Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Popups, Disabled Auto Update, Recurring dlls in Startup


  • This topic is locked This topic is locked
27 replies to this topic

#1 Phlimm

Phlimm

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 11 October 2009 - 05:42 PM

Hi, I have an XP Home system with the symptoms in the description. I have tried several antivirus solutions with no love. Currently using Avast. Here is the HJT and Kaspersky reports. Any help is greatly appreciated. I have a lot of experience with PCs in general, but not with this type of infection.

I have downloaded ComboFix and ATF Cleaner but have not used them yet because I noticed that they generally say to use only when directed to, so here I am. Also any advice as to how these infections occurred because this PC is used only by the kids and their account is a Limited User one, though it was an Admin for a while until about 6 months ago.

Feel free to contact me via email as well as this thread.

Thanks a lot in advance.

EDITED TO ADD DDS AND ROOTREPEAL LOGS AT END

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:34:28 PM, on 10/11/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\atray.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Admin\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.winxdvd.com/?gr
O1 - Hosts: ::1 localhost
O1 - Hosts: 209.44.111.62 antispy.microsoft.com
O1 - Hosts: 209.44.111.62 antiaware-pro.com
O1 - Hosts: 209.44.111.62 www.antiaware-pro.com
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {CD10D714-77B8-4423-8E73-915DA0FDBC1E} - C:\WINDOWS\system32\ddcDtUKa.dll (file missing)
O3 - Toolbar: Veoh Web Player Video Finder - {0FBB9689-D3D7-4f7a-A2E2-585B10099BFC} - C:\Program Files\Veoh Networks\VeohWebPlayer\VeohIEToolbar.dll
O4 - HKLM\..\Run: [atray] atray.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [tudunayug] Rundll32.exe "c:\windows\system32\juvilisi.dll",a
O4 - HKCU\..\Run: [VeohPlugin] "C:\Program Files\Veoh Networks\VeohWebPlayer\veohwebplayer.exe"
O4 - HKUS\S-1-5-20\..\Run: [dilemufuzu] Rundll32.exe "C:\WINDOWS\system32\rotapote.dll",s (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [tudunayug] Rundll32.exe "c:\windows\system32\fevebuso.dll",a (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [tudunayug] Rundll32.exe "c:\windows\system32\fevebuso.dll",a (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O8 - Extra context menu item: Sothink SWF Catcher - C:\Program Files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Sothink SWF Catcher - {E19ADC6E-3909-43E4-9A89-B7B676377EE3} - C:\Program Files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
O9 - Extra 'Tools' menuitem: Sothink SWF Catcher - {E19ADC6E-3909-43E4-9A89-B7B676377EE3} - C:\Program Files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/betapit/PCPitStop.CAB
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1151415293781
O20 - AppInit_DLLs: egdkdd.dll c:\windows\system32\pitizudi.dll c:\windows\system32\nobiwuna.dll c:\windows\system32\laroriwa.dll wayolelu.dll c:\windows\system32\juvilisi.dll c:\windows\system32\nuyakete.dll c:\windows\system32\wetuyoje.dll c:\windows\system32\matomomi.dll c:\windows\system32\nabigeki.dll c:\windows\system32\likeboyu.dll c:\windows\system32\pobokifi.dll c:\windows\system32\fevebuso.dll
O20 - Winlogon Notify: nnnmkkjj - nnnmkkjj.dll (file missing)
O21 - SSODL: jogagegik - {4f650cad-93e0-448b-a191-b4f7ff316cc7} - c:\windows\system32\fevebuso.dll
O21 - SSODL: pupokupih - {bd7c26fa-95db-40c5-91dd-1d211f5e0d5d} - c:\windows\system32\fevebuso.dll
O21 - SSODL: fekojihin - {8d6b26fe-abd7-4634-8436-7dd33f2d890c} - c:\windows\system32\fevebuso.dll
O21 - SSODL: kuyisuwap - {1eef9082-ec0e-426a-adb3-fc488d878954} - c:\windows\system32\nabigeki.dll
O21 - SSODL: nobisudez - {2510de18-0654-47f6-b321-e13e68cc80a1} - c:\windows\system32\fevebuso.dll
O21 - SSODL: ziparipad - {7329d66f-fa34-4129-8edb-62dc6bb56035} - c:\windows\system32\fevebuso.dll
O21 - SSODL: wezerakij - {bf4cebfc-a073-48a7-9f24-8a339a4b6c01} - c:\windows\system32\nabigeki.dll
O21 - SSODL: sisekokih - {d0fd3ac3-bafb-4a08-8bb5-5a886012b7d7} - c:\windows\system32\matomomi.dll
O22 - SharedTaskScheduler: jugezatag - {4f650cad-93e0-448b-a191-b4f7ff316cc7} - c:\windows\system32\fevebuso.dll
O22 - SharedTaskScheduler: kupuhivus - {bd7c26fa-95db-40c5-91dd-1d211f5e0d5d} - c:\windows\system32\fevebuso.dll
O22 - SharedTaskScheduler: mujuzedij - {8d6b26fe-abd7-4634-8436-7dd33f2d890c} - c:\windows\system32\fevebuso.dll
O22 - SharedTaskScheduler: kupuhivus - {1eef9082-ec0e-426a-adb3-fc488d878954} - c:\windows\system32\nabigeki.dll
O22 - SharedTaskScheduler: jugezatag - {2510de18-0654-47f6-b321-e13e68cc80a1} - c:\windows\system32\fevebuso.dll
O22 - SharedTaskScheduler: gahurihor - {7329d66f-fa34-4129-8edb-62dc6bb56035} - c:\windows\system32\fevebuso.dll
O22 - SharedTaskScheduler: mujuzedij - {bf4cebfc-a073-48a7-9f24-8a339a4b6c01} - c:\windows\system32\nabigeki.dll
O22 - SharedTaskScheduler: gahurihor - {d0fd3ac3-bafb-4a08-8bb5-5a886012b7d7} - c:\windows\system32\matomomi.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

--
End of file - 8071 bytes


****************************************************


KASPERSKY ONLINE SCANNER 7.0: scan report
Sunday, October 11, 2009
Operating system: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Sunday, October 11, 2009 18:31:59
Records in database: 2955362
Scan settings
scan using the following database extended
Scan archives yes
Scan e-mail databases yes
Scan area My Computer
A:\
C:\
E:\
F:\
Scan statistics
Objects scanned 138064
Threats found 8
Infected objects found 28
Suspicious objects found 4
Scan duration 04:04:15

File name Threat Threats count
c:\windows\system32\pobokifi.dll/c:\windows\system32\pobokifi.dll Infected: Trojan.Win32.Plapon.vm 15
C:\Documents and Settings\slinko\Local Settings\Application Data\Mozilla\Firefox\Profiles\zuz5s3nk.default\Cache\1AB7E6ECd01 Infected: Exploit.Win32.Pidief.ceh 1
C:\Documents and Settings\slinko\Local Settings\Temp\plugtmp-14\plugin-pfqd.php Infected: Exploit.JS.Pdfka.mq 1
C:\Phlimm Backup\Docs and Sets\Admin\Applicationn Data\Qualcomm\Eudora\Out.mbx.001 Suspicious: Trojan-Spy.HTML.Fraud.gen 2
C:\Phlimm Backup\Docs and Sets\Admin\Applicationn Data\Qualcomm\Eudora\Out.mbx.002 Suspicious: Trojan-Spy.HTML.Fraud.gen 2
C:\Phlimm Backup\Drivers\Software\mIRC\mirc617.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.617 1
C:\Phlimm Backup\Prog Files\mIRC\mirc.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.617 1
C:\WINDOWS\system32\biravoja.exe Infected: Packed.Win32.Krap.x 1
C:\WINDOWS\system32\jazeraka.exe Infected: Packed.Win32.Krap.x 1
C:\WINDOWS\system32\keriwina.dll Infected: Trojan.Win32.Monderb.besw 1
C:\WINDOWS\system32\kudepoga.dll Infected: Trojan.Win32.Monderb.bere 1
C:\WINDOWS\system32\pobokifi.dll Infected: Trojan.Win32.Plapon.vm 1
C:\WINDOWS\system32\rujidovo.exe Infected: Packed.Win32.Krap.x 1
C:\WINDOWS\system32\sofifowo.exe Infected: Packed.Win32.Krap.x 1
C:\WINDOWS\system32\volopamo.exe Infected: Packed.Win32.Krap.x 1
C:\WINDOWS\system32\vuwagimo.exe Infected: Packed.Win32.Krap.x 1
Selected area has been scanned.


****************************************************


DDS (Ver_09-10-12.01) - NTFSx86
Run by Admin at 16:16:31.43 on Sun 10/11/2009
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_03
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.606 [GMT -7:00]

AV: avast! antivirus 4.8.1335 [VPS 091011-0] *On-access scanning enabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\atray.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
C:\Documents and Settings\Admin\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/advanced_search?hl=en
uInternet Connection Wizard,ShellNext = hxxp://www.winxdvd.com/?gr
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_03\bin\ssv.dll
BHO: {cd10d714-77b8-4423-8e73-915da0fdbc1e} - c:\windows\system32\ddcDtUKa.dll
TB: Veoh Web Player Video Finder: {0fbb9689-d3d7-4f7a-a2e2-585b10099bfc} - c:\program files\veoh networks\veohwebplayer\VeohIEToolbar.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [VeohPlugin] "c:\program files\veoh networks\veohwebplayer\veohwebplayer.exe"
mRun: [<NO NAME>]
mRun: [atray] atray.exe
mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe
mRun: [tudunayug] Rundll32.exe "c:\windows\system32\juvilisi.dll",a
dRun: [tudunayug] Rundll32.exe "c:\windows\system32\fevebuso.dll",a
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
IE: Sothink SWF Catcher - c:\program files\common files\sourcetec\swf catcher\InternetExplorer.htm
IE: {E19ADC6E-3909-43E4-9A89-B7B676377EE3} - c:\program files\common files\sourcetec\swf catcher\InternetExplorer.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_03\bin\ssv.dll
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} - hxxp://www.pcpitstop.com/betapit/PCPitStop.CAB
DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} - hxxp://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} - hxxp://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1151415293781
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
Notify: AtiExtEvent - Ati2evxx.dll
Notify: nnnmkkjj - nnnmkkjj.dll
AppInit_DLLs: egdkdd.dll c:\windows\system32\pitizudi.dll c:\windows\system32\nobiwuna.dll c:\windows\system32\laroriwa.dll wayolelu.dll c:\windows\system32\juvilisi.dll c:\windows\system32\nuyakete.dll c:\windows\system32\wetuyoje.dll c:\windows\system32\matomomi.dll c:\windows\system32\nabigeki.dll c:\windows\system32\likeboyu.dll c:\windows\system32\pobokifi.dll c:\windows\system32\fevebuso.dll
SSODL: jogagegik - {4f650cad-93e0-448b-a191-b4f7ff316cc7} - c:\windows\system32\fevebuso.dll
SSODL: pupokupih - {bd7c26fa-95db-40c5-91dd-1d211f5e0d5d} - c:\windows\system32\fevebuso.dll
SSODL: fekojihin - {8d6b26fe-abd7-4634-8436-7dd33f2d890c} - c:\windows\system32\fevebuso.dll
SSODL: kuyisuwap - {1eef9082-ec0e-426a-adb3-fc488d878954} - c:\windows\system32\nabigeki.dll
SSODL: nobisudez - {2510de18-0654-47f6-b321-e13e68cc80a1} - c:\windows\system32\fevebuso.dll
SSODL: ziparipad - {7329d66f-fa34-4129-8edb-62dc6bb56035} - c:\windows\system32\fevebuso.dll
SSODL: wezerakij - {bf4cebfc-a073-48a7-9f24-8a339a4b6c01} - c:\windows\system32\nabigeki.dll
SSODL: sisekokih - {d0fd3ac3-bafb-4a08-8bb5-5a886012b7d7} - c:\windows\system32\likeboyu.dll
SSODL: tegugeyif - {877d4c62-6a7c-4882-a19f-e1ddc8928d6c} - c:\windows\system32\matomomi.dll
STS: jugezatag: {4f650cad-93e0-448b-a191-b4f7ff316cc7} - c:\windows\system32\fevebuso.dll
STS: kupuhivus: {bd7c26fa-95db-40c5-91dd-1d211f5e0d5d} - c:\windows\system32\fevebuso.dll
STS: mujuzedij: {8d6b26fe-abd7-4634-8436-7dd33f2d890c} - c:\windows\system32\fevebuso.dll
STS: kupuhivus: {1eef9082-ec0e-426a-adb3-fc488d878954} - c:\windows\system32\nabigeki.dll
STS: jugezatag: {2510de18-0654-47f6-b321-e13e68cc80a1} - c:\windows\system32\fevebuso.dll
STS: gahurihor: {7329d66f-fa34-4129-8edb-62dc6bb56035} - c:\windows\system32\fevebuso.dll
STS: mujuzedij: {bf4cebfc-a073-48a7-9f24-8a339a4b6c01} - c:\windows\system32\nabigeki.dll
STS: gahurihor: {d0fd3ac3-bafb-4a08-8bb5-5a886012b7d7} - c:\windows\system32\likeboyu.dll
STS: mujuzedij: {877d4c62-6a7c-4882-a19f-e1ddc8928d6c} - c:\windows\system32\pobokifi.dll
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, digeste.dll
LSA: Authentication Packages = msv1_0 c:\windows\system32\ddcDtUKa
LSA: Notification Packages = scecli sokoyeji.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\admin\applic~1\mozilla\firefox\profiles\dhew55a8.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/advanced_search
FF - plugin: c:\program files\mozilla firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\veoh networks\veohwebplayer\npWebPlayerVideoPluginATL.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-8-15 114768]
R1 BIOS;BIOS;c:\windows\system32\drivers\BIOS.sys [2006-6-24 13696]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-8-15 20560]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\superantispyware\saskutil.sys --> c:\program files\superantispyware\SASKUTIL.sys [?]
S3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [2008-12-3 8704]
S3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [2008-12-3 3072]
S3 RSC4_A02;U.S. Robotics Wireless USB Adapter Driver;c:\windows\system32\drivers\rsc4usb.sys --> c:\windows\system32\drivers\RSC4USB.sys [?]

=============== Created Last 30 ================

2009-10-11 15:22 <DIR> --d----- c:\docume~1\alluse~1\applic~1\PrevxCSI
2009-10-11 15:22 64 a------- c:\windows\wininit.ini
2009-10-11 09:28 <DIR> --dsh--- c:\documents and settings\admin\PrivacIE
2009-10-11 09:27 <DIR> --dsh--- c:\documents and settings\admin\IETldCache
2009-10-11 08:35 <DIR> -cd-h--- c:\windows\ie8
2009-10-11 08:15 <DIR> --d----- c:\docume~1\admin\applic~1\AVG8
2009-09-21 22:02 <DIR> --d----- c:\program files\Veoh Networks

==================== Find3M ====================

2009-08-06 19:23 274,288 a------- c:\windows\system32\mucltui.dll
2009-08-06 19:23 215,920 a------- c:\windows\system32\muweb.dll
2009-08-05 02:01 204,800 a------- c:\windows\system32\mswebdvd.dll
2009-07-17 12:01 58,880 a------- c:\windows\system32\atl.dll
2004-06-17 20:41 386,688 a------- c:\windows\inf\wg311v2\netwg311_XP.sys
2004-04-04 10:07 84,912 a------- c:\windows\inf\wg311v2\FwRad17.bin
2004-04-04 10:07 83,320 a------- c:\windows\inf\wg311v2\FwRad16.bin
2009-01-25 20:43 30,392 a--sh--- c:\windows\system32\aKUtDcdd.ini2
2009-07-11 07:52 1,050,147 a--sh--- c:\windows\system32\befomita.exe
2009-07-09 19:51 1,050,659 a--sh--- c:\windows\system32\biravoja.exe
2009-07-11 07:52 37,888 a--sh--- c:\windows\system32\biwapuyu.dll
2009-07-08 06:50 51,712 a--sh--- c:\windows\system32\fajuzosi.dll
2009-07-07 18:50 88,576 a--sh--- c:\windows\system32\fejojolu.dll
2009-07-07 18:50 37,888 a--sh--- c:\windows\system32\gepiruge.dll
2009-07-10 07:51 1,050,147 a--sh--- c:\windows\system32\jazeraka.exe
2009-07-09 06:50 38,912 a--sh--- c:\windows\system32\kasawove.dll
2009-07-09 19:51 37,376 a--sh--- c:\windows\system32\keriwina.dll
2009-07-09 07:51 37,888 a--sh--- c:\windows\system32\kudepoga.dll
2009-07-09 06:50 825,344 a--sh--- c:\windows\system32\lawaragu.exe
2009-07-09 19:51 88,576 a--sh--- c:\windows\system32\likeboyu.dll
2009-07-08 18:50 88,064 a--sh--- c:\windows\system32\matomomi.dll
2009-07-08 06:50 38,400 a--sh--- c:\windows\system32\mogepuju.dll
2009-07-09 07:51 27,136 a--sh--- c:\windows\system32\mujuluro.dll
2009-07-09 06:50 89,088 a--sh--- c:\windows\system32\nabigeki.dll
2009-07-10 19:51 87,552 a--sh--- c:\windows\system32\nuyakete.dll
2009-07-10 19:51 1,050,147 a--sh--- c:\windows\system32\pavogare.exe
2009-07-09 07:51 87,552 a--sh--- c:\windows\system32\pobokifi.dll
2009-07-08 18:50 37,888 a--sh--- c:\windows\system32\rezalefe.dll
2009-07-07 18:50 1,050,659 a--sh--- c:\windows\system32\rujidovo.exe
2009-07-08 18:50 1,011,226 a--sh--- c:\windows\system32\sofifowo.exe
2009-07-09 07:51 1,050,659 a--sh--- c:\windows\system32\volopamo.exe
2009-07-08 06:50 1,011,243 a--sh--- c:\windows\system32\vuwagimo.exe
2009-07-08 06:50 88,576 a--sh--- c:\windows\system32\wetuyoje.dll
2009-07-07 18:50 27,136 a--sh--- c:\windows\system32\yezejugo.dll

============= FINISH: 16:18:45.89 ===============


****************************************************

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/10/11 16:19
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xAA51E000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7AC9000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA7EBE000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: c:\documents and settings\admin\local settings\temp\etilqs_6e9ahkjqogcv2abfnk02
Status: Allocation size mismatch (API: 16384, Raw: 0)

SSDT
-------------------
#: 025 Function Name: NtClose
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e6b8

#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e574

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53ea52

#: 068 Function Name: NtDuplicateObject
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e14c

#: 119 Function Name: NtOpenKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e64e

#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e08c

#: 128 Function Name: NtOpenThread
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e0f0

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e76e

#: 204 Function Name: NtRestoreKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e72e

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xaa53e8ae

Hidden Services
-------------------
Service Name: TDSSserv.sys
Image Path: C:\WINDOWS\system32\drivers\TDSSmhct.sys

==EOF==

Attached Files


Edited by Phlimm, 11 October 2009 - 06:34 PM.


BC AdBot (Login to Remove)

 


#2 SifuMike

SifuMike

    malware expert


  • Staff Emeritus
  • 15,385 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vancouver (not BC) WA (Not DC) USA
  • Local time:02:28 AM

Posted 15 October 2009 - 05:29 PM

Hello Phlimm,

Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

Download Security Check by screen317 from here or here.
Save it to your Desktop.
Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
A Notepad document should open automatically called checkup.txt.
Please post the contents of that document.

**********************

Note: If you already have Malwarebytes' Anti-Malware, then update, run it, then do a "Perform Full Scan"

Please download Malwarebytes' Anti-Malware from one of these places:
http://download.cnet.com/Malwarebytes-Anti...&tag=button
http://www.majorgeeks.com/Malwarebytes_Ant...ware_d5756.html
http://www.besttechie.net/mbam/mbam-setup.exe

Double Click mbam-setup.exe to install the application.

* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Full Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy&Paste the entire MBAM report (even if it does not find anything) in your next reply.

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.

Edited by SifuMike, 15 October 2009 - 05:32 PM.

If I've saved you time & money,
please make a donation so I can keep helping people just like you! You can donate using a credit card and PayPal. Thank you!



Posted Image

Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#3 Phlimm

Phlimm
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 16 October 2009 - 12:08 AM

Some notes on the system status:

For a couple of days, the PC was left logged off but powered on. When I tried to login with my Admin account, I got no desktop at all. No icons, no taskbar, nothing. Mouse clicks (both left and right) and all keyboard entry did nothing. No access to task manager, windows keys, anything. It is as though the Windows Shell was replaced with an empty file. This forced a hard reset.

So now the only way to use the system is via safe mode with networking. After this was realized, the PC is now being left powered off when not being diagnosed or repaired.

When I installed Malwarebytes, the executable was deleted. After the 3rd install attempt I watched it happen with Windows Explorer. The install program created the files and mbam.exe was there for a few moments, then disappeared from the file list. Soooo I decided to try and outsmart the virus. Did a fourth install and before it completed, I quickly copy pasted mbam.exe to my desktop. When the virus deleted the original, I dropped in what I had on the desktop. Voila! I guess the virus only keys off when the mbam install program runs. :(
I was able to do the database update and am now currently running the Full Scan. Will post those results here as soon as they become available.

Here is the Checkup.txt file - again keep in mind that these results were achieved when the system was in Safe Mode with Networking:

Results of screen317's Security Check version 0.99.0
Windows XP Service Pack 3
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Enabled!
avast! Antivirus
Prentice Hall Biology Interactive Textbook CD-ROM
avast! updated!
``````````````````````````````
Anti-malware/Other Utilities Check:

Ad-Aware
HijackThis 2.0.2
CCleaner (remove only)
Java™ SE Runtime Environment 6
Java™ 6 Update 3
Out of date Java installed!
Adobe Reader 8.1.0
Out of date Adobe Reader installed!
``````````````````````````````
Process Check:
objlist.exe by Laurent

Ad-Aware AAWService.exe is disabled!
Ad-Aware AAWTray.exe is disabled!
``````````````````````````````
DNS Vulnerability Check:

GREAT! (Not vulnerable to DNS cache poisoning)

`````````End of Log```````````

Edited by Phlimm, 16 October 2009 - 12:19 AM.


#4 SifuMike

SifuMike

    malware expert


  • Staff Emeritus
  • 15,385 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vancouver (not BC) WA (Not DC) USA
  • Local time:02:28 AM

Posted 16 October 2009 - 12:12 AM

Hi Phlimm,

I quickly copy pasted mbam.exe to my desktop. When the virus deleted the original, I dropped in what I had on the desktop. Voila! I guess the virus only keys off when the mbam install program runs


Good job. :(

Post the log when complete.
If I've saved you time & money,
please make a donation so I can keep helping people just like you! You can donate using a credit card and PayPal. Thank you!



Posted Image

Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#5 Phlimm

Phlimm
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 16 October 2009 - 01:49 AM

Okaaaayyy...did the full scan got some results that were able to be deleted and some that were not without a reboot. Did the reboot, went into normal user mode...no desktop icons, taskbar, nothing...just like before. So I figured maybe the HKLM->Run flag for mbam.exe /runcleanupscript wasn't getting called for some reason. Booted to Safe Mode with Command Prompt and ran the mbam.exe /runcleanupscript manually. Reboot to Safe Mode with Networking and ran a Quick Scan. Still getting results on Vundo.H that can't get cleaned up with this method. Here are the original scan logs and then the Quick Scan for after running the mbam.exe /runcleanupscript via command prompt.

PS - Sorry about going off on my own with the command prompt thing. I won't do that anymore - just follow the instructions as posted here from now on. :(

Malwarebytes' Anti-Malware 1.41
Database version: 2970
Windows 5.1.2600 Service Pack 3 (Safe Mode)

10/15/2009 10:37:37 PM
mbam-log-2009-10-15 (22-37-37).txt

Scan type: Full Scan (C:\|)
Objects scanned: 281723
Time elapsed: 46 minute(s), 55 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 6
Registry Values Infected: 7
Registry Data Items Infected: 7
Folders Infected: 4
Files Infected: 30

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\WINDOWS\system32\kudafane.dll (Trojan.Vundo) -> Delete on reboot.
c:\WINDOWS\system32\wetuyoje.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TDSSserv.sys (Rootkit.TDSS) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{d0661233-42d4-f7f1-80e1-8a9e0e99e71d} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{883627ee-816e-487b-ab78-7b4936fcd3a4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{aa209fdf-11be-4168-8a2f-a798071f1340} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e932a25d-ad79-4e95-be1c-21b609b1847b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{883627ee-816e-487b-ab78-7b4936fcd3a4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\miyurigeb (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{aa209fdf-11be-4168-8a2f-a798071f1340} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\lehobakem (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{e932a25d-ad79-4e95-be1c-21b609b1847b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\huyerifip (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tudunayug (Trojan.Vundo.H) -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo) -> Data: c:\windows\system32\kudafane.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo) -> Data: system32\kudafane.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\wetuyoje.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\wetuyoje.dll -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\All Users\Application Data\33780425 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\45442120 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\29973131 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\slinko\Application Data\Twain (Trojan.Matcash) -> Quarantined and deleted successfully.

Files Infected:
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148723.exe (Adware.Zango) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148722.exe (Adware.Zango) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\29973131\29973131.bat (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\slinko\Desktop\Security Tool.LNK (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pavogare.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148732.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Documents and Settings\slinko\Start Menu\Programs\Security Tool.LNK (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\33780425\33780425.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rujidovo.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jazeraka.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\29973131\29973131.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\volopamo.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dajufiwe.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\befomita.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\biravoja.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\45442120\45442120.exe (Rogue.SystemSecurity) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sofifowo.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vuwagimo.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yovopepa.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\zipomona.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lawaragu.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mebapiro.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148730.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148729.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148712.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kudafane.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\rezalefe.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lukumeyo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rimomuzo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\wetuyoje.dll (Trojan.Vundo.H) -> Delete on reboot.

**************************

Quick Scan:
Malwarebytes' Anti-Malware 1.41
Database version: 2970
Windows 5.1.2600 Service Pack 3 (Safe Mode)

10/15/2009 11:40:42 PM
mbam-log-2009-10-15 (23-40-42).txt

Scan type: Quick Scan
Objects scanned: 139156
Time elapsed: 6 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 3
Registry Values Infected: 7
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\WINDOWS\system32\nujeripa.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{669a6cc9-249f-435d-b56a-d20a0e4de327} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b5bcf639-432f-4b37-93dc-d2017fdca177} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{fdee7bc5-8186-43a0-a4e9-144598833e8e} (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tudunayug (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{669a6cc9-249f-435d-b56a-d20a0e4de327} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\tesimukin (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{b5bcf639-432f-4b37-93dc-d2017fdca177} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\tosikulir (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{fdee7bc5-8186-43a0-a4e9-144598833e8e} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\pelozehot (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\nujeripa.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\nujeripa.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\nujeripa.dll (Trojan.Vundo.H) -> Delete on reboot.

Edited by Phlimm, 16 October 2009 - 01:55 AM.


#6 SifuMike

SifuMike

    malware expert


  • Staff Emeritus
  • 15,385 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vancouver (not BC) WA (Not DC) USA
  • Local time:02:28 AM

Posted 16 October 2009 - 12:25 PM

Hi Phlimm,


We will run ComboFix.

You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.

Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.
Please read Combofix's Disclaimer.
Further, ComboFix logs are not permitted outside the HijackThis forums and then only when requested by a HJT Team member.

You need to disable your AVAST Antivirus before running ComboFix, as it will prevent it from running.

AVAST will cause BSOD unless you disable it like this:
Posted Image

Note: If you already have a copy of ComboFix on your system it is essential that you delete it before downloading this copy.

Please visit this webpage for instructions for downloading and running ComboFix:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix

To work properly, you must install ComboFix on the Desktop..
Post the log from ComboFix in your next reply,

A caution - ComboFix may reset a number of Internet Explorer's settings, including making IE the default browser.
ComboFix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal and increase security. If this is an issue or makes it difficult for you -- please tell me.
Have no other programs running. Your Task Bar should be clear of any program entries including your Browser.
Do not run Combofix more than once.
Do not touch your mouse/keyboard until the scan has completed, as this may cause the process to stall or your computer to lock.
The scan will temporarily disable your desktop, and if interrupted may leave your desktop disabled. If this occurs, please reboot to restore the desktop.
Even when ComboFix appears to be doing nothing, look at your Drive light. If it is flashing, Combofix is still at work.
If I've saved you time & money,
please make a donation so I can keep helping people just like you! You can donate using a credit card and PayPal. Thank you!



Posted Image

Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#7 Phlimm

Phlimm
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 16 October 2009 - 11:06 PM

Here is the ComboFix log file - one note...even though I set the Settings screen in Avast to match the one in the image from your post, ComboFix kept telling me it was running anyways. I had to actually uninstall it to get ComboFix to run. Please let me know when I can reinstall Avast, or should I just stick with Malwarebytes?

ComboFix 09-10-16.09 - Admin 10/16/2009 20:53.1.1 - NTFSx86 NETWORK
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.829 [GMT -7:00]
Running from: c:\documents and settings\Admin\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\55914630
c:\documents and settings\All Users\Application Data\55914630\55914630.exe
c:\documents and settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\c.cgm
c:\windows\system32\aKUtDcdd.ini
c:\windows\system32\aKUtDcdd.ini2
c:\windows\system32\biwapuyu.dll
c:\windows\system32\dujupesa.dll
c:\windows\system32\fajuzosi.dll
c:\windows\system32\fejojolu.dll
c:\windows\system32\gepiruge.dll
c:\windows\system32\gukuyesa.dll
c:\windows\system32\keriwina.dll
c:\windows\system32\kudepoga.dll
c:\windows\system32\luyehaya.dll
c:\windows\system32\meyagabu.dll
c:\windows\system32\mogepuju.dll
c:\windows\system32\mujuluro.dll
c:\windows\system32\narenodo.dll
c:\windows\system32\pobokifi.dll
c:\windows\system32\porevujo.dll
c:\windows\system32\posuyele.exe
c:\windows\system32\todorulo.dll
c:\windows\system32\womifaso.dll
c:\windows\system32\yezejugo.dll
c:\windows\system32\yufobata.dll
c:\windows\system32\yujupaye.dll
c:\windows\system32\zobubabe.dll
c:\windows\Tasks\egvtrrfa.job
c:\windows\wiaserviv.log

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_TDSSSERV.SYS


((((((((((((((((((((((((( Files Created from 2009-09-17 to 2009-10-17 )))))))))))))))))))))))))))))))
.

2009-10-16 04:35 . 2009-09-10 21:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-16 04:35 . 2009-10-16 04:38 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-16 04:35 . 2009-09-10 21:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-16 04:20 . 2009-10-16 04:20 -------- d-----w- c:\documents and settings\Admin\Application Data\Malwarebytes
2009-10-14 14:03 . 2009-10-14 14:03 -------- d-----w- c:\program files\AnVir Task Manager
2009-10-12 02:52 . 2009-10-12 02:52 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2009-10-11 23:42 . 2009-10-11 23:42 -------- d-----w- c:\program files\Cobian Backup 9
2009-10-11 22:22 . 2009-10-11 22:33 -------- d-----w- c:\documents and settings\All Users\Application Data\PrevxCSI
2009-10-11 16:55 . 2009-10-11 16:55 -------- d-sh--w- c:\documents and settings\Administrator\PrivacIE
2009-10-11 16:53 . 2009-10-11 16:53 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2009-10-11 16:28 . 2009-10-11 16:28 -------- d-sh--w- c:\documents and settings\Admin\PrivacIE
2009-10-11 16:27 . 2009-10-11 16:27 -------- d-sh--w- c:\documents and settings\Admin\IETldCache
2009-10-11 15:35 . 2009-10-11 15:38 -------- dc-h--w- c:\windows\ie8
2009-10-11 15:15 . 2009-10-11 15:15 -------- d-----w- c:\documents and settings\Admin\Application Data\AVG8
2009-10-11 01:36 . 2009-10-11 01:36 -------- d-----w- c:\documents and settings\Admin\Application Data\Lavasoft
2009-10-11 01:33 . 2009-10-14 14:03 -------- d-----w- c:\documents and settings\Admin\Local Settings\Application Data\AnVir
2009-10-11 01:25 . 2009-10-11 01:26 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\AnVir
2009-09-22 05:02 . 2009-09-22 05:02 -------- d-----w- c:\program files\Veoh Networks

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-16 04:11 . 2009-10-16 04:11 -------- d-----w- c:\documents and settings\Admin2\Application Data\Malwarebytes
2009-10-11 18:00 . 2009-04-05 23:39 -------- d-----w- c:\documents and settings\Admin\Application Data\OpenOffice.org2
2009-10-11 14:49 . 2008-01-17 23:40 -------- d-----w- c:\program files\LimeWire
2009-10-08 00:48 . 2007-10-09 02:48 -------- d-----w- c:\documents and settings\slinko\Application Data\OpenOffice.org2
2009-09-12 20:15 . 2007-11-07 05:18 -------- d-----w- c:\documents and settings\slinko\Application Data\Image Zone Express
2009-09-05 02:42 . 2009-04-05 22:30 15472 ----a-w- c:\documents and settings\Admin\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-08-09 23:36 . 2007-05-28 18:49 15472 ----a-w- c:\documents and settings\slinko\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-08-07 02:24 . 2006-06-24 17:26 327896 ----a-w- c:\windows\system32\wucltui.dll
2009-08-07 02:24 . 2006-06-24 17:26 209632 ----a-w- c:\windows\system32\wuweb.dll
2009-08-07 02:24 . 2006-06-24 17:26 35552 ----a-w- c:\windows\system32\wups.dll
2009-08-07 02:24 . 2005-05-26 08:16 44768 ----a-w- c:\windows\system32\wups2.dll
2009-08-07 02:24 . 2006-06-25 04:48 53472 ----a-w- c:\windows\system32\wuauclt.exe
2009-08-07 02:24 . 2002-08-29 12:00 96480 ----a-w- c:\windows\system32\cdm.dll
2009-08-07 02:23 . 2006-06-24 17:26 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-08-07 02:23 . 2006-06-28 01:56 274288 ----a-w- c:\windows\system32\mucltui.dll
2009-08-07 02:23 . 2006-06-25 04:48 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2009-08-07 02:23 . 2005-05-26 08:19 215920 ----a-w- c:\windows\system32\muweb.dll
2009-08-05 09:01 . 2006-06-24 18:06 204800 ----a-w- c:\windows\system32\mswebdvd.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AnVir Task Manager"="c:\program files\AnVir Task Manager\AnVir.exe" [2009-10-13 3102944]

c:\documents and settings\black-vixzin\Start Menu\Programs\Startup\
OpenOffice.org 2.2.lnk - c:\program files\OpenOffice.org 2.2\program\quickstart.exe [2007-2-2 393216]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-5-11 282624]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-1.11.1.5462-to-1.11.2.5464-enUS-downloader.exe"=
"c:\\Program Files\\Warcraft III\\Warcraft III.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-1.12.x-to-2.0.1-enUS-patch-downloader.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\WINDOWS\\system32\\HPZipm12.exe"=
"c:\\WINDOWS\\system32\\cmd.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\Apple\\Mobile Device Support\\bin\\AppleMobileDeviceService.exe"=
"c:\\Program Files\\Veoh Networks\\VeohWebPlayer\\veohwebplayer.exe"=
"c:\\WINDOWS\\system32\\logon.scr"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=

S1 BIOS;BIOS;c:\windows\system32\drivers\BIOS.sys [6/24/2006 11:01 AM 13696]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys --> c:\program files\SUPERAntiSpyware\SASKUTIL.sys [?]
S3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [12/3/2008 7:07 AM 8704]
S3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [12/3/2008 7:07 AM 3072]
S3 RSC4_A02;U.S. Robotics Wireless USB Adapter Driver;c:\windows\system32\DRIVERS\RSC4USB.sys --> c:\windows\system32\DRIVERS\RSC4USB.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-10-07 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 21:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/advanced_search?hl=en
uInternet Connection Wizard,ShellNext = hxxp://www.winxdvd.com/?gr
IE: Sothink SWF Catcher - c:\program files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Admin\Application Data\Mozilla\Firefox\Profiles\dhew55a8.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/advanced_search
FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\Veoh Networks\VeohWebPlayer\npWebPlayerVideoPluginATL.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.
- - - - ORPHANS REMOVED - - - -

BHO-{718c1eb1-1226-44a1-a714-8d55a8856e11} - yujupaye.dll
BHO-{CD10D714-77B8-4423-8E73-915DA0FDBC1E} - c:\windows\system32\ddcDtUKa.dll
HKLM-Run-tudunayug - c:\windows\system32\pobokifi.dll
HKLM-Run-dilemufuzu - meyagabu.dll
SharedTaskScheduler-{4f650cad-93e0-448b-a191-b4f7ff316cc7} - c:\windows\system32\fevebuso.dll
SharedTaskScheduler-{bd7c26fa-95db-40c5-91dd-1d211f5e0d5d} - c:\windows\system32\fevebuso.dll
SharedTaskScheduler-{8d6b26fe-abd7-4634-8436-7dd33f2d890c} - c:\windows\system32\fevebuso.dll
SharedTaskScheduler-{1eef9082-ec0e-426a-adb3-fc488d878954} - c:\windows\system32\nabigeki.dll
SharedTaskScheduler-{2510de18-0654-47f6-b321-e13e68cc80a1} - c:\windows\system32\fevebuso.dll
SharedTaskScheduler-{7329d66f-fa34-4129-8edb-62dc6bb56035} - c:\windows\system32\fevebuso.dll
SharedTaskScheduler-{bf4cebfc-a073-48a7-9f24-8a339a4b6c01} - c:\windows\system32\nabigeki.dll
SharedTaskScheduler-{d0fd3ac3-bafb-4a08-8bb5-5a886012b7d7} - c:\windows\system32\likeboyu.dll
SharedTaskScheduler-{25e4fa1b-c34c-4d53-aa4e-d8037e702912} - c:\windows\system32\vibomate.dll
SharedTaskScheduler-{89cd880f-a1e5-4c85-8498-2ff2e78c59e6} - c:\windows\system32\nabigeki.dll
SharedTaskScheduler-{3c982f6e-874e-4798-bfe3-0c6e0176406a} - c:\windows\system32\solesara.dll
SharedTaskScheduler-{e6f5c4ff-8941-445c-942b-9bbe2b9cceb0} - c:\windows\system32\pobokifi.dll
SharedTaskScheduler-{69d8a4a1-5efd-45d2-b6c3-ffc397ef7483} - c:\windows\system32\pobokifi.dll
SharedTaskScheduler-{c6343ea8-a52e-41f4-83ba-ad18e7c9023b} - c:\windows\system32\gazetima.dll
SharedTaskScheduler-{b5bcf639-432f-4b37-93dc-d2017fdca177} - c:\windows\system32\gazetima.dll
SSODL-jogagegik-{4f650cad-93e0-448b-a191-b4f7ff316cc7} - c:\windows\system32\fevebuso.dll
SSODL-pupokupih-{bd7c26fa-95db-40c5-91dd-1d211f5e0d5d} - c:\windows\system32\fevebuso.dll
SSODL-fekojihin-{8d6b26fe-abd7-4634-8436-7dd33f2d890c} - c:\windows\system32\fevebuso.dll
SSODL-kuyisuwap-{1eef9082-ec0e-426a-adb3-fc488d878954} - c:\windows\system32\nabigeki.dll
SSODL-nobisudez-{2510de18-0654-47f6-b321-e13e68cc80a1} - c:\windows\system32\fevebuso.dll
SSODL-ziparipad-{7329d66f-fa34-4129-8edb-62dc6bb56035} - c:\windows\system32\fevebuso.dll
SSODL-wezerakij-{bf4cebfc-a073-48a7-9f24-8a339a4b6c01} - c:\windows\system32\nabigeki.dll
SSODL-sisekokih-{d0fd3ac3-bafb-4a08-8bb5-5a886012b7d7} - c:\windows\system32\likeboyu.dll
SSODL-fazutejer-{25e4fa1b-c34c-4d53-aa4e-d8037e702912} - c:\windows\system32\vibomate.dll
SSODL-zijezodag-{89cd880f-a1e5-4c85-8498-2ff2e78c59e6} - c:\windows\system32\nabigeki.dll
SSODL-wehemavom-{3c982f6e-874e-4798-bfe3-0c6e0176406a} - c:\windows\system32\solesara.dll
SSODL-vuvelehig-{e6f5c4ff-8941-445c-942b-9bbe2b9cceb0} - c:\windows\system32\pobokifi.dll
SSODL-nizowoduy-{69d8a4a1-5efd-45d2-b6c3-ffc397ef7483} - c:\windows\system32\pobokifi.dll
SSODL-rolirefud-{c6343ea8-a52e-41f4-83ba-ad18e7c9023b} - c:\windows\system32\gazetima.dll
SSODL-tosikulir-{b5bcf639-432f-4b37-93dc-d2017fdca177} - c:\windows\system32\gazetima.dll
Notify-nnnmkkjj - nnnmkkjj.dll
AddRemove-HijackThis - c:\documents and settings\Admin\Desktop\HijackThis.exe
AddRemove-ShockwaveFlash - c:\windows\system32\Macromed\Flash\FlashUtil9b.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-16 21:00
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{45CDD3FC-8EAE-411C-A8BC-964F3A81A5ED}\InprocServer32]
@DACL=(02 0000)
@="c:\\Documents and Settings\\All Users\\Application Data\\Microsoft\\Internet Explorer\\DLLs\\mcbbklmqyr.dll"
"ThreadingModel"="Apartment"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{E3C0BF00-37B2-4EBF-8494-9E8EA80C2CED}\InprocServer32]
@DACL=(02 0000)
@="c:\\Documents and Settings\\All Users\\Application Data\\Microsoft\\Internet Explorer\\DLLs\\ieModule.dll"
"ThreadingModel"="Apartment"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{ed1edaf1-8b3b-4433-9a58-abee0477d986}\InprocServer32]
@DACL=(02 0000)
@="c:\\WINDOWS\\system32\\egdkdd.dll"
"ThreadingModel"="free"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]
@DACL=(02 0000)
@=""
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(720)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(1516)
c:\windows\system32\ieframe.dll
.
Completion time: 2009-10-17 21:02 - machine was rebooted
ComboFix-quarantined-files.txt 2009-10-17 04:02

Pre-Run: 72,471,855,104 bytes free
Post-Run: 74,171,125,760 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

Current=4 Default=4 Failed=2 LastKnownGood=5 Sets=1,2,3,4,5
230 --- E O F --- 2009-09-09 10:03

Edited by Phlimm, 16 October 2009 - 11:08 PM.


#8 SifuMike

SifuMike

    malware expert


  • Staff Emeritus
  • 15,385 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vancouver (not BC) WA (Not DC) USA
  • Local time:02:28 AM

Posted 17 October 2009 - 01:54 AM

Hi Phlimm,

With Avast uninstalled,
Click Start, then Run and type Notepad and click OK.
Open notepad - don't use any other text editor than notepad or the script will fail.
Copy/paste the text in the code box below into notepad:

RegLockDel:: 
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{45CDD3FC-8EAE-411C-A8BC-964F3A81A5ED}\InprocServer32]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{E3C0BF00-37B2-4EBF-8494-9E8EA80C2CED}\InprocServer32]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{ed1edaf1-8b3b-4433-9a58-abee0477d986}\InprocServer32]


Name the Notepad file CFScript.txt and Save it to your desktop.

IMPORTANT: The above script was written specifically for this infection on this person's computer. It is NOT to be used on another computer, as it may cause damage that could result in a format!

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

Posted Image


This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply

Now you reinstall Avast.
If I've saved you time & money,
please make a donation so I can keep helping people just like you! You can donate using a credit card and PayPal. Thank you!



Posted Image

Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#9 Phlimm

Phlimm
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 17 October 2009 - 04:31 PM

OK done and done. Here is the 2nd ComboFix report:

ComboFix 09-10-16.09 - Admin 10/17/2009 14:21.2.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.723 [GMT -7:00]
Running from: c:\documents and settings\Admin\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Admin\Desktop\CFScript.txt
.

((((((((((((((((((((((((( Files Created from 2009-09-17 to 2009-10-17 )))))))))))))))))))))))))))))))
.

2009-10-17 04:24 . 2009-10-17 04:24 -------- d-----w- c:\windows\ie8updates
2009-10-16 04:35 . 2009-09-10 21:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-16 04:35 . 2009-10-16 04:38 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-16 04:35 . 2009-09-10 21:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-16 04:20 . 2009-10-16 04:20 -------- d-----w- c:\documents and settings\Admin\Application Data\Malwarebytes
2009-10-14 14:03 . 2009-10-14 14:03 -------- d-----w- c:\program files\AnVir Task Manager
2009-10-12 02:52 . 2009-10-12 02:52 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2009-10-11 23:42 . 2009-10-11 23:42 -------- d-----w- c:\program files\Cobian Backup 9
2009-10-11 22:22 . 2009-10-11 22:33 -------- d-----w- c:\documents and settings\All Users\Application Data\PrevxCSI
2009-10-11 16:55 . 2009-10-11 16:55 -------- d-sh--w- c:\documents and settings\Administrator\PrivacIE
2009-10-11 16:53 . 2009-10-11 16:53 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2009-10-11 16:48 . 2009-07-03 17:09 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
2009-10-11 16:48 . 2009-07-03 17:09 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
2009-10-11 16:28 . 2009-10-11 16:28 -------- d-sh--w- c:\documents and settings\Admin\PrivacIE
2009-10-11 16:27 . 2009-10-11 16:27 -------- d-sh--w- c:\documents and settings\Admin\IETldCache
2009-10-11 15:35 . 2009-10-11 15:38 -------- dc-h--w- c:\windows\ie8
2009-10-11 15:15 . 2009-10-11 15:15 -------- d-----w- c:\documents and settings\Admin\Application Data\AVG8
2009-10-11 01:36 . 2009-10-11 01:36 -------- d-----w- c:\documents and settings\Admin\Application Data\Lavasoft
2009-10-11 01:33 . 2009-10-14 14:03 -------- d-----w- c:\documents and settings\Admin\Local Settings\Application Data\AnVir
2009-10-11 01:25 . 2009-10-11 01:26 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\AnVir
2009-09-22 05:02 . 2009-09-22 05:02 -------- d-----w- c:\program files\Veoh Networks

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-17 04:36 . 2008-01-17 23:40 -------- d-----w- c:\program files\LimeWire
2009-10-11 18:00 . 2009-04-05 23:39 -------- d-----w- c:\documents and settings\Admin\Application Data\OpenOffice.org2
2009-10-08 00:48 . 2007-10-09 02:48 -------- d-----w- c:\documents and settings\slinko\Application Data\OpenOffice.org2
2009-09-12 20:15 . 2007-11-07 05:18 -------- d-----w- c:\documents and settings\slinko\Application Data\Image Zone Express
2009-09-11 14:18 . 2002-08-29 12:00 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-05 02:42 . 2009-04-05 22:30 15472 ----a-w- c:\documents and settings\Admin\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-04 21:03 . 2002-08-29 12:00 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-08-26 08:00 . 2002-08-29 12:00 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-09 23:36 . 2007-05-28 18:49 15472 ----a-w- c:\documents and settings\slinko\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-08-07 02:24 . 2006-06-24 17:26 327896 ----a-w- c:\windows\system32\wucltui.dll
2009-08-07 02:24 . 2006-06-24 17:26 209632 ----a-w- c:\windows\system32\wuweb.dll
2009-08-07 02:24 . 2006-06-24 17:26 35552 ----a-w- c:\windows\system32\wups.dll
2009-08-07 02:24 . 2005-05-26 08:16 44768 ----a-w- c:\windows\system32\wups2.dll
2009-08-07 02:24 . 2006-06-25 04:48 53472 ------w- c:\windows\system32\wuauclt.exe
2009-08-07 02:24 . 2002-08-29 12:00 96480 ----a-w- c:\windows\system32\cdm.dll
2009-08-07 02:23 . 2006-06-24 17:26 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-08-07 02:23 . 2006-06-28 01:56 274288 ----a-w- c:\windows\system32\mucltui.dll
2009-08-07 02:23 . 2006-06-25 04:48 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2009-08-07 02:23 . 2005-05-26 08:19 215920 ----a-w- c:\windows\system32\muweb.dll
2009-08-05 09:01 . 2006-06-24 18:06 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-08-05 03:44 . 2002-08-29 12:00 2189184 ------w- c:\windows\system32\ntoskrnl.exe
2009-08-04 14:20 . 2002-08-29 01:04 2066048 ------w- c:\windows\system32\ntkrnlpa.exe
.

((((((((((((((((((((((((((((( SnapShot@2009-10-17_04.00.05 )))))))))))))))))))))))))))))))))))))))))
.
- 2002-08-29 12:00 . 2009-08-08 10:08 85916 c:\windows\system32\perfc009.dat
+ 2002-08-29 12:00 . 2009-10-17 04:28 85916 c:\windows\system32\perfc009.dat
+ 2007-08-14 01:54 . 2009-07-03 17:09 55296 c:\windows\system32\msfeedsbs.dll
- 2007-08-14 01:54 . 2009-03-08 11:31 55296 c:\windows\system32\msfeedsbs.dll
- 2002-08-29 12:00 . 2009-03-08 11:33 25600 c:\windows\system32\jsproxy.dll
+ 2002-08-29 12:00 . 2009-07-03 17:09 25600 c:\windows\system32\jsproxy.dll
- 2009-04-05 20:46 . 2009-03-08 11:31 55296 c:\windows\system32\dllcache\msfeedsbs.dll
+ 2009-04-05 20:46 . 2009-07-03 17:09 55296 c:\windows\system32\dllcache\msfeedsbs.dll
+ 2009-09-04 21:03 . 2009-09-04 21:03 58880 c:\windows\system32\dllcache\msasn1.dll
+ 2007-08-14 01:54 . 2009-07-03 17:09 25600 c:\windows\system32\dllcache\jsproxy.dll
- 2007-08-14 01:54 . 2009-03-08 11:33 25600 c:\windows\system32\dllcache\jsproxy.dll
+ 2009-10-17 04:24 . 2009-03-08 11:33 12288 c:\windows\ie8updates\KB972260-IE8\xpshims.dll
+ 2009-10-17 04:24 . 2009-03-08 11:31 55296 c:\windows\ie8updates\KB972260-IE8\msfeedsbs.dll
+ 2009-10-17 04:24 . 2009-03-08 11:33 25600 c:\windows\ie8updates\KB972260-IE8\jsproxy.dll
+ 2009-10-17 04:35 . 2009-10-17 04:35 60928 c:\windows\assembly\NativeImages_v2.0.50727_32\UIAutomationProvider\b4a9e413d5cd6d6ec2d50aa05381e293\UIAutomationProvider.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 37888 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Pres#\8acb476a0d4ee17a12881e17ae74a6af\System.Windows.Presentation.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 36864 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.DynamicD#\4b87ca3482a3c0ee733e028ecee7de65\System.Web.DynamicData.Design.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 94208 c:\windows\assembly\NativeImages_v2.0.50727_32\System.ComponentMod#\a0c71055364bd356971791284c3fb910\System.ComponentModel.DataAnnotations.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 82944 c:\windows\assembly\NativeImages_v2.0.50727_32\System.AddIn.Contra#\f9a75bbdc2ce7db578b5977766a09b99\System.AddIn.Contract.ni.dll
+ 2009-10-17 04:31 . 2009-10-17 04:31 47104 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFontCac#\3dd0f86c966c75755d62eab8ddf0634c\PresentationFontCache.ni.exe
+ 2009-10-17 04:29 . 2009-10-17 04:29 39424 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationCFFRast#\034d081fe294bab1ee1ecc98c1181424\PresentationCFFRasterizer.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 55296 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Vsa\f2673aec397c52796aef05bb9d2668df\Microsoft.Vsa.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 65024 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Fra#\d513fe1a81c441e7656a9b062cff4e9f\Microsoft.Build.Framework.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 74752 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Fra#\c5d504724d7f351b1d034615dbb72a2a\Microsoft.Build.Framework.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 14336 c:\windows\assembly\NativeImages_v2.0.50727_32\dfsvc\a664ccab020f93f1d533919f57131190\dfsvc.ni.exe
+ 2009-10-17 04:42 . 2009-10-17 04:42 25600 c:\windows\assembly\NativeImages_v2.0.50727_32\Accessibility\e63d6d26b8a664cfdfbd4ad75e03c14d\Accessibility.ni.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 77824 c:\windows\assembly\GAC_MSIL\System.Web.RegularExpressions\2.0.0.0__b03f5f7f11d50a3a\System.Web.RegularExpressions.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 77824 c:\windows\assembly\GAC_MSIL\System.Web.RegularExpressions\2.0.0.0__b03f5f7f11d50a3a\System.Web.RegularExpressions.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 81920 c:\windows\assembly\GAC_MSIL\System.Drawing.Design\2.0.0.0__b03f5f7f11d50a3a\System.Drawing.Design.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 81920 c:\windows\assembly\GAC_MSIL\System.Drawing.Design\2.0.0.0__b03f5f7f11d50a3a\System.Drawing.Design.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 81920 c:\windows\assembly\GAC_MSIL\System.Configuration.Install\2.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 81920 c:\windows\assembly\GAC_MSIL\System.Configuration.Install\2.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 32768 c:\windows\assembly\GAC_MSIL\Microsoft.Vsa\8.0.0.0__b03f5f7f11d50a3a\Microsoft.Vsa.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 32768 c:\windows\assembly\GAC_MSIL\Microsoft.Vsa\8.0.0.0__b03f5f7f11d50a3a\Microsoft.Vsa.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 12800 c:\windows\assembly\GAC_MSIL\Microsoft.Vsa.Vb.CodeDOMProcessor\8.0.0.0__b03f5f7f11d50a3a\Microsoft.Vsa.Vb.CodeDOMProcessor.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 12800 c:\windows\assembly\GAC_MSIL\Microsoft.Vsa.Vb.CodeDOMProcessor\8.0.0.0__b03f5f7f11d50a3a\Microsoft.Vsa.Vb.CodeDOMProcessor.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 28672 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Vsa\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Vsa.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 28672 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Vsa\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Vsa.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 77824 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Utilities\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Utilities.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 77824 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Utilities\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Utilities.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 36864 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 36864 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 77824 c:\windows\assembly\GAC_MSIL\IEHost\2.0.0.0__b03f5f7f11d50a3a\IEHost.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 77824 c:\windows\assembly\GAC_MSIL\IEHost\2.0.0.0__b03f5f7f11d50a3a\IEHost.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 13312 c:\windows\assembly\GAC_MSIL\cscompmgd\8.0.0.0__b03f5f7f11d50a3a\cscompmgd.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 13312 c:\windows\assembly\GAC_MSIL\cscompmgd\8.0.0.0__b03f5f7f11d50a3a\cscompmgd.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 10752 c:\windows\assembly\GAC_MSIL\Accessibility\2.0.0.0__b03f5f7f11d50a3a\Accessibility.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 10752 c:\windows\assembly\GAC_MSIL\Accessibility\2.0.0.0__b03f5f7f11d50a3a\Accessibility.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 72192 c:\windows\assembly\GAC_32\ISymWrapper\2.0.0.0__b03f5f7f11d50a3a\ISymWrapper.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 72192 c:\windows\assembly\GAC_32\ISymWrapper\2.0.0.0__b03f5f7f11d50a3a\ISymWrapper.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 69120 c:\windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 69120 c:\windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 8192 c:\windows\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e\IEExecRemote.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 8192 c:\windows\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e\IEExecRemote.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 7168 c:\windows\assembly\GAC_MSIL\Microsoft_VsaVb\8.0.0.0__b03f5f7f11d50a3a\Microsoft_VsaVb.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 7168 c:\windows\assembly\GAC_MSIL\Microsoft_VsaVb\8.0.0.0__b03f5f7f11d50a3a\Microsoft_VsaVb.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 5632 c:\windows\assembly\GAC_MSIL\Microsoft.VisualC\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualC.Dll
- 2009-08-08 10:07 . 2009-08-08 10:07 5632 c:\windows\assembly\GAC_MSIL\Microsoft.VisualC\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualC.Dll
- 2009-08-08 10:07 . 2009-08-08 10:07 6656 c:\windows\assembly\GAC_MSIL\IIEHost\2.0.0.0__b03f5f7f11d50a3a\IIEHost.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 6656 c:\windows\assembly\GAC_MSIL\IIEHost\2.0.0.0__b03f5f7f11d50a3a\IIEHost.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 8192 c:\windows\assembly\GAC_MSIL\IEExecRemote\2.0.0.0__b03f5f7f11d50a3a\IEExecRemote.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 8192 c:\windows\assembly\GAC_MSIL\IEExecRemote\2.0.0.0__b03f5f7f11d50a3a\IEExecRemote.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 113664 c:\windows\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790\System.EnterpriseServices.Wrapper.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 113664 c:\windows\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790\System.EnterpriseServices.Wrapper.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 258048 c:\windows\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790\System.EnterpriseServices.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 258048 c:\windows\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790\System.EnterpriseServices.dll
+ 2005-01-28 17:44 . 2009-04-10 08:01 413032 c:\windows\system32\wmspdmod.dll
+ 2006-04-28 14:58 . 2009-07-03 17:09 915456 c:\windows\system32\wininet.dll
+ 2002-08-29 12:00 . 2009-10-17 04:28 513048 c:\windows\system32\perfh009.dat
- 2002-08-29 12:00 . 2009-08-08 10:08 513048 c:\windows\system32\perfh009.dat
+ 2002-08-29 12:00 . 2009-07-03 17:09 206848 c:\windows\system32\occache.dll
+ 2007-08-14 01:54 . 2009-07-03 17:09 594432 c:\windows\system32\msfeeds.dll
- 2007-08-14 01:54 . 2009-03-08 11:32 594432 c:\windows\system32\msfeeds.dll
+ 2002-08-29 12:00 . 2009-06-22 06:44 726528 c:\windows\system32\jscript.dll
- 2002-08-29 12:00 . 2009-03-08 11:33 726528 c:\windows\system32\jscript.dll
+ 2002-08-29 12:00 . 2009-07-03 17:09 184320 c:\windows\system32\iepeers.dll
+ 2002-08-29 12:00 . 2009-07-03 17:09 386048 c:\windows\system32\iedkcs32.dll
+ 2002-08-29 12:00 . 2009-07-03 11:01 173056 c:\windows\system32\ie4uinit.exe
- 2002-08-29 12:00 . 2009-03-08 11:32 173056 c:\windows\system32\ie4uinit.exe
+ 2009-04-10 08:01 . 2009-04-10 08:01 413032 c:\windows\system32\dllcache\wmspdmod.dll
+ 2008-04-21 06:44 . 2009-07-03 17:09 915456 c:\windows\system32\dllcache\wininet.dll
- 2006-08-21 14:52 . 2008-10-03 10:02 247326 c:\windows\system32\dllcache\strmdll.dll
+ 2006-08-21 14:52 . 2009-08-26 08:00 247326 c:\windows\system32\dllcache\strmdll.dll
+ 2007-08-14 01:44 . 2009-07-03 17:09 206848 c:\windows\system32\dllcache\occache.dll
+ 2009-06-25 08:25 . 2009-09-11 14:18 136192 c:\windows\system32\dllcache\msv1_0.dll
- 2009-06-25 08:25 . 2009-06-25 08:25 136192 c:\windows\system32\dllcache\msv1_0.dll
- 2009-04-05 20:46 . 2009-03-08 11:32 594432 c:\windows\system32\dllcache\msfeeds.dll
+ 2009-04-05 20:46 . 2009-07-03 17:09 594432 c:\windows\system32\dllcache\msfeeds.dll
+ 2008-05-09 10:53 . 2009-06-22 06:44 726528 c:\windows\system32\dllcache\jscript.dll
- 2008-05-09 10:53 . 2009-03-08 11:33 726528 c:\windows\system32\dllcache\jscript.dll
+ 2007-08-14 01:54 . 2009-07-03 17:09 184320 c:\windows\system32\dllcache\iepeers.dll
+ 2007-08-14 01:39 . 2009-07-03 17:09 386048 c:\windows\system32\dllcache\iedkcs32.dll
+ 2007-08-14 01:39 . 2009-07-03 11:01 173056 c:\windows\system32\dllcache\ie4uinit.exe
- 2007-08-14 01:39 . 2009-03-08 11:32 173056 c:\windows\system32\dllcache\ie4uinit.exe
+ 2009-08-08 06:51 . 2009-08-08 06:51 989016 c:\windows\Microsoft.NET\Framework\v2.0.50727\mscordacwks.dll
+ 2009-10-17 04:24 . 2009-03-08 11:34 914944 c:\windows\ie8updates\KB972260-IE8\wininet.dll
+ 2009-10-17 04:24 . 2009-05-26 11:40 382840 c:\windows\ie8updates\KB972260-IE8\spuninst\updspapi.dll
+ 2009-10-17 04:24 . 2009-05-26 11:40 231288 c:\windows\ie8updates\KB972260-IE8\spuninst\spuninst.exe
+ 2009-10-17 04:24 . 2009-03-08 11:34 109568 c:\windows\ie8updates\KB972260-IE8\occache.dll
+ 2009-10-17 04:24 . 2009-03-08 11:32 594432 c:\windows\ie8updates\KB972260-IE8\msfeeds.dll
+ 2009-10-17 04:24 . 2009-03-08 11:33 246784 c:\windows\ie8updates\KB972260-IE8\ieproxy.dll
+ 2009-10-17 04:24 . 2009-03-08 11:31 183808 c:\windows\ie8updates\KB972260-IE8\iepeers.dll
+ 2009-10-17 04:24 . 2009-03-08 21:09 391536 c:\windows\ie8updates\KB972260-IE8\iedkcs32.dll
+ 2009-10-17 04:24 . 2009-03-08 11:32 173056 c:\windows\ie8updates\KB972260-IE8\ie4uinit.exe
+ 2009-10-17 04:25 . 2008-07-08 13:02 382840 c:\windows\ie8updates\KB971961-IE8\spuninst\updspapi.dll
+ 2009-10-17 04:25 . 2008-07-08 13:02 231288 c:\windows\ie8updates\KB971961-IE8\spuninst\spuninst.exe
+ 2009-10-17 04:25 . 2009-03-08 11:33 726528 c:\windows\ie8updates\KB971961-IE8\jscript.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 321536 c:\windows\assembly\NativeImages_v2.0.50727_32\WsatConfig\e2098e43d115155d6ba91ba3a7e577cf\WsatConfig.ni.exe
+ 2009-10-17 04:35 . 2009-10-17 04:35 240128 c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsFormsIntegra#\bf92bc207f927cbbd6dfc9dc0c3eae68\WindowsFormsIntegration.ni.dll
+ 2009-10-17 04:35 . 2009-10-17 04:35 187904 c:\windows\assembly\NativeImages_v2.0.50727_32\UIAutomationTypes\6f488b7644dc50a083868e91a4014466\UIAutomationTypes.ni.dll
+ 2009-10-17 04:35 . 2009-10-17 04:35 447488 c:\windows\assembly\NativeImages_v2.0.50727_32\UIAutomationClient\c2fbf25609b704061a93500efa6f241d\UIAutomationClient.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 400896 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Xml.Linq\eb23b78564687badff1bd1f1d0a0ec97\System.Xml.Linq.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 129536 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Routing\e7666364bf9f3ba5f4833c9efedd8218\System.Web.Routing.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 202240 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.RegularE#\b5f1b8791e6c47e5bd5e7018c346c586\System.Web.RegularExpressions.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 859648 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Extensio#\884eacddf339b8b342f66aedff5f8ef9\System.Web.Extensions.Design.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 328704 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Entity\9e199645bd26f1afe58ebe185d1e7f0f\System.Web.Entity.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 301056 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Entity.D#\652017ebe962ab2eb271c2524f31cd61\System.Web.Entity.Design.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 547328 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.DynamicD#\d0070c1c1a642ae30394e00bc0d82336\System.Web.DynamicData.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 141312 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Abstract#\1896753d02d146be1988d32241300f51\System.Web.Abstractions.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 627200 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Transactions\408e637346ef628a3f54fb1b9b83ac9f\System.Transactions.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 212992 c:\windows\assembly\NativeImages_v2.0.50727_32\System.ServiceProce#\1f61bccb700d687775cf778dd77752e9\System.ServiceProcess.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 676352 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Security\a9e9b885a6601469c4058375cc74d856\System.Security.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 311296 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Seri#\9bc34a79af9c3ed2cf17a0226c769b4c\System.Runtime.Serialization.Formatters.Soap.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 621056 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Net\5f74a84e9d28c2332c51f6e30da0e125\System.Net.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 998400 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Management\2c208e4c5521f31057ea7d6e93c6a567\System.Management.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 330752 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Management.I#\818b20a7c6f3b2fe97bf008ca24080c1\System.Management.Instrumentation.ni.dll
+ 2009-10-17 04:42 . 2009-10-17 04:42 381440 c:\windows\assembly\NativeImages_v2.0.50727_32\System.IO.Log\6c273eb9d1ee8b66b5ecb073de4b785d\System.IO.Log.ni.dll
+ 2009-10-17 04:42 . 2009-10-17 04:42 212992 c:\windows\assembly\NativeImages_v2.0.50727_32\System.IdentityMode#\7222db518afb4eaaa138824278249bc7\System.IdentityModel.Selectors.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 280064 c:\windows\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\8a7d0bd0057a8ed38291d5662248f7a1\System.EnterpriseServices.Wrapper.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 627712 c:\windows\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\8a7d0bd0057a8ed38291d5662248f7a1\System.EnterpriseServices.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 208384 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Drawing.Desi#\ca6d7208c0fb72ff97429f2636ced321\System.Drawing.Design.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 881152 c:\windows\assembly\NativeImages_v2.0.50727_32\System.DirectorySer#\c92fc19800e701c90f90ab7a2ab44c47\System.DirectoryServices.AccountManagement.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 455680 c:\windows\assembly\NativeImages_v2.0.50727_32\System.DirectorySer#\a601f47a98ee67df424685c9a66ea449\System.DirectoryServices.Protocols.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 939008 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.Service#\b91b44015859163646f210d284f7166a\System.Data.Services.Client.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 354816 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.Service#\1b35297e07b85071daecdb06f96750a1\System.Data.Services.Design.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 756736 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.Entity.#\cf906bf9146d1f0013451ec63b58e064\System.Data.Entity.Design.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 135680 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.DataSet#\4ff4134b0d490c090e03d74e104517c4\System.Data.DataSetExtensions.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 971264 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\7c743462baccf29b3567b0e3ec9ac134\System.Configuration.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 141312 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Configuratio#\443e3a85c491b2de4a2ac654cb957484\System.Configuration.Install.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 633856 c:\windows\assembly\NativeImages_v2.0.50727_32\System.AddIn\cba35f47925431a54d0e6ae147a292f1\System.AddIn.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 366080 c:\windows\assembly\NativeImages_v2.0.50727_32\SMSvcHost\6af32fe5cbec0aa54e2efa6910c73651\SMSvcHost.ni.exe
+ 2009-10-17 04:44 . 2009-10-17 04:44 256000 c:\windows\assembly\NativeImages_v2.0.50727_32\SMDiagnostics\7602d7687fb9bd21cd9ae60d2b187c99\SMDiagnostics.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 320512 c:\windows\assembly\NativeImages_v2.0.50727_32\ServiceModelReg\a23dc25782df04533a13e348203e4dc5\ServiceModelReg.ni.exe
+ 2009-10-17 04:34 . 2009-10-17 04:34 258048 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\96f74da5fc40b92f09069230bc0df4f0\PresentationFramework.Royale.ni.dll
+ 2009-10-17 04:33 . 2009-10-17 04:33 539648 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\3bb4d16b042b72c2c85a0f8ac9d48f28\PresentationFramework.Luna.ni.dll
+ 2009-10-17 04:33 . 2009-10-17 04:33 368128 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\30c5c2682d3c5bdaa83bb9a36ee48afa\PresentationFramework.Aero.ni.dll
+ 2009-10-17 04:33 . 2009-10-17 04:33 224768 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\07e952efd70f5608e221a008e6231ace\PresentationFramework.Classic.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 133632 c:\windows\assembly\NativeImages_v2.0.50727_32\MSBuild\eade8c1c9c1e8e5ffb50e6c9b9af0f6a\MSBuild.ni.exe
+ 2009-10-17 04:44 . 2009-10-17 04:44 386560 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Transacti#\fc4d66e0a92b3767006a84f2519d2457\Microsoft.Transactions.Bridge.Dtc.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 144384 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Uti#\58ca3ecc52b7246b448c109817198a0b\Microsoft.Build.Utilities.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 175104 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Uti#\4dd43724dd92026577c6f588270137a0\Microsoft.Build.Utilities.v3.5.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 839680 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Eng#\8c651f75bb741330370986dcad8e9e5b\Microsoft.Build.Engine.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 222720 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Con#\a6dcbae619ccd938bfe808c54d6d3ae0\Microsoft.Build.Conversion.v3.5.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 220672 c:\windows\assembly\NativeImages_v2.0.50727_32\CustomMarshalers\77688ce14f221ed94a9f442ae4736123\CustomMarshalers.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 410112 c:\windows\assembly\NativeImages_v2.0.50727_32\ComSvcConfig\a17c65f0cffaa4f792dd38d50df9d526\ComSvcConfig.ni.exe
+ 2009-10-17 04:42 . 2009-10-17 04:42 842240 c:\windows\assembly\NativeImages_v2.0.50727_32\AspNetMMCExt\85d7c111956b478766d90625b35d963f\AspNetMMCExt.ni.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 839680 c:\windows\assembly\GAC_MSIL\System.Web.Services\2.0.0.0__b03f5f7f11d50a3a\System.Web.Services.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 839680 c:\windows\assembly\GAC_MSIL\System.Web.Services\2.0.0.0__b03f5f7f11d50a3a\System.Web.Services.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 835584 c:\windows\assembly\GAC_MSIL\System.Web.Mobile\2.0.0.0__b03f5f7f11d50a3a\System.Web.Mobile.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 835584 c:\windows\assembly\GAC_MSIL\System.Web.Mobile\2.0.0.0__b03f5f7f11d50a3a\System.Web.Mobile.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 114688 c:\windows\assembly\GAC_MSIL\System.ServiceProcess\2.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 114688 c:\windows\assembly\GAC_MSIL\System.ServiceProcess\2.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 258048 c:\windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 258048 c:\windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 131072 c:\windows\assembly\GAC_MSIL\System.Runtime.Serialization.Formatters.Soap\2.0.0.0__b03f5f7f11d50a3a\System.Runtime.Serialization.Formatters.Soap.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 131072 c:\windows\assembly\GAC_MSIL\System.Runtime.Serialization.Formatters.Soap\2.0.0.0__b03f5f7f11d50a3a\System.Runtime.Serialization.Formatters.Soap.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 303104 c:\windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 303104 c:\windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 258048 c:\windows\assembly\GAC_MSIL\System.Messaging\2.0.0.0__b03f5f7f11d50a3a\System.Messaging.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 258048 c:\windows\assembly\GAC_MSIL\System.Messaging\2.0.0.0__b03f5f7f11d50a3a\System.Messaging.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 372736 c:\windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 372736 c:\windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 626688 c:\windows\assembly\GAC_MSIL\System.Drawing\2.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 626688 c:\windows\assembly\GAC_MSIL\System.Drawing\2.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 401408 c:\windows\assembly\GAC_MSIL\System.DirectoryServices\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 401408 c:\windows\assembly\GAC_MSIL\System.DirectoryServices\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 188416 c:\windows\assembly\GAC_MSIL\System.DirectoryServices.Protocols\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.Protocols.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 188416 c:\windows\assembly\GAC_MSIL\System.DirectoryServices.Protocols\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.Protocols.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 970752 c:\windows\assembly\GAC_MSIL\System.Deployment\2.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 970752 c:\windows\assembly\GAC_MSIL\System.Deployment\2.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 745472 c:\windows\assembly\GAC_MSIL\System.Data.SqlXml\2.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 745472 c:\windows\assembly\GAC_MSIL\System.Data.SqlXml\2.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 425984 c:\windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 425984 c:\windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 110592 c:\windows\assembly\GAC_MSIL\sysglobl\2.0.0.0__b03f5f7f11d50a3a\sysglobl.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 110592 c:\windows\assembly\GAC_MSIL\sysglobl\2.0.0.0__b03f5f7f11d50a3a\sysglobl.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 659456 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 659456 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 372736 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Compatibility.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 372736 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Compatibility.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 110592 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility.Data\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Compatibility.Data.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 110592 c:\windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility.Data\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Compatibility.Data.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 749568 c:\windows\assembly\GAC_MSIL\Microsoft.JScript\8.0.0.0__b03f5f7f11d50a3a\Microsoft.JScript.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 749568 c:\windows\assembly\GAC_MSIL\Microsoft.JScript\8.0.0.0__b03f5f7f11d50a3a\Microsoft.JScript.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 655360 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Tasks\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Tasks.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 655360 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Tasks\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Tasks.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 348160 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 348160 c:\windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 507904 c:\windows\assembly\GAC_MSIL\AspNetMMCExt\2.0.0.0__b03f5f7f11d50a3a\AspNetMMCExt.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 507904 c:\windows\assembly\GAC_MSIL\AspNetMMCExt\2.0.0.0__b03f5f7f11d50a3a\AspNetMMCExt.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 261632 c:\windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 261632 c:\windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 113664 c:\windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 113664 c:\windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 258048 c:\windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 258048 c:\windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 486400 c:\windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 486400 c:\windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll
+ 2009-10-17 04:23 . 2009-08-13 13:55 1748992 c:\windows\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.6001.22319_x-ww_f0b4c2df\GdiPlus.dll
+ 2006-05-08 14:50 . 2009-07-03 17:09 1208832 c:\windows\system32\urlmon.dll
+ 2002-08-29 12:00 . 2009-07-17 16:22 1435648 c:\windows\system32\query.dll
- 2002-08-29 12:00 . 2008-04-14 00:12 1435648 c:\windows\system32\query.dll
+ 2006-05-19 19:52 . 2009-07-19 13:18 5937152 c:\windows\system32\mshtml.dll
- 2006-05-19 19:52 . 2009-03-08 11:41 5937152 c:\windows\system32\mshtml.dll
+ 2007-08-14 01:34 . 2009-07-03 17:09 1985536 c:\windows\system32\iertutil.dll
+ 2008-06-26 08:15 . 2009-07-03 17:09 1208832 c:\windows\system32\dllcache\urlmon.dll
+ 2009-07-17 16:22 . 2009-07-17 16:22 1435648 c:\windows\system32\dllcache\query.dll
+ 2008-10-15 02:03 . 2009-08-05 03:44 2189184 c:\windows\system32\dllcache\ntoskrnl.exe
+ 2008-10-15 02:03 . 2009-08-04 14:20 2023936 c:\windows\system32\dllcache\ntkrpamp.exe
- 2008-10-15 02:03 . 2009-02-06 10:32 2023936 c:\windows\system32\dllcache\ntkrpamp.exe
+ 2008-10-15 02:03 . 2009-08-04 14:20 2066048 c:\windows\system32\dllcache\ntkrnlpa.exe
- 2008-10-15 02:03 . 2009-02-08 02:02 2066048 c:\windows\system32\dllcache\ntkrnlpa.exe
- 2008-10-15 02:03 . 2009-02-06 11:06 2145280 c:\windows\system32\dllcache\ntkrnlmp.exe
+ 2008-10-15 02:03 . 2009-08-04 15:13 2145280 c:\windows\system32\dllcache\ntkrnlmp.exe
- 2008-04-21 06:44 . 2009-03-08 11:41 5937152 c:\windows\system32\dllcache\mshtml.dll
+ 2008-04-21 06:44 . 2009-07-19 13:18 5937152 c:\windows\system32\dllcache\mshtml.dll
+ 2009-04-05 20:46 . 2009-07-03 17:09 1985536 c:\windows\system32\dllcache\iertutil.dll
+ 2009-08-08 06:51 . 2009-08-08 06:51 5812560 c:\windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll
+ 2009-08-08 06:51 . 2009-08-08 06:51 4546560 c:\windows\Microsoft.NET\Framework\v2.0.50727\mscorlib.dll
- 2008-11-25 11:59 . 2008-11-25 11:59 4546560 c:\windows\Microsoft.NET\Framework\v2.0.50727\mscorlib.dll
+ 2009-10-17 04:24 . 2009-03-08 11:34 1206784 c:\windows\ie8updates\KB972260-IE8\urlmon.dll
+ 2009-10-17 04:24 . 2009-03-08 11:41 5937152 c:\windows\ie8updates\KB972260-IE8\mshtml.dll
+ 2009-10-17 04:24 . 2009-03-08 11:32 1985024 c:\windows\ie8updates\KB972260-IE8\iertutil.dll
+ 2008-10-15 02:03 . 2009-08-05 03:44 2189184 c:\windows\Driver Cache\i386\ntoskrnl.exe
- 2008-10-15 02:03 . 2009-02-06 10:32 2023936 c:\windows\Driver Cache\i386\ntkrpamp.exe
+ 2008-10-15 02:03 . 2009-08-04 14:20 2023936 c:\windows\Driver Cache\i386\ntkrpamp.exe
+ 2008-10-15 02:03 . 2009-08-04 14:20 2066048 c:\windows\Driver Cache\i386\ntkrnlpa.exe
- 2008-10-15 02:03 . 2009-02-08 02:02 2066048 c:\windows\Driver Cache\i386\ntkrnlpa.exe
+ 2008-10-15 02:03 . 2009-08-04 15:13 2145280 c:\windows\Driver Cache\i386\ntkrnlmp.exe
- 2008-10-15 02:03 . 2009-02-06 11:06 2145280 c:\windows\Driver Cache\i386\ntkrnlmp.exe
+ 2009-10-17 04:30 . 2009-10-17 04:30 3313664 c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsBase\204d6e5b335134f23ca37638b9227ecf\WindowsBase.ni.dll
+ 2009-10-17 04:35 . 2009-10-17 04:35 1049600 c:\windows\assembly\NativeImages_v2.0.50727_32\UIAutomationClients#\0f2ed6a204eb13841e99b77025464afc\UIAutomationClientsideProviders.ni.dll
+ 2009-10-17 04:29 . 2009-10-17 04:29 7868416 c:\windows\assembly\NativeImages_v2.0.50727_32\System\3de5bd01124463d7862bd173af90bc83\System.ni.dll
+ 2009-10-17 04:35 . 2009-10-17 04:35 5450752 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Xml\5913d3f81e77194ec833991b1047a532\System.Xml.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 1356288 c:\windows\assembly\NativeImages_v2.0.50727_32\System.WorkflowServ#\fa48917b13629d8effa80dd4a2f2973d\System.WorkflowServices.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 1908224 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Workflow.Run#\6fe66ee6f3c81996bc148f1ebe7ec030\System.Workflow.Runtime.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 4514304 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Workflow.Com#\9d0b61f2f1ebdc300bd970f594c422ef\System.Workflow.ComponentModel.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 2992640 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Workflow.Act#\65328898148a720d394f802f192fc2a0\System.Workflow.Activities.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 1840640 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Services\ea07ac791bb5cb9f83679e3dd1a0c0cc\System.Web.Services.ni.dll
+ 2009-10-17 04:48 . 2009-10-17 04:48 2209280 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Mobile\29e2f8b1fb691ced973acf49fcee6ec1\System.Web.Mobile.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 2403328 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web.Extensio#\981dea02bc63c0c083e335adf9018788\System.Web.Extensions.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 1917440 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Speech\99594bae1d022502925f5b9dfcdaae9a\System.Speech.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 1706496 c:\windows\assembly\NativeImages_v2.0.50727_32\System.ServiceModel#\e182695d05ea57257568bc5f3208aca7\System.ServiceModel.Web.ni.dll
+ 2009-10-17 04:43 . 2009-10-17 04:43 2338304 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Seri#\67ad55827f2542552b576170f0a7dc56\System.Runtime.Serialization.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 1035264 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Printing\e5313735a40c0800f116e27fba4754db\System.Printing.ni.dll
+ 2009-10-17 04:42 . 2009-10-17 04:42 1056768 c:\windows\assembly\NativeImages_v2.0.50727_32\System.IdentityModel\c3b18fef5c6dc3bcdbe5df699fd21a55\System.IdentityModel.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 1587200 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\abb2ac7e08bee026f857d8fa36f9fe6f\System.Drawing.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 1116672 c:\windows\assembly\NativeImages_v2.0.50727_32\System.DirectorySer#\f47ebb9db460874b1bcbfc391dc970b1\System.DirectoryServices.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 1801216 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Deployment\c94a427baa7683f4221b91f90c18461b\System.Deployment.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 6616576 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data\694c07365e0fd6bba0bc304d4d2404a7\System.Data.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 2510336 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.SqlXml\272152f0cc139490729e215611a4b244\System.Data.SqlXml.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 1328128 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.Services\112a48e34620a0210eb850040da8a31b\System.Data.Services.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 2516480 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.Linq\32788c58ff9f8324460604cf1fe7681b\System.Data.Linq.ni.dll
+ 2009-10-17 04:46 . 2009-10-17 04:46 9924096 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.Entity\9012cac7819660f61f1c69cf8e4f2ccf\System.Data.Entity.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 2295296 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Core\c0a42d2ad8a4078040b334f6770ea11f\System.Core.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 2128896 c:\windows\assembly\NativeImages_v2.0.50727_32\ReachFramework\954685c29689d2a6126ceca1fd55e904\ReachFramework.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 1657856 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationUI\a3a6f52ce1d09a7bdccc8e7fc664792d\PresentationUI.ni.dll
+ 2009-10-17 04:29 . 2009-10-17 04:29 1451008 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationBuildTa#\f906701365083c1473db31519147e263\PresentationBuildTasks.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 1712128 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\6eee9b772b6d12d3dbd82f118c2ab2e5\Microsoft.VisualBasic.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 1093120 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Transacti#\f19e9b439636d0744597fff1331cad04\Microsoft.Transactions.Bridge.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 2332160 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.JScript\5b1af7b5be24c7ace065fe1c81c2b650\Microsoft.JScript.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 1620992 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Tas#\9eec1cc7ac37e0c7f3205e8156149c5a\Microsoft.Build.Tasks.ni.dll
+ 2009-10-17 04:45 . 2009-10-17 04:45 1966080 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Tas#\28c0730288453d57d5dcd62903c4d31b\Microsoft.Build.Tasks.v3.5.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 1888768 c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Eng#\5dd4f58999eed37c12aee7ea9f9863ac\Microsoft.Build.Engine.ni.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 3149824 c:\windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 3149824 c:\windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 2048000 c:\windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.XML.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 2048000 c:\windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.XML.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 5025792 c:\windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 5025792 c:\windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 5062656 c:\windows\assembly\GAC_MSIL\System.Design\2.0.0.0__b03f5f7f11d50a3a\System.Design.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 5062656 c:\windows\assembly\GAC_MSIL\System.Design\2.0.0.0__b03f5f7f11d50a3a\System.Design.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 5242880 c:\windows\assembly\GAC_32\System.Web\2.0.0.0__b03f5f7f11d50a3a\System.Web.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 5242880 c:\windows\assembly\GAC_32\System.Web\2.0.0.0__b03f5f7f11d50a3a\System.Web.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 2933248 c:\windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 2933248 c:\windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll
+ 2009-10-17 04:27 . 2009-10-17 04:27 4546560 c:\windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll
- 2009-08-08 10:07 . 2009-08-08 10:07 4546560 c:\windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll
+ 2009-10-17 04:29 . 2009-10-02 18:01 25198016 c:\windows\system32\MRT.exe
+ 2007-08-14 01:54 . 2009-07-20 01:48 11067392 c:\windows\system32\ieframe.dll
+ 2009-04-05 20:46 . 2009-07-20 01:48 11067392 c:\windows\system32\dllcache\ieframe.dll
+ 2009-08-15 03:32 . 2009-08-15 03:32 11110912 c:\windows\Installer\5376a.msp
+ 2009-10-17 04:24 . 2009-03-08 11:39 11063808 c:\windows\ie8updates\KB972260-IE8\ieframe.dll
+ 2009-10-17 04:35 . 2009-10-17 04:35 12430848 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d2ea8d76f015817db1607075812b555f\System.Windows.Forms.ni.dll
+ 2009-10-17 04:47 . 2009-10-17 04:47 11796992 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Web\5cea03cfb008f2eac1439a9905467f37\System.Web.ni.dll
+ 2009-10-17 04:44 . 2009-10-17 04:44 17317888 c:\windows\assembly\NativeImages_v2.0.50727_32\System.ServiceModel\06d6eab93282d2b136a377bd50b7c5a9\System.ServiceModel.ni.dll
+ 2009-10-17 04:34 . 2009-10-17 04:34 10683392 c:\windows\assembly\NativeImages_v2.0.50727_32\System.Design\8b82e08c008924d51833cb0884bcbfc5\System.Design.ni.dll
+ 2009-10-17 04:33 . 2009-10-17 04:33 14327808 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\58c7ac6b6054038dc9346d7ec8e32b4c\PresentationFramework.ni.dll
+ 2009-10-17 04:31 . 2009-10-17 04:31 12216320 c:\windows\assembly\NativeImages_v2.0.50727_32\PresentationCore\94badbd64df59de7da249f71da38b1c2\PresentationCore.ni.dll
+ 2009-10-17 04:28 . 2009-10-17 04:28 11486720 c:\windows\assembly\NativeImages_v2.0.50727_32\mscorlib\7124a40b9998f7b63c86bd1a2125ce26\mscorlib.ni.dll
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AnVir Task Manager"="c:\program files\AnVir Task Manager\AnVir.exe" [2009-10-13 3102944]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]

c:\documents and settings\black-vixzin\Start Menu\Programs\Startup\
OpenOffice.org 2.2.lnk - c:\program files\OpenOffice.org 2.2\program\quickstart.exe [2007-2-2 393216]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-5-11 282624]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-1.11.1.5462-to-1.11.2.5464-enUS-downloader.exe"=
"c:\\Program Files\\Warcraft III\\Warcraft III.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-1.12.x-to-2.0.1-enUS-patch-downloader.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\WINDOWS\\system32\\HPZipm12.exe"=
"c:\\WINDOWS\\system32\\cmd.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\Apple\\Mobile Device Support\\bin\\AppleMobileDeviceService.exe"=
"c:\\Program Files\\Veoh Networks\\VeohWebPlayer\\veohwebplayer.exe"=
"c:\\WINDOWS\\system32\\logon.scr"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=

R1 BIOS;BIOS;c:\windows\system32\drivers\BIOS.sys [6/24/2006 11:01 AM 13696]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys --> c:\program files\SUPERAntiSpyware\SASKUTIL.sys [?]
S3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [12/3/2008 7:07 AM 8704]
S3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [12/3/2008 7:07 AM 3072]
S3 RSC4_A02;U.S. Robotics Wireless USB Adapter Driver;c:\windows\system32\DRIVERS\RSC4USB.sys --> c:\windows\system32\DRIVERS\RSC4USB.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-10-07 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 21:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/advanced_search?hl=en
uInternet Connection Wizard,ShellNext = hxxp://www.winxdvd.com/?gr
IE: Sothink SWF Catcher - c:\program files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Admin\Application Data\Mozilla\Firefox\Profiles\dhew55a8.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/advanced_search
FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\Veoh Networks\VeohWebPlayer\npWebPlayerVideoPluginATL.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-17 14:27
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]
@DACL=(02 0000)
@=""
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(788)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3224)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
Completion time: 2009-10-17 14:29
ComboFix-quarantined-files.txt 2009-10-17 21:29
ComboFix2.txt 2009-10-17 04:02

Pre-Run: 73,625,587,712 bytes free
Post-Run: 73,600,245,760 bytes free

Current=4 Default=4 Failed=2 LastKnownGood=5 Sets=1,2,3,4,5
455 --- E O F --- 2009-10-17 05:42

#10 SifuMike

SifuMike

    malware expert


  • Staff Emeritus
  • 15,385 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vancouver (not BC) WA (Not DC) USA
  • Local time:02:28 AM

Posted 17 October 2009 - 05:14 PM

Hi Phlimm,



I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

Edited by SifuMike, 17 October 2009 - 05:24 PM.
typo

If I've saved you time & money,
please make a donation so I can keep helping people just like you! You can donate using a credit card and PayPal. Thank you!



Posted Image

Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#11 Phlimm

Phlimm
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 17 October 2009 - 05:18 PM

Here is the Securoty Check log, I am running the other scan as we speak:

Results of screen317's Security Check version 0.99.0
Windows XP Service Pack 3
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
avast! Antivirus
Prentice Hall Biology Interactive Textbook CD-ROM
avast! updated!
``````````````````````````````
Anti-malware/Other Utilities Check:

Ad-Aware
CCleaner (remove only)
Java™ SE Runtime Environment 6
Java™ 6 Update 3
Out of date Java installed!
Adobe Reader 8.1.0
Out of date Adobe Reader installed!
``````````````````````````````
Process Check:
objlist.exe by Laurent

Ad-Aware AAWService.exe is disabled!
Ad-Aware AAWTray.exe is disabled!
Alwil Software Avast4 aswUpdSv.exe
Alwil Software Avast4 ashServ.exe
Alwil Software Avast4 ashDisp.exe
Alwil Software Avast4 ashMaiSv.exe
Alwil Software Avast4 ashWebSv.exe
``````````````````````````````
DNS Vulnerability Check:

GREAT! (Not vulnerable to DNS cache poisoning)

`````````End of Log```````````

#12 SifuMike

SifuMike

    malware expert


  • Staff Emeritus
  • 15,385 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vancouver (not BC) WA (Not DC) USA
  • Local time:02:28 AM

Posted 17 October 2009 - 05:25 PM

Hi,

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version Java components and update.
  • Please download Java Version 6 Update 16
  • Click the "Free Java Download" button.
  • Click "Free Java Download" again
  • Save the file jxpiinstall.exe to your desktop
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java.
    Examples of older versions in Add or Remove Programs:
    Java SE Runtime Environment 6
    Java 6 Update 3

  • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jxpiinstall.exe to install the newest version.


You are using and outdated version of Adobe Reader. Adobe has since been updated and the update closes many security holes and provides new features.

First, uninstall earlier versions of Adobe Reader.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Adobe Reader.
    Adobe Reader 8.1.0
  • Check (highlight) any item with Adobe Reader in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Adobe Reader version.
Please download the latest version from:
http://get.adobe.com/reader/

And install it. Once installed, launch it, select Help --> Check for Updates and install any updates.

You may also try the free Foxit PDF reader if you prefer:
http://www.foxitsoftware.com/pdf/reader/

Edited by SifuMike, 17 October 2009 - 05:27 PM.

If I've saved you time & money,
please make a donation so I can keep helping people just like you! You can donate using a credit card and PayPal. Thank you!



Posted Image

Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#13 Phlimm

Phlimm
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 17 October 2009 - 08:30 PM

ESET Log:

C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\55914630\55914630.exe.vir a variant of Win32/Kryptik.AVG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\aKUtDcdd.ini.vir Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\aKUtDcdd.ini2.vir Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\biwapuyu.dll.vir a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\dujupesa.dll.vir a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\fajuzosi.dll.vir a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\fejojolu.dll.vir Win32/Adware.Virtumonde application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\gepiruge.dll.vir a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\gukuyesa.dll.vir a variant of Win32/Adware.SuperJuan.H application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\keriwina.dll.vir a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\kudepoga.dll.vir a variant of Win32/Kryptik.ARO trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\luyehaya.dll.vir a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\meyagabu.dll.vir a variant of Win32/Adware.SuperJuan.H application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\mogepuju.dll.vir a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\mujuluro.dll.vir a variant of Win32/Kryptik.ARO trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\narenodo.dll.vir a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\pobokifi.dll.vir a variant of Win32/Kryptik.ARO trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\porevujo.dll.vir a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\womifaso.dll.vir a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\yezejugo.dll.vir a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\yujupaye.dll.vir a variant of Win32/Adware.SuperJuan.H application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\zobubabe.dll.vir a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1079\A0148682.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1079\A0148683.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1079\A0148684.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148725.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148726.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1080\A0148727.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1083\A0149019.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1083\A0149020.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0152050.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0152051.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0152052.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0152091.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0152092.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0152093.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0152094.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0155141.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0155143.dll a variant of Win32/Adware.SuperJuan.H application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0155146.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0156154.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157166.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157173.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157179.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157197.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157198.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157199.dll a variant of Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157200.dll Win32/Adware.Virtumonde.NFT application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157603.exe a variant of Win32/Kryptik.AVG trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157604.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157605.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157606.dll a variant of Win32/Adware.SuperJuan.F application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157607.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157608.dll Win32/Adware.Virtumonde application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157609.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157610.dll a variant of Win32/Adware.SuperJuan.H application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157611.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157612.dll a variant of Win32/Kryptik.ARO trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157613.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157614.dll a variant of Win32/Adware.SuperJuan.H application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157615.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157616.dll a variant of Win32/Kryptik.ARO trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157617.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157618.dll a variant of Win32/Kryptik.ARO trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157619.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157622.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157623.dll a variant of Win32/Adware.Virtumonde.NFR application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157625.dll a variant of Win32/Adware.SuperJuan.H application cleaned by deleting - quarantined
C:\System Volume Information\_restore{2771783C-F652-4C83-A6CC-9BC498CFAB8F}\RP1084\A0157626.dll a variant of Win32/AntiAV.NCZ trojan cleaned by deleting - quarantined

#14 Phlimm

Phlimm
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 17 October 2009 - 08:54 PM

I am getting an error while trying to uninstall Adobe Reader 8 and while trying install the latest version. It says it cannot access the key HKLM->Software->Microsoft->Windows->CurrentVersion->Run->OptionalComponents->MSFS

I tried to create the key manually in the OptionalComponents but got this error:

Cannot create key: Error while opening the key OptionalComponents

I tried with Avast and the Windows Firewall disabled as well with no difference.

#15 SifuMike

SifuMike

    malware expert


  • Staff Emeritus
  • 15,385 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vancouver (not BC) WA (Not DC) USA
  • Local time:02:28 AM

Posted 17 October 2009 - 08:57 PM

Hi Phlimm,

ESET found files previously quarantined by ComboFix, as well as files previously deleted and stored in your System Restore folder.

We will be clearing your System Restore folder shortly.

I think we have you clean. :(

How is the computer running.

We have one more clean up step to do.
If I've saved you time & money,
please make a donation so I can keep helping people just like you! You can donate using a credit card and PayPal. Thank you!



Posted Image

Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users