x86-enu.exe
c:\windows\windowsxp-kb900466-x86-enu.exe
c:\windows\windowsxp-kb900485-v2-x86-enu.exe
c:\windows\windowsxp-kb900725-x86-enu.exe
c:\windows\windowsxp-kb901017-x86-enu.exe
c:\windows\windowsxp-kb901214-x86-enu.exe
c:\windows\windowsxp-kb902400-x86-enu.exe
c:\windows\windowsxp-kb903235-x86-enu.exe
c:\windows\windowsxp-kb904706-x86-enu.exe
c:\windows\windowsxp-kb905414-x86-enu.exe
c:\windows\windowsxp-kb905749-x86-enu.exe
c:\windows\windowsxp-kb905915-x86-enu.exe
c:\windows\windowsxp-kb908519-x86-enu.exe
c:\windows\windowsxp-kb908531-x86-enu.exe
c:\windows\windowsxp-kb909667-x86-enu.exe
c:\windows\windowsxp-kb910437-x86-enu.exe
c:\windows\windowsxp-kb910728-x86-enu.exe
c:\windows\windowsxp-kb911280-x86-enu.exe
c:\windows\windowsxp-kb911562-x86-enu.exe
c:\windows\windowsxp-kb911567-x86-enu.exe
c:\windows\windowsxp-kb911927-x86-enu.exe
c:\windows\windowsxp-kb912919-x86-enu.exe
c:\windows\windowsxp-kb912945-x86-enu.exe
c:\windows\windowsxp-kb914388-x86-enu.exe
c:\windows\windowsxp-kb914389-x86-enu.exe
c:\windows\windowsxp-kb916281-x86-enu.exe
c:\windows\windowsxp-kb917159-x86-enu.exe
c:\windows\windowsxp-kb917344-x86-enu.exe
c:\windows\windowsxp-kb917953-x86-enu.exe
c:\windows\windowsxp-kb918439-x86-enu.exe
.
.
((((((((((((((((((((((((( Files Created from 2012-01-24 to 2012-02-24 )))))))))))))))))))))))))))))))
.
.
2012-02-23 00:55 . 2012-02-23 00:55 -------- d-----w- C:\Malwarebytes' Anti-Malware
2012-02-23 00:55 . 2011-12-10 20:24 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-18 05:22 . 2012-02-24 00:19 -------- d-----w- C:\anti malware
2012-02-18 04:57 . 2012-02-18 04:57 -------- d--h--w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2012-02-18 03:33 . 2012-02-18 03:33 -------- d--h--w- c:\documents and settings\Administrator\Application Data\U3
2012-02-18 02:18 . 2012-02-18 02:18 -------- d-----w- C:\TDSSKiller_Quarantine
2012-02-18 02:10 . 2012-02-18 02:10 -------- d--h--w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2012-02-15 00:06 . 2012-01-11 19:06 3072 -c----w- c:\windows\system32\dllcache\iacenc.dll
2012-02-15 00:06 . 2012-01-11 19:06 3072 ------w- c:\windows\system32\iacenc.dll
2012-02-11 00:10 . 2008-04-13 18:45 60032 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2012-02-11 00:10 . 2008-04-13 18:45 60032 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-01-12 16:53 . 2006-09-01 21:55 1859968 ----a-w- c:\windows\system32\win32k.sys
2011-12-19 08:13 . 2006-09-01 21:55 832512 ----a-w- c:\windows\system32\wininet.dll
2011-12-19 08:13 . 2006-09-01 21:55 1830912 ------w- c:\windows\system32\inetcpl.cpl
2011-12-19 08:13 . 2006-09-01 21:55 78336 ----a-w- c:\windows\system32\ieencode.dll
2011-12-19 08:13 . 2006-09-01 21:55 17408 ----a-w- c:\windows\system32\corpol.dll
2008-08-16 22:42 . 2008-08-16 22:42 13112 ----a-w- c:\program files\mozilla firefox\plugins\cgpcfg.dll
2008-08-16 22:42 . 2008-08-16 22:42 70456 ----a-w- c:\program files\mozilla firefox\plugins\CgpCore.dll
2008-08-16 22:42 . 2008-08-16 22:42 91448 ----a-w- c:\program files\mozilla firefox\plugins\confmgr.dll
2008-08-16 22:42 . 2008-08-16 22:42 20800 ----a-w- c:\program files\mozilla firefox\plugins\ctxlogging.dll
2008-08-16 22:43 . 2008-08-16 22:43 206136 ----a-w- c:\program files\mozilla firefox\plugins\ctxmui.dll
2008-08-16 22:42 . 2008-08-16 22:42 31032 ----a-w- c:\program files\mozilla firefox\plugins\icafile.dll
2008-08-16 22:42 . 2008-08-16 22:42 40248 ----a-w- c:\program files\mozilla firefox\plugins\icalogon.dll
2008-05-21 13:41 . 2008-05-21 13:41 479232 ----a-w- c:\program files\mozilla firefox\plugins\msvcm80.dll
2008-05-21 13:41 . 2008-05-21 13:41 548864 ----a-w- c:\program files\mozilla firefox\plugins\msvcp80.dll
2008-05-21 13:41 . 2008-05-21 13:41 626688 ----a-w- c:\program files\mozilla firefox\plugins\msvcr80.dll
2008-06-05 18:58 . 2008-06-05 18:58 648504 ----a-w- c:\program files\mozilla firefox\plugins\sslsdk_b.dll
2008-08-16 22:42 . 2008-08-16 22:42 23864 ----a-w- c:\program files\mozilla firefox\plugins\TcpPServ.dll
2012-02-02 00:16 . 2012-02-02 00:16 121816 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2006-04-05 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2006-04-05 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2006-04-05 118784]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2004-11-18 118784]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]
"SkyTel"="SkyTel.EXE" [2006-05-17 2879488]
"AzMixerSel"="c:\program files\Realtek\InstallShield\AzMixerSel.exe" [2005-08-25 53248]
"VAIO Recovery"="c:\windows\Sonysys\VAIO Recovery\PartSeal.exe" [2003-04-20 28672]
"SonyPowerCfg"="c:\program files\Sony\VAIO Power Management\SPMgr.exe" [2006-08-10 217088]
"ISBMgr.exe"="c:\program files\Sony\ISB Utility\ISBMgr.exe" [2004-02-20 32768]
"Switcher.exe"="c:\program files\Sony\Wireless Switch Setting Utility\Switcher.exe" [2006-02-14 176128]
"DISCover"="c:\program files\DISC\DISCover.exe" [2006-06-02 1077248]
"PartSeal"="c:\windows\Sonysys\VAIO Recovery\PartSeal.exe" [2003-04-20 28672]
"VAIO Update 3"="c:\program files\Sony\VAIO Update 3\VAIOUpdt.exe" [2007-05-16 551032]
"Samsung PanelMgr"="c:\windows\Samsung\PanelMgr\SSMMgr.exe" [2009-02-04 548864]
"BISA.exe"="c:\program files\Bell\Internet Service Advisor\BISA.exe" [2011-01-06 4318520]
"BellCanada_McciTrayApp"="c:\program files\BellCanada\McciTrayApp.exe" [2010-01-19 1565696]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\VESWinlogon]
2006-06-20 23:11 73728 ----a-w- c:\windows\system32\VESWinlogon.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"midi2"=rddv1027.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\aawservice]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ServicepointService]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\DISC\\DISCover.exe"=
"c:\\Program Files\\DISC\\DiscStreamHub.exe"=
"c:\\Program Files\\DISC\\myFTP.exe"=
"c:\\Program Files\\Sony\\VAIO Media 5.0\\Vc.exe"=
"c:\\Program Files\\Sony Pictures Games\\Wheel of Fortune\\Wheel of Fortune.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Sony\\Click to DVD 2\\CtoDvd.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Java\\jre6\\bin\\java.exe"=
"c:\\WINDOWS\\system32\\SUPDSvc.exe"=
"c:\\Program Files\\Bell\\Internet Service Advisor\\ServicepointService.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
.
R2 ServicepointService;ServicepointService;c:\program files\Bell\Internet Service Advisor\ServicepointService.exe [2/27/2011 8:05 PM 689464]
S1 SASDIFSV;SASDIFSV;\??\g:\super anti spyware\SASDIFSV.SYS --> g:\super anti spyware\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\g:\super anti spyware\SASKUTIL.SYS --> g:\super anti spyware\SASKUTIL.SYS [?]
S2 !SASCORE;SAS Core Service;"g:\super anti spyware\SASCORE.EXE" --> g:\super anti spyware\SASCORE.EXE [?]
S2 MSSQL$VAIO_VEDB;MSSQL$VAIO_VEDB;c:\program files\Microsoft SQL Server\MSSQL$VAIO_VEDB\Binn\sqlservr.exe -sVAIO_VEDB --> c:\program files\Microsoft SQL Server\MSSQL$VAIO_VEDB\Binn\sqlservr.exe -sVAIO_VEDB [?]
S2 SSPORT;SSPORT;\??\c:\windows\system32\Drivers\SSPORT.sys --> c:\windows\system32\Drivers\SSPORT.sys [?]
S2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [10/29/2007 9:41 PM 24652]
S3 Samsung UPD Service;Samsung UPD Service;c:\windows\system32\SUPDSvc.exe [2/23/2010 6:43 PM 127656]
S3 SASENUM;SASENUM;\??\g:\superanti\SASENUM.SYS --> g:\superanti\SASENUM.SYS [?]
S3 SQLAgent$VAIO_VEDB;SQLAgent$VAIO_VEDB;c:\program files\Microsoft SQL Server\MSSQL$VAIO_VEDB\Binn\sqlagent.EXE -i VAIO_VEDB --> c:\program files\Microsoft SQL Server\MSSQL$VAIO_VEDB\Binn\sqlagent.EXE -i VAIO_VEDB [?]
S3 ti21sony;ti21sony;c:\windows\system32\drivers\ti21sony.sys [9/1/2006 4:56 PM 226304]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.sony.com/vaiopeople
IE: &AOL Toolbar Search - c:\program files\aol\aol toolbar 3.0\resources\en-US\local\search.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.2.1
FF - ProfilePath -
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-SUPERAntiSpyware - d:\super anti\SUPERAntiSpyware.exe
HKLM-Run-gYUFSGBPBg.exe - c:\documents and settings\All Users\Application Data\gYUFSGBPBg.exe
ShellExecuteHooks-{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - d:\super anti\SASSEH.DLL
Notify-!SASWinLogon - d:\super anti\SASWINLO.DLL
AddRemove-{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1 - g:\spybot - search & destroy\unins000.exe
AddRemove-{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA} - g:\super anti spyware\Uninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-02-23 19:45
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(772)
c:\windows\system32\VESWinlogon.dll
c:\program files\Citrix\ICA Client\pnsson.dll
.
- - - - - - - > 'lsass.exe'(828)
c:\windows\system32\rddv1027.dll
.
Completion time: 2012-02-23 19:51:49
ComboFix-quarantined-files.txt 2012-02-24 00:51
.
Pre-Run: 32,860,381,184 bytes free
Post-Run: 33,441,894,400 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect
.
- - End Of File - - 63DCEA0301F1868DB022081BE8B83205





ListParts by Farbar
Ran by Administrator on 23-02-2012 at 19:55:07
Windows XP (X86)
Running From: C:\Documents and Settings\Administrator\Desktop
Language: 0409
************************************************************

========================= Memory info ======================

Percentage of memory in use: 30%
Total physical RAM: 1014.11 MB
Available physical RAM: 707.25 MB
Total Pagefile: 2444.08 MB
Available Pagefile: 2298.28 MB
Total Virtual: 2047.88 MB
Available Virtual: 2005.46 MB

======================= Partitions =========================

1 Drive c: () (Fixed) (Total:69.07 GB) (Free:31.18 GB) NTFS ==>[Drive with boot components (Windows XP)]
3 Drive g: (KINGSTON) (Removable) (Total:3.72 GB) (Free:3.69 GB) FAT32

Disk ### Status Size Free Dyn Gpt
-------- ---------- ------- ------- --- ---
Disk 0 Online 75 GB 0 B

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 OEM 5593 MB 32 KB
Partition 2 Primary 69 GB 5593 MB

Disk: 0
Partition 1
Type : 12
Hidden: Yes
Active: No

There is no volume associated with this partition.

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 C NTFS Partition 69 GB Healthy System (partition with boot components)


****** End Of Log ******

Edited by letsgetitdone, 24 February 2012 - 04:25 PM.


#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:06 AM

Posted 23 February 2012 - 11:18 PM

Hello,

Your logs look good after these next steps are done go ahead and use IE and Firefox and see how it goes.



1.
Please download and run unhide.exe.


2.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.

3.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

Things to include in your next reply::
MBAM log
Eset log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 letsgetitdone

letsgetitdone
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 24 February 2012 - 02:35 AM

Computer seems to be working fine now. No error messages. Everything appearing again in "Start" menu. Internet browsing seems to be fine - normal speed, no redirects. MBAM and ESET detected things. Awaiting further instruction. I will post the logs below in the order of MBAM and then ESET.


Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.23.05

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 7.0.5730.13
YuriLaptop :: LAPTOP [administrator]

2/23/2012 11:59:27 PM
mbam-log-2012-02-23 (23-59-27).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 191085
Time elapsed: 5 minute(s), 37 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 7
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowControlPanel (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowHelp (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowMyComputer (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowMyDocs (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowRun (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowSearch (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System|DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Documents and Settings\Administrator\Desktop\uSeRiNiT.exe (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.

(end)




C:\Documents and Settings\YuriLaptop\Application Data\Sun\Java\Deployment\cache\6.0\15\5f003dcf-6f3360fe a variant of Win32/Kryptik.AAZS trojan cleaned by deleting - quarantined
C:\Documents and Settings\YuriLaptop\Application Data\Sun\Java\Deployment\cache\6.0\55\6e300b77-5d646682 multiple threats deleted - quarantined
C:\Documents and Settings\YuriLaptop\Application Data\Sun\Java\Deployment\cache\6.0\62\5024297e-4951010f a variant of Java/Exploit.CVE-2010-4452.B trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\gYUFSGBPBg.exe.vir a variant of Win32/Kryptik.AAZS trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{98F833F7-368A-46D0-8190-E8CC52059E7E}\RP1149\A0103360.exe a variant of Win32/Kryptik.AAZS trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\17.02.2012_21.15.27\mbr0000\tdlfs0000\tsk0005.dta a variant of Win32/Olmasco.O trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\17.02.2012_21.15.27\mbr0000\tdlfs0000\tsk0011.dta a variant of Win32/Olmasco.Q trojan cleaned by deleting - quarantined

Edited by letsgetitdone, 24 February 2012 - 04:26 PM.


#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:06 AM

Posted 24 February 2012 - 12:52 PM

Hello, letsgetitdone.
Congratulations! You now appear clean! :cool:


Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".


Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.



One of the most common questions found when cleaning malware is "how did my machine get infected?"

There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.

Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.

Do not use P2P programs
Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

Practice Safe Internet
Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your computer clean and running securely:
  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.
    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your http://en.wikipedia.org/wiki/Taskbar#Screenshots '>Taskbar, right click and chose close.
  • Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.
  • Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
    Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

  • Windows XP users
    You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
  • Windows Vista users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
  • Windows 7 users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here


Keep your browser secure
Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

The latest versions of the three common browsers can be found below:

Use an AntiVirus Software
It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.
See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Use a Firewall
I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

Install an Anti-Malware program
Recommended, and free, Anti-Malware programs are Malwarebytes Anti-Malware and SuperAntiSpyware.

You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

Follow this list and your potential for being infected again will reduce dramatically.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 letsgetitdone

letsgetitdone
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 24 February 2012 - 04:21 PM

That is great.

I didn't uninstall Combofix though because it's not showing up on my desktop in normal mode, but it does show up on my desktop in safe mode. Should I still do the uninstall in safe mode?

Also, just FYI, when I started up the machine today, this message came up when I clicked on my user icon:
"Windows cannot load the user's profile but has logged you on with the default profile for the system.

DETAIL - The process cannot access the file because it is being used by another process."

When I logged in after clicking "OK", everything seemed exactly the same as how I logged in before (after we did the malware cleanup). So it doesn't seem like a problem but I wanted to let you know. I have not gotten that message since after rebooting and logging in two more times.

Edited by letsgetitdone, 24 February 2012 - 04:30 PM.


#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:06 AM

Posted 24 February 2012 - 11:58 PM

Hello,

Yes, Please go ahead and run the uninstall in safemode. Let me know how it goes.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 letsgetitdone

letsgetitdone
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 25 February 2012 - 01:26 AM

It uninstalled successfully. I also ran the OTC tool, which also seemed to go fine.

Thank you so much for your assistance through all of this.

You have helped me learn a lot. The last point in the post about updating applications like Java and Adobe Reader is something in particular I will pay attention to, since it looks like it might have been a Java vulnerability that got me here.

Thanks again. All the best to you.

#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:06 AM

Posted 25 February 2012 - 03:15 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users