Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirect, Svchost using near 100% CPU, Update failures


  • This topic is locked This topic is locked
19 replies to this topic

#1 Jmul

Jmul

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 27 April 2012 - 10:21 PM

Hello everyone. I'm using an HP Laptop with Windows XP. It is very old and I'm planning on upgrading, but for the time being I need it to work for the next few months. However, recently my computer's performance has plummeted to a near-unusable state.


Google searches are redirecting to a variety of sites. The ones I can remember include Happili, Scour, click.getanswers, and other hijack sites depending on the search material. Furthermore, minutes after Windows has started up, SVCHost starts using large amounts of CPU, and it gets worse the longer it runs, up to near 100% CPU usage. This taxes my computer to the point where it either lags to where it is practically frozen, I get a BSOD, or my system automatically shuts down due to overheating.

Ending the task with Task Manager does nothing; it starts again almost immediately. According to Process Explorer, the culprit is SVCHost netscvs. I have used several malware scanners including Malwarebytes and SuperAntiSpyware, but they have done nothing to solve the problems.

The malware also seems to have compromised my ability to use Windows Update. When using Automatic Updates, it seems to work, but in actuality I am downloading the same update every time. Updates also fail if I download them directly from Microsoft.com.

I am out of ideas as to what to do. Please help!


.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_31
Run by admin at 21:13:53 on 2012-04-27
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.503.43 [GMT -5:00]
.
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
svchost.exe
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {53707962-6f74-2d53-2644-206d7942484f} - Spybot-S&D IE Protection
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: {963B125B-8B21-49A2-A3A8-E37092276531} - No File
BHO: script helper for ie: {a0e8bc7d-6959-40b6-8e05-204d9768ad6e} - ReImage Browser Helper
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [SynTPStart] c:\program files\synaptics\syntp\SynTPStart.exe
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [UnlockerAssistant] "c:\program files\unlocker\UnlockerAssistant.exe"
mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
dRun: [Update] rundll32.exe "c:\documents and settings\admin\application data\microsoft\microsoft\sgpeue.dll",DllRegisterServer
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F}
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{28737BDF-49C3-488D-92D7-461C6EE1F0E5} : DhcpNameServer = 192.168.1.1
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\admin\application data\mozilla\firefox\profiles\rsnp0ui1.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/?pc=Z179&install_date=20111029
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=Z179&form=ZGAADF&install_date=20111029&q=
FF - plugin: c:\documents and settings\admin\local settings\application data\unity\webplayer\loader\npUnity3D32.dll
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\java\jre6\bin\plugin2\npdeployJava1.dll
FF - plugin: c:\program files\java\jre6\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
.
============= SERVICES / DRIVERS ===============
.
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [2012-4-1 101112]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2011-8-11 116608]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2012-4-1 654408]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-4-1 22344]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\macromed\flash\FlashPlayerUpdateService.exe [2012-4-4 253088]
S3 cpuz134;cpuz134; [x]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2012-4-27 40776]
.
=============== Created Last 30 ================
.
2012-04-27 22:11:11 208896 ----a-w- c:\windows\MBR.exe
2012-04-27 22:11:10 98816 ----a-w- c:\windows\sed.exe
2012-04-27 22:11:10 518144 ----a-w- c:\windows\SWREG.exe
2012-04-27 22:11:10 256000 ----a-w- c:\windows\PEV.exe
2012-04-27 20:54:40 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2012-04-27 16:26:27 -------- d-----w- c:\windows\system32\wbem\repository\FS
2012-04-27 16:26:27 -------- d-----w- c:\windows\system32\wbem\Repository
2012-04-27 00:41:13 -------- d-----w- c:\program files\Combined Community Codec Pack(2)
2012-04-23 22:28:01 388096 ----a-r- c:\documents and settings\admin\application data\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2012-04-23 22:28:00 -------- d-----w- c:\program files\Trend Micro
2012-04-23 19:41:27 -------- d-----w- c:\program files\Unlocker
2012-04-23 19:21:12 -------- d-----w- c:\documents and settings\admin\application data\Uniblue
2012-04-23 19:21:06 -------- dc----w- c:\documents and settings\all users\application data\{6AD8E59C-250C-4201-B5BA-56ADEF76FF46}
2012-04-23 19:21:06 -------- d-----w- c:\program files\Uniblue
2012-04-23 19:20:50 -------- d-----w- c:\documents and settings\admin\local settings\application data\PackageAware
2012-04-23 19:15:22 3584 ----a-r- c:\documents and settings\admin\application data\microsoft\installer\{121634b0-2f4b-11d3-ada3-00c04f52dd52}\Icon386ED4E3.exe
2012-04-23 19:15:21 -------- d-----w- c:\program files\Windows Installer Clean Up
2012-04-23 18:34:52 73728 ----a-w- c:\windows\system32\javacpl.cpl
2012-04-20 21:57:13 -------- d-----w- c:\documents and settings\admin\application data\AmPro
2012-04-20 21:50:01 -------- d-----w- c:\documents and settings\admin\AppData
2012-04-20 04:45:19 -------- d-----w- C:\d30af35d66ffe0e4b94424bb
2012-04-05 01:57:35 418464 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-04-04 05:53:56 182160 ----a-w- c:\program files\mozilla firefox\plugins\nppdf32.dll
2012-04-04 05:53:56 182160 ----a-w- c:\program files\internet explorer\plugins\nppdf32.dll
2012-04-01 21:28:34 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-04-01 21:28:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-04-01 18:38:54 42864 ----a-r- c:\windows\system32\SBBD.EXE
2012-04-01 18:38:54 101112 ----a-r- c:\windows\system32\drivers\SBREDrv.sys
2012-04-01 18:38:34 -------- d-----w- c:\documents and settings\all users\application data\STOPzilla!
.
==================== Find3M ====================
.
2012-04-23 18:34:15 472808 ----a-w- c:\windows\system32\deployJava1.dll
2012-04-13 18:55:42 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-02-08 22:05:20 21016 ----a-w- C:\FixitRegBackup.reg
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: HTS541060G9AT00 rev.MB3OA56J -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x82C504B1]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x82c5793c]; MOV EAX, [0x82c57ab0]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x804EE130] -> \Device\Harddisk0\DR0[0x82D1E370]
3 CLASSPNP[0xF8512FD7] -> ntkrnlpa!IofCallDriver[0x804EE130] -> \Device\00000081[0x82DD49E8]
5 ACPI[0xF8389620] -> ntkrnlpa!IofCallDriver[0x804EE130] -> [0x82D1E8E8]
\Driver\atapi[0x82CF4B48] -> IRP_MJ_CREATE -> 0x82C504B1
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x82C502E2
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
.
============= FINISH: 21:15:55.93 ===============

NOTE: For the GMER log, GMER would give me a BSOD nearly immediately after opening it. The log had to be done in Safe Mode.
Attached File  attach.txt   18.86KB   2 downloads
Attached File  ark.txt   2.47KB   1 downloads

Edited by Jmul, 27 April 2012 - 10:25 PM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:38 AM

Posted 27 April 2012 - 11:20 PM

Hello and Welcome to Bleeping Computer!!

My name is Gringo and I'll be glad to help you with your computer problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of hartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Security Check

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.



Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Jmul

Jmul
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 28 April 2012 - 09:52 AM

Thank you for helping me out.

Something I forgot to mention: if I use Task Manager to end the SVCHost net services process, some of the Internet Explorer and Start Menu graphics glitch, and I cannot change the sound volume unless I reboot.

ComboFix would not start scanning unless I ended grep.3xe and had it start up again. ComboFix deleted alot of system32 files, but I see no changes in performance.


Results of screen317's Security Check version 0.99.32
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Antivirus up to date! (On Access scanning disabled!)
```````````````````````````````
Anti-malware/Other Utilities Check:

SUPERAntiSpyware
Java™ 6 Update 31
Adobe Reader X (10.1.3)
Mozilla Firefox (11.0.)
````````````````````````````````
Process Check:
objlist.exe by Laurent

Malwarebytes' Anti-Malware mbamservice.exe
``````````End of Log````````````



ComboFix 12-04-28.01 - admin 04/28/2012 9:00.6.1 - x86
Running from: c:\documents and settings\admin\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\acelpdec.ax
c:\windows\system32\g711codc.ax
c:\windows\system32\iac25_32.ax
c:\windows\system32\ir41_32.ax
c:\windows\system32\ivfsrc.ax
c:\windows\system32\ksproxy.ax
c:\windows\system32\l3codecx.ax
c:\windows\system32\mpeg2data.ax
c:\windows\system32\mpg2splt.ax
c:\windows\system32\mpg4ds32.ax
c:\windows\system32\msadds32.ax
c:\windows\system32\msscds32.ax
c:\windows\system32\vbicodec.ax
c:\windows\system32\vbisurf.ax
c:\windows\system32\wiasf.ax
c:\windows\system32\wmv8ds32.ax
c:\windows\system32\wmvds32.ax
c:\windows\system32\wstpager.ax
c:\windows\system32\wstrenderer.ax
.
.
((((((((((((((((((((((((( Files Created from 2012-03-28 to 2012-04-28 )))))))))))))))))))))))))))))))
.
.
2012-04-27 20:54 . 2012-04-27 20:54 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2012-04-27 16:26 . 2012-04-27 16:26 -------- d-----w- c:\windows\system32\wbem\Repository
2012-04-27 00:41 . 2012-04-27 16:25 -------- d-----w- c:\program files\Combined Community Codec Pack(2)
2012-04-24 22:21 . 2012-04-24 22:21 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Temp
2012-04-23 22:28 . 2012-04-23 22:28 388096 ----a-r- c:\documents and settings\admin\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2012-04-23 22:28 . 2012-04-23 22:28 -------- d-----w- c:\program files\Trend Micro
2012-04-23 19:41 . 2012-04-23 19:41 -------- d-----w- c:\program files\Unlocker
2012-04-23 19:21 . 2012-04-23 19:21 -------- d-----w- c:\documents and settings\admin\Application Data\Uniblue
2012-04-23 19:21 . 2012-04-23 19:21 -------- dc----w- c:\documents and settings\All Users\Application Data\{6AD8E59C-250C-4201-B5BA-56ADEF76FF46}
2012-04-23 19:21 . 2012-04-23 19:21 -------- d-----w- c:\program files\Uniblue
2012-04-23 19:20 . 2012-04-23 19:20 -------- d-----w- c:\documents and settings\admin\Local Settings\Application Data\PackageAware
2012-04-23 19:15 . 2012-04-23 19:15 3584 ----a-r- c:\documents and settings\admin\Application Data\Microsoft\Installer\{121634B0-2F4B-11D3-ADA3-00C04F52DD52}\Icon386ED4E3.exe
2012-04-23 19:15 . 2012-04-23 19:15 -------- d-----w- c:\program files\Windows Installer Clean Up
2012-04-23 18:35 . 2012-04-23 18:35 -------- d-----w- c:\program files\Common Files\Java
2012-04-23 18:34 . 2012-04-23 18:34 73728 ----a-w- c:\windows\system32\javacpl.cpl
2012-04-20 22:37 . 2012-04-27 16:27 -------- d-----w- c:\documents and settings\Administrator.OWNER.003
2012-04-20 21:57 . 2012-04-20 21:57 -------- d-----w- c:\documents and settings\admin\Application Data\AmPro
2012-04-20 21:50 . 2012-04-20 21:50 -------- d-----w- c:\documents and settings\admin\AppData
2012-04-20 21:31 . 2012-04-20 21:34 -------- d-s---w- c:\documents and settings\Administrator.OWNER.002
2012-04-20 14:17 . 2012-04-20 21:46 -------- d-s---w- c:\documents and settings\Administrator.OWNER.001
2012-04-20 04:45 . 2012-04-20 22:02 -------- d-----w- C:\d30af35d66ffe0e4b94424bb
2012-04-06 01:31 . 2012-04-20 21:50 -------- d-----w- c:\program files\Apple Software Update
2012-04-05 01:57 . 2012-04-13 18:55 418464 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-04-04 05:53 . 2012-04-04 05:53 182160 ----a-w- c:\program files\Mozilla Firefox\plugins\nppdf32.dll
2012-04-04 05:53 . 2012-04-04 05:53 182160 ----a-w- c:\program files\Internet Explorer\Plugins\nppdf32.dll
2012-04-01 21:28 . 2012-04-04 20:56 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-04-01 21:28 . 2012-04-20 21:55 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-04-01 18:38 . 2012-01-19 15:22 42864 ----a-r- c:\windows\system32\SBBD.EXE
2012-04-01 18:38 . 2012-01-12 14:26 101112 ----a-r- c:\windows\system32\drivers\SBREDrv.sys
2012-04-01 18:38 . 2012-04-01 22:44 -------- d-----w- c:\documents and settings\All Users\Application Data\STOPzilla!
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-04-23 18:34 . 2010-09-03 01:28 472808 ----a-w- c:\windows\system32\deployJava1.dll
2012-04-13 18:55 . 2011-05-17 20:59 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-02-08 22:05 . 2012-02-08 22:05 21016 ----a-w- C:\FixitRegBackup.reg
2012-04-12 16:58 . 2012-04-12 16:58 97208 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
Cryptography Services Error !!
.
((((((((((((((((((((((((((((( SnapShot_2012-04-24_02.01.02 )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-04-28 14:22 . 2012-04-28 14:22 16384 c:\windows\temp\Perflib_Perfdata_548.dat
+ 2010-07-18 02:13 . 2012-04-27 16:29 300472 c:\windows\system32\Restore\rstrlog.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-04-27 3905920]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-01-13 131072]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-01-13 163840]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-01-13 135168]
"AGRSMMSG"="AGRSMMSG.exe" [2005-11-16 88209]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-09-15 102400]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
"UnlockerAssistant"="c:\program files\Unlocker\UnlockerAssistant.exe" [2010-07-04 17408]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-04-04 462408]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
"Update"="c:\documents and settings\admin\Application Data\Microsoft\Microsoft\sgpeue.dll" [BU]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=c:\windows\pss\Windows Search.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2012-01-03 07:37 843712 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe [BU]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IMJPMIG8.1]
2008-04-14 12:00 208952 ----a-w- c:\windows\ime\imjp8_1\imjpmig.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-04-28 20:06 142120 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes' Anti-Malware]
2012-04-04 20:56 462408 ----a-w- c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 15:50 155648 ----a-w- c:\windows\system32\NeroCheck.exe
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\Steam\\Steam.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\ultimate doom\\ultimate.bat"=
"c:\\Program Files\\mIRC\\mirc.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\wolfenstein 3d\\Wolf3d.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M1 - Spear of Destiny.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M2 - Return to Danger.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M3 - Ultimate Challenge.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\doom 2\\doom2 + mouse.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\doom 2\\doom2.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\wolfenstein 3d\\base\\dosbox.exe"=
"c:\\Documents and Settings\\admin\\Desktop\\ffdshow-rev3072_20090912\\MM8BDM-v2c\\skulltag.exe"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 11:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 4:55 PM 67664]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [4/1/2012 1:38 PM 101112]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [8/11/2011 6:38 PM 116608]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [4/1/2012 4:28 PM 654408]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [4/1/2012 4:28 PM 22344]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [4/4/2012 8:57 PM 253088]
S3 cpuz134;cpuz134; [x]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [4/27/2012 3:54 PM 40776]
.
Contents of the 'Scheduled Tasks' folder
.
2012-04-27 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-05 18:55]
.
2012-04-27 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 22:57]
.
2012-04-23 c:\windows\Tasks\RegistryBooster.job
- c:\program files\Uniblue\RegistryBooster\rbmonitor.exe [2012-04-23 18:56]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\documents and settings\admin\Application Data\Mozilla\Firefox\Profiles\rsnp0ui1.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/?pc=Z179&install_date=20111029
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=Z179&form=ZGAADF&install_date=20111029&q=
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-04-28 09:23
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: HTS541060G9AT00 rev.MB3OA56J -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
.
device: opened successfully
user: MBR read successfully
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x82C4E2E2
user & kernel MBR OK
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(884)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
- - - - - - - > 'explorer.exe'(2416)
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\AGRSMMSG.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Synaptics\SynTP\SynTPEnh.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\taskmgr.exe
.
**************************************************************************
.
Completion time: 2012-04-28 09:44:02 - machine was rebooted
ComboFix-quarantined-files.txt 2012-04-28 14:43
ComboFix2.txt 2012-04-27 22:57
ComboFix3.txt 2012-04-24 02:09
ComboFix4.txt 2012-04-23 04:08
ComboFix5.txt 2012-04-28 13:38
.
Pre-Run: 33,905,655,808 bytes free
Post-Run: 33,980,157,952 bytes free
.
- - End Of File - - C2933F7F61A1B8C371ADA00DD9164E94

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:38 AM

Posted 28 April 2012 - 10:53 AM

Greetings

I want you to run these next,

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and aswMBR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Jmul

Jmul
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 28 April 2012 - 02:54 PM

Here are the latest logs:

14:24:45.0750 3628 TDSS rootkit removing tool 2.7.33.0 Apr 24 2012 18:43:43
14:24:46.0171 3628 ============================================================
14:24:46.0171 3628 Current date / time: 2012/04/28 14:24:46.0171
14:24:46.0171 3628 SystemInfo:
14:24:46.0171 3628
14:24:46.0171 3628 OS Version: 5.1.2600 ServicePack: 3.0
14:24:46.0171 3628 Product type: Workstation
14:24:46.0171 3628 ComputerName: OWNER
14:24:46.0171 3628 UserName: admin
14:24:46.0171 3628 Windows directory: C:\WINDOWS
14:24:46.0171 3628 System windows directory: C:\WINDOWS
14:24:46.0171 3628 Processor architecture: Intel x86
14:24:46.0171 3628 Number of processors: 1
14:24:46.0171 3628 Page size: 0x1000
14:24:46.0171 3628 Boot type: Normal boot
14:24:46.0171 3628 ============================================================
14:24:50.0671 3628 Drive \Device\Harddisk0\DR0 - Size: 0xDF8F90000 (55.89 Gb), SectorSize: 0x200, Cylinders: 0x1E48, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xF0, Type 'K0', Flags 0x00000054
14:24:50.0703 3628 ============================================================
14:24:50.0703 3628 \Device\Harddisk0\DR0:
14:24:50.0703 3628 MBR partitions:
14:24:50.0703 3628 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x6FC4131
14:24:50.0703 3628 ============================================================
14:24:50.0765 3628 C: <-> \Device\Harddisk0\DR0\Partition0
14:24:50.0812 3628 ============================================================
14:24:50.0812 3628 Initialize success
14:24:50.0812 3628 ============================================================
14:24:58.0937 2604 ============================================================
14:24:58.0937 2604 Scan started
14:24:58.0937 2604 Mode: Manual;
14:24:58.0937 2604 ============================================================
14:24:59.0343 2604 !SASCORE (c0393eb99a6c72c6bef9bfc4a72b33a6) C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
14:24:59.0343 2604 !SASCORE - ok
14:24:59.0468 2604 Abiosdsk - ok
14:24:59.0468 2604 abp480n5 - ok
14:24:59.0531 2604 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
14:24:59.0531 2604 ACPI - ok
14:24:59.0562 2604 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
14:24:59.0562 2604 ACPIEC - ok
14:24:59.0734 2604 AdobeFlashPlayerUpdateSvc (459ac130c6ab892b1cd5d7544626efc5) C:\WINDOWS\system32\Macromed\Flash\FlashPlayerUpdateService.exe
14:24:59.0734 2604 AdobeFlashPlayerUpdateSvc - ok
14:24:59.0750 2604 adpu160m - ok
14:24:59.0828 2604 aeaudio (ad707942e4ccb28d77cee5ed989c9e55) C:\WINDOWS\system32\drivers\aeaudio.sys
14:24:59.0828 2604 aeaudio - ok
14:24:59.0859 2604 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
14:24:59.0859 2604 aec - ok
14:24:59.0921 2604 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
14:24:59.0921 2604 AFD - ok
14:25:00.0015 2604 AgereSoftModem (029e01cb2938bec5af31bf47b6af0159) C:\WINDOWS\system32\DRIVERS\AGRSM.sys
14:25:00.0046 2604 AgereSoftModem - ok
14:25:00.0046 2604 Aha154x - ok
14:25:00.0062 2604 aic78u2 - ok
14:25:00.0062 2604 aic78xx - ok
14:25:00.0093 2604 Alerter (a9a3daa780ca6c9671a19d52456705b4) C:\WINDOWS\system32\alrsvc.dll
14:25:00.0093 2604 Alerter - ok
14:25:00.0125 2604 ALG (8c515081584a38aa007909cd02020b3d) C:\WINDOWS\System32\alg.exe
14:25:00.0125 2604 ALG - ok
14:25:00.0140 2604 AliIde - ok
14:25:00.0140 2604 amsint - ok
14:25:00.0234 2604 Apple Mobile Device (d503df3aba595f551b98b9bae017a271) C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
14:25:00.0234 2604 Apple Mobile Device - ok
14:25:00.0281 2604 AppMgmt (d8849f77c0b66226335a59d26cb4edc6) C:\WINDOWS\System32\appmgmts.dll
14:25:00.0281 2604 AppMgmt - ok
14:25:00.0312 2604 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
14:25:00.0312 2604 Arp1394 - ok
14:25:00.0328 2604 asc - ok
14:25:00.0328 2604 asc3350p - ok
14:25:00.0328 2604 asc3550 - ok
14:25:00.0484 2604 aspnet_state (0e5e4957549056e2bf2c49f4f6b601ad) C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe
14:25:00.0484 2604 aspnet_state - ok
14:25:00.0500 2604 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
14:25:00.0500 2604 AsyncMac - ok
14:25:00.0562 2604 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
14:25:00.0562 2604 atapi - ok
14:25:00.0578 2604 Atdisk - ok
14:25:00.0640 2604 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
14:25:00.0640 2604 Atmarpc - ok
14:25:00.0921 2604 AudioSrv (def7a7882bec100fe0b2ce2549188f9d) C:\WINDOWS\System32\audiosrv.dll
14:25:00.0921 2604 AudioSrv - ok
14:25:00.0968 2604 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
14:25:00.0968 2604 audstub - ok
14:25:01.0031 2604 bcm4sbxp (78123f44be9e4768852a3a017e02d637) C:\WINDOWS\system32\DRIVERS\bcm4sbxp.sys
14:25:01.0031 2604 bcm4sbxp - ok
14:25:01.0078 2604 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
14:25:01.0078 2604 Beep - ok
14:25:01.0140 2604 BITS (574738f61fca2935f5265dc4e5691314) C:\WINDOWS\system32\qmgr.dll
14:25:01.0234 2604 BITS - ok
14:25:01.0265 2604 Browser (a06ce3399d16db864f55faeb1f1927a9) C:\WINDOWS\System32\browser.dll
14:25:01.0265 2604 Browser - ok
14:25:01.0281 2604 catchme - ok
14:25:01.0343 2604 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
14:25:01.0343 2604 cbidf2k - ok
14:25:01.0343 2604 cd20xrnt - ok
14:25:01.0375 2604 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
14:25:01.0375 2604 Cdaudio - ok
14:25:01.0390 2604 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
14:25:01.0406 2604 Cdfs - ok
14:25:01.0421 2604 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
14:25:01.0453 2604 Cdrom - ok
14:25:01.0453 2604 Changer - ok
14:25:01.0468 2604 CiSvc (1cfe720eb8d93a7158a4ebc3ab178bde) C:\WINDOWS\system32\cisvc.exe
14:25:01.0468 2604 CiSvc - ok
14:25:01.0500 2604 ClipSrv (34cbe729f38138217f9c80212a2a0c82) C:\WINDOWS\system32\clipsrv.exe
14:25:01.0500 2604 ClipSrv - ok
14:25:01.0546 2604 clr_optimization_v2.0.50727_32 (d87acaed61e417bba546ced5e7e36d9c) c:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
14:25:01.0562 2604 clr_optimization_v2.0.50727_32 - ok
14:25:01.0625 2604 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
14:25:01.0625 2604 CmBatt - ok
14:25:01.0625 2604 CmdIde - ok
14:25:01.0640 2604 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
14:25:01.0640 2604 Compbatt - ok
14:25:01.0656 2604 COMSysApp - ok
14:25:01.0656 2604 Cpqarray - ok
14:25:01.0687 2604 cpuz134 - ok
14:25:01.0703 2604 CryptSvc (3d4e199942e29207970e04315d02ad3b) C:\WINDOWS\System32\cryptsvc.dll
14:25:01.0703 2604 CryptSvc - ok
14:25:01.0718 2604 dac2w2k - ok
14:25:01.0718 2604 dac960nt - ok
14:25:01.0812 2604 DcomLaunch (6b27a5c03dfb94b4245739065431322c) C:\WINDOWS\system32\rpcss.dll
14:25:01.0828 2604 DcomLaunch - ok
14:25:01.0843 2604 Dhcp (5e38d7684a49cacfb752b046357e0589) C:\WINDOWS\System32\dhcpcsvc.dll
14:25:01.0843 2604 Dhcp - ok
14:25:01.0859 2604 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
14:25:01.0859 2604 Disk - ok
14:25:01.0859 2604 dmadmin - ok
14:25:01.0953 2604 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
14:25:02.0015 2604 dmboot - ok
14:25:02.0078 2604 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
14:25:02.0093 2604 dmio - ok
14:25:02.0125 2604 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
14:25:02.0125 2604 dmload - ok
14:25:02.0140 2604 dmserver (57edec2e5f59f0335e92f35184bc8631) C:\WINDOWS\System32\dmserver.dll
14:25:02.0140 2604 dmserver - ok
14:25:02.0171 2604 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
14:25:02.0187 2604 DMusic - ok
14:25:02.0234 2604 Dnscache (5f7e24fa9eab896051ffb87f840730d2) C:\WINDOWS\System32\dnsrslvr.dll
14:25:02.0234 2604 Dnscache - ok
14:25:02.0250 2604 Dot3svc (0f0f6e687e5e15579ef4da8dd6945814) C:\WINDOWS\System32\dot3svc.dll
14:25:02.0265 2604 Dot3svc - ok
14:25:02.0265 2604 dpti2o - ok
14:25:02.0281 2604 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
14:25:02.0281 2604 drmkaud - ok
14:25:02.0328 2604 EapHost (2187855a7703adef0cef9ee4285182cc) C:\WINDOWS\System32\eapsvc.dll
14:25:02.0328 2604 EapHost - ok
14:25:02.0625 2604 ERSvc (bc93b4a066477954555966d77fec9ecb) C:\WINDOWS\System32\ersvc.dll
14:25:02.0625 2604 ERSvc - ok
14:25:02.0671 2604 Eventlog (65df52f5b8b6e9bbd183505225c37315) C:\WINDOWS\system32\services.exe
14:25:02.0687 2604 Eventlog - ok
14:25:02.0750 2604 EventSystem (d4991d98f2db73c60d042f1aef79efae) C:\WINDOWS\system32\es.dll
14:25:02.0750 2604 EventSystem - ok
14:25:02.0796 2604 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
14:25:02.0796 2604 Fastfat - ok
14:25:02.0890 2604 FastUserSwitchingCompatibility (99bc0b50f511924348be19c7c7313bbf) C:\WINDOWS\System32\shsvcs.dll
14:25:02.0890 2604 FastUserSwitchingCompatibility - ok
14:25:02.0906 2604 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
14:25:02.0921 2604 Fdc - ok
14:25:02.0953 2604 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
14:25:02.0953 2604 Fips - ok
14:25:02.0984 2604 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
14:25:02.0984 2604 Flpydisk - ok
14:25:03.0031 2604 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
14:25:03.0031 2604 FltMgr - ok
14:25:03.0171 2604 FontCache3.0.0.0 (8ba7c024070f2b7fdd98ed8a4ba41789) c:\WINDOWS\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
14:25:03.0171 2604 FontCache3.0.0.0 - ok
14:25:03.0218 2604 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
14:25:03.0218 2604 Fs_Rec - ok
14:25:03.0234 2604 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
14:25:03.0250 2604 Ftdisk - ok
14:25:03.0296 2604 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
14:25:03.0296 2604 GEARAspiWDM - ok
14:25:03.0328 2604 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
14:25:03.0343 2604 Gpc - ok
14:25:03.0390 2604 helpsvc (4fcca060dfe0c51a09dd5c3843888bcd) C:\WINDOWS\PCHealth\HelpCtr\Binaries\pchsvc.dll
14:25:03.0390 2604 helpsvc - ok
14:25:03.0421 2604 HidServ - ok
14:25:03.0453 2604 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
14:25:03.0453 2604 HidUsb - ok
14:25:03.0500 2604 hkmsvc (8878bd685e490239777bfe51320b88e9) C:\WINDOWS\System32\kmsvc.dll
14:25:03.0500 2604 hkmsvc - ok
14:25:03.0515 2604 hpn - ok
14:25:03.0578 2604 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
14:25:03.0578 2604 HTTP - ok
14:25:03.0640 2604 HTTPFilter (6100a808600f44d999cebdef8841c7a3) C:\WINDOWS\System32\w3ssl.dll
14:25:03.0640 2604 HTTPFilter - ok
14:25:03.0656 2604 i2omgmt - ok
14:25:03.0656 2604 i2omp - ok
14:25:03.0687 2604 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
14:25:03.0687 2604 i8042prt - ok
14:25:04.0265 2604 ialm (2aae7be67911f4aec9ad28e9cfb9096f) C:\WINDOWS\system32\DRIVERS\igxpmp32.sys
14:25:04.0437 2604 ialm - ok
14:25:04.0640 2604 idsvc (c01ac32dc5c03076cfb852cb5da5229c) c:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
14:25:04.0656 2604 idsvc - ok
14:25:04.0765 2604 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
14:25:04.0765 2604 Imapi - ok
14:25:04.0828 2604 ImapiService (30deaf54a9755bb8546168cfe8a6b5e1) C:\WINDOWS\system32\imapi.exe
14:25:04.0828 2604 ImapiService - ok
14:25:04.0843 2604 ini910u - ok
14:25:04.0890 2604 IntelIde (b5466a9250342a7aa0cd1fba13420678) C:\WINDOWS\system32\DRIVERS\intelide.sys
14:25:04.0890 2604 IntelIde - ok
14:25:04.0953 2604 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
14:25:04.0953 2604 intelppm - ok
14:25:04.0968 2604 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
14:25:04.0968 2604 Ip6Fw - ok
14:25:05.0031 2604 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
14:25:05.0031 2604 IpFilterDriver - ok
14:25:05.0062 2604 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
14:25:05.0062 2604 IpInIp - ok
14:25:05.0093 2604 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
14:25:05.0093 2604 IpNat - ok
14:25:05.0203 2604 iPod Service (3c30491045dbbd44a42876b3d6f3917d) C:\Program Files\iPod\bin\iPodService.exe
14:25:05.0218 2604 iPod Service - ok
14:25:05.0265 2604 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
14:25:05.0265 2604 IPSec - ok
14:25:05.0312 2604 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
14:25:05.0312 2604 IRENUM - ok
14:25:05.0343 2604 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
14:25:05.0343 2604 isapnp - ok
14:25:05.0453 2604 JavaQuickStarterService (0a5709543986843d37a92290b7838340) C:\Program Files\Java\jre6\bin\jqs.exe
14:25:05.0453 2604 JavaQuickStarterService - ok
14:25:05.0468 2604 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
14:25:05.0468 2604 Kbdclass - ok
14:25:05.0531 2604 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
14:25:05.0531 2604 kmixer - ok
14:25:05.0578 2604 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
14:25:05.0578 2604 KSecDD - ok
14:25:05.0640 2604 LanmanServer (3a7c3cbe5d96b8ae96ce81f0b22fb527) C:\WINDOWS\System32\srvsvc.dll
14:25:05.0640 2604 LanmanServer - ok
14:25:05.0703 2604 lanmanworkstation (a8888a5327621856c0cec4e385f69309) C:\WINDOWS\System32\wkssvc.dll
14:25:05.0703 2604 lanmanworkstation - ok
14:25:05.0718 2604 lbrtfdc - ok
14:25:05.0750 2604 LmHosts (a7db739ae99a796d91580147e919cc59) C:\WINDOWS\System32\lmhsvc.dll
14:25:05.0750 2604 LmHosts - ok
14:25:05.0843 2604 MBAMProtector (fb097bbc1a18f044bd17bd2fccf97865) C:\WINDOWS\system32\drivers\mbam.sys
14:25:05.0890 2604 MBAMProtector - ok
14:25:06.0000 2604 MBAMService (ba400ed640bca1eae5c727ae17c10207) C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
14:25:06.0015 2604 MBAMService - ok
14:25:06.0125 2604 MBAMSwissArmy (0db7527db188c7d967a37bb51bbf3963) C:\WINDOWS\system32\drivers\mbamswissarmy.sys
14:25:06.0125 2604 MBAMSwissArmy - ok
14:25:06.0140 2604 Messenger (986b1ff5814366d71e0ac5755c88f2d3) C:\WINDOWS\System32\msgsvc.dll
14:25:06.0156 2604 Messenger - ok
14:25:06.0203 2604 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
14:25:06.0203 2604 mnmdd - ok
14:25:06.0234 2604 mnmsrvc (d18f1f0c101d06a1c1adf26eed16fcdd) C:\WINDOWS\system32\mnmsrvc.exe
14:25:06.0250 2604 mnmsrvc - ok
14:25:06.0296 2604 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
14:25:06.0296 2604 Modem - ok
14:25:06.0328 2604 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
14:25:06.0328 2604 Mouclass - ok
14:25:06.0375 2604 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
14:25:06.0375 2604 mouhid - ok
14:25:06.0406 2604 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
14:25:06.0406 2604 MountMgr - ok
14:25:06.0437 2604 MpFilter (fee0baded54222e9f1dae9541212aab1) C:\WINDOWS\system32\DRIVERS\MpFilter.sys
14:25:06.0437 2604 MpFilter - ok
14:25:06.0453 2604 mraid35x - ok
14:25:06.0500 2604 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
14:25:06.0500 2604 MRxDAV - ok
14:25:06.0562 2604 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
14:25:06.0593 2604 MRxSmb - ok
14:25:06.0640 2604 MSDTC (a137f1470499a205abbb9aafb3b6f2b1) C:\WINDOWS\system32\msdtc.exe
14:25:06.0640 2604 MSDTC - ok
14:25:06.0656 2604 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
14:25:06.0656 2604 Msfs - ok
14:25:06.0671 2604 MSIServer - ok
14:25:06.0718 2604 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
14:25:06.0718 2604 MSKSSRV - ok
14:25:06.0796 2604 MsMpSvc (cfce43b70ca0cc4dcc8adb62b792b173) c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
14:25:06.0875 2604 MsMpSvc - ok
14:25:06.0953 2604 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
14:25:06.0953 2604 MSPCLOCK - ok
14:25:06.0968 2604 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
14:25:06.0968 2604 MSPQM - ok
14:25:07.0031 2604 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
14:25:07.0031 2604 mssmbios - ok
14:25:07.0078 2604 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
14:25:07.0078 2604 Mup - ok
14:25:07.0125 2604 napagent (0102140028fad045756796e1c685d695) C:\WINDOWS\System32\qagentrt.dll
14:25:07.0140 2604 napagent - ok
14:25:07.0171 2604 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
14:25:07.0171 2604 NDIS - ok
14:25:07.0218 2604 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
14:25:07.0218 2604 NdisTapi - ok
14:25:07.0265 2604 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
14:25:07.0265 2604 Ndisuio - ok
14:25:07.0328 2604 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
14:25:07.0328 2604 NdisWan - ok
14:25:07.0390 2604 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
14:25:07.0390 2604 NDProxy - ok
14:25:07.0421 2604 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
14:25:07.0421 2604 NetBIOS - ok
14:25:07.0453 2604 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
14:25:07.0453 2604 NetBT - ok
14:25:07.0484 2604 NetDDE (b857ba82860d7ff85ae29b095645563b) C:\WINDOWS\system32\netdde.exe
14:25:07.0484 2604 NetDDE - ok
14:25:07.0500 2604 NetDDEdsdm (b857ba82860d7ff85ae29b095645563b) C:\WINDOWS\system32\netdde.exe
14:25:07.0500 2604 NetDDEdsdm - ok
14:25:07.0531 2604 Netlogon (bf2466b3e18e970d8a976fb95fc1ca85) C:\WINDOWS\system32\lsass.exe
14:25:07.0531 2604 Netlogon - ok
14:25:07.0562 2604 Netman (13e67b55b3abd7bf3fe7aae5a0f9a9de) C:\WINDOWS\System32\netman.dll
14:25:07.0578 2604 Netman - ok
14:25:07.0718 2604 NetTcpPortSharing (d34612c5d02d026535b3095d620626ae) c:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
14:25:07.0718 2604 NetTcpPortSharing - ok
14:25:07.0765 2604 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
14:25:07.0765 2604 NIC1394 - ok
14:25:07.0890 2604 Nla (943337d786a56729263071623bbb9de5) C:\WINDOWS\System32\mswsock.dll
14:25:07.0890 2604 Nla - ok
14:25:07.0906 2604 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
14:25:07.0906 2604 Npfs - ok
14:25:07.0968 2604 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
14:25:07.0968 2604 Ntfs - ok
14:25:07.0984 2604 NtLmSsp (bf2466b3e18e970d8a976fb95fc1ca85) C:\WINDOWS\system32\lsass.exe
14:25:07.0984 2604 NtLmSsp - ok
14:25:08.0078 2604 NtmsSvc (156f64a3345bd23c600655fb4d10bc08) C:\WINDOWS\system32\ntmssvc.dll
14:25:08.0093 2604 NtmsSvc - ok
14:25:08.0125 2604 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
14:25:08.0125 2604 Null - ok
14:25:08.0171 2604 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
14:25:08.0171 2604 NwlnkFlt - ok
14:25:08.0187 2604 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
14:25:08.0187 2604 NwlnkFwd - ok
14:25:08.0218 2604 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
14:25:08.0218 2604 ohci1394 - ok
14:25:08.0312 2604 ose (5a432a042dae460abe7199b758e8606c) C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
14:25:08.0312 2604 ose - ok
14:25:08.0359 2604 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
14:25:08.0359 2604 Parport - ok
14:25:08.0375 2604 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
14:25:08.0375 2604 PartMgr - ok
14:25:08.0406 2604 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
14:25:08.0406 2604 ParVdm - ok
14:25:08.0421 2604 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
14:25:08.0421 2604 PCI - ok
14:25:08.0437 2604 PCIDump - ok
14:25:08.0453 2604 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\drivers\PCIIde.sys
14:25:08.0453 2604 PCIIde - ok
14:25:08.0500 2604 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
14:25:08.0515 2604 Pcmcia - ok
14:25:08.0531 2604 PDCOMP - ok
14:25:08.0531 2604 PDFRAME - ok
14:25:08.0546 2604 PDRELI - ok
14:25:08.0546 2604 PDRFRAME - ok
14:25:08.0578 2604 perc2 - ok
14:25:08.0593 2604 perc2hib - ok
14:25:08.0671 2604 PlugPlay (65df52f5b8b6e9bbd183505225c37315) C:\WINDOWS\system32\services.exe
14:25:08.0671 2604 PlugPlay - ok
14:25:08.0687 2604 PolicyAgent (bf2466b3e18e970d8a976fb95fc1ca85) C:\WINDOWS\system32\lsass.exe
14:25:08.0687 2604 PolicyAgent - ok
14:25:08.0703 2604 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
14:25:08.0703 2604 PptpMiniport - ok
14:25:08.0718 2604 ProtectedStorage (bf2466b3e18e970d8a976fb95fc1ca85) C:\WINDOWS\system32\lsass.exe
14:25:08.0718 2604 ProtectedStorage - ok
14:25:08.0734 2604 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
14:25:08.0734 2604 PSched - ok
14:25:08.0796 2604 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
14:25:08.0796 2604 Ptilink - ok
14:25:08.0796 2604 ql1080 - ok
14:25:08.0812 2604 Ql10wnt - ok
14:25:08.0812 2604 ql12160 - ok
14:25:08.0828 2604 ql1240 - ok
14:25:08.0828 2604 ql1280 - ok
14:25:08.0875 2604 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
14:25:08.0875 2604 RasAcd - ok
14:25:08.0906 2604 RasAuto (ad188be7bdf94e8df4ca0a55c00a5073) C:\WINDOWS\System32\rasauto.dll
14:25:08.0906 2604 RasAuto - ok
14:25:08.0937 2604 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
14:25:08.0937 2604 Rasl2tp - ok
14:25:08.0953 2604 RasMan (76a9a3cbeadd68cc57cda5e1d7448235) C:\WINDOWS\System32\rasmans.dll
14:25:08.0968 2604 RasMan - ok
14:25:08.0984 2604 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
14:25:08.0984 2604 RasPppoe - ok
14:25:09.0015 2604 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
14:25:09.0015 2604 Raspti - ok
14:25:09.0078 2604 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
14:25:09.0093 2604 Rdbss - ok
14:25:09.0109 2604 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
14:25:09.0109 2604 RDPCDD - ok
14:25:09.0187 2604 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
14:25:09.0187 2604 rdpdr - ok
14:25:09.0234 2604 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
14:25:09.0250 2604 RDPWD - ok
14:25:09.0281 2604 RDSessMgr (3c37bf86641bda977c3bf8a840f3b7fa) C:\WINDOWS\system32\sessmgr.exe
14:25:09.0281 2604 RDSessMgr - ok
14:25:09.0296 2604 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
14:25:09.0296 2604 redbook - ok
14:25:09.0343 2604 RemoteAccess (7e699ff5f59b5d9de5390e3c34c67cf5) C:\WINDOWS\System32\mprdim.dll
14:25:09.0343 2604 RemoteAccess - ok
14:25:09.0359 2604 RemoteRegistry (5b19b557b0c188210a56a6b699d90b8f) C:\WINDOWS\system32\regsvc.dll
14:25:09.0390 2604 RemoteRegistry - ok
14:25:09.0406 2604 RpcLocator (aaed593f84afa419bbae8572af87cf6a) C:\WINDOWS\system32\locator.exe
14:25:09.0406 2604 RpcLocator - ok
14:25:09.0453 2604 RpcSs (6b27a5c03dfb94b4245739065431322c) C:\WINDOWS\System32\rpcss.dll
14:25:09.0468 2604 RpcSs - ok
14:25:09.0531 2604 RSVP (471b3f9741d762abe75e9deea4787e47) C:\WINDOWS\system32\rsvp.exe
14:25:09.0531 2604 RSVP - ok
14:25:09.0562 2604 SamSs (bf2466b3e18e970d8a976fb95fc1ca85) C:\WINDOWS\system32\lsass.exe
14:25:09.0562 2604 SamSs - ok
14:25:09.0718 2604 SASDIFSV (39763504067962108505bff25f024345) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS
14:25:09.0718 2604 SASDIFSV - ok
14:25:09.0734 2604 SASKUTIL (77b9fc20084b48408ad3e87570eb4a85) C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS
14:25:09.0734 2604 SASKUTIL - ok
14:25:09.0968 2604 SBRE (1fd538c4feb36b793d2121f20bbdc16f) C:\WINDOWS\system32\drivers\SBREdrv.sys
14:25:09.0968 2604 SBRE - ok
14:25:10.0078 2604 SCardSvr (86d007e7a654b9a71d1d7d856b104353) C:\WINDOWS\System32\SCardSvr.exe
14:25:10.0078 2604 SCardSvr - ok
14:25:10.0140 2604 Schedule (0a9a7365a1ca4319aa7c1d6cd8e4eafa) C:\WINDOWS\system32\schedsvc.dll
14:25:10.0140 2604 Schedule - ok
14:25:10.0171 2604 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
14:25:10.0171 2604 Secdrv - ok
14:25:10.0234 2604 seclogon (cbe612e2bb6a10e3563336191eda1250) C:\WINDOWS\System32\seclogon.dll
14:25:10.0234 2604 seclogon - ok
14:25:10.0296 2604 SENS (7fdd5d0684eca8c1f68b4d99d124dcd0) C:\WINDOWS\system32\sens.dll
14:25:10.0312 2604 SENS - ok
14:25:10.0359 2604 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
14:25:10.0359 2604 Serial - ok
14:25:10.0421 2604 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
14:25:10.0437 2604 Sfloppy - ok
14:25:10.0562 2604 SharedAccess (83f41d0d89645d7235c051ab1d9523ac) C:\WINDOWS\System32\ipnathlp.dll
14:25:10.0578 2604 SharedAccess - ok
14:25:10.0750 2604 ShellHWDetection (99bc0b50f511924348be19c7c7313bbf) C:\WINDOWS\System32\shsvcs.dll
14:25:10.0750 2604 ShellHWDetection - ok
14:25:10.0765 2604 Simbad - ok
14:25:11.0109 2604 smwdm (858934c454bdc6664c752bf0cd3eaeae) C:\WINDOWS\system32\drivers\smwdm.sys
14:25:11.0109 2604 smwdm - ok
14:25:11.0125 2604 Sparrow - ok
14:25:11.0156 2604 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
14:25:11.0156 2604 splitter - ok
14:25:11.0312 2604 Spooler (60784f891563fb1b767f70117fc2428f) C:\WINDOWS\system32\spoolsv.exe
14:25:11.0312 2604 Spooler - ok
14:25:11.0484 2604 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
14:25:11.0484 2604 sr - ok
14:25:11.0562 2604 srservice (3805df0ac4296a34ba4bf93b346cc378) C:\WINDOWS\system32\srsvc.dll
14:25:11.0578 2604 srservice - ok
14:25:11.0859 2604 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
14:25:11.0875 2604 Srv - ok
14:25:11.0937 2604 SSDPSRV (0a5679b3714edab99e357057ee88fca6) C:\WINDOWS\System32\ssdpsrv.dll
14:25:11.0937 2604 SSDPSRV - ok
14:25:12.0156 2604 stisvc (8bad69cbac032d4bbacfce0306174c30) C:\WINDOWS\system32\wiaservc.dll
14:25:12.0171 2604 stisvc - ok
14:25:12.0281 2604 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
14:25:12.0312 2604 swenum - ok
14:25:12.0375 2604 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
14:25:12.0375 2604 swmidi - ok
14:25:12.0406 2604 SwPrv - ok
14:25:12.0406 2604 symc810 - ok
14:25:12.0421 2604 symc8xx - ok
14:25:12.0421 2604 sym_hi - ok
14:25:12.0437 2604 sym_u3 - ok
14:25:12.0546 2604 SynTP (0f332c0ba9b968ebc8cbb906416f8597) C:\WINDOWS\system32\DRIVERS\SynTP.sys
14:25:12.0703 2604 SynTP - ok
14:25:12.0718 2604 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
14:25:12.0734 2604 sysaudio - ok
14:25:12.0796 2604 SysmonLog (c7abbc59b43274b1109df6b24d617051) C:\WINDOWS\system32\smlogsvc.exe
14:25:12.0796 2604 SysmonLog - ok
14:25:12.0875 2604 TapiSrv (3cb78c17bb664637787c9a1c98f79c38) C:\WINDOWS\System32\tapisrv.dll
14:25:12.0921 2604 TapiSrv - ok
14:25:13.0250 2604 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
14:25:13.0375 2604 Tcpip - ok
14:25:13.0484 2604 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
14:25:13.0484 2604 TDPIPE - ok
14:25:13.0546 2604 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
14:25:13.0546 2604 TDTCP - ok
14:25:13.0578 2604 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
14:25:13.0578 2604 TermDD - ok
14:25:13.0687 2604 TermService (ff3477c03be7201c294c35f684b3479f) C:\WINDOWS\System32\termsrv.dll
14:25:13.0687 2604 TermService - ok
14:25:13.0812 2604 Themes (99bc0b50f511924348be19c7c7313bbf) C:\WINDOWS\System32\shsvcs.dll
14:25:13.0812 2604 Themes - ok
14:25:13.0875 2604 TlntSvr (db7205804759ff62c34e3efd8a4cc76a) C:\WINDOWS\system32\tlntsvr.exe
14:25:13.0890 2604 TlntSvr - ok
14:25:13.0890 2604 TosIde - ok
14:25:13.0937 2604 TrkWks (55bca12f7f523d35ca3cb833c725f54e) C:\WINDOWS\system32\trkwks.dll
14:25:13.0953 2604 TrkWks - ok
14:25:14.0015 2604 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
14:25:14.0015 2604 Udfs - ok
14:25:14.0031 2604 ultra - ok
14:25:14.0265 2604 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
14:25:14.0453 2604 Update - ok
14:25:14.0640 2604 upnphost (1ebafeb9a3fbdc41b8d9c7f0f687ad91) C:\WINDOWS\System32\upnphost.dll
14:25:14.0656 2604 upnphost - ok
14:25:14.0687 2604 UPS (05365fb38fca1e98f7a566aaaf5d1815) C:\WINDOWS\System32\ups.exe
14:25:14.0687 2604 UPS - ok
14:25:14.0750 2604 USBAAPL (e8c1b9ebac65288e1b51e8a987d98af6) C:\WINDOWS\system32\Drivers\usbaapl.sys
14:25:14.0750 2604 USBAAPL - ok
14:25:14.0859 2604 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
14:25:14.0859 2604 usbccgp - ok
14:25:14.0937 2604 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
14:25:14.0953 2604 usbehci - ok
14:25:14.0968 2604 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
14:25:14.0968 2604 usbhub - ok
14:25:15.0093 2604 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
14:25:15.0093 2604 usbprint - ok
14:25:15.0140 2604 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
14:25:15.0140 2604 usbscan - ok
14:25:15.0265 2604 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
14:25:15.0265 2604 USBSTOR - ok
14:25:15.0343 2604 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
14:25:15.0343 2604 usbuhci - ok
14:25:15.0468 2604 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
14:25:15.0468 2604 VgaSave - ok
14:25:15.0484 2604 ViaIde - ok
14:25:15.0546 2604 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
14:25:15.0546 2604 VolSnap - ok
14:25:15.0703 2604 VSS (7a9db3a67c333bf0bd42e42b8596854b) C:\WINDOWS\System32\vssvc.exe
14:25:15.0703 2604 VSS - ok
14:25:16.0703 2604 w29n51 (a22abd73e0d6ba666cba4e86eeb001b3) C:\WINDOWS\system32\DRIVERS\w29n51.sys
14:25:17.0406 2604 w29n51 - ok
14:25:18.0156 2604 W32Time (54af4b1d5459500ef0937f6d33b1914f) C:\WINDOWS\system32\w32time.dll
14:25:18.0171 2604 W32Time - ok
14:25:18.0234 2604 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
14:25:18.0234 2604 Wanarp - ok
14:25:18.0250 2604 WDICA - ok
14:25:18.0312 2604 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
14:25:18.0312 2604 wdmaud - ok
14:25:18.0343 2604 WebClient (77a354e28153ad2d5e120a5a8687bc06) C:\WINDOWS\System32\webclnt.dll
14:25:18.0343 2604 WebClient - ok
14:25:18.0406 2604 winmgmt (2d0e4ed081963804ccc196a0929275b5) C:\WINDOWS\system32\wbem\WMIsvc.dll
14:25:18.0406 2604 winmgmt - ok
14:25:18.0468 2604 WmdmPmSN (051b1bdecd6dee18c771b5d5ec7f044d) C:\WINDOWS\system32\MsPMSNSv.dll
14:25:18.0484 2604 WmdmPmSN - ok
14:25:18.0562 2604 Wmi (e76f8807070ed04e7408a86d6d3a6137) C:\WINDOWS\System32\advapi32.dll
14:25:18.0562 2604 Wmi - ok
14:25:18.0625 2604 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
14:25:18.0625 2604 WmiAcpi - ok
14:25:18.0671 2604 WmiApSrv (e0673f1106e62a68d2257e376079f821) C:\WINDOWS\system32\wbem\wmiapsrv.exe
14:25:18.0671 2604 WmiApSrv - ok
14:25:18.0859 2604 WMPNetworkSvc (6bab4dc65515a098505f8b3d01fb6fe5) C:\Program Files\Windows Media Player\WMPNetwk.exe
14:25:18.0890 2604 WMPNetworkSvc - ok
14:25:18.0921 2604 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
14:25:18.0921 2604 WS2IFSL - ok
14:25:18.0984 2604 wscsvc (7c278e6408d1dce642230c0585a854d5) C:\WINDOWS\system32\wscsvc.dll
14:25:18.0984 2604 wscsvc - ok
14:25:18.0984 2604 WSearch - ok
14:25:19.0062 2604 wuauserv (35321fb577cdc98ce3eb3a3eb9e4610a) C:\WINDOWS\system32\wuauserv.dll
14:25:19.0093 2604 wuauserv - ok
14:25:19.0140 2604 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
14:25:19.0140 2604 WudfPf - ok
14:25:19.0171 2604 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
14:25:19.0187 2604 WudfRd - ok
14:25:19.0218 2604 WudfSvc (05231c04253c5bc30b26cbaae680ed89) C:\WINDOWS\System32\WUDFSvc.dll
14:25:19.0218 2604 WudfSvc - ok
14:25:19.0312 2604 WZCSVC (81dc3f549f44b1c1fff022dec9ecf30b) C:\WINDOWS\System32\wzcsvc.dll
14:25:19.0312 2604 WZCSVC - ok
14:25:19.0343 2604 xmlprov (295d21f14c335b53cb8154e5b1f892b9) C:\WINDOWS\System32\xmlprov.dll
14:25:19.0359 2604 xmlprov - ok
14:25:19.0421 2604 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
14:25:19.0453 2604 \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - infected
14:25:19.0453 2604 \Device\Harddisk0\DR0 - detected Rootkit.Boot.Pihar.c (0)
14:25:19.0468 2604 Boot (0x1200) (a1f217689f1014e04390841c5653815f) \Device\Harddisk0\DR0\Partition0
14:25:19.0468 2604 \Device\Harddisk0\DR0\Partition0 - ok
14:25:19.0468 2604 ============================================================
14:25:19.0468 2604 Scan finished
14:25:19.0468 2604 ============================================================
14:25:19.0484 3492 Detected object count: 1
14:25:19.0484 3492 Actual detected object count: 1
14:25:28.0265 3492 \Device\Harddisk0\DR0\# - copied to quarantine
14:25:28.0265 3492 \Device\Harddisk0\DR0 - copied to quarantine
14:25:28.0515 3492 \Device\Harddisk0\DR0\TDLFS\ldrm - copied to quarantine
14:25:28.0531 3492 \Device\Harddisk0\DR0\TDLFS\cmd.dll - copied to quarantine
14:25:28.0531 3492 \Device\Harddisk0\DR0\TDLFS\cmd64.dll - copied to quarantine
14:25:28.0546 3492 \Device\Harddisk0\DR0\TDLFS\drv32 - copied to quarantine
14:25:28.0546 3492 \Device\Harddisk0\DR0\TDLFS\drv64 - copied to quarantine
14:25:28.0546 3492 \Device\Harddisk0\DR0\TDLFS\servers.dat - copied to quarantine
14:25:28.0546 3492 \Device\Harddisk0\DR0\TDLFS\config.ini - copied to quarantine
14:25:28.0734 3492 \Device\Harddisk0\DR0\TDLFS\ldr16 - copied to quarantine
14:25:28.0750 3492 \Device\Harddisk0\DR0\TDLFS\ldr32 - copied to quarantine
14:25:28.0750 3492 \Device\Harddisk0\DR0\TDLFS\ldr64 - copied to quarantine
14:25:28.0750 3492 \Device\Harddisk0\DR0\TDLFS\s - copied to quarantine
14:25:28.0750 3492 \Device\Harddisk0\DR0\TDLFS\u - copied to quarantine
14:25:28.0828 3492 \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - will be cured on reboot
14:25:28.0828 3492 \Device\Harddisk0\DR0 - ok
14:25:28.0828 3492 \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - User select action: Cure
14:25:35.0062 3480 Deinitialize success



aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-04-28 14:29:33
-----------------------------
14:29:33.984 OS Version: Windows 5.1.2600 Service Pack 3
14:29:33.984 Number of processors: 1 586 0xD08
14:29:33.984 ComputerName: OWNER UserName: admin
14:29:42.968 Initialize success
14:35:19.281 AVAST engine defs: 12042801
14:35:30.750 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
14:35:30.750 Disk 0 Vendor: HTS541060G9AT00 MB3OA56J Size: 57231MB BusType: 3
14:35:30.765 Disk 0 MBR read successfully
14:35:30.765 Disk 0 MBR scan
14:35:30.875 Disk 0 Windows XP default MBR code
14:35:30.890 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 57224 MB offset 63
14:35:30.921 Disk 0 scanning sectors +117195120
14:35:31.078 Disk 0 scanning C:\WINDOWS\system32\drivers
14:35:55.312 Service scanning
14:36:59.812 Modules scanning
14:37:16.093 Disk 0 trace - called modules:
14:37:16.109 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys intelide.sys PCIIDEX.SYS
14:37:16.125 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x82d1e370]
14:37:16.625 3 CLASSPNP.SYS[f8512fd7] -> nt!IofCallDriver -> \Device\00000081[0x82dd49e8]
14:37:16.625 5 ACPI.sys[f8389620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x82d1e8e8]
14:37:18.453 AVAST engine scan C:\WINDOWS
14:37:31.171 AVAST engine scan C:\WINDOWS\system32
14:40:04.796 AVAST engine scan C:\WINDOWS\system32\drivers
14:40:15.203 AVAST engine scan C:\Documents and Settings\admin
14:40:18.140 File: C:\Documents and Settings\admin\Application Data\Apple Computer\Apple Computer\tceskqa.dll **INFECTED** Win32:Trojan-gen
14:40:22.515 File: C:\Documents and Settings\admin\Application Data\gtk-2.0\gtk-2.0\afxjahc.dll **INFECTED** Win32:Trojan-gen
14:40:36.890 File: C:\Documents and Settings\admin\Application Data\Mythicsoft\Mythicsoft\sqduxv.dll **INFECTED** Win32:Malware-gen
14:47:29.656 AVAST engine scan C:\Documents and Settings\All Users
14:49:35.718 Scan finished successfully
14:52:04.031 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\admin\Desktop\MBR.dat"
14:52:04.046 The log file has been saved successfully to "C:\Documents and Settings\admin\Desktop\aswMBR.txt"

#6 Jmul

Jmul
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 28 April 2012 - 04:56 PM

After running aswMBR, SVCHost is running at a more manageable state. However, now, whenever I open Internet Explorer, it temporarily spikes the CPU usage to the 90s before going back down.

I temporarily shut down my computer; when I used it again, SVCHost was back to its old state. TDSKiller found no new errors. AswMBR found the same problems as in the first scan, and now my computer is back to the state I mentioned above.

Edited by Jmul, 28 April 2012 - 04:59 PM.


#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:38 AM

Posted 28 April 2012 - 07:00 PM

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::
KillAll::

File::
C:\Documents and Settings\admin\Application Data\Apple Computer\Apple Computer\tceskqa.dll
C:\Documents and Settings\admin\Application Data\gtk-2.0\gtk-2.0\afxjahc.dll
C:\Documents and Settings\admin\Application Data\Mythicsoft\Mythicsoft\sqduxv.dll

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 Jmul

Jmul
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 28 April 2012 - 08:21 PM

Once again, ComboFix initially wouldn't start scanning. Looking at Task Manager, grep.3xe was clocking in at nearly 40,000K memory usage. After force-terminating it and letting it restart, ComboFix started scanning almost immediately.

So far, my computer is looking good as far as SVCHost is concerned. Also, I haven't seen any Google redirects yet. I haven't yet checked the status of Windows Updater.


ComboFix 12-04-28.01 - admin 04/28/2012 19:45:55.7.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.503.282 [GMT -5:00]
Running from: c:\documents and settings\admin\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\admin\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
FILE ::
"c:\documents and settings\admin\Application Data\Apple Computer\Apple Computer\tceskqa.dll"
"c:\documents and settings\admin\Application Data\gtk-2.0\gtk-2.0\afxjahc.dll"
"c:\documents and settings\admin\Application Data\Mythicsoft\Mythicsoft\sqduxv.dll"
.
.
((((((((((((((((((((((((( Files Created from 2012-03-28 to 2012-04-29 )))))))))))))))))))))))))))))))
.
.
2012-04-28 19:25 . 2012-04-28 19:25 -------- d-----w- C:\TDSSKiller_Quarantine
2012-04-27 20:54 . 2012-04-27 20:54 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2012-04-27 16:26 . 2012-04-27 16:26 -------- d-----w- c:\windows\system32\wbem\Repository
2012-04-27 00:41 . 2012-04-27 16:25 -------- d-----w- c:\program files\Combined Community Codec Pack(2)
2012-04-24 22:21 . 2012-04-24 22:21 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Temp
2012-04-23 22:28 . 2012-04-23 22:28 388096 ----a-r- c:\documents and settings\admin\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2012-04-23 22:28 . 2012-04-23 22:28 -------- d-----w- c:\program files\Trend Micro
2012-04-23 19:41 . 2012-04-23 19:41 -------- d-----w- c:\program files\Unlocker
2012-04-23 19:21 . 2012-04-23 19:21 -------- d-----w- c:\documents and settings\admin\Application Data\Uniblue
2012-04-23 19:21 . 2012-04-23 19:21 -------- dc----w- c:\documents and settings\All Users\Application Data\{6AD8E59C-250C-4201-B5BA-56ADEF76FF46}
2012-04-23 19:21 . 2012-04-23 19:21 -------- d-----w- c:\program files\Uniblue
2012-04-23 19:20 . 2012-04-23 19:20 -------- d-----w- c:\documents and settings\admin\Local Settings\Application Data\PackageAware
2012-04-23 19:15 . 2012-04-23 19:15 3584 ----a-r- c:\documents and settings\admin\Application Data\Microsoft\Installer\{121634B0-2F4B-11D3-ADA3-00C04F52DD52}\Icon386ED4E3.exe
2012-04-23 19:15 . 2012-04-23 19:15 -------- d-----w- c:\program files\Windows Installer Clean Up
2012-04-23 18:35 . 2012-04-23 18:35 -------- d-----w- c:\program files\Common Files\Java
2012-04-23 18:34 . 2012-04-23 18:34 73728 ----a-w- c:\windows\system32\javacpl.cpl
2012-04-20 22:37 . 2012-04-27 16:27 -------- d-----w- c:\documents and settings\Administrator.OWNER.003
2012-04-20 21:57 . 2012-04-20 21:57 -------- d-----w- c:\documents and settings\admin\Application Data\AmPro
2012-04-20 21:50 . 2012-04-20 21:50 -------- d-----w- c:\documents and settings\admin\AppData
2012-04-20 21:31 . 2012-04-20 21:34 -------- d-s---w- c:\documents and settings\Administrator.OWNER.002
2012-04-20 14:17 . 2012-04-20 21:46 -------- d-s---w- c:\documents and settings\Administrator.OWNER.001
2012-04-20 04:45 . 2012-04-20 22:02 -------- d-----w- C:\d30af35d66ffe0e4b94424bb
2012-04-06 01:31 . 2012-04-20 21:50 -------- d-----w- c:\program files\Apple Software Update
2012-04-05 01:57 . 2012-04-13 18:55 418464 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-04-04 05:53 . 2012-04-04 05:53 182160 ----a-w- c:\program files\Mozilla Firefox\plugins\nppdf32.dll
2012-04-04 05:53 . 2012-04-04 05:53 182160 ----a-w- c:\program files\Internet Explorer\Plugins\nppdf32.dll
2012-04-01 21:28 . 2012-04-04 20:56 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-04-01 21:28 . 2012-04-20 21:55 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-04-01 18:38 . 2012-01-19 15:22 42864 ----a-r- c:\windows\system32\SBBD.EXE
2012-04-01 18:38 . 2012-01-12 14:26 101112 ----a-r- c:\windows\system32\drivers\SBREDrv.sys
2012-04-01 18:38 . 2012-04-01 22:44 -------- d-----w- c:\documents and settings\All Users\Application Data\STOPzilla!
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-04-23 18:34 . 2010-09-03 01:28 472808 ----a-w- c:\windows\system32\deployJava1.dll
2012-04-13 18:55 . 2011-05-17 20:59 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-02-08 22:05 . 2012-02-08 22:05 21016 ----a-w- C:\FixitRegBackup.reg
2012-04-12 16:58 . 2012-04-12 16:58 97208 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-04-27 3905920]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-01-13 131072]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-01-13 163840]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-01-13 135168]
"AGRSMMSG"="AGRSMMSG.exe" [2005-11-16 88209]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-09-15 102400]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
"UnlockerAssistant"="c:\program files\Unlocker\UnlockerAssistant.exe" [2010-07-04 17408]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-04-04 462408]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
"Update"="c:\documents and settings\admin\Application Data\Microsoft\Microsoft\sgpeue.dll" [BU]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=c:\windows\pss\Windows Search.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2012-01-03 07:37 843712 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe [BU]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IMJPMIG8.1]
2008-04-14 12:00 208952 ----a-w- c:\windows\ime\imjp8_1\imjpmig.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-04-28 20:06 142120 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes' Anti-Malware]
2012-04-04 20:56 462408 ----a-w- c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 15:50 155648 ----a-w- c:\windows\system32\NeroCheck.exe
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\Steam\\Steam.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\ultimate doom\\ultimate.bat"=
"c:\\Program Files\\mIRC\\mirc.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\wolfenstein 3d\\Wolf3d.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M1 - Spear of Destiny.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M2 - Return to Danger.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M3 - Ultimate Challenge.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\doom 2\\doom2 + mouse.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\doom 2\\doom2.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\wolfenstein 3d\\base\\dosbox.exe"=
"c:\\Documents and Settings\\admin\\Desktop\\ffdshow-rev3072_20090912\\MM8BDM-v2c\\skulltag.exe"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 11:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 4:55 PM 67664]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [4/1/2012 1:38 PM 101112]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [8/11/2011 6:38 PM 116608]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [4/1/2012 4:28 PM 654408]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [4/1/2012 4:28 PM 22344]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [4/4/2012 8:57 PM 253088]
S3 cpuz134;cpuz134; [x]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [4/27/2012 3:54 PM 40776]
.
Contents of the 'Scheduled Tasks' folder
.
2012-04-28 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-05 18:55]
.
2012-04-27 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 22:57]
.
2012-04-23 c:\windows\Tasks\RegistryBooster.job
- c:\program files\Uniblue\RegistryBooster\rbmonitor.exe [2012-04-23 18:56]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\documents and settings\admin\Application Data\Mozilla\Firefox\Profiles\rsnp0ui1.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/?pc=Z179&install_date=20111029
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=Z179&form=ZGAADF&install_date=20111029&q=
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-04-28 20:00
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(860)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
- - - - - - - > 'explorer.exe'(3928)
c:\program files\Unlocker\UnlockerHook.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\AGRSMMSG.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\system32\wscntfy.exe
c:\program files\Synaptics\SynTP\SynTPEnh.exe
.
**************************************************************************
.
Completion time: 2012-04-28 20:11:40 - machine was rebooted
ComboFix-quarantined-files.txt 2012-04-29 01:11
ComboFix2.txt 2012-04-28 14:44
ComboFix3.txt 2012-04-27 22:57
ComboFix4.txt 2012-04-24 02:09
ComboFix5.txt 2012-04-29 00:25
.
Pre-Run: 33,920,503,808 bytes free
Post-Run: 34,174,660,608 bytes free
.
- - End Of File - - 83FBB3D2ED0F5C26BF8CBD6AF70B6806

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:38 AM

Posted 28 April 2012 - 08:30 PM

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)

Programs to remove

Uniblue RegistryBooster [/list]


  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
.



Clean Out Temp Files

  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here http://www.ccleaner.com/

  • Run the installer to install the application.
  • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
  • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
  • Click Run Cleaner.
  • Close CCleaner.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidentally close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

If you have any problems running Hijackthis see NOTE** below (Host file not read, blank notepad ...)

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a log file button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the Analyze This button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

NOTE**
sometimes we have to run it like this To run HijackThis as an administrator, right-click HijackThis.exe
(located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)<--32bit
(located: C:\Program Files(86)\Trend Micro\HiJackThis\HiJackThis.exe)<--64bit
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 Jmul

Jmul
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 28 April 2012 - 09:18 PM

From Microsoft.com, I was able to install many updates that Automatic Updates had failed to notify me of.

Computer continues to perform solidly, there were no issues with this step.


Malwarebytes Anti-Malware (Trial) 1.61.0.1400
www.malwarebytes.org

Database version: v2012.04.28.09

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
admin :: OWNER [administrator]

Protection: Disabled

4/28/2012 9:02:35 PM
mbam-log-2012-04-28 (21-02-35).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 275345
Time elapsed: 5 minute(s), 43 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)



Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 9:16:04 PM, on 4/28/2012
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
c:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - (no file)
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {963B125B-8B21-49A2-A3A8-E37092276531} - (no file)
O2 - BHO: script helper for ie - {a0e8bc7d-6959-40b6-8e05-204d9768ad6e} - (no file)
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [SynTPStart] C:\Program Files\Synaptics\SynTP\SynTPStart.exe
O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe"
O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware] "C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "c:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Update] rundll32.exe "C:\Documents and Settings\admin\Application Data\Microsoft\Microsoft\sgpeue.dll",DllRegisterServer (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "c:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: SAS Core Service (!SASCORE) - SUPERAntiSpyware.com - C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\WINDOWS\system32\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

--
End of file - 5966 bytes

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:38 AM

Posted 28 April 2012 - 10:07 PM

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

If you have any problems running Hijackthis see NOTE** below (Host file not read, blank notepad ...)

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
      O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
      O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
      O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe"
      O4 - HKUS\S-1-5-18\..\Run: [Update] rundll32.exe "C:\Documents and Settings\admin\Application Data\Microsoft\Microsoft\sgpeue.dll",DllRegisterServe
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    NOTE**You can research each of those lines >here< and see if you want to keep them or not
    just copy the name between the brackets and paste into the search space
    O4 - HKLM\..\Run: [IntelliPoint]


NOTE**
sometimes we have to run it like this To run HijackThis as an administrator, right-click HijackThis.exe
(located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)<--32bit
(located: C:\Program Files(86)\Trend Micro\HiJackThis\HiJackThis.exe)<--64bit
and select to run as administrator

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the ActiveX control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Click on copy to clipboard or copy and paste the results here in this topic

Copy and paste that log as a reply to this topic

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 Jmul

Jmul
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 28 April 2012 - 11:38 PM

Here are the results from ESET:

C:\Documents and Settings\admin\Application Data\Apple Computer\Apple Computer\tceskqa.dll a variant of Win32/Kryptik.AEVS trojan
C:\Documents and Settings\admin\Application Data\Apple Computer\Apple Computer\vmvsz.dll a variant of Win32/Kryptik.AEVS trojan
C:\Documents and Settings\admin\Application Data\gtk-2.0\gtk-2.0\afxjahc.dll Win32/Boaxxe.C trojan
C:\Documents and Settings\admin\Application Data\Mythicsoft\Mythicsoft\sqduxv.dll a variant of Win32/Kryptik.AEVS trojan
C:\Qoobox\Quarantine\C\Documents and Settings\admin\Application Data\gtk-2.0\gtk-2.0\wmgaaaizl.dll.vir Win32/BHO.OEI trojan
C:\Qoobox\Quarantine\C\Documents and Settings\admin\Application Data\Microsoft\Microsoft\lfbegkzq.dll.vir a variant of Win32/Kryptik.AEVS trojan
C:\Qoobox\Quarantine\C\Documents and Settings\admin\Application Data\Microsoft\Microsoft\sgpeue.dll.vir a variant of Win32/Kryptik.AEVS trojan
C:\Qoobox\Quarantine\C\Documents and Settings\admin\Application Data\Mythicsoft\Mythicsoft\ulbzyvwiq.dll.vir a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP813\A0253382.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP814\A0254574.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP814\A0254748.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP814\A0255103.dll Win32/Boaxxe.C trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP814\A0255237.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP814\A0255238.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP817\A0258831.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP817\A0258977.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP817\A0259330.dll Win32/Boaxxe.C trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP817\A0259464.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP817\A0259465.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP817\A0263285.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP817\A0263286.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP828\A0286596.dll Win32/BHO.OEI trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP828\A0286597.dll a variant of Win32/Kryptik.AEVS trojan
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP834\A0293199.exe Win32/RegistryBooster application
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP834\A0293200.exe Win32/RegistryBooster application
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP834\A0293201.exe Win32/RegistryBooster application
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP834\A0293202.exe Win32/RegistryBooster application
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP834\A0293203.exe Win32/RegistryBooster application
C:\System Volume Information\_restore{DC8B3F3B-D8D9-46A8-8BA6-BA989EC78CF4}\RP834\A0293204.exe a variant of Win32/RegistryBooster application
C:\TDSSKiller_Quarantine\28.04.2012_14.24.46\mbr0000\tdlfs0000\tsk0001.dta Win32/Olmarik.AYI trojan
C:\TDSSKiller_Quarantine\28.04.2012_14.24.46\mbr0000\tdlfs0000\tsk0002.dta Win64/Olmarik.AK trojan
C:\TDSSKiller_Quarantine\28.04.2012_14.24.46\mbr0000\tdlfs0000\tsk0003.dta Win32/Olmarik.AWO trojan
C:\TDSSKiller_Quarantine\28.04.2012_14.24.46\mbr0000\tdlfs0000\tsk0004.dta Win64/Olmarik.AK trojan
C:\TDSSKiller_Quarantine\28.04.2012_14.24.46\mbr0000\tdlfs0000\tsk0008.dta Win32/Olmarik.AFK trojan
C:\TDSSKiller_Quarantine\28.04.2012_14.24.46\mbr0000\tdlfs0000\tsk0009.dta Win64/Olmarik.AK trojan

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:38 AM

Posted 28 April 2012 - 11:58 PM

Greetings

There are somethings in the online scan I want to remove so run this scrript for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

File::
C:\Documents and Settings\admin\Application Data\Apple Computer\Apple Computer\tceskqa.dll
C:\Documents and Settings\admin\Application Data\Apple Computer\Apple Computer\vmvsz.dll
C:\Documents and Settings\admin\Application Data\gtk-2.0\gtk-2.0\afxjahc.dll
C:\Documents and Settings\admin\Application Data\Mythicsoft\Mythicsoft\sqduxv.dll

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer



"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 Jmul

Jmul
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 29 April 2012 - 12:40 AM

ComboFix log:

ComboFix 12-04-28.01 - admin 04/29/2012 0:24.8.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.503.268 [GMT -5:00]
Running from: c:\documents and settings\admin\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\admin\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
FILE ::
"c:\documents and settings\admin\Application Data\Apple Computer\Apple Computer\tceskqa.dll"
"c:\documents and settings\admin\Application Data\Apple Computer\Apple Computer\vmvsz.dll"
"c:\documents and settings\admin\Application Data\gtk-2.0\gtk-2.0\afxjahc.dll"
"c:\documents and settings\admin\Application Data\Mythicsoft\Mythicsoft\sqduxv.dll"
.
.
((((((((((((((((((((((((( Files Created from 2012-03-28 to 2012-04-29 )))))))))))))))))))))))))))))))
.
.
2012-04-29 03:28 . 2012-04-29 03:28 -------- d-----w- c:\program files\ESET
2012-04-29 02:15 . 2012-04-29 02:15 388096 ----a-r- c:\documents and settings\admin\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2012-04-29 01:55 . 2012-04-29 01:55 -------- d-----w- c:\program files\CCleaner
2012-04-29 01:50 . 2012-04-29 01:50 -------- d-----w- c:\program files\VS Revo Group
2012-04-28 19:25 . 2012-04-28 19:25 -------- d-----w- C:\TDSSKiller_Quarantine
2012-04-27 16:26 . 2012-04-27 16:26 -------- d-----w- c:\windows\system32\wbem\Repository
2012-04-27 00:41 . 2012-04-27 16:25 -------- d-----w- c:\program files\Combined Community Codec Pack(2)
2012-04-24 22:21 . 2012-04-24 22:21 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Temp
2012-04-23 22:28 . 2012-04-23 22:28 -------- d-----w- c:\program files\Trend Micro
2012-04-23 19:41 . 2012-04-23 19:41 -------- d-----w- c:\program files\Unlocker
2012-04-23 19:21 . 2012-04-29 01:52 -------- dc----w- c:\documents and settings\All Users\Application Data\~0
2012-04-23 19:20 . 2012-04-23 19:20 -------- d-----w- c:\documents and settings\admin\Local Settings\Application Data\PackageAware
2012-04-23 19:15 . 2012-04-23 19:15 3584 ----a-r- c:\documents and settings\admin\Application Data\Microsoft\Installer\{121634B0-2F4B-11D3-ADA3-00C04F52DD52}\Icon386ED4E3.exe
2012-04-23 19:15 . 2012-04-23 19:15 -------- d-----w- c:\program files\Windows Installer Clean Up
2012-04-23 18:35 . 2012-04-23 18:35 -------- d-----w- c:\program files\Common Files\Java
2012-04-23 18:34 . 2012-04-23 18:34 73728 ----a-w- c:\windows\system32\javacpl.cpl
2012-04-20 22:37 . 2012-04-27 16:27 -------- d-----w- c:\documents and settings\Administrator.OWNER.003
2012-04-20 21:57 . 2012-04-20 21:57 -------- d-----w- c:\documents and settings\admin\Application Data\AmPro
2012-04-20 21:50 . 2012-04-20 21:50 -------- d-----w- c:\documents and settings\admin\AppData
2012-04-20 21:31 . 2012-04-20 21:34 -------- d-s---w- c:\documents and settings\Administrator.OWNER.002
2012-04-20 14:17 . 2012-04-20 21:46 -------- d-s---w- c:\documents and settings\Administrator.OWNER.001
2012-04-20 04:45 . 2012-04-20 22:02 -------- d-----w- C:\d30af35d66ffe0e4b94424bb
2012-04-06 01:31 . 2012-04-20 21:50 -------- d-----w- c:\program files\Apple Software Update
2012-04-05 01:57 . 2012-04-13 18:55 418464 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-04-04 05:53 . 2012-04-04 05:53 182160 ----a-w- c:\program files\Mozilla Firefox\plugins\nppdf32.dll
2012-04-04 05:53 . 2012-04-04 05:53 182160 ----a-w- c:\program files\Internet Explorer\Plugins\nppdf32.dll
2012-04-01 21:28 . 2012-04-04 20:56 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-04-01 21:28 . 2012-04-20 21:55 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-04-01 18:38 . 2012-01-19 15:22 42864 ----a-r- c:\windows\system32\SBBD.EXE
2012-04-01 18:38 . 2012-01-12 14:26 101112 ----a-r- c:\windows\system32\drivers\SBREDrv.sys
2012-04-01 18:38 . 2012-04-01 22:44 -------- d-----w- c:\documents and settings\All Users\Application Data\STOPzilla!
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-04-23 18:34 . 2010-09-03 01:28 472808 ----a-w- c:\windows\system32\deployJava1.dll
2012-04-13 18:55 . 2011-05-17 20:59 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-03-01 11:01 . 2008-04-14 12:00 916992 ----a-w- c:\windows\system32\wininet.dll
2012-03-01 11:01 . 2008-04-14 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2012-03-01 11:01 . 2008-04-14 12:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2012-02-29 14:10 . 2008-04-14 12:00 177664 ----a-w- c:\windows\system32\wintrust.dll
2012-02-29 14:10 . 2008-04-14 12:00 148480 ----a-w- c:\windows\system32\imagehlp.dll
2012-02-29 12:17 . 2008-04-14 12:00 385024 ----a-w- c:\windows\system32\html.iec
2012-02-08 22:05 . 2012-02-08 22:05 21016 ----a-w- C:\FixitRegBackup.reg
2012-02-03 09:22 . 2008-04-14 12:00 1860096 ----a-w- c:\windows\system32\win32k.sys
2012-04-12 16:58 . 2012-04-12 16:58 97208 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((( SnapShot_2012-04-24_02.01.02 )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-04-29 01:45 . 2012-04-29 01:45 16384 c:\windows\temp\Perflib_Perfdata_5f4.dat
+ 2012-04-23 23:13 . 2010-07-05 13:15 17272 c:\windows\system32\spmsg.dll
- 2008-04-14 12:00 . 2009-03-08 09:31 66560 c:\windows\system32\mshtmled.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 66560 c:\windows\system32\mshtmled.dll
+ 2009-03-08 09:31 . 2012-03-01 11:01 55296 c:\windows\system32\msfeedsbs.dll
- 2009-03-08 09:31 . 2009-03-08 09:31 55296 c:\windows\system32\msfeedsbs.dll
- 2008-04-14 12:00 . 2009-03-08 09:33 25600 c:\windows\system32\jsproxy.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 25600 c:\windows\system32\jsproxy.dll
+ 2009-08-26 20:17 . 2012-03-01 11:01 12800 c:\windows\system32\dllcache\xpshims.dll
- 2009-08-26 20:17 . 2011-12-17 19:46 12800 c:\windows\system32\dllcache\xpshims.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 66560 c:\windows\system32\dllcache\mshtmled.dll
- 2008-04-14 12:00 . 2009-03-08 09:31 66560 c:\windows\system32\dllcache\mshtmled.dll
+ 2009-08-26 20:17 . 2012-03-01 11:01 55296 c:\windows\system32\dllcache\msfeedsbs.dll
- 2009-08-26 20:17 . 2011-12-17 19:46 55296 c:\windows\system32\dllcache\msfeedsbs.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 43520 c:\windows\system32\dllcache\licmgr10.dll
- 2008-04-14 12:00 . 2009-03-08 09:33 25600 c:\windows\system32\dllcache\jsproxy.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 25600 c:\windows\system32\dllcache\jsproxy.dll
- 2012-04-21 16:21 . 2010-07-05 13:15 26488 c:\windows\SoftwareDistribution\Download\c656e6c592787a464f852186d6e0b466\update\spcustom.dll
- 2012-04-21 16:21 . 2010-07-05 13:15 17272 c:\windows\SoftwareDistribution\Download\c656e6c592787a464f852186d6e0b466\spmsg.dll
+ 2012-04-29 01:42 . 2009-03-08 09:33 12288 c:\windows\ie8updates\KB2675157-IE8\xpshims.dll
+ 2012-04-29 01:42 . 2009-03-08 09:31 66560 c:\windows\ie8updates\KB2675157-IE8\mshtmled.dll
+ 2012-04-29 01:42 . 2009-03-08 09:31 55296 c:\windows\ie8updates\KB2675157-IE8\msfeedsbs.dll
+ 2012-04-29 01:42 . 2009-03-08 09:34 43008 c:\windows\ie8updates\KB2675157-IE8\licmgr10.dll
+ 2012-04-29 01:42 . 2009-03-08 09:33 25600 c:\windows\ie8updates\KB2675157-IE8\jsproxy.dll
+ 2012-04-29 01:38 . 2010-07-05 13:15 17272 c:\windows\ie8updates\KB2544521-IE8\spmsg.dll
+ 2012-04-29 01:39 . 2010-07-05 13:15 26488 c:\windows\ie8updates\KB2544521-IE8\spcustom.dll
+ 2012-04-29 01:38 . 2010-07-05 13:15 17272 c:\windows\ie8updates\KB2510531-IE8\spmsg.dll
+ 2012-04-29 01:38 . 2010-07-05 13:15 26488 c:\windows\ie8updates\KB2510531-IE8\spcustom.dll
+ 2008-04-14 12:00 . 2009-04-02 04:02 604160 c:\windows\system32\wmspdmod.dll
- 2008-04-14 12:00 . 2009-01-31 01:34 604160 c:\windows\system32\WMSPDMOD.dll
+ 2008-04-14 12:00 . 2009-07-14 04:43 286208 c:\windows\system32\wmpdxm.dll
+ 2008-04-14 12:00 . 2011-03-04 06:37 420864 c:\windows\system32\vbscript.dll
- 2008-04-14 12:00 . 2009-03-08 09:34 105984 c:\windows\system32\url.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 105984 c:\windows\system32\url.dll
+ 2010-07-18 02:13 . 2012-04-27 16:29 300472 c:\windows\system32\Restore\rstrlog.dat
+ 2008-04-14 12:00 . 2012-03-01 11:01 206848 c:\windows\system32\occache.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 611840 c:\windows\system32\mstime.dll
- 2008-04-14 12:00 . 2009-03-08 09:32 611840 c:\windows\system32\mstime.dll
+ 2009-03-08 09:32 . 2012-03-01 11:01 602112 c:\windows\system32\msfeeds.dll
+ 2009-01-31 01:33 . 2010-03-30 17:24 317440 c:\windows\system32\mp4sdecd.dll
- 2009-01-31 01:33 . 2009-01-31 01:33 317440 c:\windows\system32\MP4SDECD.dll
+ 2008-04-14 12:00 . 2011-03-04 06:37 726528 c:\windows\system32\jscript.dll
- 2008-04-14 12:00 . 2009-03-08 09:33 726528 c:\windows\system32\jscript.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 184320 c:\windows\system32\iepeers.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 387584 c:\windows\system32\iedkcs32.dll
+ 2008-04-14 12:00 . 2012-02-29 12:17 174080 c:\windows\system32\ie4uinit.exe
- 2009-08-26 14:20 . 2012-02-16 22:40 270192 c:\windows\system32\FNTCACHE.DAT
+ 2009-08-26 14:20 . 2012-04-29 01:45 270192 c:\windows\system32\FNTCACHE.DAT
+ 2009-08-26 18:27 . 2012-01-09 16:20 139784 c:\windows\system32\drivers\rdpwd.sys
+ 2008-04-14 12:00 . 2009-04-02 04:02 604160 c:\windows\system32\dllcache\wmspdmod.dll
- 2008-04-14 12:00 . 2009-01-31 01:34 604160 c:\windows\system32\dllcache\WMSPDMOD.dll
+ 2008-04-14 12:00 . 2009-07-14 04:43 286208 c:\windows\system32\dllcache\wmpdxm.dll
- 2008-04-14 12:00 . 2009-12-24 06:59 177664 c:\windows\system32\dllcache\wintrust.dll
+ 2008-04-14 12:00 . 2012-02-29 14:10 177664 c:\windows\system32\dllcache\wintrust.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 916992 c:\windows\system32\dllcache\wininet.dll
+ 2009-08-26 18:30 . 2011-04-30 03:01 758784 c:\windows\system32\dllcache\vgx.dll
+ 2008-04-14 12:00 . 2011-03-04 06:37 420864 c:\windows\system32\dllcache\vbscript.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 105984 c:\windows\system32\dllcache\url.dll
- 2008-04-14 12:00 . 2009-03-08 09:34 105984 c:\windows\system32\dllcache\url.dll
+ 2009-08-26 18:27 . 2012-01-09 16:20 139784 c:\windows\system32\dllcache\rdpwd.sys
+ 2008-04-14 12:00 . 2012-03-01 11:01 206848 c:\windows\system32\dllcache\occache.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 611840 c:\windows\system32\dllcache\mstime.dll
- 2008-04-14 12:00 . 2009-03-08 09:32 611840 c:\windows\system32\dllcache\mstime.dll
- 2009-08-26 20:17 . 2011-12-17 19:46 602112 c:\windows\system32\dllcache\msfeeds.dll
+ 2009-08-26 20:17 . 2012-03-01 11:01 602112 c:\windows\system32\dllcache\msfeeds.dll
+ 2008-04-14 12:00 . 2011-03-04 06:37 726528 c:\windows\system32\dllcache\jscript.dll
- 2008-04-14 12:00 . 2009-03-08 09:33 726528 c:\windows\system32\dllcache\jscript.dll
+ 2008-04-14 12:00 . 2012-02-29 14:10 148480 c:\windows\system32\dllcache\imagehlp.dll
+ 2009-08-26 20:17 . 2012-03-01 11:01 247808 c:\windows\system32\dllcache\ieproxy.dll
- 2009-08-26 20:17 . 2011-12-17 19:46 247808 c:\windows\system32\dllcache\ieproxy.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 184320 c:\windows\system32\dllcache\iepeers.dll
- 2010-06-11 00:39 . 2011-12-17 19:46 743424 c:\windows\system32\dllcache\iedvtool.dll
+ 2010-06-11 00:39 . 2012-03-01 11:01 743424 c:\windows\system32\dllcache\iedvtool.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 387584 c:\windows\system32\dllcache\iedkcs32.dll
+ 2008-04-14 12:00 . 2012-02-29 12:17 174080 c:\windows\system32\dllcache\ie4uinit.exe
- 2012-04-21 16:21 . 2010-07-05 13:16 382840 c:\windows\SoftwareDistribution\Download\c656e6c592787a464f852186d6e0b466\update\updspapi.dll
- 2012-04-21 16:21 . 2010-07-05 13:15 755576 c:\windows\SoftwareDistribution\Download\c656e6c592787a464f852186d6e0b466\update\update.exe
- 2012-04-21 16:21 . 2010-07-05 13:15 231288 c:\windows\SoftwareDistribution\Download\c656e6c592787a464f852186d6e0b466\spuninst.exe
+ 2012-04-29 01:42 . 2009-03-08 09:34 914944 c:\windows\ie8updates\KB2675157-IE8\wininet.dll
+ 2012-04-29 01:42 . 2009-03-08 09:34 105984 c:\windows\ie8updates\KB2675157-IE8\url.dll
+ 2012-04-29 01:42 . 2010-07-05 13:16 382840 c:\windows\ie8updates\KB2675157-IE8\spuninst\updspapi.dll
+ 2012-04-29 01:42 . 2010-07-05 13:15 231288 c:\windows\ie8updates\KB2675157-IE8\spuninst\spuninst.exe
+ 2012-04-29 01:42 . 2009-03-08 09:34 109568 c:\windows\ie8updates\KB2675157-IE8\occache.dll
+ 2012-04-29 01:42 . 2009-03-08 09:32 611840 c:\windows\ie8updates\KB2675157-IE8\mstime.dll
+ 2012-04-29 01:42 . 2009-03-08 09:32 594432 c:\windows\ie8updates\KB2675157-IE8\msfeeds.dll
+ 2012-04-29 01:42 . 2009-03-08 09:33 246784 c:\windows\ie8updates\KB2675157-IE8\ieproxy.dll
+ 2012-04-29 01:42 . 2009-03-08 09:31 183808 c:\windows\ie8updates\KB2675157-IE8\iepeers.dll
+ 2012-04-29 01:42 . 2009-03-08 09:35 742912 c:\windows\ie8updates\KB2675157-IE8\iedvtool.dll
+ 2012-04-29 01:42 . 2009-03-08 19:09 391536 c:\windows\ie8updates\KB2675157-IE8\iedkcs32.dll
+ 2012-04-29 01:42 . 2009-03-08 09:32 173056 c:\windows\ie8updates\KB2675157-IE8\ie4uinit.exe
+ 2012-04-29 01:38 . 2009-03-08 09:33 759296 c:\windows\ie8updates\KB2544521-IE8\vgx.dll
+ 2012-04-29 01:39 . 2010-07-05 13:16 382840 c:\windows\ie8updates\KB2544521-IE8\updspapi.dll
+ 2012-04-29 01:39 . 2010-07-05 13:15 755576 c:\windows\ie8updates\KB2544521-IE8\update.exe
+ 2012-04-29 01:39 . 2010-07-05 13:16 382840 c:\windows\ie8updates\KB2544521-IE8\spuninst\updspapi.dll
+ 2012-04-29 01:39 . 2010-07-05 13:15 231288 c:\windows\ie8updates\KB2544521-IE8\spuninst\spuninst.exe
+ 2012-04-29 01:38 . 2010-07-05 13:15 231288 c:\windows\ie8updates\KB2544521-IE8\spuninst.exe
+ 2012-04-29 01:38 . 2009-03-08 09:33 420352 c:\windows\ie8updates\KB2510531-IE8\vbscript.dll
+ 2012-04-29 01:38 . 2010-07-05 13:16 382840 c:\windows\ie8updates\KB2510531-IE8\updspapi.dll
+ 2012-04-29 01:38 . 2010-07-05 13:15 755576 c:\windows\ie8updates\KB2510531-IE8\update.exe
+ 2012-04-29 01:38 . 2010-07-05 13:16 382840 c:\windows\ie8updates\KB2510531-IE8\spuninst\updspapi.dll
+ 2012-04-29 01:38 . 2010-07-05 13:15 231288 c:\windows\ie8updates\KB2510531-IE8\spuninst\spuninst.exe
+ 2012-04-29 01:38 . 2010-07-05 13:15 231288 c:\windows\ie8updates\KB2510531-IE8\spuninst.exe
+ 2012-04-29 01:38 . 2009-03-08 09:33 726528 c:\windows\ie8updates\KB2510531-IE8\jscript.dll
+ 2008-04-14 12:00 . 2010-04-06 09:52 2462720 c:\windows\system32\WMVCore.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 1212416 c:\windows\system32\urlmon.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 5978624 c:\windows\system32\mshtml.dll
+ 2009-03-08 09:32 . 2012-03-01 11:01 2000384 c:\windows\system32\iertutil.dll
+ 2008-04-14 12:00 . 2010-04-06 09:52 2462720 c:\windows\system32\dllcache\WMVCore.dll
+ 2008-04-14 12:00 . 2012-02-03 09:22 1860096 c:\windows\system32\dllcache\win32k.sys
+ 2008-04-14 12:00 . 2012-03-01 11:01 1212416 c:\windows\system32\dllcache\urlmon.dll
+ 2008-04-14 12:00 . 2012-03-01 11:01 5978624 c:\windows\system32\dllcache\mshtml.dll
+ 2009-08-26 20:17 . 2012-03-01 11:01 2000384 c:\windows\system32\dllcache\iertutil.dll
- 2009-08-26 20:17 . 2011-12-17 19:46 2000384 c:\windows\system32\dllcache\iertutil.dll
+ 2012-04-29 02:15 . 2012-04-29 02:15 1094656 c:\windows\Installer\195cd6.msi
+ 2012-04-29 01:42 . 2009-03-08 09:34 1206784 c:\windows\ie8updates\KB2675157-IE8\urlmon.dll
+ 2012-04-29 01:42 . 2009-03-08 09:41 5937152 c:\windows\ie8updates\KB2675157-IE8\mshtml.dll
+ 2012-04-29 01:42 . 2009-03-08 09:32 1985024 c:\windows\ie8updates\KB2675157-IE8\iertutil.dll
+ 2008-04-14 12:00 . 2010-08-26 04:36 10841088 c:\windows\system32\wmp.dll
+ 2009-03-08 09:39 . 2012-03-02 11:01 11082752 c:\windows\system32\ieframe.dll
+ 2008-04-14 12:00 . 2010-08-26 04:36 10841088 c:\windows\system32\dllcache\wmp.dll
+ 2009-08-26 20:17 . 2012-03-02 11:01 11082752 c:\windows\system32\dllcache\ieframe.dll
+ 2012-04-29 01:42 . 2009-03-08 09:39 11063808 c:\windows\ie8updates\KB2675157-IE8\ieframe.dll
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-04-27 3905920]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-01-13 163840]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-01-13 135168]
"AGRSMMSG"="AGRSMMSG.exe" [2005-11-16 88209]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-09-15 102400]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-04-04 462408]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=c:\windows\pss\Windows Search.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2012-01-03 07:37 843712 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe [BU]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IMJPMIG8.1]
2008-04-14 12:00 208952 ----a-w- c:\windows\ime\imjp8_1\imjpmig.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-04-28 20:06 142120 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes' Anti-Malware]
2012-04-04 20:56 462408 ----a-w- c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 15:50 155648 ----a-w- c:\windows\system32\NeroCheck.exe
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\Steam\\Steam.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\ultimate doom\\ultimate.bat"=
"c:\\Program Files\\mIRC\\mirc.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\wolfenstein 3d\\Wolf3d.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M1 - Spear of Destiny.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M2 - Return to Danger.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\spear of destiny\\M3 - Ultimate Challenge.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\doom 2\\doom2 + mouse.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\doom 2\\doom2.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\wolfenstein 3d\\base\\dosbox.exe"=
"c:\\Documents and Settings\\admin\\Desktop\\ffdshow-rev3072_20090912\\MM8BDM-v2c\\skulltag.exe"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 11:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 4:55 PM 67664]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [4/1/2012 1:38 PM 101112]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [8/11/2011 6:38 PM 116608]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [4/1/2012 4:28 PM 654408]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [4/1/2012 4:28 PM 22344]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [4/4/2012 8:57 PM 253088]
S3 cpuz134;cpuz134; [x]
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - MBAMSwissArmy
.
Contents of the 'Scheduled Tasks' folder
.
2012-04-29 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-05 18:55]
.
2012-04-27 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 22:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\documents and settings\admin\Application Data\Mozilla\Firefox\Profiles\rsnp0ui1.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/?pc=Z179&install_date=20111029
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=Z179&form=ZGAADF&install_date=20111029&q=
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-{09FF4DB8-7DE9-4D47-B7DB-915DB7D9A8CA} - c:\documents and settings\All Users\Application Data\{6AD8E59C-250C-4201-B5BA-56ADEF76FF46}\bm_installer.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-04-29 00:34
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(864)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
.
- - - - - - - > 'explorer.exe'(3892)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2012-04-29 00:38:32
ComboFix-quarantined-files.txt 2012-04-29 05:38
ComboFix2.txt 2012-04-29 01:11
ComboFix3.txt 2012-04-28 14:44
ComboFix4.txt 2012-04-27 22:57
ComboFix5.txt 2012-04-29 05:17
.
Pre-Run: 34,331,680,768 bytes free
Post-Run: 34,377,252,864 bytes free
.
- - End Of File - - F9AA43E3934B96BD0D667BE00C309668

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:38 AM

Posted 29 April 2012 - 05:58 AM

Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


:Why we need to remove some of our tools:

Some of the tools we have used to clean your computer were made by fellow malware fighters and are very powerful and if used incorrectly or at the wrong time can make the computer an expensive paper weight.
They are updated all the time and some of them more than once a day so by the time you are ready to use them again they will already be outdated.

The following procedures will implement some cleanup procedures to remove these tools. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.
:DeFogger:

Note** Defogger only needs to be run if it was run when we first started. If you have not already run it then skip this.

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK.
Your Emulation drivers are now re-enabled.

:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • Posted Image

:Remove the rest of our tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

:The programs you can keep:

Some of the programs that we have used would be a good idea to keep and used often in helping to keep the computer clean. I use these programs on my computer.

Revo Uninstaller Free - this is the uninstaller that I had you download and works allot better than add/remove in windows and has saved me more than once from corrupted installs and uninstalls

CCleaner - This is a good program to clean out temp files, I would use this once a week or before any malware scan to remove unwanted temp files - It has a built in registry cleaner but I would leave that alone and not use any registry cleaner

Malwarebytes' Anti-Malware The Gold standard today in antimalware scanners

:Security programs:

One of the questions I am asked all the time is "What programs do you use" I have at this time 4 computers in my home and I have this setup on all 4 of them.


  • Microsoft Security Essentials - provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often. (I have upgraded to the paid version of MBAM and I am glad I did)

    Note** If you decide to install MSE you will need to uninstall your present Antivirus

:Security awareness:

The other question I am asked all the time is "How can I prevent this from happening again." and the short answer to that is to be aware of what is out there and how to start spotting dangers.

Here are some articles that are must reads and should be read by everybody in your household that uses the internet

internetsafety

Internet Safety for Kids

Here is some more reading for you from some of my colleges

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum

COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

quoted from Tech Support Forum

Conclusion

There is no such thing as ‘perfect security’. This applies to many things, not just computer systems. Using the above guide you should be able to take all the reasonable steps you can to prevent infection. However, the most important part of all this is you, the user. Surf sensibly and think before you download a file or click on a link. Take a few moments to assess the possible risks and you should be able to enjoy all the internet has to offer.


I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->Posted Image<-- Don't worry every little bit helps.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users