Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Forensics of a very severe malware infection


  • This topic is locked This topic is locked
11 replies to this topic

#1 aninkling

aninkling

  • Members
  • 75 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 04 May 2010 - 01:04 PM

This is a computer with multiple infections. I am attempting to assess what infections they are and what can be done with the infections in place. Normally, with all that I've found, I would wipe the hard drive and start over. But it is necessary, in this case, to identify all the malware I can.

The computer did not have malware or virus protection. The OS is Vista.

I initially ran malwarebytes in a regular session. The results:

[codebox]Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3930

Windows 6.0.6001 Service Pack 1
Internet Explorer 7.0.6001.18000

4/16/2010 2:30:36 PM
mbam-log-2010-04-16 (14-30-36).txt

Scan type: Full scan (C:|)
Objects scanned: 303203
Time elapsed: 5 hour(s), 14 minute(s), 30 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 2
Registry Values Infected: 3
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 319

Memory Processes Infected:
C:Program FilesGamevancegamevance32.exe (Adware.Gamevance) -> No action taken.

Memory Modules Infected:
C:Program FilesGamevancegamevancelib32.dll (Adware.Gamevance) -> No action taken.

Registry Keys Infected:
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtStats{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallgamevance (Adware.Gamevance) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogontaskman (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRungamevance (Adware.Gamevance) -> No action taken.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRunfwirohapuhidono (Trojan.Agent.U) -> No action taken.

Registry Data Items Infected:
HKEY_CURRENT_USERSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell (Hijack.Shell) -> Bad: (explorer.exe,C:RECYCLERS-1-5-21-9517199572-0227472642-357729880-2484rundll32.exe) Good: (Explorer.exe) -> No action taken.

Folders Infected:
C:Program FilesGamevance (Adware.Gamevance) -> No action taken.

Files Infected:
C:RECYCLERS-1-5-21-0930990190-4522715220-369460229-3553yv8g67.exe (Worm.Autorun.cool.gif -> No action taken.
C:RECYCLERS-1-5-21-1732034387-1178126501-721395065-9630yv8g67.exe (Worm.Autorun.cool.gif -> No action taken.
C:RECYCLERS-1-5-21-8822959923-5768546287-168000731-6777yv8g67.exe (Worm.Autorun.cool.gif -> No action taken.
C:RECYCLERS-1-5-21-9517199572-0227472642-357729880-2484rundll32.exe (Worm.Autorun.cool.gif -> No action taken.
C:RECYCLERS-1-5-21-9639110868-3935874138-751741390-1546yv8g67.exe (Trojan.Dropper) -> No action taken.
C:RECYCLERS-1-5-21-4602674107-2360958502-944601678-0474rundll32.exe (Worm.Autorun.cool.gif -> No action taken.
C:UsersheidiAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE50D8T58UBbuwb8[1].exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE50D8T58UBdenin6[1].exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE50D8T58UBfcewnkn7[1].exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp004.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp007.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp009.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp012.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp059.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp154.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp315.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp521.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp856.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp931.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp787.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp789.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp798.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp808.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp818.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp822.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp823.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp824.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp825.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp830.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp838.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp839.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp840.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp844.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp846.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp847.exe (Trojan.Hiloti) -> No action taken.
C:UsersheidiAppDataLocalTemp848.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp851.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp853.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp855.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp206.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp216.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp218.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp221.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp225.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp236.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp237.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp239.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp242.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp245.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp247.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp252.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp253.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp255.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp256.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp260.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp262.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp266.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp268.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp269.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp271.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp272.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp276.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp278.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp279.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp280.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp284.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp287.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp290.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp299.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp305.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp306.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp307.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp314.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp025.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp027.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp030.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp032.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp050.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp052.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp053.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp056.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp057.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp432.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp437.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp438.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp439.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp440.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp443.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp445.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp446.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp449.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp451.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp454.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp458.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp475.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp477.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp478.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp479.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp499.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp503.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp505.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp507.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp508.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp511.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp113.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp115.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp116.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp117.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp121.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp122.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp127.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp135.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp137.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp139.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp141.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp144.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp146.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp148.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp601.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp602.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp606.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp613.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp615.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp619.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp620.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp622.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp626.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp627.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp631.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp642.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp648.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp649.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp652.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp663.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp666.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp670.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp673.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp674.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp676.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp677.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp680.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp681.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp682.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp687.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp697.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp860.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp868.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp874.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp879.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp888.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp891.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp896.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp898.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp899.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp907.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp913.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp915.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp918.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp920.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp924.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp927.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp928.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp700.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp702.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp704.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp709.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp711.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp713.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp714.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp716.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp719.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp723.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp725.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp728.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp730.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp733.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp739.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp746.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp750.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp753.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp755.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp756.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp761.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp762.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp763.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp764.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp768.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp770.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp773.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp774.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp775.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp777.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp316.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp322.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp327.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp331.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp333.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp346.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp348.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp349.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp351.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp352.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp356.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp363.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp364.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp365.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp366.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp368.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp372.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp377.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp382.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp383.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp384.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp387.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp390.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp392.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp403.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp404.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp406.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp407.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp409.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp410.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp412.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp425.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp522.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp525.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp527.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp532.exe (Trojan.Hiloti) -> No action taken.
C:UsersheidiAppDataLocalTemp534.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp535.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp537.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp544.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp556.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp559.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp560.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp561.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp563.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp569.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp570.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp571.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp576.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp578.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp579.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp580.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp590.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp596.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp597.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp599.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp157.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp159.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp162.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp163.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp164.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp168.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp170.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp173.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp176.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp183.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp184.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp185.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp186.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp189.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp191.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp192.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp195.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp196.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp204.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp060.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp072.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp074.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp075.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp076.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp077.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp080.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp083.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp084.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp088.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp089.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp090.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp093.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp095.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp098.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp099.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp104.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp106.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp107.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp108.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp111.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp933.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp944.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp945.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp951.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp953.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp954.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp956.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp962.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp968.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp970.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp974.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp976.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp980.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp981.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp982.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp988.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp989.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiAppDataLocalTemp990.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp991.exe (Trojan.Ddox) -> No action taken.
C:UsersheidiAppDataLocalTemp994.exe (Trojan.Dropper) -> No action taken.
C:UsersheidiAppDataLocalTemp996.exe (Trojan.Hiloti) -> No action taken.
C:UsersheidiAppDataLocalTempIXP000.TMPd.exe (Backdoor.Bot) -> No action taken.
C:UsersheidiDesktopsetup_build8_208.exe (Rogue.Installer) -> No action taken.
C:UsersheidiDesktopOriginalssetup_build8_208(2).exe (Rogue.Installer) -> No action taken.
C:UsersJack BrattonAppDataLocalav.exe (Trojan.FakeAlert) -> No action taken.
C:Program FilesGamevancears.cfg (Adware.Gamevance) -> No action taken.
C:Program FilesGamevancegamevance32.exe (Adware.Gamevance) -> No action taken.
C:Program FilesGamevancegamevancelib32.dll (Adware.Gamevance) -> No action taken.
C:Program FilesGamevancegvtl.dll (Adware.Gamevance) -> No action taken.
C:Program FilesGamevancegvun.exe (Adware.Gamevance) -> No action taken.
C:Program FilesGamevanceicon.ico (Adware.Gamevance) -> No action taken.

[/codebox]

I deleted all and I ran HijackThis:

[codebox]
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:19:13 PM, on 5/3/2010
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18444)
Boot mode: Normal

Running processes:
c:PROGRA~1mcafee.comagentmcagent.exe
C:Windowssystem32taskeng.exe
C:Windowssystem32Dwm.exe
C:WindowsExplorer.EXE
C:WindowsSystem32hkcmd.exe
C:WindowsSystem32igfxpers.exe
C:Program FilesToshibaPower SaverTPwrMain.exe
C:Program FilesToshibaSmoothViewSmoothView.exe
C:Program FilesToshibaFlashCardsTCrdMain.exe
C:Program FilesWindows DefenderMSASCui.exe
C:WindowsRtHDVCpl.exe
C:Program FilesToshibaConfigFreeNDSTray.exe
C:Program FilesGoogleGoogle Desktop SearchGoogleDesktop.exe
C:Program FilesHPHP Software UpdatehpwuSchd2.exe
C:Program FilesWindows LiveFamily Safetyfsui.exe
C:Program FilesLogitechQuickCamQuickcam.exe
C:Program FilesJavajre6binjusched.exe
C:Program FilesiTunesiTunesHelper.exe
C:Program FilesToshibaTOSCDSPDTOSCDSPD.exe
C:Program FilesMySpaceIMMySpaceIM.exe
C:Windowsehomeehtray.exe
C:UsersheidiAppDataRoamingSmileboxSmileboxTray.exe
C:Windowssystem32igfxsrvc.exe
C:Program FilesWindows LiveMessengermsnmsgr.exe
C:Program FilesHPDigital Imagingbinhpqtra08.exe
C:Program FilesLimeWireLimeWire.exe
C:Program FilesMicrosoft OfficeOffice12ONENOTEM.EXE
C:Windowsehomeehmsas.exe
C:Windowssystem32wuauclt.exe
C:Program FilesToshibaConfigFreeCFSwMgr.exe
C:Program FilesHPDigital ImagingbinhpqSTE08.exe
C:Program FilesYahoo!Messengerymsgr_tray.exe
C:Program FilesCommon FilesLogishrdLQCVFXCOCIManager.exe
c:PROGRA~1mcafeemscmcuimgr.exe
C:Program FilesMalwarebytes' Anti-Malwarembam.exe
C:Program FilesOpenOffice.org 3programsoffice.exe
C:Program FilesOpenOffice.org 3programsoffice.bin
C:Program FilesThoosje Vista TweakerVista Tweaker.exe
C:Windowshelppane.exe
C:Program FilesTrend MicroHijackThisHijackThis.exe

R0 - HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.yahoo.com
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.yahoo.com/
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaul...//www.yahoo.com
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Bar = http://us.rd.yahoo.com/customize/ie/defaul...rch/search.html
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://us.rd.yahoo.com/customize/ie/defaul...//www.yahoo.com
R0 - HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.yahoo.com/
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant =
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,CustomizeSearch =
R1 - HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyOverride = *.local
R0 - HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName =
R3 - URLSearchHook: ToggleEN Toolbar - {038cb5c7-48ea-4af9-94e0-a1646542e62b} - C:Program FilesToggleENtbTog1.dll
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:PROGRA~1Yahoo!CompanionInstallscpnyt.dll
O1 - Hosts: ::1 localhost
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:PROGRA~1Yahoo!CompanionInstallscpnyt.dll
O2 - BHO: ToggleEN Toolbar - {038cb5c7-48ea-4af9-94e0-a1646542e62b} - C:Program FilesToggleENtbTog1.dll
O2 - BHO: Windows Live Family Safety Browser Helper - {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} - C:Program FilesWindows LiveFamily Safetyfssbho.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:Program FilesCommon FilesMicrosoft SharedWindows LiveWindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:Program FilesGoogleGoogle ToolbarGoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:Program FilesGoogleGoogleToolbarNotifier5.5.4723.1820swg.dll
O2 - BHO: Gamevance Text - {BEAC7DC8-E106-4C6A-931E-5A42E7362883} - C:Program FilesGamevancegvtl.dll (file missing)
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:Program FilesJavajre6binjp2ssv.dll
O2 - BHO: Yontoo Layers - {FD72061E-9FDE-484D-A58A-0BAB4151CAD8} - C:Program FilesYontoo Layers Client for Internet ExplorerYontooIEClient.dll
O2 - BHO: SingleInstance Class - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:PROGRA~1Yahoo!CompanionInstallscpnYTSingleInstance.dll
O3 - Toolbar: ToggleEN Toolbar - {038cb5c7-48ea-4af9-94e0-a1646542e62b} - C:Program FilesToggleENtbTog1.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:PROGRA~1Yahoo!CompanionInstallscpnyt.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:Program FilesGoogleGoogle ToolbarGoogleToolbar_32.dll
O4 - HKLM..Run: [IgfxTray] C:Windowssystem32igfxtray.exe
O4 - HKLM..Run: [HotKeysCmds] C:Windowssystem32hkcmd.exe
O4 - HKLM..Run: [Persistence] C:Windowssystem32igfxpers.exe
O4 - HKLM..Run: [TPwrMain] %ProgramFiles%TOSHIBAPower SaverTPwrMain.EXE
O4 - HKLM..Run: [SmoothView] %ProgramFiles%ToshibaSmoothViewSmoothView.exe
O4 - HKLM..Run: [00TCrdMain] %ProgramFiles%TOSHIBAFlashCardsTCrdMain.exe
O4 - HKLM..Run: [Windows Defender] %ProgramFiles%Windows DefenderMSASCui.exe -hide
O4 - HKLM..Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM..Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM..Run: [Google Desktop Search] "C:Program FilesGoogleGoogle Desktop SearchGoogleDesktop.exe" /startup
O4 - HKLM..Run: [mcagent_exe] C:Program FilesMcAfee.comAgentmcagent.exe /runkey
O4 - HKLM..Run: [HP Software Update] C:Program FilesHPHP Software UpdateHPWuSchd2.exe
O4 - HKLM..Run: [hpqSRMon] C:Program FilesHPDigital ImagingbinhpqSRMon.exe
O4 - HKLM..Run: [fssui] "C:Program FilesWindows LiveFamily Safetyfsui.exe" -autorun
O4 - HKLM..Run: [LogitechQuickCamRibbon] "C:Program FilesLogitechQuickCamQuickcam.exe" /hide
O4 - HKLM..Run: [QuickTime Task] "C:Program FilesQuickTimeQTTask.exe" -atboottime
O4 - HKLM..Run: [SunJavaUpdateSched] "C:Program FilesJavajre6binjusched.exe"
O4 - HKLM..Run: [Adobe Reader Speed Launcher] "C:Program FilesAdobeReader 8.0ReaderReader_sl.exe"
O4 - HKLM..Run: [Adobe ARM] "C:Program FilesCommon FilesAdobeARM1.0AdobeARM.exe"
O4 - HKLM..Run: [iTunesHelper] "C:Program FilesiTunesiTunesHelper.exe"
O4 - HKLM..Run: [AppleSyncNotifier] C:Program FilesCommon FilesAppleMobile Device SupportbinAppleSyncNotifier.exe
O4 - HKCU..Run: [TOSCDSPD] C:Program FilesTOSHIBATOSCDSPDTOSCDSPD.exe
O4 - HKCU..Run: [Messenger (Yahoo!)] "C:Program FilesYahoo!MessengerYahooMessenger.exe" -quiet
O4 - HKCU..Run: [MySpaceIM] C:Program FilesMySpaceIMMySpaceIM.exe
O4 - HKCU..Run: [ehTray.exe] C:WindowsehomeehTray.exe
O4 - HKCU..Run: [SmileboxTray] "C:UsersheidiAppDataRoamingSmileboxSmileboxTray.exe"
O4 - HKCU..Run: [Pareto_Update] C:Program FilesCommon FilesParetoLogicUUS2Pareto_Update.exe
O4 - HKCU..Run: [msnmsgr] "C:Program FilesWindows LiveMessengermsnmsgr.exe" /background
O4 - HKCU..Run: [inyiiny] C:Windowssystem32nnnt9y1tn.exe
O4 - HKCU..Run: [yyddd] C:Windowssystem32yddy5iny5dn.exe
O4 - HKCU..Run: [1600818151] C:Program FilesToshiba RegistrationRegistration.exe /r "C:Program FilesToshiba RegistrationRegistration.rpd"
O4 - HKCU..Run: [bbhrwrw] C:Windowssystem32w7wrr2mh5.exe
O4 - HKCU..Run: [fkupf] C:Windowssystem32fpp6ppfu6.exe
O4 - HKCU..Run: [kkfufa1] C:Windowssystem32k6ffaff6u7.exe
O4 - HKCU..Run: [yiss6] C:Windowssystem3221ns37y.exe
O4 - HKCU..Run: [fvvll] C:Windowssystem32qf9l31fl.exe
O4 - HKCU..Run: [ssnss6] C:Windowssystem327i6c37i.exe
O4 - HKCU..Run: [nsnic] C:Windowssystem32cssxsi1sii.exe
O4 - HKCU..Run: [nxnniin] C:Windowssystem32si1sxcnn.exe
O4 - HKCU..Run: [rww7r] C:Windowssystem32wgbwwmrbm.exe
O4 - HKCU..Run: [wwgr1g] C:Windowssystem32g1r1ggbbb.exe
O4 - HKCU..Run: [rrrrm6] C:Windowssystem327gbrgr2.exe
O4 - HKUSS-1-5-19..Run: [Sidebar] %ProgramFiles%Windows SidebarSidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUSS-1-5-19..Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUSS-1-5-20..Run: [Sidebar] %ProgramFiles%Windows SidebarSidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - HKUSS-1-5-18..Run: [MySpaceIM] C:Program FilesMySpaceIMMySpaceIM.exe (User 'SYSTEM')
O4 - HKUS.DEFAULT..Run: [MySpaceIM] C:Program FilesMySpaceIMMySpaceIM.exe (User 'Default user')
O4 - Startup: LimeWire On Startup.lnk = C:Program FilesLimeWireLimeWire.exe
O4 - Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:Program FilesMicrosoft OfficeOffice12ONENOTEM.EXE
O4 - Startup: OneNote Table Of Contents.onetoc2
O4 - Startup: OpenOffice.org 3.1.lnk = C:Program FilesOpenOffice.org 3programquickstart.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:Program FilesHPDigital Imagingbinhpqtra08.exe
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:Program FilesWindows LiveWriterWriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:Program FilesWindows LiveWriterWriterBrowserExtension.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:PROGRA~1MICROS~3Office12ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:PROGRA~1MICROS~3Office12ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:PROGRA~1MICROS~3Office12REFIEBAR.DLL
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:ProgramsPartyGamingPartyPokerRunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:ProgramsPartyGamingPartyPokerRunApp.exe
O13 - Gopher Prefix:
O16 - DPF: {1DE9BB01-B121-401D-8877-BCD5ED5B7EE5} (Tpwin Control) - http://www.unmunsa.or.kr/web/mvimg/AlwaysOn.CAB
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w3/resources/...NPUplden-us.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:PROGRA~1COMMON~1SkypeSKYPE4~1.DLL
O20 - AppInit_DLLs: C:PROGRA~1GoogleGOOGLE~1GOEC62~1.DLL
O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:Windowssystem32agrsmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:Program FilesCommon FilesAppleMobile Device SupportbinAppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:Program FilesBonjourmDNSResponder.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:Program FilesTOSHIBAConfigFreeCFSvcs.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:Program FilesTOSHIBA GamesTOSHIBA Game ConsoleGameConsoleService.exe
O23 - Service: Google Desktop Manager 5.9.909.30391 (GoogleDesktopManager-093009-130223) - Google - C:Program FilesGoogleGoogle Desktop SearchGoogleDesktop.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:Program FilesGoogleUpdateGoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:Program FilesCommon FilesInstallShieldDriver1150Intel 32IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:Program FilesiPodbiniPodService.exe
O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:Program FilesCommon FilesLogiShrdLVMVFMLVPrcSrv.exe
O23 - Service: McciCMService - Motive Communications, Inc. - C:Program FilesCommon FilesMotiveMcciCMService.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:PROGRA~1McAfeeMSCmcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:PROGRA~1COMMON~1mcafeemnamcnasvc.exe
O23 - Service: pinger - Unknown owner - C:TOSHIBAIVPISMpinger.exe
O23 - Service: TOSHIBA Navi Support Service (TNaviSrv) - TOSHIBA Corporation - C:Program FilesToshibaTOSHIBA DVD PLAYERTNaviSrv.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:Windowssystem32TODDSrv.exe
O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:Program FilesToshibaPower SaverTosCoSrv.exe
O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - C:Program FilesToshibaBluetooth Toshiba StackTosBtSrv.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:Program FilesCommon FilesUlead SystemsDVDULCDRSvr.exe

--
End of file - 13290 bytes

[/codebox]

At this point I installed Microsoft Security Essentials and ran a full scan. It found:
  • JS/Tracur.B
  • ceeInject.I
  • Java/Selace.M and Java/Selace.N
  • ASX/Wimad.CS
  • ASX/Wimad.gen!K
  • Java/Classloader.T
  • Java/CVE.2008-5353.C
These were deleted.

Next, I tried to run GMER, to see what was in the Boot. Got a BSOD in regular mode. Switched to Safe Mode. Still got a BSOD.

I tried saving the information on the BSOD and some of what GMER found. Here's what GMER found before it went blue:
[codebox]
GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-05-04 12:01:53
Windows 6.0.6001 Service Pack 1
Running: 81vcoffc.exe; Driver: C:UsersheidiAppDataLocalTemppwrcipog.sys


---- Kernel code sections - GMER 1.0.15 ----

.text C:Windowssystem32DRIVERStos_sps32.sys section is writeable [0x87D56000, 0x4036D, 0xE8000020]
.dsrt C:Windowssystem32DRIVERStos_sps32.sys unknown last section [0x87D9F000, 0x510, 0x40000040]

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdiplusShutdown] [745688B4] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipCloneImage] [745A98A5] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipDrawImageRectI] [7456B9D4] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipSetInterpolationMode] [7455FB47] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdiplusStartup] [74567A79] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipCreateFromHDC] [7455EA65] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM] [7459B17D] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream] [7456BC9A] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipGetImageHeight] [7456074E] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipGetImageWidth] [745606B5] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipDisposeImage] [745571B3] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM] [745ED848] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipLoadImageFromFile] [74587379] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipDeleteGraphics] [7455E109] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipFree] [7455697E] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipAlloc] [745569A9] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:WindowsExplorer.EXE[1108] @ C:WindowsExplorer.EXE [gdiplus.dll!GdipSetCompositingMode] [74562465] C:WindowsWinSxSx86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6001.18175_none_9e7bbe54c9c04bcagdiplus.dll (Microsoft GDI+/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----
[/codebox]

I couldn't save the BSOD info directly. I don't have a web site that will allow me to post the picture in the required http format. I can provide that in the correspondence section if desired.

So, can anybody help to complete the job of identifying what is on this computer and cleaning it? Thanks,

I forgot to say I ran CCleaner before I installed MSE, which picked off a lot of the O4s in the HJT log. I was able to attach the picture of the BSOD diagnostic to this post.

Attached Files


Edited by Budapest, 04 May 2010 - 05:01 PM.
Posts merged ~BP


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Instructor
  • 33,440 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:22 AM

Posted 06 May 2010 - 08:38 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
[If I have helped you fix your PC then please donate. Thanks
jetian6yw.jpg
m0le is a proud member of UNITE

#3 aninkling

aninkling
  • Topic Starter

  • Members
  • 75 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 08 May 2010 - 03:20 PM

I'm here. The phone line went out Thursday and just came on.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Instructor
  • 33,440 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:22 AM

Posted 08 May 2010 - 03:26 PM

MBAM scratched the surface of what might be wrong.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
[If I have helped you fix your PC then please donate. Thanks
jetian6yw.jpg
m0le is a proud member of UNITE

#5 aninkling

aninkling
  • Topic Starter

  • Members
  • 75 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 08 May 2010 - 04:32 PM

Combofix.txt:

ComboFix 10-05-07.07 - heidi 05/08/2010 16:12:36.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.2038.814 [GMT -5:00]
Running from: E:\ComboFix.exe
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\users\heidi\AppData\Local\{D920017F-E5C8-4BDA-8644-C5F8C239113F}
c:\users\heidi\AppData\Local\{D920017F-E5C8-4BDA-8644-C5F8C239113F}\chrome.manifest
c:\users\heidi\AppData\Local\{D920017F-E5C8-4BDA-8644-C5F8C239113F}\chrome\content\_cfg.js
c:\users\heidi\AppData\Local\{D920017F-E5C8-4BDA-8644-C5F8C239113F}\chrome\content\overlay.xul
c:\users\heidi\AppData\Local\{D920017F-E5C8-4BDA-8644-C5F8C239113F}\install.rdf
c:\users\heidi\AppData\Roaming\Microsoft\Windows\Recent\Toshiba Direct.url
c:\users\Jjjjjjjjjjjj\AppData\Local\Microsoft\Windows\Temporary Internet Files\5B1Bxpnm.jpg
c:\users\Jjjjjjjjjjjj\AppData\Local\Microsoft\Windows\Temporary Internet Files\l5O11YxL1.jpg
c:\users\Jjjjjjjjjjjj\AppData\Local\Microsoft\Windows\Temporary Internet Files\mLmAM0Lb2.jpg
c:\users\Jjjjjjjjjjjj\AppData\Local\Microsoft\Windows\Temporary Internet Files\O01lAj.jpg
c:\windows\system32\AbaleZip.dll

.
((((((((((((((((((((((((( Files Created from 2010-04-08 to 2010-05-08 )))))))))))))))))))))))))))))))
.

2010-05-08 21:21 . 2010-05-08 21:22 -------- d-----w- c:\users\heidi\AppData\Local\temp
2010-05-08 21:21 . 2010-05-08 21:21 -------- d-----w- c:\users\Jjjjjjjjjjjj\AppData\Local\temp
2010-05-08 21:21 . 2010-05-08 21:21 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-05-08 21:21 . 2010-05-08 21:21 -------- d-----w- c:\users\Guest\AppData\Local\temp
2010-05-08 21:04 . 2010-05-08 21:04 -------- d-----w- c:\windows\system32\EventProviders
2010-05-04 00:28 . 2010-05-04 00:28 -------- d-----w- c:\users\Jjjjjjjjjjjj\AppData\Roaming\IObit
2010-05-03 23:42 . 2010-04-12 22:29 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-05-03 23:21 . 2010-05-04 00:10 -------- d-----w- c:\program files\Microsoft Security Essentials
2010-05-03 21:56 . 2010-05-03 21:59 -------- d-----w- c:\program files\CCleaner
2010-05-03 21:27 . 2009-05-07 07:04 157712 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-05-03 18:57 . 2010-02-23 11:32 78848 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-05-03 18:57 . 2010-02-23 11:32 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-05-03 18:57 . 2010-02-23 11:32 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-05-03 18:57 . 2010-02-18 14:49 3598216 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-05-03 18:56 . 2010-02-18 14:49 3545992 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-05-03 18:56 . 2010-02-18 14:49 898952 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-05-03 18:56 . 2010-02-18 14:11 190464 ----a-w- c:\windows\system32\iphlpsvc.dll
2010-05-03 18:56 . 2010-02-18 11:52 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys
2010-05-03 18:50 . 2009-12-23 12:43 171520 ----a-w- c:\windows\system32\wintrust.dll
2010-05-03 18:50 . 2010-01-15 00:04 98304 ----a-w- c:\windows\system32\cabview.dll
2010-05-03 18:31 . 2010-05-03 18:31 -------- d-----w- c:\users\heidi\AppData\Roaming\IObit
2010-05-03 18:31 . 2010-05-03 18:31 -------- d-----w- c:\program files\IObit
2010-05-03 18:03 . 2010-05-03 18:04 -------- d-----w- c:\program files\Thoosje Vista Tweaker
2010-05-03 17:24 . 2010-05-03 17:27 -------- d-----w- c:\users\heidi\AppData\Roaming\NoteTab Pro
2010-05-03 17:24 . 2010-05-03 17:24 -------- d-----w- c:\program files\NoteTab Pro 6
2010-05-03 16:30 . 2010-05-08 21:00 1 ----a-w- c:\users\heidi\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\stamp.sys
2010-05-03 16:29 . 2010-05-03 16:29 -------- d-----w- c:\users\heidi\AppData\Roaming\OpenOffice.org
2010-05-03 16:26 . 2010-05-03 16:26 -------- d-----w- c:\program files\JRE
2010-05-03 16:24 . 2010-05-03 16:25 -------- d-----w- c:\program files\OpenOffice.org 3
2010-04-16 23:11 . 2010-04-16 23:11 -------- d-----w- c:\users\Jjjjjjjjjjjj\AppData\Roaming\Malwarebytes
2010-04-16 14:09 . 2010-04-16 14:09 -------- d-----w- c:\users\heidi\AppData\Roaming\Malwarebytes
2010-04-16 14:09 . 2010-03-29 20:24 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-16 14:09 . 2010-04-16 14:09 -------- d-----w- c:\programdata\Malwarebytes
2010-04-16 14:09 . 2010-03-29 20:24 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-16 14:09 . 2010-04-16 14:09 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-16 13:07 . 2010-04-16 13:07 -------- d-----w- c:\program files\Trend Micro

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-08 21:09 . 2009-03-22 16:41 -------- d-----w- c:\users\heidi\AppData\Roaming\LimeWire
2010-05-04 00:27 . 2009-10-21 02:14 87464 ----a-w- c:\users\Jjjjjjjjjjjj\AppData\Local\GDIPFONTCACHEV1.DAT
2010-05-03 23:43 . 2007-11-06 23:07 -------- d-----w- c:\program files\Common Files\Java
2010-05-03 23:42 . 2007-11-06 23:07 -------- d-----w- c:\program files\Java
2010-05-03 19:30 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-05-03 19:22 . 2007-06-25 12:41 -------- d-----w- c:\programdata\Microsoft Help
2010-05-03 17:53 . 2009-02-01 03:42 1788 ----a-w- c:\users\heidi\AppData\Roaming\wklnhst.dat
2010-05-03 17:03 . 2008-08-20 04:14 87464 ----a-w- c:\users\heidi\AppData\Local\GDIPFONTCACHEV1.DAT
2010-04-26 01:32 . 2007-11-06 23:03 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-04-26 00:52 . 2007-11-06 23:03 -------- d-----w- c:\programdata\Symantec
2010-04-23 23:41 . 2010-04-03 21:25 680 ----a-w- c:\users\Jjjjjjjjjjjj\AppData\Local\d3d9caps.dat
2010-04-16 13:32 . 2008-11-21 13:34 1356 ----a-w- c:\users\heidi\AppData\Local\d3d9caps.dat
2010-04-04 01:51 . 2009-11-08 04:26 446 ----a-w- c:\users\Jjjjjjjjjjjj\AppData\Roaming\wklnhst.dat
2010-04-03 21:40 . 2007-11-06 22:43 -------- d-----w- c:\programdata\WildTangent
2010-04-03 21:29 . 2010-04-03 21:29 -------- d-----w- c:\users\Jjjjjjjjjjjj\AppData\Roaming\WildTangent
2010-03-30 00:39 . 2010-03-30 00:39 -------- d-----w- c:\users\Jjjjjjjjjjjj\AppData\Roaming\MySpace
2010-03-29 08:13 . 2009-03-18 11:01 -------- d-----w- c:\programdata\DriverCure
2010-03-28 03:30 . 2010-03-22 11:17 -------- d-----w- c:\users\Jjjjjjjjjjjj\AppData\Roaming\Apple Computer
2010-03-24 06:00 . 2009-01-07 09:38 -------- d-----w- c:\program files\ToggleEN
2010-03-23 04:40 . 2009-02-09 00:36 -------- d-----w- c:\users\heidi\AppData\Roaming\Smilebox
2010-03-22 10:06 . 2009-12-11 20:34 -------- d---a-w- c:\users\Jjjjjjjjjjjj\AppData\Roaming\Skype
2010-03-22 04:39 . 2009-02-11 03:45 -------- d-----w- c:\users\heidi\AppData\Roaming\Image Zone Express
2010-03-22 03:57 . 2006-11-02 12:37 -------- d---a-r- c:\users\Default\AppData\Roaming\Media Center Programs
2010-03-21 23:07 . 2009-05-01 03:46 -------- d-----w- c:\users\heidi\AppData\Roaming\Apple Computer
2010-03-18 07:08 . 2010-01-23 06:33 3519152 ----a-w- c:\programdata\ParetoLogic\UUS2\DriverCure\Temp\DriverCure Installer.exe
2010-03-14 20:48 . 2009-03-02 00:58 -------- d-----w- c:\users\Guest\AppData\Roaming\HP
2010-03-14 17:09 . 2008-12-17 15:13 -------- d-----w- c:\users\Guest\AppData\Roaming\TOSHIBA
2010-03-14 15:49 . 2008-12-12 05:04 83288 ----a-w- c:\users\Guest\AppData\Local\GDIPFONTCACHEV1.DAT
2010-03-12 19:18 . 2009-08-11 00:29 0 ----a-w- c:\windows\system32\drivers\lvuvc.hs
2010-03-09 19:15 . 2009-01-29 12:11 287368 ----a-w- c:\users\heidi\AppData\Roaming\Smilebox\SmileboxTray.exe
2010-03-09 06:43 . 2010-03-09 06:43 79144 ----a-w- c:\programdata\Apple Computer\Installer Cache\Safari 5.31.21.10\SetupAdmin.exe
2010-03-09 06:14 . 2010-03-09 06:14 72488 ----a-w- c:\programdata\Apple Computer\Installer Cache\iTunes 9.0.3.15\SetupAdmin.exe
2010-02-24 15:16 . 2009-10-07 00:45 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-23 06:39 . 2010-05-03 23:45 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-23 06:33 . 2010-05-03 23:45 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-02-23 06:33 . 2010-05-03 23:45 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-02-23 04:55 . 2010-05-03 23:45 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2010-02-20 23:39 . 2010-03-14 09:02 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:37 . 2010-03-14 09:02 31232 ----a-w- c:\windows\system32\httpapi.dll
2010-02-20 21:18 . 2010-03-14 09:02 411136 ----a-w- c:\windows\system32\drivers\http.sys
2010-02-17 22:05 . 2009-01-29 12:11 397960 ----a-w- c:\users\heidi\AppData\Roaming\Smilebox\SmileboxStarter.exe
2010-02-17 22:05 . 2009-01-29 11:48 217736 ----a-w- c:\users\heidi\AppData\Roaming\Smilebox\SmileboxDvd.exe
2010-02-17 22:05 . 2009-01-29 11:48 168584 ----a-w- c:\users\heidi\AppData\Roaming\Smilebox\SmileboxBrowserEngine.dll
2010-02-17 21:50 . 2010-02-17 21:50 1602184 ----a-w- c:\users\heidi\AppData\Roaming\Smilebox\SmileboxClient.exe
2010-02-17 21:10 . 2010-02-17 21:10 344712 ----a-w- c:\users\heidi\AppData\Roaming\Smilebox\SmileboxDvdEngine.dll
2010-02-17 21:10 . 2010-02-17 21:10 135816 ----a-w- c:\users\heidi\AppData\Roaming\Smilebox\SmileboxUpdater.exe
2010-02-12 14:37 . 2010-02-12 14:37 509552 ----a-w- c:\programdata\Google\Google Toolbar\Update\gtbFA76.tmp.exe
2010-02-11 14:49 . 2010-02-11 14:49 119808 ----a-w- c:\users\heidi\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\[email protected]\components\FFTextLinks.dll
2009-10-23 05:11 . 2009-10-23 05:11 119808 ----a-w- c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
2007-06-25 13:15 . 2007-06-25 13:15 3 --sh--r- c:\windows\System32\drivers\taishop.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{038cb5c7-48ea-4af9-94e0-a1646542e62b}"= "c:\program files\ToggleEN\tbTog1.dll" [2010-03-24 2349080]

[HKEY_CLASSES_ROOT\clsid\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]
2010-03-24 06:01 2349080 ----a-w- c:\program files\ToggleEN\tbTog1.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
2008-10-01 07:40 192960 ------w- c:\program files\Yontoo Layers Client for Internet Explorer\YontooIEClient.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{038cb5c7-48ea-4af9-94e0-a1646542e62b}"= "c:\program files\ToggleEN\tbTog1.dll" [2010-03-24 2349080]

[HKEY_CLASSES_ROOT\clsid\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{038CB5C7-48EA-4AF9-94E0-A1646542E62B}"= "c:\program files\ToggleEN\tbTog1.dll" [2010-03-24 2349080]

[HKEY_CLASSES_ROOT\clsid\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2007-05-18 430080]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2008-11-06 4347120]
"MySpaceIM"="c:\program files\MySpace\IM\MySpaceIM.exe" [2008-12-12 9555968]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"SmileboxTray"="c:\users\heidi\AppData\Roaming\Smilebox\SmileboxTray.exe" [2010-03-09 287368]
"Pareto_Update"="c:\program files\Common Files\ParetoLogic\UUS2\Pareto_Update.exe" [2009-01-21 189808]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-09-20 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-09-20 154136]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-09-20 129560]
"TPwrMain"="c:\program files\TOSHIBA\Power Saver\TPwrMain.EXE" [2007-03-29 411192]
"SmoothView"="c:\program files\Toshiba\SmoothView\SmoothView.exe" [2007-06-16 448080]
"00TCrdMain"="c:\program files\TOSHIBA\FlashCards\TCrdMain.exe" [2007-05-22 538744]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"RtHDVCpl"="RtHDVCpl.exe" [2007-04-25 4444160]
"NDSTray.exe"="NDSTray.exe" [BU]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2009-10-23 30192]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-12-11 49152]
"hpqSRMon"="c:\program files\HP\Digital Imaging\bin\hpqSRMon.exe" [2008-08-20 150016]
"fssui"="c:\program files\Windows Live\Family Safety\fsui.exe" [2009-02-07 454000]
"LogitechQuickCamRibbon"="c:\program files\Logitech\QuickCam\Quickcam.exe" [2008-12-20 2656528]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2009-12-18 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-12-11 948672]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-02-16 141608]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2010-02-18 177472]
"MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-02-21 1093208]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"MySpaceIM"="c:\program files\MySpace\IM\MySpaceIM.exe" [2008-12-12 9555968]

c:\users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

c:\users\Jjjjjjjjjjjj\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

c:\users\heidi\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - c:\program files\LimeWire\LimeWire.exe [2009-3-10 139776]
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]
OneNote Table Of Contents.onetoc2 [2009-3-18 3656]
OpenOffice.org 3.1.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2009-8-18 384000]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2007-1-3 210520]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Google\GOOGLE~1\GoogleDesktopNetwork3.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux1"=wdmaud.drv

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

R2 CWMonitor;Symantec Crimeware Protection Driver;c:\program files\Common Files\Symantec Shared\coShared\CW\1.5\CO_Mon.sys [x]
R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-02-12 135664]
R3 GoogleDesktopManager-093009-130223;Google Desktop Manager 5.9.909.30391;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2009-10-23 30192]
R3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2009-12-02 42368]
R3 RTL8187B;Realtek RTL8187B Wireless 802.11g 54Mbps USB 2.0 Network Adapter;c:\windows\system32\DRIVERS\RTL8187B.sys [2007-06-01 252416]
S3 FwLnk;FwLnk Driver;c:\windows\system32\DRIVERS\FwLnk.sys [2006-11-20 7168]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2010-03-30 c:\windows\Tasks\DriverCure.job
- c:\program files\ParetoLogic\DriverCure\DriverCure.exe [2009-08-07 19:36]

2010-05-08 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-12 14:46]

2010-05-08 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-12 14:46]

2010-05-03 c:\windows\Tasks\ParetoLogic Registration.job
- c:\program files\Common Files\ParetoLogic\UUS2\UUS.dll [2009-01-21 05:36]

2010-05-04 c:\windows\Tasks\ParetoLogic Update Version2.job
- c:\program files\Common Files\ParetoLogic\UUS2\Pareto_Update.exe [2009-01-21 05:36]

2010-05-08 c:\windows\Tasks\User_Feed_Synchronization-{876DC7CA-B26B-4602-BA17-11079467B16F}.job
- c:\windows\system32\msfeedssync.exe [2010-05-03 04:54]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
DPF: {1DE9BB01-B121-401D-8877-BCD5ED5B7EE5} - hxxp://www.unmunsa.or.kr/web/mvimg/AlwaysOn.CAB
FF - ProfilePath - c:\users\heidi\AppData\Roaming\Mozilla\Firefox\Profiles\4mwo1jlr.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.searchslate.com/wp.ashx?ref=home&id=121
FF - component: c:\program files\Mozilla Firefox\components\GoogleDesktopMozilla.dll
FF - component: c:\users\heidi\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\[email protected]\components\FFTextLinks.dll
FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\Microsoft\Office Live\npOLW.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll
FF - plugin: c:\users\heidi\AppData\Roaming\Move Networks\plugins\npqmp071701000002.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.
- - - - ORPHANS REMOVED - - - -

SafeBoot-MCODS



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-08 16:22
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
TOSCDSPD = c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe?/i?????e??o| ??? O???O?@?O?X?O?p?

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
Completion time: 2010-05-08 16:26:12
ComboFix-quarantined-files.txt 2010-05-08 21:26

Pre-Run: 97,240,981,504 bytes free
Post-Run: 97,144,008,704 bytes free

- - End Of File - - 81E5BB356DAF3C8806EA627F9CA44684


#6 aninkling

aninkling
  • Topic Starter

  • Members
  • 75 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 08 May 2010 - 04:33 PM

In the previous combofix.txt file, I've replaced a name with jjjj's to protect identities.

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Instructor
  • 33,440 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:22 AM

Posted 08 May 2010 - 04:39 PM

Okay, now run MBAM, as below:

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
[If I have helped you fix your PC then please donate. Thanks
jetian6yw.jpg
m0le is a proud member of UNITE

#8 aninkling

aninkling
  • Topic Starter

  • Members
  • 75 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 08 May 2010 - 07:02 PM

The Malwarebytes results (no hits):

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4052

Windows 6.0.6001 Service Pack 1
Internet Explorer 8.0.6001.18904

5/8/2010 6:15:51 PM
mbam-log-2010-05-08 (18-15-51).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 300860
Time elapsed: 1 hour(s), 28 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


#9 m0le

m0le

    Can U Dig It?


  • Malware Response Instructor
  • 33,440 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:22 AM

Posted 08 May 2010 - 07:28 PM

One more check, this time for infected files

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
[If I have helped you fix your PC then please donate. Thanks
jetian6yw.jpg
m0le is a proud member of UNITE

#10 aninkling

aninkling
  • Topic Starter

  • Members
  • 75 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 09 May 2010 - 04:14 PM

Results of Eset:

C:\Users\heidi\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\[email protected]\components\FFTextLinks.dll probably a variant of Win32/Adware.Gamevance.AG application cleaned by deleting - quarantined
C:\Users\heidi\Documents\LimeWire\Saved\Lil Wayne Feat. Drake - We Like Her.mp3 a variant of WMA/TrojanDownloader.GetCodec.gen trojan cleaned - quarantined


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Instructor
  • 33,440 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:22 AM

Posted 09 May 2010 - 04:57 PM

Looks like Limewire downloaded a little present for you. mad.gif

The log shows that you have been using so called peer-to-peer or file-sharing programmes (in your case uTorrent and Limewire). These programmes allow to share files between users as the name(s) suggest. In today's world the cyber crime has come a long way and any means is used to infect personal computers to make use of their stored data or machine power for further propagation of their malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. Some further readings on this subject, along the included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

It is also important to note that sharing entertainment files and proprietary software infringes the copyright laws in many countries over the world and you are putting yourself at risk of being indicted through organisations watching over the rights of the authors of such files (i.e. the RIAA for music files, or the MPAA for movie files in the USA) or the authors of the files themselves.

Naturally there are also legal ways to use these services, such as downloading Linux distributions or office suites such as "Open Office."


However, as far as the PC goes...

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it aninkling, happy surfing!

Cheers.

m0le
[If I have helped you fix your PC then please donate. Thanks
jetian6yw.jpg
m0le is a proud member of UNITE

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Instructor
  • 33,440 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:22 AM

Posted 13 May 2010 - 07:52 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. smile.gif

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
[If I have helped you fix your PC then please donate. Thanks
jetian6yw.jpg
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users