Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Trojan:DOS/Alureon.E


  • This topic is locked This topic is locked
10 replies to this topic

#1 Raxter54

Raxter54

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Paris IL
  • Local time:05:24 AM

Posted 25 February 2012 - 11:37 AM

I have recently installed a new HD and installed Windows 7 Home Professional 64-bit. MSE now says that I am infected with Trojan:DOS/Alureon.E. When I run MSE it says "Security Essentials encountered the following error: Error code 0x800704ec. This program is blocked by group policy. For more information, contact your system administrator." I am getting a few redirects while doing web searches, and my computer seems to take extra time to start-up and shut down. Would really like to get this removed before something major happens.

Thanks in advance for any help you can give.


.
DDS (Ver_2011-08-26.01) - NTFSAMD64
Internet Explorer: 9.0.8112.16421
Run by Raxter at 10:24:18 on 2012-02-25
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.2046.886 [GMT -6:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {108DAC43-C256-20B7-BB05-914135DA5160}
SP: Microsoft Security Essentials *Enabled/Updated* {ABEC4DA7-E46C-2F39-81B5-AA334E5D1BDD}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
c:\Program Files\Microsoft Security Client\Antimalware\NisSrv.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskhost.exe
C:\Windows\Explorer.EXE
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\conhost.exe
C:\Windows\SysWOW64\cscript.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
mWinlogon: Userinit=userinit.exe,
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
mRun: [Malwarebytes' Anti-Malware] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
TCP: DhcpNameServer = 184.16.4.22 184.16.33.54
TCP: Interfaces\{5511F09E-B12C-4C9B-9EB4-275224720B72} : DhcpNameServer = 184.16.4.22 184.16.33.54
BHO-X64: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
mRun-x64: [Malwarebytes' Anti-Malware] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
.
================= FIREFOX ===================
.
FF - ProfilePath - C:\Users\Raxter\AppData\Roaming\Mozilla\Firefox\Profiles\wrbyh1ku.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxps://www.facebook.com/
FF - prefs.js: network.proxy.type - 0
FF - plugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll
.
============= SERVICES / DRIVERS ===============
.
R1 MpFilter;Microsoft Malware Protection Driver;C:\Windows\system32\DRIVERS\MpFilter.sys --> C:\Windows\system32\DRIVERS\MpFilter.sys [?]
R2 MBAMService;MBAMService;C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2012-2-25 652360]
R3 MBAMProtector;MBAMProtector;\??\C:\Windows\system32\drivers\mbam.sys --> C:\Windows\system32\drivers\mbam.sys [?]
R3 MpNWMon;Microsoft Malware Protection Network Driver;C:\Windows\system32\DRIVERS\MpNWMon.sys --> C:\Windows\system32\DRIVERS\MpNWMon.sys [?]
R3 NisDrv;Microsoft Network Inspection System;C:\Windows\system32\DRIVERS\NisDrvWFP.sys --> C:\Windows\system32\DRIVERS\NisDrvWFP.sys [?]
R3 NisSrv;Microsoft Network Inspection;C:\Program Files\Microsoft Security Client\Antimalware\NisSrv.exe [2011-4-27 288272]
R3 WSDPrintDevice;WSD Print Support via UMB;C:\Windows\system32\DRIVERS\WSDPrint.sys --> C:\Windows\system32\DRIVERS\WSDPrint.sys [?]
S3 TsUsbFlt;TsUsbFlt;C:\Windows\system32\drivers\tsusbflt.sys --> C:\Windows\system32\drivers\tsusbflt.sys [?]
S3 TsUsbGD;Remote Desktop Generic USB Device;C:\Windows\system32\drivers\TsUsbGD.sys --> C:\Windows\system32\drivers\TsUsbGD.sys [?]
S3 WatAdminSvc;Windows Activation Technologies Service;C:\Windows\system32\Wat\WatAdminSvc.exe --> C:\Windows\system32\Wat\WatAdminSvc.exe [?]
S4 McComponentHostService;McAfee Security Scan Component Host Service;C:\Program Files (x86)\McAfee Security Scan\2.0.181\McCHSvc.exe [2010-1-15 227232]
.
=============== Created Last 30 ================
.
2012-02-25 15:14:54 69000 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{D402416A-4571-4E90-B9D8-6AE82F666511}\offreg.dll
2012-02-25 15:07:52 -------- d-----w- C:\TDSSKiller_Quarantine
2012-02-25 13:36:46 23152 ----a-w- C:\Windows\System32\drivers\mbam.sys
2012-02-25 13:36:46 -------- d-----w- C:\Program Files (x86)\Malwarebytes' Anti-Malware
2012-02-25 13:27:07 -------- d-----w- C:\Users\Raxter\AppData\Roaming\Malwarebytes
2012-02-25 13:27:07 -------- d-----w- C:\ProgramData\Malwarebytes
2012-02-25 07:58:55 -------- d-----w- C:\Windows\pss
2012-02-25 06:18:23 902656 ----a-w- C:\Windows\System32\d2d1.dll
2012-02-25 06:18:23 1544192 ----a-w- C:\Windows\System32\DWrite.dll
2012-02-25 06:18:23 1139200 ----a-w- C:\Windows\System32\FntCache.dll
2012-02-25 06:18:23 1076736 ----a-w- C:\Windows\SysWow64\DWrite.dll
2012-02-25 06:18:22 739840 ----a-w- C:\Windows\SysWow64\d2d1.dll
2012-02-25 03:52:11 8643640 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2012-02-25 03:51:57 8643640 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{D402416A-4571-4E90-B9D8-6AE82F666511}\mpengine.dll
2012-02-25 00:52:55 472808 ----a-w- C:\Windows\SysWow64\deployJava1.dll
2012-02-25 00:28:10 -------- d-----w- C:\Windows\SysWow64\Wat
2012-02-25 00:28:10 -------- d-----w- C:\Windows\System32\Wat
2012-02-24 21:12:56 870912 ----a-w- C:\Windows\SysWow64\XpsPrint.dll
2012-02-24 21:10:55 886784 ----a-w- C:\Program Files\Common Files\System\wab32.dll
2012-02-24 21:09:46 1731920 ----a-w- C:\Windows\System32\ntdll.dll
2012-02-24 21:09:46 1292080 ----a-w- C:\Windows\SysWow64\ntdll.dll
2012-02-24 21:08:29 197120 ----a-w- C:\Windows\System32\d3d10_1.dll
2012-02-24 21:08:28 161792 ----a-w- C:\Windows\SysWow64\d3d10_1.dll
2012-02-24 21:08:26 467456 ----a-w- C:\Windows\System32\drivers\srv.sys
2012-02-24 21:08:26 410112 ----a-w- C:\Windows\System32\drivers\srv2.sys
2012-02-24 21:08:26 168448 ----a-w- C:\Windows\System32\drivers\srvnet.sys
2012-02-24 21:08:24 3145728 ----a-w- C:\Windows\System32\win32k.sys
2012-02-24 21:08:19 75776 ----a-w- C:\Windows\SysWow64\psisrndr.ax
2012-02-24 21:08:19 613888 ----a-w- C:\Windows\System32\psisdecd.dll
2012-02-24 21:08:19 465408 ----a-w- C:\Windows\SysWow64\psisdecd.dll
2012-02-24 21:08:18 108032 ----a-w- C:\Windows\System32\psisrndr.ax
2012-02-24 21:08:15 498688 ----a-w- C:\Windows\System32\drivers\afd.sys
2012-02-24 21:07:27 605552 ----a-w- C:\Windows\System32\winload.exe
2012-02-24 21:07:27 566208 ----a-w- C:\Windows\System32\winresume.efi
2012-02-24 21:07:26 642944 ----a-w- C:\Windows\System32\winload.efi
2012-02-24 21:07:26 518672 ----a-w- C:\Windows\System32\winresume.exe
2012-02-24 21:07:26 20352 ----a-w- C:\Windows\System32\kdusb.dll
2012-02-24 21:07:26 19328 ----a-w- C:\Windows\System32\kd1394.dll
2012-02-24 21:07:26 17792 ----a-w- C:\Windows\System32\kdcom.dll
2012-02-24 20:54:33 5561216 ----a-w- C:\Windows\System32\ntoskrnl.exe
2012-02-24 20:54:33 3912576 ----a-w- C:\Windows\SysWow64\ntoskrnl.exe
2012-02-24 20:54:32 3967872 ----a-w- C:\Windows\SysWow64\ntkrnlpa.exe
2012-02-24 20:53:52 77312 ----a-w- C:\Windows\System32\packager.dll
2012-02-24 20:53:52 67072 ----a-w- C:\Windows\SysWow64\packager.dll
2012-02-24 03:41:31 927800 ------w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{D6F70700-ECAA-4A61-870D-0CAADF93B3BD}\gapaengine.dll
2012-02-24 03:33:47 -------- d-----w- C:\Program Files (x86)\Microsoft Security Client
2012-02-24 03:33:38 -------- d-sh--w- C:\Windows\Installer
2012-02-24 03:33:37 -------- d-----w- C:\Program Files\Microsoft Security Client
2012-02-24 00:19:57 -------- d-----w- C:\Program Files (x86)\uTorrent
2012-02-24 00:19:08 -------- d-----w- C:\Users\Raxter\AppData\Roaming\uTorrent
2012-02-23 23:53:06 0 ----a-w- C:\Windows\ativpsrm.bin
2012-02-23 23:49:45 -------- d-----w- C:\Windows\Panther
2012-02-23 23:45:52 414368 ----a-w- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2012-02-23 23:45:41 -------- d-----w- C:\ProgramData\McAfee Security Scan
2012-02-23 23:45:39 -------- d-----w- C:\Program Files (x86)\McAfee Security Scan
2012-02-23 22:53:05 -------- d-----w- C:\Users\Raxter\AppData\Local\Mozilla
2012-02-23 22:50:58 -------- d-----w- C:\Users\Raxter\AppData\Local\ElevatedDiagnostics
2012-02-23 22:05:50 -------- d-sh--w- C:\Recovery
.
==================== Find3M ====================
.
2012-02-24 23:53:59 85504 ----a-w- C:\Windows\System32\iesetup.dll
2012-02-24 23:53:59 30720 ----a-w- C:\Windows\System32\licmgr10.dll
2012-02-24 23:53:59 1493504 ----a-w- C:\Windows\System32\inetcpl.cpl
2012-02-24 23:53:58 603648 ----a-w- C:\Windows\System32\vbscript.dll
2012-02-24 23:53:58 165888 ----a-w- C:\Windows\System32\iexpress.exe
2012-02-24 23:53:58 160256 ----a-w- C:\Windows\System32\wextract.exe
2012-01-31 12:44:20 279656 ------w- C:\Windows\System32\MpSigStub.exe
2012-01-04 10:44:20 509952 ----a-w- C:\Windows\System32\ntshrui.dll
2012-01-04 08:58:41 442880 ----a-w- C:\Windows\SysWow64\ntshrui.dll
2011-12-30 06:26:08 515584 ----a-w- C:\Windows\System32\timedate.cpl
2011-12-30 05:27:56 478720 ----a-w- C:\Windows\SysWow64\timedate.cpl
2011-12-16 08:46:06 634880 ----a-w- C:\Windows\System32\msvcrt.dll
2011-12-16 07:52:58 690688 ----a-w- C:\Windows\SysWow64\msvcrt.dll
.
============= FINISH: 10:25:18.45 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:06:24 AM

Posted 25 February 2012 - 11:46 AM

Hello Raxter54,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.
  • We need to get a little more information before we begin


1.
Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

2.
Please download Listparts64
Run the tool, click Scan and post the log (Result.txt) it makes.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 Raxter54

Raxter54
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Paris IL
  • Local time:05:24 AM

Posted 25 February 2012 - 01:52 PM

Thanks for the fast reply, Fireman4it! Here are the two log results for aswMBR and ListParts64:

aswMBR version 0.9.9.1649 Copyright© 2011 AVAST Software
Run date: 2012-02-25 12:40:46
-----------------------------
12:40:46.136 OS Version: Windows x64 6.1.7601 Service Pack 1
12:40:46.136 Number of processors: 2 586 0xF0D
12:40:46.137 ComputerName: RAXTER-PC UserName: Raxter
12:40:50.562 Initialize success
12:41:10.247 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0
12:41:10.252 Disk 0 Vendor: WDC_WD20EARX-00PASB0 51.0AB51 Size: 1907729MB BusType: 3
12:41:10.258 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP1T0L0-1
12:41:10.266 Disk 1 Vendor: ST3500320AS SD1A Size: 476940MB BusType: 3
12:41:10.297 Disk 0 MBR read successfully
12:41:10.301 Disk 0 MBR scan
12:41:10.305 Disk 0 Windows 7 default MBR code
12:41:10.309 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048
12:41:10.314 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 1907627 MB offset 206848
12:41:10.321 Disk 0 scanning C:\Windows\system32\drivers
12:41:14.662 Service scanning
12:41:24.188 Service MpNWMon C:\Windows\system32\DRIVERS\MpNWMon.sys **LOCKED** 32
12:41:30.021 Modules scanning
12:41:30.039 Disk 0 trace - called modules:
12:41:30.419 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys ataport.SYS viaide.sys PCIIDEX.SYS hal.dll atapi.sys
12:41:30.429 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80027c13b0]
12:41:30.441 3 CLASSPNP.SYS[fffff8800197e43f] -> nt!IofCallDriver -> [0xfffffa800266d520]
12:41:30.450 5 ACPI.sys[fffff88000f387a1] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-0[0xfffffa800263b060]
12:41:30.459 Scan finished successfully
12:41:49.476 Disk 0 MBR has been saved successfully to "C:\Users\Raxter\Desktop\MBR.dat"
12:41:49.552 The log file has been saved successfully to "C:\Users\Raxter\Desktop\aswMBR.txt"


ListParts by Farbar
Ran by Raxter (administrator) on 25-02-2012 at 12:42:12
Windows 7 (X64)
Running From: C:\Users\Raxter\Desktop
Language: 0409
************************************************************

========================= Memory info ======================

Percentage of memory in use: 53%
Total physical RAM: 2046.49 MB
Available physical RAM: 960.13 MB
Total Pagefile: 4092.98 MB
Available Pagefile: 2913.96 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

======================= Partitions =========================

2 Drive c: () (Fixed) (Total:1862.92 GB) (Free:1843.38 GB) NTFS
3 Drive d: (DISK3_VOL1) (Fixed) (Total:465.76 GB) (Free:369.25 GB) NTFS
5 Drive f: (GSP1RMCHPXFREO_EN_DVD) (CDROM) (Total:3.09 GB) (Free:0 GB) UDF

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 1863 GB 0 B
Disk 1 Online 465 GB 1024 KB

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 100 MB 1024 KB
Partition 2 Primary 1862 GB 101 MB

Disk: 0
Partition 1
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 System Rese NTFS Partition 100 MB Healthy System (partition with boot components)

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 C NTFS Partition 1862 GB Healthy Boot

Partitions of Disk 1:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 465 GB 31 KB

Disk: 1
Partition 1
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 4 D DISK3_VOL1 NTFS Partition 465 GB Healthy



****** End Of Log ******

#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:06:24 AM

Posted 25 February 2012 - 03:33 PM

1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not an option, Skip instead, do not choose Delete unless instructed.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
Tdsskiller log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 Raxter54

Raxter54
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Paris IL
  • Local time:05:24 AM

Posted 25 February 2012 - 04:50 PM

Here are the logs from Tdsskiller and Combofix:

15:04:00.0400 3308 TDSS rootkit removing tool 2.7.14.0 Feb 22 2012 16:54:49
15:04:01.0204 3308 ============================================================
15:04:01.0204 3308 Current date / time: 2012/02/25 15:04:01.0204
15:04:01.0204 3308 SystemInfo:
15:04:01.0204 3308
15:04:01.0205 3308 OS Version: 6.1.7601 ServicePack: 1.0
15:04:01.0205 3308 Product type: Workstation
15:04:01.0205 3308 ComputerName: RAXTER-PC
15:04:01.0205 3308 UserName: Raxter
15:04:01.0205 3308 Windows directory: C:\Windows
15:04:01.0205 3308 System windows directory: C:\Windows
15:04:01.0205 3308 Running under WOW64
15:04:01.0205 3308 Processor architecture: Intel x64
15:04:01.0205 3308 Number of processors: 2
15:04:01.0205 3308 Page size: 0x1000
15:04:01.0205 3308 Boot type: Normal boot
15:04:01.0205 3308 ============================================================
15:04:03.0088 3308 Drive \Device\Harddisk0\DR0 - Size: 0x1D1C1116000 (1863.02 Gb), SectorSize: 0x200, Cylinders: 0x3F161, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xF0, Type 'K0', Flags 0x00000040
15:04:03.0108 3308 Drive \Device\Harddisk1\DR1 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
15:04:03.0115 3308 \Device\Harddisk0\DR0:
15:04:03.0116 3308 MBR used
15:04:03.0116 3308 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x32000
15:04:03.0116 3308 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x32800, BlocksNum 0xE8DD5800
15:04:03.0116 3308 \Device\Harddisk1\DR1:
15:04:03.0116 3308 MBR used
15:04:03.0116 3308 \Device\Harddisk1\DR1\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x3A384C02
15:04:03.0228 3308 Initialize success
15:04:03.0228 3308 ============================================================
15:04:44.0186 4008 ============================================================
15:04:44.0186 4008 Scan started
15:04:44.0186 4008 Mode: Manual;
15:04:44.0186 4008 ============================================================
15:04:45.0559 4008 1394ohci (a87d604aea360176311474c87a63bb88) C:\Windows\system32\drivers\1394ohci.sys
15:04:45.0559 4008 1394ohci - ok
15:04:45.0605 4008 ACPI (d81d9e70b8a6dd14d42d7b4efa65d5f2) C:\Windows\system32\drivers\ACPI.sys
15:04:45.0605 4008 ACPI - ok
15:04:45.0637 4008 AcpiPmi (99f8e788246d495ce3794d7e7821d2ca) C:\Windows\system32\drivers\acpipmi.sys
15:04:45.0637 4008 AcpiPmi - ok
15:04:45.0683 4008 adp94xx (2f6b34b83843f0c5118b63ac634f5bf4) C:\Windows\system32\drivers\adp94xx.sys
15:04:45.0683 4008 adp94xx - ok
15:04:45.0715 4008 adpahci (597f78224ee9224ea1a13d6350ced962) C:\Windows\system32\drivers\adpahci.sys
15:04:45.0715 4008 adpahci - ok
15:04:45.0746 4008 adpu320 (e109549c90f62fb570b9540c4b148e54) C:\Windows\system32\drivers\adpu320.sys
15:04:45.0746 4008 adpu320 - ok
15:04:45.0808 4008 AFD (1c7857b62de5994a75b054a9fd4c3825) C:\Windows\system32\drivers\afd.sys
15:04:45.0824 4008 AFD - ok
15:04:45.0855 4008 aliide (5812713a477a3ad7363c7438ca2ee038) C:\Windows\system32\drivers\aliide.sys
15:04:45.0871 4008 aliide - ok
15:04:45.0871 4008 amdide (1ff8b4431c353ce385c875f194924c0c) C:\Windows\system32\drivers\amdide.sys
15:04:45.0886 4008 amdide - ok
15:04:45.0902 4008 AmdK8 (7024f087cff1833a806193ef9d22cda9) C:\Windows\system32\drivers\amdk8.sys
15:04:45.0902 4008 AmdK8 - ok
15:04:45.0917 4008 AmdPPM (1e56388b3fe0d031c44144eb8c4d6217) C:\Windows\system32\drivers\amdppm.sys
15:04:45.0933 4008 AmdPPM - ok
15:04:45.0995 4008 amdsata (d4121ae6d0c0e7e13aa221aa57ef2d49) C:\Windows\system32\drivers\amdsata.sys
15:04:45.0995 4008 amdsata - ok
15:04:46.0027 4008 amdsbs (f67f933e79241ed32ff46a4f29b5120b) C:\Windows\system32\drivers\amdsbs.sys
15:04:46.0042 4008 amdsbs - ok
15:04:46.0058 4008 amdxata (540daf1cea6094886d72126fd7c33048) C:\Windows\system32\drivers\amdxata.sys
15:04:46.0058 4008 amdxata - ok
15:04:46.0089 4008 AppID (89a69c3f2f319b43379399547526d952) C:\Windows\system32\drivers\appid.sys
15:04:46.0089 4008 AppID - ok
15:04:46.0120 4008 arc (c484f8ceb1717c540242531db7845c4e) C:\Windows\system32\drivers\arc.sys
15:04:46.0120 4008 arc - ok
15:04:46.0136 4008 arcsas (019af6924aefe7839f61c830227fe79c) C:\Windows\system32\drivers\arcsas.sys
15:04:46.0136 4008 arcsas - ok
15:04:46.0167 4008 AsyncMac (769765ce2cc62867468cea93969b2242) C:\Windows\system32\DRIVERS\asyncmac.sys
15:04:46.0167 4008 AsyncMac - ok
15:04:46.0183 4008 atapi (02062c0b390b7729edc9e69c680a6f3c) C:\Windows\system32\drivers\atapi.sys
15:04:46.0183 4008 atapi - ok
15:04:46.0385 4008 atikmdag (3efd964d52221360af0673cd61c2f4f5) C:\Windows\system32\DRIVERS\atikmdag.sys
15:04:46.0635 4008 atikmdag - ok
15:04:46.0729 4008 b06bdrv (3e5b191307609f7514148c6832bb0842) C:\Windows\system32\drivers\bxvbda.sys
15:04:46.0729 4008 b06bdrv - ok
15:04:46.0775 4008 b57nd60a (b5ace6968304a3900eeb1ebfd9622df2) C:\Windows\system32\DRIVERS\b57nd60a.sys
15:04:46.0775 4008 b57nd60a - ok
15:04:46.0791 4008 Beep (16a47ce2decc9b099349a5f840654746) C:\Windows\system32\drivers\Beep.sys
15:04:46.0807 4008 Beep - ok
15:04:46.0822 4008 blbdrive (61583ee3c3a17003c4acd0475646b4d3) C:\Windows\system32\DRIVERS\blbdrive.sys
15:04:46.0822 4008 blbdrive - ok
15:04:46.0885 4008 bowser (6c02a83164f5cc0a262f4199f0871cf5) C:\Windows\system32\DRIVERS\bowser.sys
15:04:46.0885 4008 bowser - ok
15:04:46.0900 4008 BrFiltLo (f09eee9edc320b5e1501f749fde686c8) C:\Windows\system32\drivers\BrFiltLo.sys
15:04:46.0900 4008 BrFiltLo - ok
15:04:46.0916 4008 BrFiltUp (b114d3098e9bdb8bea8b053685831be6) C:\Windows\system32\drivers\BrFiltUp.sys
15:04:46.0916 4008 BrFiltUp - ok
15:04:46.0963 4008 Brserid (43bea8d483bf1870f018e2d02e06a5bd) C:\Windows\System32\Drivers\Brserid.sys
15:04:46.0963 4008 Brserid - ok
15:04:46.0978 4008 BrSerWdm (a6eca2151b08a09caceca35c07f05b42) C:\Windows\System32\Drivers\BrSerWdm.sys
15:04:46.0978 4008 BrSerWdm - ok
15:04:46.0994 4008 BrUsbMdm (b79968002c277e869cf38bd22cd61524) C:\Windows\System32\Drivers\BrUsbMdm.sys
15:04:46.0994 4008 BrUsbMdm - ok
15:04:47.0025 4008 BrUsbSer (a87528880231c54e75ea7a44943b38bf) C:\Windows\System32\Drivers\BrUsbSer.sys
15:04:47.0025 4008 BrUsbSer - ok
15:04:47.0041 4008 BTHMODEM (9da669f11d1f894ab4eb69bf546a42e8) C:\Windows\system32\drivers\bthmodem.sys
15:04:47.0041 4008 BTHMODEM - ok
15:04:47.0072 4008 cdfs (b8bd2bb284668c84865658c77574381a) C:\Windows\system32\DRIVERS\cdfs.sys
15:04:47.0072 4008 cdfs - ok
15:04:47.0087 4008 cdrom (f036ce71586e93d94dab220d7bdf4416) C:\Windows\system32\DRIVERS\cdrom.sys
15:04:47.0103 4008 cdrom - ok
15:04:47.0119 4008 circlass (d7cd5c4e1b71fa62050515314cfb52cf) C:\Windows\system32\drivers\circlass.sys
15:04:47.0119 4008 circlass - ok
15:04:47.0181 4008 CLFS (fe1ec06f2253f691fe36217c592a0206) C:\Windows\system32\CLFS.sys
15:04:47.0181 4008 CLFS - ok
15:04:47.0212 4008 CmBatt (0840155d0bddf1190f84a663c284bd33) C:\Windows\system32\drivers\CmBatt.sys
15:04:47.0212 4008 CmBatt - ok
15:04:47.0228 4008 cmdide (e19d3f095812725d88f9001985b94edd) C:\Windows\system32\drivers\cmdide.sys
15:04:47.0228 4008 cmdide - ok
15:04:47.0275 4008 CNG (c4943b6c962e4b82197542447ad599f4) C:\Windows\system32\Drivers\cng.sys
15:04:47.0290 4008 CNG - ok
15:04:47.0306 4008 Compbatt (102de219c3f61415f964c88e9085ad14) C:\Windows\system32\drivers\compbatt.sys
15:04:47.0306 4008 Compbatt - ok
15:04:47.0321 4008 CompositeBus (03edb043586cceba243d689bdda370a8) C:\Windows\system32\DRIVERS\CompositeBus.sys
15:04:47.0321 4008 CompositeBus - ok
15:04:47.0353 4008 crcdisk (1c827878a998c18847245fe1f34ee597) C:\Windows\system32\drivers\crcdisk.sys
15:04:47.0353 4008 crcdisk - ok
15:04:47.0415 4008 DfsC (9bb2ef44eaa163b29c4a4587887a0fe4) C:\Windows\system32\Drivers\dfsc.sys
15:04:47.0415 4008 DfsC - ok
15:04:47.0431 4008 discache (13096b05847ec78f0977f2c0f79e9ab3) C:\Windows\system32\drivers\discache.sys
15:04:47.0431 4008 discache - ok
15:04:47.0446 4008 Disk (9819eee8b5ea3784ec4af3b137a5244c) C:\Windows\system32\drivers\disk.sys
15:04:47.0446 4008 Disk - ok
15:04:47.0477 4008 drmkaud (9b19f34400d24df84c858a421c205754) C:\Windows\system32\drivers\drmkaud.sys
15:04:47.0493 4008 drmkaud - ok
15:04:47.0540 4008 DXGKrnl (f5bee30450e18e6b83a5012c100616fd) C:\Windows\System32\drivers\dxgkrnl.sys
15:04:47.0555 4008 DXGKrnl - ok
15:04:47.0711 4008 ebdrv (dc5d737f51be844d8c82c695eb17372f) C:\Windows\system32\drivers\evbda.sys
15:04:47.0789 4008 ebdrv - ok
15:04:47.0883 4008 elxstor (0e5da5369a0fcaea12456dd852545184) C:\Windows\system32\drivers\elxstor.sys
15:04:47.0883 4008 elxstor - ok
15:04:47.0914 4008 ErrDev (34a3c54752046e79a126e15c51db409b) C:\Windows\system32\drivers\errdev.sys
15:04:47.0914 4008 ErrDev - ok
15:04:47.0945 4008 exfat (a510c654ec00c1e9bdd91eeb3a59823b) C:\Windows\system32\drivers\exfat.sys
15:04:47.0961 4008 exfat - ok
15:04:47.0977 4008 fastfat (0adc83218b66a6db380c330836f3e36d) C:\Windows\system32\drivers\fastfat.sys
15:04:47.0977 4008 fastfat - ok
15:04:48.0008 4008 fdc (d765d19cd8ef61f650c384f62fac00ab) C:\Windows\system32\DRIVERS\fdc.sys
15:04:48.0023 4008 fdc - ok
15:04:48.0055 4008 FETNDIS (ecce54654a19f6cc5e526696680c1827) C:\Windows\system32\DRIVERS\fet6x64.sys
15:04:48.0055 4008 FETNDIS - ok
15:04:48.0070 4008 FileInfo (655661be46b5f5f3fd454e2c3095b930) C:\Windows\system32\drivers\fileinfo.sys
15:04:48.0086 4008 FileInfo - ok
15:04:48.0101 4008 Filetrace (5f671ab5bc87eea04ec38a6cd5962a47) C:\Windows\system32\drivers\filetrace.sys
15:04:48.0101 4008 Filetrace - ok
15:04:48.0117 4008 flpydisk (c172a0f53008eaeb8ea33fe10e177af5) C:\Windows\system32\DRIVERS\flpydisk.sys
15:04:48.0133 4008 flpydisk - ok
15:04:48.0148 4008 FltMgr (da6b67270fd9db3697b20fce94950741) C:\Windows\system32\drivers\fltmgr.sys
15:04:48.0211 4008 FltMgr - ok
15:04:48.0242 4008 FsDepends (d43703496149971890703b4b1b723eac) C:\Windows\system32\drivers\FsDepends.sys
15:04:48.0257 4008 FsDepends - ok
15:04:48.0273 4008 Fs_Rec (e95ef8547de20cf0603557c0cf7a9462) C:\Windows\system32\drivers\Fs_Rec.sys
15:04:48.0273 4008 Fs_Rec - ok
15:04:48.0304 4008 fvevol (1f7b25b858fa27015169fe95e54108ed) C:\Windows\system32\DRIVERS\fvevol.sys
15:04:48.0320 4008 fvevol - ok
15:04:48.0335 4008 gagp30kx (8c778d335c9d272cfd3298ab02abe3b6) C:\Windows\system32\drivers\gagp30kx.sys
15:04:48.0351 4008 gagp30kx - ok
15:04:48.0429 4008 hcw85cir (f2523ef6460fc42405b12248338ab2f0) C:\Windows\system32\drivers\hcw85cir.sys
15:04:48.0429 4008 hcw85cir - ok
15:04:48.0460 4008 HdAudAddService (975761c778e33cd22498059b91e7373a) C:\Windows\system32\drivers\HdAudio.sys
15:04:48.0460 4008 HdAudAddService - ok
15:04:48.0491 4008 HDAudBus (97bfed39b6b79eb12cddbfeed51f56bb) C:\Windows\system32\DRIVERS\HDAudBus.sys
15:04:48.0491 4008 HDAudBus - ok
15:04:48.0507 4008 HidBatt (78e86380454a7b10a5eb255dc44a355f) C:\Windows\system32\drivers\HidBatt.sys
15:04:48.0507 4008 HidBatt - ok
15:04:48.0523 4008 HidBth (7fd2a313f7afe5c4dab14798c48dd104) C:\Windows\system32\drivers\hidbth.sys
15:04:48.0523 4008 HidBth - ok
15:04:48.0538 4008 HidIr (0a77d29f311b88cfae3b13f9c1a73825) C:\Windows\system32\drivers\hidir.sys
15:04:48.0538 4008 HidIr - ok
15:04:48.0569 4008 HidUsb (9592090a7e2b61cd582b612b6df70536) C:\Windows\system32\DRIVERS\hidusb.sys
15:04:48.0585 4008 HidUsb - ok
15:04:48.0616 4008 HpSAMD (39d2abcd392f3d8a6dce7b60ae7b8efc) C:\Windows\system32\drivers\HpSAMD.sys
15:04:48.0616 4008 HpSAMD - ok
15:04:48.0694 4008 HTTP (0ea7de1acb728dd5a369fd742d6eee28) C:\Windows\system32\drivers\HTTP.sys
15:04:48.0694 4008 HTTP - ok
15:04:48.0710 4008 hwpolicy (a5462bd6884960c9dc85ed49d34ff392) C:\Windows\system32\drivers\hwpolicy.sys
15:04:48.0725 4008 hwpolicy - ok
15:04:48.0788 4008 i8042prt (fa55c73d4affa7ee23ac4be53b4592d3) C:\Windows\system32\DRIVERS\i8042prt.sys
15:04:48.0788 4008 i8042prt - ok
15:04:48.0897 4008 iaStorV (aaaf44db3bd0b9d1fb6969b23ecc8366) C:\Windows\system32\drivers\iaStorV.sys
15:04:48.0913 4008 iaStorV - ok
15:04:48.0944 4008 iirsp (5c18831c61933628f5bb0ea2675b9d21) C:\Windows\system32\drivers\iirsp.sys
15:04:48.0944 4008 iirsp - ok
15:04:48.0975 4008 intelide (f00f20e70c6ec3aa366910083a0518aa) C:\Windows\system32\drivers\intelide.sys
15:04:48.0975 4008 intelide - ok
15:04:48.0991 4008 intelppm (ada036632c664caa754079041cf1f8c1) C:\Windows\system32\DRIVERS\intelppm.sys
15:04:48.0991 4008 intelppm - ok
15:04:49.0037 4008 IpFilterDriver (c9f0e1bd74365a8771590e9008d22ab6) C:\Windows\system32\DRIVERS\ipfltdrv.sys
15:04:49.0037 4008 IpFilterDriver - ok
15:04:49.0069 4008 IPMIDRV (0fc1aea580957aa8817b8f305d18ca3a) C:\Windows\system32\drivers\IPMIDrv.sys
15:04:49.0069 4008 IPMIDRV - ok
15:04:49.0100 4008 IPNAT (af9b39a7e7b6caa203b3862582e9f2d0) C:\Windows\system32\drivers\ipnat.sys
15:04:49.0100 4008 IPNAT - ok
15:04:49.0115 4008 IRENUM (3abf5e7213eb28966d55d58b515d5ce9) C:\Windows\system32\drivers\irenum.sys
15:04:49.0115 4008 IRENUM - ok
15:04:49.0131 4008 isapnp (2f7b28dc3e1183e5eb418df55c204f38) C:\Windows\system32\drivers\isapnp.sys
15:04:49.0131 4008 isapnp - ok
15:04:49.0193 4008 iScsiPrt (d931d7309deb2317035b07c9f9e6b0bd) C:\Windows\system32\drivers\msiscsi.sys
15:04:49.0193 4008 iScsiPrt - ok
15:04:49.0209 4008 kbdclass (bc02336f1cba7dcc7d1213bb588a68a5) C:\Windows\system32\DRIVERS\kbdclass.sys
15:04:49.0225 4008 kbdclass - ok
15:04:49.0240 4008 kbdhid (0705eff5b42a9db58548eec3b26bb484) C:\Windows\system32\DRIVERS\kbdhid.sys
15:04:49.0240 4008 kbdhid - ok
15:04:49.0303 4008 KSecDD (da1e991a61cfdd755a589e206b97644b) C:\Windows\system32\Drivers\ksecdd.sys
15:04:49.0303 4008 KSecDD - ok
15:04:49.0318 4008 KSecPkg (7e33198d956943a4f11a5474c1e9106f) C:\Windows\system32\Drivers\ksecpkg.sys
15:04:49.0334 4008 KSecPkg - ok
15:04:49.0349 4008 ksthunk (6869281e78cb31a43e969f06b57347c4) C:\Windows\system32\drivers\ksthunk.sys
15:04:49.0349 4008 ksthunk - ok
15:04:49.0396 4008 lltdio (1538831cf8ad2979a04c423779465827) C:\Windows\system32\DRIVERS\lltdio.sys
15:04:49.0412 4008 lltdio - ok
15:04:49.0443 4008 LSI_FC (1a93e54eb0ece102495a51266dcdb6a6) C:\Windows\system32\drivers\lsi_fc.sys
15:04:49.0443 4008 LSI_FC - ok
15:04:49.0474 4008 LSI_SAS (1047184a9fdc8bdbff857175875ee810) C:\Windows\system32\drivers\lsi_sas.sys
15:04:49.0474 4008 LSI_SAS - ok
15:04:49.0490 4008 LSI_SAS2 (30f5c0de1ee8b5bc9306c1f0e4a75f93) C:\Windows\system32\drivers\lsi_sas2.sys
15:04:49.0490 4008 LSI_SAS2 - ok
15:04:49.0505 4008 LSI_SCSI (0504eacaff0d3c8aed161c4b0d369d4a) C:\Windows\system32\drivers\lsi_scsi.sys
15:04:49.0505 4008 LSI_SCSI - ok
15:04:49.0537 4008 luafv (43d0f98e1d56ccddb0d5254cff7b356e) C:\Windows\system32\drivers\luafv.sys
15:04:49.0537 4008 luafv - ok
15:04:49.0646 4008 MBAMProtector (79da94b35371b9e7104460c7693dcb2c) C:\Windows\system32\drivers\mbam.sys
15:04:49.0646 4008 MBAMProtector - ok
15:04:49.0708 4008 megasas (a55805f747c6edb6a9080d7c633bd0f4) C:\Windows\system32\drivers\megasas.sys
15:04:49.0708 4008 megasas - ok
15:04:49.0724 4008 MegaSR (baf74ce0072480c3b6b7c13b2a94d6b3) C:\Windows\system32\drivers\MegaSR.sys
15:04:49.0739 4008 MegaSR - ok
15:04:49.0755 4008 Modem (800ba92f7010378b09f9ed9270f07137) C:\Windows\system32\drivers\modem.sys
15:04:49.0755 4008 Modem - ok
15:04:49.0942 4008 monitor (b03d591dc7da45ece20b3b467e6aadaa) C:\Windows\system32\DRIVERS\monitor.sys
15:04:49.0942 4008 monitor - ok
15:04:49.0958 4008 mouclass (7d27ea49f3c1f687d357e77a470aea99) C:\Windows\system32\DRIVERS\mouclass.sys
15:04:49.0973 4008 mouclass - ok
15:04:49.0989 4008 mouhid (d3bf052c40b0c4166d9fd86a4288c1e6) C:\Windows\system32\DRIVERS\mouhid.sys
15:04:49.0989 4008 mouhid - ok
15:04:50.0005 4008 mountmgr (32e7a3d591d671a6df2db515a5cbe0fa) C:\Windows\system32\drivers\mountmgr.sys
15:04:50.0005 4008 mountmgr - ok
15:04:50.0051 4008 MpFilter (c177a7ebf5e8a0b596f618870516cab8) C:\Windows\system32\DRIVERS\MpFilter.sys
15:04:50.0051 4008 MpFilter - ok
15:04:50.0083 4008 mpio (a44b420d30bd56e145d6a2bc8768ec58) C:\Windows\system32\drivers\mpio.sys
15:04:50.0083 4008 mpio - ok
15:04:50.0098 4008 MpNWMon (8fbf6b31fe8af1833d93c5913d5b4d55) C:\Windows\system32\DRIVERS\MpNWMon.sys
15:04:50.0098 4008 MpNWMon - ok
15:04:50.0129 4008 mpsdrv (6c38c9e45ae0ea2fa5e551f2ed5e978f) C:\Windows\system32\drivers\mpsdrv.sys
15:04:50.0129 4008 mpsdrv - ok
15:04:50.0145 4008 MRxDAV (dc722758b8261e1abafd31a3c0a66380) C:\Windows\system32\drivers\mrxdav.sys
15:04:50.0161 4008 MRxDAV - ok
15:04:50.0207 4008 mrxsmb (a5d9106a73dc88564c825d317cac68ac) C:\Windows\system32\DRIVERS\mrxsmb.sys
15:04:50.0207 4008 mrxsmb - ok
15:04:50.0254 4008 mrxsmb10 (d711b3c1d5f42c0c2415687be09fc163) C:\Windows\system32\DRIVERS\mrxsmb10.sys
15:04:50.0254 4008 mrxsmb10 - ok
15:04:50.0301 4008 mrxsmb20 (9423e9d355c8d303e76b8cfbd8a5c30c) C:\Windows\system32\DRIVERS\mrxsmb20.sys
15:04:50.0301 4008 mrxsmb20 - ok
15:04:50.0317 4008 msahci (c25f0bafa182cbca2dd3c851c2e75796) C:\Windows\system32\drivers\msahci.sys
15:04:50.0317 4008 msahci - ok
15:04:50.0348 4008 msdsm (db801a638d011b9633829eb6f663c900) C:\Windows\system32\drivers\msdsm.sys
15:04:50.0348 4008 msdsm - ok
15:04:50.0379 4008 Msfs (aa3fb40e17ce1388fa1bedab50ea8f96) C:\Windows\system32\drivers\Msfs.sys
15:04:50.0379 4008 Msfs - ok
15:04:50.0395 4008 mshidkmdf (f9d215a46a8b9753f61767fa72a20326) C:\Windows\System32\drivers\mshidkmdf.sys
15:04:50.0395 4008 mshidkmdf - ok
15:04:50.0410 4008 msisadrv (d916874bbd4f8b07bfb7fa9b3ccae29d) C:\Windows\system32\drivers\msisadrv.sys
15:04:50.0410 4008 msisadrv - ok
15:04:50.0473 4008 MSKSSRV (49ccf2c4fea34ffad8b1b59d49439366) C:\Windows\system32\drivers\MSKSSRV.sys
15:04:50.0473 4008 MSKSSRV - ok
15:04:50.0504 4008 MSPCLOCK (bdd71ace35a232104ddd349ee70e1ab3) C:\Windows\system32\drivers\MSPCLOCK.sys
15:04:50.0519 4008 MSPCLOCK - ok
15:04:50.0535 4008 MSPQM (4ed981241db27c3383d72092b618a1d0) C:\Windows\system32\drivers\MSPQM.sys
15:04:50.0535 4008 MSPQM - ok
15:04:50.0551 4008 MsRPC (759a9eeb0fa9ed79da1fb7d4ef78866d) C:\Windows\system32\drivers\MsRPC.sys
15:04:50.0566 4008 MsRPC - ok
15:04:50.0597 4008 mssmbios (0eed230e37515a0eaee3c2e1bc97b288) C:\Windows\system32\DRIVERS\mssmbios.sys
15:04:50.0597 4008 mssmbios - ok
15:04:50.0613 4008 MSTEE (2e66f9ecb30b4221a318c92ac2250779) C:\Windows\system32\drivers\MSTEE.sys
15:04:50.0613 4008 MSTEE - ok
15:04:50.0629 4008 MTConfig (7ea404308934e675bffde8edf0757bcd) C:\Windows\system32\drivers\MTConfig.sys
15:04:50.0629 4008 MTConfig - ok
15:04:50.0644 4008 Mup (f9a18612fd3526fe473c1bda678d61c8) C:\Windows\system32\Drivers\mup.sys
15:04:50.0660 4008 Mup - ok
15:04:50.0691 4008 NativeWifiP (1ea3749c4114db3e3161156ffffa6b33) C:\Windows\system32\DRIVERS\nwifi.sys
15:04:50.0691 4008 NativeWifiP - ok
15:04:50.0738 4008 NDIS (79b47fd40d9a817e932f9d26fac0a81c) C:\Windows\system32\drivers\ndis.sys
15:04:50.0753 4008 NDIS - ok
15:04:50.0769 4008 NdisCap (9f9a1f53aad7da4d6fef5bb73ab811ac) C:\Windows\system32\DRIVERS\ndiscap.sys
15:04:50.0769 4008 NdisCap - ok
15:04:50.0785 4008 NdisTapi (30639c932d9fef22b31268fe25a1b6e5) C:\Windows\system32\DRIVERS\ndistapi.sys
15:04:50.0785 4008 NdisTapi - ok
15:04:50.0800 4008 Ndisuio (136185f9fb2cc61e573e676aa5402356) C:\Windows\system32\DRIVERS\ndisuio.sys
15:04:50.0800 4008 Ndisuio - ok
15:04:50.0831 4008 NdisWan (53f7305169863f0a2bddc49e116c2e11) C:\Windows\system32\DRIVERS\ndiswan.sys
15:04:50.0831 4008 NdisWan - ok
15:04:50.0847 4008 NDProxy (015c0d8e0e0421b4cfd48cffe2825879) C:\Windows\system32\drivers\NDProxy.sys
15:04:50.0847 4008 NDProxy - ok
15:04:50.0878 4008 NetBIOS (86743d9f5d2b1048062b14b1d84501c4) C:\Windows\system32\DRIVERS\netbios.sys
15:04:50.0894 4008 NetBIOS - ok
15:04:50.0909 4008 NetBT (09594d1089c523423b32a4229263f068) C:\Windows\system32\DRIVERS\netbt.sys
15:04:50.0909 4008 NetBT - ok
15:04:50.0956 4008 nfrd960 (77889813be4d166cdab78ddba990da92) C:\Windows\system32\drivers\nfrd960.sys
15:04:50.0956 4008 nfrd960 - ok
15:04:50.0972 4008 NisDrv (5f7d72cbcdd025af1f38fdeee5646968) C:\Windows\system32\DRIVERS\NisDrvWFP.sys
15:04:50.0972 4008 NisDrv - ok
15:04:51.0003 4008 Npfs (1e4c4ab5c9b8dd13179bbdc75a2a01f7) C:\Windows\system32\drivers\Npfs.sys
15:04:51.0003 4008 Npfs - ok
15:04:51.0034 4008 nsiproxy (e7f5ae18af4168178a642a9247c63001) C:\Windows\system32\drivers\nsiproxy.sys
15:04:51.0034 4008 nsiproxy - ok
15:04:51.0206 4008 Ntfs (a2f74975097f52a00745f9637451fdd8) C:\Windows\system32\drivers\Ntfs.sys
15:04:51.0237 4008 Ntfs - ok
15:04:51.0268 4008 Null (9899284589f75fa8724ff3d16aed75c1) C:\Windows\system32\drivers\Null.sys
15:04:51.0268 4008 Null - ok
15:04:51.0284 4008 nvraid (0a92cb65770442ed0dc44834632f66ad) C:\Windows\system32\drivers\nvraid.sys
15:04:51.0299 4008 nvraid - ok
15:04:51.0346 4008 nvstor (dab0e87525c10052bf65f06152f37e4a) C:\Windows\system32\drivers\nvstor.sys
15:04:51.0346 4008 nvstor - ok
15:04:51.0362 4008 nv_agp (270d7cd42d6e3979f6dd0146650f0e05) C:\Windows\system32\drivers\nv_agp.sys
15:04:51.0362 4008 nv_agp - ok
15:04:51.0377 4008 ohci1394 (3589478e4b22ce21b41fa1bfc0b8b8a0) C:\Windows\system32\drivers\ohci1394.sys
15:04:51.0393 4008 ohci1394 - ok
15:04:51.0455 4008 Parport (0086431c29c35be1dbc43f52cc273887) C:\Windows\system32\DRIVERS\parport.sys
15:04:51.0455 4008 Parport - ok
15:04:51.0471 4008 partmgr (871eadac56b0a4c6512bbe32753ccf79) C:\Windows\system32\drivers\partmgr.sys
15:04:51.0471 4008 partmgr - ok
15:04:51.0502 4008 pci (94575c0571d1462a0f70bde6bd6ee6b3) C:\Windows\system32\drivers\pci.sys
15:04:51.0502 4008 pci - ok
15:04:51.0518 4008 pciide (b5b8b5ef2e5cb34df8dcf8831e3534fa) C:\Windows\system32\drivers\pciide.sys
15:04:51.0518 4008 pciide - ok
15:04:51.0533 4008 pcmcia (b2e81d4e87ce48589f98cb8c05b01f2f) C:\Windows\system32\drivers\pcmcia.sys
15:04:51.0549 4008 pcmcia - ok
15:04:51.0565 4008 pcw (d6b9c2e1a11a3a4b26a182ffef18f603) C:\Windows\system32\drivers\pcw.sys
15:04:51.0565 4008 pcw - ok
15:04:51.0596 4008 PEAUTH (68769c3356b3be5d1c732c97b9a80d6e) C:\Windows\system32\drivers\peauth.sys
15:04:51.0611 4008 PEAUTH - ok
15:04:51.0752 4008 PptpMiniport (f92a2c41117a11a00be01ca01a7fcde9) C:\Windows\system32\DRIVERS\raspptp.sys
15:04:51.0752 4008 PptpMiniport - ok
15:04:51.0783 4008 Processor (0d922e23c041efb1c3fac2a6f943c9bf) C:\Windows\system32\drivers\processr.sys
15:04:51.0799 4008 Processor - ok
15:04:51.0814 4008 Psched (0557cf5a2556bd58e26384169d72438d) C:\Windows\system32\DRIVERS\pacer.sys
15:04:51.0830 4008 Psched - ok
15:04:51.0892 4008 ql2300 (a53a15a11ebfd21077463ee2c7afeef0) C:\Windows\system32\drivers\ql2300.sys
15:04:51.0908 4008 ql2300 - ok
15:04:51.0923 4008 ql40xx (4f6d12b51de1aaeff7dc58c4d75423c8) C:\Windows\system32\drivers\ql40xx.sys
15:04:51.0939 4008 ql40xx - ok
15:04:51.0955 4008 QWAVEdrv (76707bb36430888d9ce9d705398adb6c) C:\Windows\system32\drivers\qwavedrv.sys
15:04:51.0955 4008 QWAVEdrv - ok
15:04:51.0970 4008 RasAcd (5a0da8ad5762fa2d91678a8a01311704) C:\Windows\system32\DRIVERS\rasacd.sys
15:04:51.0970 4008 RasAcd - ok
15:04:52.0001 4008 RasAgileVpn (7ecff9b22276b73f43a99a15a6094e90) C:\Windows\system32\DRIVERS\AgileVpn.sys
15:04:52.0001 4008 RasAgileVpn - ok
15:04:52.0033 4008 Rasl2tp (471815800ae33e6f1c32fb1b97c490ca) C:\Windows\system32\DRIVERS\rasl2tp.sys
15:04:52.0033 4008 Rasl2tp - ok
15:04:52.0048 4008 RasPppoe (855c9b1cd4756c5e9a2aa58a15f58c25) C:\Windows\system32\DRIVERS\raspppoe.sys
15:04:52.0048 4008 RasPppoe - ok
15:04:52.0079 4008 RasSstp (e8b1e447b008d07ff47d016c2b0eeecb) C:\Windows\system32\DRIVERS\rassstp.sys
15:04:52.0079 4008 RasSstp - ok
15:04:52.0095 4008 rdbss (77f665941019a1594d887a74f301fa2f) C:\Windows\system32\DRIVERS\rdbss.sys
15:04:52.0111 4008 rdbss - ok
15:04:52.0126 4008 rdpbus (302da2a0539f2cf54d7c6cc30c1f2d8d) C:\Windows\system32\drivers\rdpbus.sys
15:04:52.0126 4008 rdpbus - ok
15:04:52.0142 4008 RDPCDD (cea6cc257fc9b7715f1c2b4849286d24) C:\Windows\system32\DRIVERS\RDPCDD.sys
15:04:52.0142 4008 RDPCDD - ok
15:04:52.0173 4008 RDPENCDD (bb5971a4f00659529a5c44831af22365) C:\Windows\system32\drivers\rdpencdd.sys
15:04:52.0173 4008 RDPENCDD - ok
15:04:52.0189 4008 RDPREFMP (216f3fa57533d98e1f74ded70113177a) C:\Windows\system32\drivers\rdprefmp.sys
15:04:52.0189 4008 RDPREFMP - ok
15:04:52.0235 4008 RDPWD (15b66c206b5cb095bab980553f38ed23) C:\Windows\system32\drivers\RDPWD.sys
15:04:52.0235 4008 RDPWD - ok
15:04:52.0251 4008 rdyboost (34ed295fa0121c241bfef24764fc4520) C:\Windows\system32\drivers\rdyboost.sys
15:04:52.0267 4008 rdyboost - ok
15:04:52.0298 4008 rspndr (ddc86e4f8e7456261e637e3552e804ff) C:\Windows\system32\DRIVERS\rspndr.sys
15:04:52.0298 4008 rspndr - ok
15:04:52.0329 4008 sbp2port (ac03af3329579fffb455aa2daabbe22b) C:\Windows\system32\drivers\sbp2port.sys
15:04:52.0329 4008 sbp2port - ok
15:04:52.0345 4008 scfilter (253f38d0d7074c02ff8deb9836c97d2b) C:\Windows\system32\DRIVERS\scfilter.sys
15:04:52.0360 4008 scfilter - ok
15:04:52.0391 4008 secdrv (3ea8a16169c26afbeb544e0e48421186) C:\Windows\system32\drivers\secdrv.sys
15:04:52.0391 4008 secdrv - ok
15:04:52.0423 4008 Serenum (cb624c0035412af0debec78c41f5ca1b) C:\Windows\system32\DRIVERS\serenum.sys
15:04:52.0423 4008 Serenum - ok
15:04:52.0438 4008 Serial (c1d8e28b2c2adfaec4ba89e9fda69bd6) C:\Windows\system32\DRIVERS\serial.sys
15:04:52.0438 4008 Serial - ok
15:04:52.0454 4008 sermouse (1c545a7d0691cc4a027396535691c3e3) C:\Windows\system32\drivers\sermouse.sys
15:04:52.0469 4008 sermouse - ok
15:04:52.0501 4008 sffdisk (a554811bcd09279536440c964ae35bbf) C:\Windows\system32\drivers\sffdisk.sys
15:04:52.0501 4008 sffdisk - ok
15:04:52.0516 4008 sffp_mmc (ff414f0baefeba59bc6c04b3db0b87bf) C:\Windows\system32\drivers\sffp_mmc.sys
15:04:52.0516 4008 sffp_mmc - ok
15:04:52.0547 4008 sffp_sd (dd85b78243a19b59f0637dcf284da63c) C:\Windows\system32\drivers\sffp_sd.sys
15:04:52.0547 4008 sffp_sd - ok
15:04:52.0563 4008 sfloppy (a9d601643a1647211a1ee2ec4e433ff4) C:\Windows\system32\drivers\sfloppy.sys
15:04:52.0563 4008 sfloppy - ok
15:04:52.0594 4008 SiSRaid2 (843caf1e5fde1ffd5ff768f23a51e2e1) C:\Windows\system32\drivers\SiSRaid2.sys
15:04:52.0594 4008 SiSRaid2 - ok
15:04:52.0610 4008 SiSRaid4 (6a6c106d42e9ffff8b9fcb4f754f6da4) C:\Windows\system32\drivers\sisraid4.sys
15:04:52.0610 4008 SiSRaid4 - ok
15:04:52.0625 4008 Smb (548260a7b8654e024dc30bf8a7c5baa4) C:\Windows\system32\DRIVERS\smb.sys
15:04:52.0641 4008 Smb - ok
15:04:52.0657 4008 spldr (b9e31e5cacdfe584f34f730a677803f9) C:\Windows\system32\drivers\spldr.sys
15:04:52.0657 4008 spldr - ok
15:04:52.0735 4008 srv (441fba48bff01fdb9d5969ebc1838f0b) C:\Windows\system32\DRIVERS\srv.sys
15:04:52.0750 4008 srv - ok
15:04:52.0828 4008 srv2 (b4adebbf5e3677cce9651e0f01f7cc28) C:\Windows\system32\DRIVERS\srv2.sys
15:04:52.0844 4008 srv2 - ok
15:04:52.0875 4008 srvnet (27e461f0be5bff5fc737328f749538c3) C:\Windows\system32\DRIVERS\srvnet.sys
15:04:52.0875 4008 srvnet - ok
15:04:52.0906 4008 stexstor (f3817967ed533d08327dc73bc4d5542a) C:\Windows\system32\drivers\stexstor.sys
15:04:52.0906 4008 stexstor - ok
15:04:52.0953 4008 StillCam (decacb6921ded1a38642642685d77dac) C:\Windows\system32\DRIVERS\serscan.sys
15:04:52.0953 4008 StillCam - ok
15:04:52.0984 4008 swenum (d01ec09b6711a5f8e7e6564a4d0fbc90) C:\Windows\system32\DRIVERS\swenum.sys
15:04:52.0984 4008 swenum - ok
15:04:53.0093 4008 Tcpip (fc62769e7bff2896035aeed399108162) C:\Windows\system32\drivers\tcpip.sys
15:04:53.0140 4008 Tcpip - ok
15:04:53.0234 4008 TCPIP6 (fc62769e7bff2896035aeed399108162) C:\Windows\system32\DRIVERS\tcpip.sys
15:04:53.0249 4008 TCPIP6 - ok
15:04:53.0312 4008 tcpipreg (df687e3d8836bfb04fcc0615bf15a519) C:\Windows\system32\drivers\tcpipreg.sys
15:04:53.0312 4008 tcpipreg - ok
15:04:53.0327 4008 TDPIPE (3371d21011695b16333a3934340c4e7c) C:\Windows\system32\drivers\tdpipe.sys
15:04:53.0327 4008 TDPIPE - ok
15:04:53.0359 4008 TDTCP (e4245bda3190a582d55ed09e137401a9) C:\Windows\system32\drivers\tdtcp.sys
15:04:53.0359 4008 TDTCP - ok
15:04:53.0374 4008 tdx (ddad5a7ab24d8b65f8d724f5c20fd806) C:\Windows\system32\DRIVERS\tdx.sys
15:04:53.0374 4008 tdx - ok
15:04:53.0390 4008 TermDD (561e7e1f06895d78de991e01dd0fb6e5) C:\Windows\system32\DRIVERS\termdd.sys
15:04:53.0405 4008 TermDD - ok
15:04:53.0437 4008 tssecsrv (ce18b2cdfc837c99e5fae9ca6cba5d30) C:\Windows\system32\DRIVERS\tssecsrv.sys
15:04:53.0468 4008 tssecsrv - ok
15:04:53.0499 4008 TsUsbFlt (d11c783e3ef9a3c52c0ebe83cc5000e9) C:\Windows\system32\drivers\tsusbflt.sys
15:04:53.0499 4008 TsUsbFlt - ok
15:04:53.0530 4008 TsUsbGD (9cc2ccae8a84820eaecb886d477cbcb8) C:\Windows\system32\drivers\TsUsbGD.sys
15:04:53.0530 4008 TsUsbGD - ok
15:04:53.0608 4008 tunnel (3566a8daafa27af944f5d705eaa64894) C:\Windows\system32\DRIVERS\tunnel.sys
15:04:53.0608 4008 tunnel - ok
15:04:53.0624 4008 uagp35 (b4dd609bd7e282bfc683cec7eaaaad67) C:\Windows\system32\DRIVERS\uagp35.sys
15:04:53.0624 4008 uagp35 - ok
15:04:53.0655 4008 udfs (ff4232a1a64012baa1fd97c7b67df593) C:\Windows\system32\DRIVERS\udfs.sys
15:04:53.0655 4008 udfs - ok
15:04:53.0702 4008 uliagpkx (4bfe1bc28391222894cbf1e7d0e42320) C:\Windows\system32\drivers\uliagpkx.sys
15:04:53.0702 4008 uliagpkx - ok
15:04:53.0717 4008 umbus (dc54a574663a895c8763af0fa1ff7561) C:\Windows\system32\DRIVERS\umbus.sys
15:04:53.0733 4008 umbus - ok
15:04:53.0749 4008 UmPass (b2e8e8cb557b156da5493bbddcc1474d) C:\Windows\system32\drivers\umpass.sys
15:04:53.0749 4008 UmPass - ok
15:04:53.0795 4008 usbccgp (6f1a3157a1c89435352ceb543cdb359c) C:\Windows\system32\DRIVERS\usbccgp.sys
15:04:53.0795 4008 usbccgp - ok
15:04:53.0827 4008 usbcir (af0892a803fdda7492f595368e3b68e7) C:\Windows\system32\drivers\usbcir.sys
15:04:53.0827 4008 usbcir - ok
15:04:53.0858 4008 usbehci (c025055fe7b87701eb042095df1a2d7b) C:\Windows\system32\DRIVERS\usbehci.sys
15:04:53.0858 4008 usbehci - ok
15:04:53.0889 4008 usbhub (287c6c9410b111b68b52ca298f7b8c24) C:\Windows\system32\DRIVERS\usbhub.sys
15:04:53.0889 4008 usbhub - ok
15:04:53.0920 4008 usbohci (9840fc418b4cbd632d3d0a667a725c31) C:\Windows\system32\drivers\usbohci.sys
15:04:53.0920 4008 usbohci - ok
15:04:53.0936 4008 usbprint (73188f58fb384e75c4063d29413cee3d) C:\Windows\system32\drivers\usbprint.sys
15:04:53.0951 4008 usbprint - ok
15:04:53.0967 4008 USBSTOR (fed648b01349a3c8395a5169db5fb7d6) C:\Windows\system32\drivers\USBSTOR.SYS
15:04:53.0983 4008 USBSTOR - ok
15:04:54.0014 4008 usbuhci (62069a34518bcf9c1fd9e74b3f6db7cd) C:\Windows\system32\DRIVERS\usbuhci.sys
15:04:54.0014 4008 usbuhci - ok
15:04:54.0076 4008 vdrvroot (c5c876ccfc083ff3b128f933823e87bd) C:\Windows\system32\drivers\vdrvroot.sys
15:04:54.0076 4008 vdrvroot - ok
15:04:54.0092 4008 vga (da4da3f5e02943c2dc8c6ed875de68dd) C:\Windows\system32\DRIVERS\vgapnp.sys
15:04:54.0092 4008 vga - ok
15:04:54.0107 4008 VgaSave (53e92a310193cb3c03bea963de7d9cfc) C:\Windows\System32\drivers\vga.sys
15:04:54.0123 4008 VgaSave - ok
15:04:54.0139 4008 vhdmp (2ce2df28c83aeaf30084e1b1eb253cbb) C:\Windows\system32\drivers\vhdmp.sys
15:04:54.0139 4008 vhdmp - ok
15:04:54.0154 4008 viaide (e5689d93ffe4e5d66c0178761240dd54) C:\Windows\system32\drivers\viaide.sys
15:04:54.0154 4008 viaide - ok
15:04:54.0185 4008 volmgr (d2aafd421940f640b407aefaaebd91b0) C:\Windows\system32\drivers\volmgr.sys
15:04:54.0185 4008 volmgr - ok
15:04:54.0201 4008 volmgrx (a255814907c89be58b79ef2f189b843b) C:\Windows\system32\drivers\volmgrx.sys
15:04:54.0217 4008 volmgrx - ok
15:04:54.0248 4008 volsnap (0d08d2f3b3ff84e433346669b5e0f639) C:\Windows\system32\drivers\volsnap.sys
15:04:54.0248 4008 volsnap - ok
15:04:54.0279 4008 vsmraid (5e2016ea6ebaca03c04feac5f330d997) C:\Windows\system32\drivers\vsmraid.sys
15:04:54.0279 4008 vsmraid - ok
15:04:54.0310 4008 vwifibus (36d4720b72b5c5d9cb2b9c29e9df67a1) C:\Windows\System32\drivers\vwifibus.sys
15:04:54.0310 4008 vwifibus - ok
15:04:54.0326 4008 WacomPen (4e9440f4f152a7b944cb1663d3935a3e) C:\Windows\system32\drivers\wacompen.sys
15:04:54.0341 4008 WacomPen - ok
15:04:54.0357 4008 WANARP (356afd78a6ed4457169241ac3965230c) C:\Windows\system32\DRIVERS\wanarp.sys
15:04:54.0357 4008 WANARP - ok
15:04:54.0373 4008 Wanarpv6 (356afd78a6ed4457169241ac3965230c) C:\Windows\system32\DRIVERS\wanarp.sys
15:04:54.0373 4008 Wanarpv6 - ok
15:04:54.0419 4008 Wd (72889e16ff12ba0f235467d6091b17dc) C:\Windows\system32\drivers\wd.sys
15:04:54.0419 4008 Wd - ok
15:04:54.0451 4008 Wdf01000 (441bd2d7b4f98134c3a4f9fa570fd250) C:\Windows\system32\drivers\Wdf01000.sys
15:04:54.0466 4008 Wdf01000 - ok
15:04:54.0544 4008 WfpLwf (611b23304bf067451a9fdee01fbdd725) C:\Windows\system32\DRIVERS\wfplwf.sys
15:04:54.0544 4008 WfpLwf - ok
15:04:54.0575 4008 WIMMount (05ecaec3e4529a7153b3136ceb49f0ec) C:\Windows\system32\drivers\wimmount.sys
15:04:54.0575 4008 WIMMount - ok
15:04:54.0622 4008 WmiAcpi (f6ff8944478594d0e414d3f048f0d778) C:\Windows\system32\drivers\wmiacpi.sys
15:04:54.0622 4008 WmiAcpi - ok
15:04:54.0669 4008 ws2ifsl (6bcc1d7d2fd2453957c5479a32364e52) C:\Windows\system32\drivers\ws2ifsl.sys
15:04:54.0669 4008 ws2ifsl - ok
15:04:54.0716 4008 WSDPrintDevice (8d918b1db190a4d9b1753a66fa8c96e8) C:\Windows\system32\DRIVERS\WSDPrint.sys
15:04:54.0716 4008 WSDPrintDevice - ok
15:04:54.0747 4008 WudfPf (d3381dc54c34d79b22cee0d65ba91b7c) C:\Windows\system32\drivers\WudfPf.sys
15:04:54.0763 4008 WudfPf - ok
15:04:55.0402 4008 WUDFRd (cf8d590be3373029d57af80914190682) C:\Windows\system32\DRIVERS\WUDFRd.sys
15:04:55.0418 4008 WUDFRd - ok
15:04:55.0465 4008 MBR (0x1B8) (a36c5e4f47e84449ff07ed3517b43a31) \Device\Harddisk0\DR0
15:04:55.0527 4008 \Device\Harddisk0\DR0 - ok
15:04:55.0527 4008 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk1\DR1
15:04:55.0652 4008 \Device\Harddisk1\DR1 - ok
15:04:55.0667 4008 Boot (0x1200) (b093c6471bd36f7dcb0f9a080b8e1fd6) \Device\Harddisk0\DR0\Partition0
15:04:55.0667 4008 \Device\Harddisk0\DR0\Partition0 - ok
15:04:55.0683 4008 Boot (0x1200) (2d515a2e8d2a73d006a5b4f0ee291c12) \Device\Harddisk0\DR0\Partition1
15:04:55.0683 4008 \Device\Harddisk0\DR0\Partition1 - ok
15:04:55.0699 4008 Boot (0x1200) (48f97250eb4ed430abe28945a6dc7cfe) \Device\Harddisk1\DR1\Partition0
15:04:55.0699 4008 \Device\Harddisk1\DR1\Partition0 - ok
15:04:55.0699 4008 ============================================================
15:04:55.0699 4008 Scan finished
15:04:55.0699 4008 ============================================================
15:04:55.0714 3516 Detected object count: 0
15:04:55.0714 3516 Actual detected object count: 0
15:05:41.0642 3520 Deinitialize success


ComboFix 12-02-25.02 - Raxter 02/25/2012 15:12:26.1.2 - x64
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.2046.978 [GMT -6:00]
Running from: c:\users\Raxter\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {108DAC43-C256-20B7-BB05-914135DA5160}
SP: Microsoft Security Essentials *Disabled/Updated* {ABEC4DA7-E46C-2F39-81B5-AA334E5D1BDD}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2012-01-25 to 2012-02-25 )))))))))))))))))))))))))))))))
.
.
2012-02-25 21:17 . 2012-02-25 21:17 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-02-25 19:35 . 2012-02-25 19:35 -------- d-----w- c:\program files (x86)\7-Zip
2012-02-25 19:17 . 2012-02-25 19:19 -------- d-----w- c:\program files (x86)\OpenOffice.org 3
2012-02-25 19:16 . 2012-02-25 19:16 -------- d-----w- c:\program files (x86)\Common Files\Java
2012-02-25 17:19 . 2009-04-16 18:47 249856 ----a-w- c:\windows\system32\Spool\prtprocs\x64\hpfpp70w.dll
2012-02-25 17:15 . 2012-02-25 17:15 -------- d-----w- c:\program files (x86)\Common Files\HP
2012-02-25 17:15 . 2012-02-25 17:15 -------- d-----w- c:\program files (x86)\Common Files\Hewlett-Packard
2012-02-25 17:13 . 2009-04-16 18:47 136704 ----a-w- c:\windows\system32\hpf3l70w.dll
2012-02-25 17:13 . 2012-02-25 17:14 -------- d-----w- c:\program files (x86)\HP
2012-02-25 17:12 . 2012-02-25 17:12 -------- d-----w- c:\program files\HP
2012-02-25 17:12 . 2012-02-25 17:12 -------- d-----w- c:\programdata\HP
2012-02-25 17:11 . 2009-04-16 11:53 642360 ----a-w- c:\windows\system32\hpzids40.dll
2012-02-25 17:11 . 2008-10-29 00:27 551424 ----a-w- c:\windows\system32\hppldcoi.dll
2012-02-25 17:11 . 2009-04-01 06:21 881664 ----a-w- c:\windows\system32\hposwia_d02d.dll
2012-02-25 17:11 . 2009-04-01 06:21 749056 ----a-w- c:\windows\system32\hpost_d02d.dll
2012-02-25 17:11 . 2009-04-01 06:21 516096 ----a-w- c:\windows\system32\hposc_d02a.dll
2012-02-25 15:07 . 2012-02-25 15:07 -------- d-----w- C:\TDSSKiller_Quarantine
2012-02-25 13:36 . 2012-02-25 13:36 -------- d-----w- c:\program files (x86)\Malwarebytes' Anti-Malware
2012-02-25 13:36 . 2011-12-10 21:24 23152 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-25 13:27 . 2012-02-25 13:27 -------- d-----w- c:\programdata\Malwarebytes
2012-02-25 06:18 . 2011-02-19 12:05 1139200 ----a-w- c:\windows\system32\FntCache.dll
2012-02-25 06:18 . 2011-02-19 12:04 1544192 ----a-w- c:\windows\system32\DWrite.dll
2012-02-25 06:18 . 2011-02-19 12:04 902656 ----a-w- c:\windows\system32\d2d1.dll
2012-02-25 06:18 . 2011-02-19 06:30 1076736 ----a-w- c:\windows\SysWow64\DWrite.dll
2012-02-25 06:18 . 2011-02-19 06:30 739840 ----a-w- c:\windows\SysWow64\d2d1.dll
2012-02-25 03:52 . 2012-02-08 05:14 8643640 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2012-02-25 03:51 . 2012-02-08 05:14 8643640 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{D402416A-4571-4E90-B9D8-6AE82F666511}\mpengine.dll
2012-02-25 00:52 . 2012-02-25 19:16 472808 ----a-w- c:\windows\SysWow64\deployJava1.dll
2012-02-25 00:50 . 2012-02-25 00:50 -------- d-----w- c:\program files (x86)\Java
2012-02-25 00:28 . 2012-02-25 00:28 -------- d-----w- c:\windows\SysWow64\Wat
2012-02-25 00:28 . 2012-02-25 00:28 -------- d-----w- c:\windows\system32\Wat
2012-02-24 21:12 . 2011-03-12 12:08 1465344 ----a-w- c:\windows\system32\XpsPrint.dll
2012-02-24 21:10 . 2011-10-01 05:45 886784 ----a-w- c:\program files\Common Files\System\wab32.dll
2012-02-24 21:09 . 2011-11-17 06:41 1731920 ----a-w- c:\windows\system32\ntdll.dll
2012-02-24 21:09 . 2011-11-17 05:38 1292080 ----a-w- c:\windows\SysWow64\ntdll.dll
2012-02-24 21:08 . 2011-01-17 11:09 197120 ----a-w- c:\windows\system32\d3d10_1.dll
2012-02-24 21:08 . 2011-01-17 05:47 161792 ----a-w- c:\windows\SysWow64\d3d10_1.dll
2012-02-24 21:08 . 2011-04-29 03:06 467456 ----a-w- c:\windows\system32\drivers\srv.sys
2012-02-24 21:08 . 2011-04-29 03:05 410112 ----a-w- c:\windows\system32\drivers\srv2.sys
2012-02-24 21:08 . 2011-04-29 03:05 168448 ----a-w- c:\windows\system32\drivers\srvnet.sys
2012-02-24 21:08 . 2012-01-14 04:06 3145728 ----a-w- c:\windows\system32\win32k.sys
2012-02-24 21:08 . 2011-08-17 05:26 613888 ----a-w- c:\windows\system32\psisdecd.dll
2012-02-24 21:08 . 2011-08-17 04:24 465408 ----a-w- c:\windows\SysWow64\psisdecd.dll
2012-02-24 21:08 . 2011-08-17 04:19 75776 ----a-w- c:\windows\SysWow64\psisrndr.ax
2012-02-24 21:08 . 2011-08-17 05:25 108032 ----a-w- c:\windows\system32\psisrndr.ax
2012-02-24 21:08 . 2011-12-28 03:59 498688 ----a-w- c:\windows\system32\drivers\afd.sys
2012-02-24 21:07 . 2011-02-05 17:06 605552 ----a-w- c:\windows\system32\winload.exe
2012-02-24 21:07 . 2011-02-05 17:06 566208 ----a-w- c:\windows\system32\winresume.efi
2012-02-24 21:07 . 2011-02-05 17:10 642944 ----a-w- c:\windows\system32\winload.efi
2012-02-24 21:07 . 2011-02-05 17:10 20352 ----a-w- c:\windows\system32\kdusb.dll
2012-02-24 21:07 . 2011-02-05 17:10 19328 ----a-w- c:\windows\system32\kd1394.dll
2012-02-24 21:07 . 2011-02-05 17:10 17792 ----a-w- c:\windows\system32\kdcom.dll
2012-02-24 21:07 . 2011-02-05 17:06 518672 ----a-w- c:\windows\system32\winresume.exe
2012-02-24 20:54 . 2011-06-23 05:43 5561216 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-02-24 20:54 . 2011-06-23 04:33 3912576 ----a-w- c:\windows\SysWow64\ntoskrnl.exe
2012-02-24 20:54 . 2011-06-23 04:33 3967872 ----a-w- c:\windows\SysWow64\ntkrnlpa.exe
2012-02-24 20:53 . 2011-11-19 14:58 77312 ----a-w- c:\windows\system32\packager.dll
2012-02-24 20:53 . 2011-11-19 14:01 67072 ----a-w- c:\windows\SysWow64\packager.dll
2012-02-24 03:41 . 2012-02-24 03:39 927800 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{D6F70700-ECAA-4A61-870D-0CAADF93B3BD}\gapaengine.dll
2012-02-24 03:33 . 2012-02-24 03:33 -------- d-----w- c:\program files (x86)\Microsoft Security Client
2012-02-24 03:33 . 2012-02-25 19:20 -------- d-sh--w- c:\windows\Installer
2012-02-24 03:33 . 2012-02-24 03:33 -------- d-----w- c:\program files\Microsoft Security Client
2012-02-24 00:19 . 2012-02-24 00:19 -------- d-----w- c:\program files (x86)\uTorrent
2012-02-23 23:54 . 2012-02-24 00:06 -------- d-----w- c:\users\Debra
2012-02-23 23:53 . 2012-02-23 23:53 0 ----a-w- c:\windows\ativpsrm.bin
2012-02-23 23:49 . 2012-02-23 22:05 -------- d-----w- c:\windows\Panther
2012-02-23 23:45 . 2012-02-23 23:45 414368 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-02-23 23:45 . 2012-02-23 23:45 -------- d-----w- c:\windows\SysWow64\Macromed
2012-02-23 23:45 . 2012-02-23 23:45 -------- d-----w- c:\programdata\McAfee
2012-02-23 23:45 . 2012-02-23 23:45 -------- d-----w- c:\programdata\McAfee Security Scan
2012-02-23 23:45 . 2012-02-23 23:45 -------- d-----w- c:\windows\system32\Macromed
2012-02-23 23:45 . 2012-02-23 23:45 -------- d-----w- c:\program files (x86)\McAfee Security Scan
2012-02-23 22:06 . 2012-02-23 23:01 -------- d-----w- c:\users\Raxter
2012-02-23 22:05 . 2012-02-23 22:05 -------- d-----w- C:\Recovery
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-01-31 12:44 . 2010-11-21 03:27 279656 ------w- c:\windows\system32\MpSigStub.exe
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"Malwarebytes' Anti-Malware"="c:\program files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-01-13 460872]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
.
c:\users\Raxter\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OpenOffice.org 3.3.lnk - c:\program files (x86)\OpenOffice.org 3\program\quickstart.exe [2010-12-13 1198592]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
R2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2012-01-13 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [x]
R3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [x]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [x]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\Antimalware\NisSrv.exe [2011-04-27 288272]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]
R3 WSDPrintDevice;WSD Print Support via UMB;c:\windows\system32\DRIVERS\WSDPrint.sys [x]
R4 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files (x86)\McAfee Security Scan\2.0.181\McCHSvc.exe [2010-01-15 227232]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
.
--------- x86-64 -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2011-06-15 1436736]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"LoadAppInit_DLLs"=0x0
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
TCP: DhcpNameServer = 184.16.4.22 184.16.33.54
FF - ProfilePath - c:\users\Raxter\AppData\Roaming\Mozilla\Firefox\Profiles\wrbyh1ku.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxps://www.facebook.com/
FF - prefs.js: network.proxy.type - 0
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2012-02-25 15:22:19 - machine was rebooted
ComboFix-quarantined-files.txt 2012-02-25 21:22
.
Pre-Run: 1,977,900,130,304 bytes free
Post-Run: 1,977,726,820,352 bytes free
.
- - End Of File - - D041A351890A2B2A9527C59677CDFE6A


I was surprised to see that Tdsskiller reported no threats this time. The computer seems to be running fine now. I've done a few searches using both Google and Bing, and the results were normal - no redirects. Rebooting of the computer is much quicker. Do you think the threat is gone?

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:06:24 AM

Posted 25 February 2012 - 09:35 PM

I was surprised to see that Tdsskiller reported no threats this time. The computer seems to be running fine now. I've done a few searches using both Google and Bing, and the results were normal - no redirects. Rebooting of the computer is much quicker. Do you think the threat is gone?


Have you ran TdssKiller before this if so can you post the log if it found something. MSE may have been picking up things in your system restore points. We will address those later after we know your clean. Let's run a couple other scans to see if they find anything.



1.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


2.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

3.
  • Download RogueKiller on the desktop
  • Close all the running processes
  • Under Vista/Seven, right click -> Run as Administrator
  • Otherwise just double-click on RogueKiller.exe
  • When prompted, Click Scan
  • A report should open, give its content to your helper. (RKreport could also be found next to the executable)
  • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename in winlogon.exe (or winlogon.com) and try again


Things to include in your next reply::
MBAM log
Eset log
RogueKiller log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:06:24 AM

Posted 27 February 2012 - 06:28 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 3-5 days the topic will need to be closed.

Thanks for understanding :)

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#8 Raxter54

Raxter54
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Paris IL
  • Local time:05:24 AM

Posted 27 February 2012 - 08:14 PM

I am in the middle of running ESET right now, will be running Rogue Killer after that.

#9 Raxter54

Raxter54
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Paris IL
  • Local time:05:24 AM

Posted 28 February 2012 - 01:42 AM

OK - Results finally (ESET took over 5 hours to run):

Malwarebytes Anti-Malware (PRO) 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.26.04

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Raxter :: RAXTER-PC [administrator]

Protection: Disabled

2/26/2012 3:44:00 PM
mbam-log-2012-02-26 (15-44-00).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 201657
Time elapsed: 3 minute(s), 57 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Users\Raxter\Downloads\7Zip.exe (PUP.BundleInstaller.OI) -> No action taken.

(end)


ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6583
# api_version=3.0.2
# EOSSerial=988a7d1d676dac4b8408192ce9450a35
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2012-02-27 08:29:05
# local_time=2012-02-27 02:29:05 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=5893 16776574 100 94 26788916 81850239 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=303691
# found=4
# cleaned=4
# scan_time=24556
C:\Users\Raxter\Downloads\7Zip.exe a variant of Win32/Adware.OpenInstall application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
D:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\cache\6.0\19\58e27fd3-3577236b Java/TrojanDownloader.OpenStream.NBW trojan (deleted - quarantined) 00000000000000000000000000000000 C
D:\Documents and Settings\Tamtara\Application Data\Sun\Java\Deployment\cache\6.0\52\58f7d234-459bf3fb multiple threats (deleted - quarantined) 00000000000000000000000000000000 C
D:\Program Files\Microsoft Games\Mechwarrior Mercenaries\mwdmercs_sc.exe probably a variant of Win32/Spy.Agent.BCGWGTD trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6583
# api_version=3.0.2
# EOSSerial=988a7d1d676dac4b8408192ce9450a35
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2012-02-28 04:52:11
# local_time=2012-02-27 10:52:11 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=5893 16776574 100 94 26871052 81932375 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=304650
# found=0
# cleaned=0
# scan_time=15806

RogueKiller V7.2.0 [02/27/2012] by Tigzy
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/
Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User: Raxter [Admin rights]
Mode: Scan -- Date: 02/28/2012 00:34:51

¤¤¤ Bad processes: 0 ¤¤¤

¤¤¤ Registry Entries: 2 ¤¤¤
[HJ] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver: [NOT LOADED] ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: WDC WD20EARX-00PASB0 ATA Device +++++
--- User ---
[MBR] 19bf132a811ee524dc545cf7feeb7913
[BSP] 77a0187fcab36fcadb27f7dc24eefa9a : Windows 7 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 1907627 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: ST3500320AS ATA Device +++++
--- User ---
[MBR] aec64837f941faf1cf21a6def035d966
[BSP] 8cbe1111b01f6b4e33594f1d7a4ce2af : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476937 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[1].txt >>
RKreport[1].txt


Computer seems to be running great now. Your assistance has been greatly appreciated.

#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:06:24 AM

Posted 28 February 2012 - 09:08 PM

Hello, Raxter54.
Congratulations! You now appear clean! :cool:


Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".





Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.


One of the most common questions found when cleaning malware is "how did my machine get infected?"

There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.

Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.

Do not use P2P programs
Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

Practice Safe Internet
Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your computer clean and running securely:
  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.
    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your http://en.wikipedia.org/wiki/Taskbar#Screenshots '>Taskbar, right click and chose close.
  • Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.
  • Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
    Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

  • Windows XP users
    You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
  • Windows Vista users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
  • Windows 7 users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here


Keep your browser secure
Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

The latest versions of the three common browsers can be found below:

Use an AntiVirus Software
It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.
See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Use a Firewall
I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

Install an Anti-Malware program
Recommended, and free, Anti-Malware programs are Malwarebytes Anti-Malware and SuperAntiSpyware.

You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

Follow this list and your potential for being infected again will reduce dramatically.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#11 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:06:24 AM

Posted 02 March 2012 - 04:43 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users