Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected computer and cannot run tools


  • This topic is locked This topic is locked
9 replies to this topic

#1 plzhelpme1

plzhelpme1

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:55 PM

Posted 23 October 2009 - 11:33 AM

Hello! This computer is infected with something that is blocking access to MBAM, these forums on bleepingcomputer.com, online scanners like kaspersky bit defender and avast antivirus isnt doing anything. I appreciate any help I can get here are the DDS logs and the Root repeal log:


DDS (Ver_09-10-13.01) - NTFSx86
Run by user1 at 11:32:21.78 on Fri 10/23/2009
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.106 [GMT -4:00]

AV: avast! antivirus 4.8.1351 [VPS 091022-0] *On-access scanning enabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\msb.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Intel\ASF Agent\ASFAgent.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\System32\DSentry.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\McAfee\Common Framework\UdaterUI.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9FA.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\user1\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.comcast.net/home.html
uInternet Settings,ProxyOverride = *.local
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\reader\activex\AcroIEHelper.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar2.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar2.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [DVDSentry] c:\windows\system32\DSentry.exe
mRun: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\UdaterUI.exe" /StartedFromRunKey
mRun: [EPSON Stylus Photo R320 Series] c:\windows\system32\spool\drivers\w32x86\3\E_FATI9FA.EXE /P30 "EPSON Stylus Photo R320 Series" /O6 "USB002" /M "Stylus Photo R320"
mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
dRun: [EFI Job Monitor] c:\windows\system32\rundll32.exe c:\windows\system32\spool\drivers\w32x86\3\efjm.dll,run
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {1663ed61-23eb-11d2-b92f-008048fdd814} - hxxps://www.driveraudit.com/trippak/smsx.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} - hxxp://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
DPF: {460324E8-CFB4-4357-85EF-CE3EBFE23A62} - hxxps://www.driveraudit.com/trippak/ActiveXViewer11.cab
DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - hxxp://lads.myspace.com/upload/MySpaceUploader1006.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1129140456741
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} - hxxp://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} - hxxp://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-160-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: {5767B741-BC4B-4943-90B4-590354331F4C} = 207.217.126.81,207.217.77.82,68.87.66.196,68.87.64.196
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: wamejulu.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Notification Packages = scecli mebarepo.dll

============= SERVICES / DRIVERS ===============

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-9-1 114768]
R2 ASFAgent;ASF Agent;c:\program files\intel\asf agent\ASFAgent.exe [2003-2-10 114688]
R2 AsfAlrt;AsfAlrt;c:\windows\system32\drivers\Asfalrt.sys [2002-12-18 36064]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-9-1 20560]
S3 USBNET_XP;Instant Wireless XP USB Network Adapter ver.2.6 Driver;c:\windows\system32\drivers\netusbxp.sys [2005-2-2 72576]

=============== Created Last 30 ================

2009-10-23 11:18 51,712 -------- c:\windows\system32\trz9.tmp
2009-10-23 11:18 51,712 -------- c:\windows\system32\trz8.tmp
2009-10-23 11:17 51,712 -------- c:\windows\system32\trz7.tmp
2009-10-23 11:17 156,672 -------- c:\windows\trz6.tmp
2009-10-23 11:12 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-23 11:12 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-10-23 11:12 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-10-11 11:09 <DIR> --d----- c:\docume~1\alluse~1\applic~1\74558433
2009-10-11 10:58 156,672 a------- c:\windows\msa.exe
2009-10-02 22:57 <DIR> --d----- c:\program files\iPod
2009-09-30 06:41 <DIR> --dsh--- c:\documents and settings\user1\IECompatCache

==================== Find3M ====================

2009-08-29 23:45 411,368 a------- c:\windows\system32\deploytk.dll
2009-08-28 19:42 2,065,696 a------- c:\windows\system32\usbaaplrc.dll
2009-08-28 19:42 40,448 a------- c:\windows\system32\drivers\usbaapl.sys
2009-08-23 03:09 229,376 a------- c:\windows\PEV.exe
2009-08-06 19:24 327,896 a------- c:\windows\system32\dllcache\wucltui.dll
2009-08-06 19:24 209,632 a------- c:\windows\system32\dllcache\wuweb.dll
2009-08-06 19:24 35,552 a------- c:\windows\system32\dllcache\wups.dll
2009-08-06 19:24 53,472 a------- c:\windows\system32\dllcache\wuauclt.exe
2009-08-06 19:24 53,472 a------- c:\windows\system32\dllcache\cache\wuauclt.exe
2009-08-06 19:24 96,480 a------- c:\windows\system32\dllcache\cdm.dll
2009-08-06 19:23 575,704 a------- c:\windows\system32\dllcache\wuapi.dll
2009-08-06 19:23 1,929,952 a------- c:\windows\system32\dllcache\wuaueng.dll
2009-08-06 19:23 274,288 a------- c:\windows\system32\mucltui.dll
2009-08-06 19:23 215,920 a------- c:\windows\system32\muweb.dll
2009-08-05 05:11 204,800 a------- c:\windows\system32\mswebdvd.dll
2009-08-05 05:11 204,800 -------- c:\windows\system32\dllcache\mswebdvd.dll
2009-07-11 11:08 1,011,429 a--sh--- c:\windows\system32\jegivige.exe
2009-07-11 11:08 88,576 a--sh--- c:\windows\system32\mowehujo.dll
2009-07-11 11:08 69,120 a--sh--- c:\windows\system32\nikeroko.dll
2009-07-12 19:37 87,040 a--sh--- c:\windows\system32\raferafo.dll
2009-07-12 19:37 194,056 a--sh--- c:\windows\system32\wejuwava.exe
2009-07-12 19:37 51,712 a--sh--- c:\windows\system32\yirepoje.dll

============= FINISH: 11:33:08.17 ===============


ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/10/23 11:36
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: catchme.sys
Image Path: C:\ComboFix\catchme.sys
Address: 0xF8B28000 Size: 31744 File Visible: No Signed: -
Status: -

Name: Combo-Fix.sys
Image Path: Combo-Fix.sys
Address: 0xF8798000 Size: 60416 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEF13E000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF8C64000 Size: 8192 File Visible: No Signed: -
Status: -

Name: imodp.sys
Image Path: imodp.sys
Address: 0xF8738000 Size: 61440 File Visible: No Signed: -
Status: -

Name: PROCEXP90.SYS
Image Path: C:\WINDOWS\system32\Drivers\PROCEXP90.SYS
Address: 0xF8CAC000 Size: 6464 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xEDBC5000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\Documents and Settings\user1\Cookies\user1@monkeybroker[1].txt
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\user1\Cookies\user1@ad.yieldmanager[2].txt
Status: Could not get file information (Error 0xc0000008)

Path: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP801\A0119288.ini
Status: Visible to the Windows API, but not on disk.

Path: c:\system volume information\_restore{987e0331-0f01-427c-a58a-7a2e4aabf84d}\rp800\snapshot\comdb.dat
Status: Allocation size mismatch (API: 12288, Raw: 24576)

Path: C:\Documents and Settings\user1\Local Settings\Temporary Internet Files\Content.IE5\6O3GMQOX\st[8]
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\user1\Local Settings\Temporary Internet Files\Content.IE5\6O3GMQOX\JXCAL7RMQ1CA4FIEO2CAR1DWBQCA9P34Y6CA8X1CRTCA5APNUXCADTYC4OCAYMS5MECAF781DNCA2OVNYECA94W8WACAVG180SCAM5AYLMCA672UWVCAJ5O6UXCAG7C0CMCA4H5E6UCAJCK12ZCAFRXNMSCA85ADU5
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\user1\Local Settings\Temporary Internet Files\Content.IE5\6YLC3MDY\iframe3[3].htm
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\user1\Local Settings\Temporary Internet Files\Content.IE5\6YLC3MDY\iframe3[2].htm
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\user1\Local Settings\Temporary Internet Files\Content.IE5\K9BH1DIY\st[1]
Status: Invisible to the Windows API!

Path: c:\system volume information\_restore{987e0331-0f01-427c-a58a-7a2e4aabf84d}\rp800\snapshot\repository\fs\objects.data
Status: Allocation size mismatch (API: 9859072, Raw: 12058624)

SSDT
-------------------
#: 025 Function Name: NtClose
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e6b8

#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e574

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15ea52

#: 068 Function Name: NtDuplicateObject
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e14c

#: 119 Function Name: NtOpenKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e64e

#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e08c

#: 128 Function Name: NtOpenThread
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e0f0

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e76e

#: 204 Function Name: NtRestoreKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e72e

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xef15e8ae

==EOF==

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:55 PM

Posted 24 October 2009 - 11:24 AM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 plzhelpme1

plzhelpme1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:55 PM

Posted 25 October 2009 - 02:05 AM

Here is the combofix log, Thanks for the help Buckeye_Sam!


ComboFix 09-10-24.01 - user1 10/25/2009 2:46.3.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.179 [GMT -4:00]
Running from: c:\documents and settings\user1\Desktop\combo-fix.exe
AV: avast! antivirus 4.8.1351 [VPS 091022-0] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\77382532
c:\documents and settings\All Users\Application Data\77382532\77382532.bat
c:\documents and settings\All Users\Application Data\77382532\77382532.exe
c:\windows\msa.exe
c:\windows\system32\dovipele.dll
c:\windows\system32\fijiveni.dll
c:\windows\system32\gihujasu.dll
c:\windows\system32\jegivige.exe
c:\windows\system32\jejobadi.dll
c:\windows\system32\jukajeyi.dll
c:\windows\system32\kiganopo.exe
c:\windows\system32\madudori.dll
c:\windows\system32\mowehujo.dll
c:\windows\system32\nikeroko.dll
c:\windows\system32\raferafo.dll
c:\windows\system32\sikizela.dll
c:\windows\system32\wegehove.dll
c:\windows\system32\yirepoje.dll

.
((((((((((((((((((((((((( Files Created from 2009-09-25 to 2009-10-25 )))))))))))))))))))))))))))))))
.

2009-10-23 15:12 . 2009-08-03 17:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-23 15:12 . 2009-10-23 15:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-23 15:12 . 2009-08-03 17:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-11 15:09 . 2009-10-23 14:52 -------- d-----w- c:\documents and settings\All Users\Application Data\74558433
2009-10-03 12:13 . 2009-10-03 12:14 -------- d-----w- c:\documents and settings\user1\Application Data\Move Networks
2009-10-03 02:57 . 2009-10-03 02:57 -------- d-----w- c:\program files\iPod
2009-09-30 10:41 . 2009-09-30 10:41 -------- d-sh--w- c:\documents and settings\user1\IECompatCache

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-11 14:59 . 2009-10-23 15:17 156672 ------w- c:\windows\trz6.tmp
2009-10-03 02:58 . 2005-02-26 06:08 -------- d-----w- c:\program files\iTunes
2009-10-03 02:57 . 2008-12-24 04:04 -------- d-----w- c:\program files\Common Files\Apple
2009-09-27 13:31 . 2008-12-24 04:09 -------- d-----w- c:\documents and settings\user1\Application Data\Apple Computer
2009-09-27 11:14 . 2007-06-05 15:01 64432 ----a-w- c:\documents and settings\user1\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-12 02:33 . 2009-09-12 02:31 -------- d-----w- c:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-09-12 02:29 . 2009-09-12 02:29 -------- d-----w- c:\program files\QuickTime
2009-09-01 21:09 . 2007-06-05 13:41 -------- d-----w- c:\program files\McAfee
2009-09-01 21:09 . 2007-06-05 13:42 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-08-30 03:45 . 2009-08-30 03:47 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-08-30 03:45 . 2004-04-08 11:14 -------- d-----w- c:\program files\Java
2009-08-30 03:16 . 2009-08-30 03:16 -------- d-----w- c:\documents and settings\user1\Application Data\Malwarebytes
2009-08-30 03:16 . 2009-08-30 03:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-08-28 23:42 . 2009-03-14 19:49 2065696 ----a-w- c:\windows\system32\usbaaplrc.dll
2009-08-28 23:42 . 2008-12-24 04:05 40448 ----a-w- c:\windows\system32\drivers\usbaapl.sys
2009-08-17 16:10 . 2009-09-01 21:18 1279456 ----a-w- c:\windows\system32\aswBoot.exe
2009-08-17 16:06 . 2009-09-01 21:18 93392 ----a-w- c:\windows\system32\drivers\aswmon.sys
2009-08-17 16:06 . 2009-09-01 21:18 94160 ----a-w- c:\windows\system32\drivers\aswmon2.sys
2009-08-17 16:05 . 2009-09-01 21:18 114768 ----a-w- c:\windows\system32\drivers\aswSP.sys
2009-08-17 16:05 . 2009-09-01 21:18 20560 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
2009-08-17 16:04 . 2009-09-01 21:18 51376 ----a-w- c:\windows\system32\drivers\aswTdi.sys
2009-08-17 16:04 . 2009-09-01 21:18 23152 ----a-w- c:\windows\system32\drivers\aswRdr.sys
2009-08-17 16:03 . 2009-09-01 21:18 26944 ----a-w- c:\windows\system32\drivers\aavmker4.sys
2009-08-17 16:02 . 2009-09-01 21:18 97480 ----a-w- c:\windows\system32\AvastSS.scr
2009-08-06 23:24 . 2004-08-03 19:02 327896 ----a-w- c:\windows\system32\wucltui.dll
2009-08-06 23:24 . 2004-08-03 18:59 209632 ----a-w- c:\windows\system32\wuweb.dll
2009-08-06 23:24 . 2005-05-26 08:16 44768 ----a-w- c:\windows\system32\wups2.dll
2009-08-06 23:24 . 2004-08-03 18:59 35552 ----a-w- c:\windows\system32\wups.dll
2009-08-06 23:24 . 2002-08-29 10:00 53472 ------w- c:\windows\system32\wuauclt.exe
2009-08-06 23:24 . 2002-08-29 10:00 96480 ----a-w- c:\windows\system32\cdm.dll
2009-08-06 23:23 . 2004-08-03 19:00 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-08-06 23:23 . 2007-06-05 12:09 274288 ----a-w- c:\windows\system32\mucltui.dll
2009-08-06 23:23 . 2005-05-26 08:19 215920 ----a-w- c:\windows\system32\muweb.dll
2009-08-06 23:23 . 2002-08-29 10:00 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2009-08-05 09:11 . 2004-11-15 19:20 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-25 06:41 . 2009-07-25 06:41 1051682 --sha-w- c:\windows\SYSTEM32\fepabavi.exe
2009-07-12 23:37 . 2009-07-12 23:37 194056 --sha-w- c:\windows\SYSTEM32\wejuwava.exe
.

((((((((((((((((((((((((((((( SnapShot_2009-10-23_15.01.25 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-10-25 06:40 . 2009-10-25 06:40 16384 c:\windows\Temp\Perflib_Perfdata_670.dat
+ 2009-10-25 06:55 . 2009-10-25 06:55 16384 c:\windows\Temp\Perflib_Perfdata_650.dat
+ 2009-10-25 06:56 . 2009-10-25 06:56 16384 c:\windows\Temp\Perflib_Perfdata_558.dat
+ 2009-08-30 03:11 . 2009-08-06 23:24 53472 c:\windows\SYSTEM32\DLLCACHE\cache\wuauclt.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 13824 c:\windows\SYSTEM32\DLLCACHE\cache\wscntfy.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 82944 c:\windows\SYSTEM32\DLLCACHE\cache\ws2_32.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 24576 c:\windows\SYSTEM32\DLLCACHE\cache\userinit.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 14336 c:\windows\SYSTEM32\DLLCACHE\cache\svchost.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 71680 c:\windows\SYSTEM32\DLLCACHE\cache\ssdpsrv.dll
+ 2009-08-30 03:11 . 2005-06-10 23:53 57856 c:\windows\SYSTEM32\DLLCACHE\cache\spoolsv.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 59904 c:\windows\SYSTEM32\DLLCACHE\cache\regsvc.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 89088 c:\windows\SYSTEM32\DLLCACHE\cache\rasauto.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 17408 c:\windows\SYSTEM32\DLLCACHE\cache\powrprof.dll
+ 2009-08-30 03:11 . 2006-10-19 01:47 27136 c:\windows\SYSTEM32\DLLCACHE\cache\mspmsnsv.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 33792 c:\windows\SYSTEM32\DLLCACHE\cache\msgsvc.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 13312 c:\windows\SYSTEM32\DLLCACHE\cache\lsass.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 22016 c:\windows\SYSTEM32\DLLCACHE\cache\lpk.dll
+ 2009-08-30 03:11 . 2005-09-01 01:41 19968 c:\windows\SYSTEM32\DLLCACHE\cache\linkinfo.dll
+ 2009-08-30 03:11 . 2004-08-04 05:58 24576 c:\windows\SYSTEM32\DLLCACHE\cache\kbdclass.sys
+ 2009-08-30 03:11 . 2004-08-04 06:00 29056 c:\windows\SYSTEM32\DLLCACHE\cache\ip6fw.sys
+ 2009-08-30 03:11 . 2004-08-04 07:56 55808 c:\windows\SYSTEM32\DLLCACHE\cache\eventlog.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 15360 c:\windows\SYSTEM32\DLLCACHE\cache\ctfmon.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 60416 c:\windows\SYSTEM32\DLLCACHE\cache\cryptsvc.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 77312 c:\windows\SYSTEM32\DLLCACHE\cache\browser.dll
+ 2009-08-30 03:11 . 2004-08-04 06:05 14336 c:\windows\SYSTEM32\DLLCACHE\cache\asyncmac.sys
+ 2009-08-30 03:11 . 2002-08-29 10:00 11648 c:\windows\SYSTEM32\DLLCACHE\cache\ACPIEC.SYS
+ 2009-10-23 15:52 . 2009-10-23 15:01 32768 c:\windows\SYSTEM32\CONFIG\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2004-02-16 14:11 . 2009-10-23 15:01 32768 c:\windows\SYSTEM32\CONFIG\systemprofile\Local Settings\History\History.IE5\INDEX.DAT
- 2004-02-16 14:11 . 2009-08-30 02:34 32768 c:\windows\SYSTEM32\CONFIG\systemprofile\Local Settings\History\History.IE5\INDEX.DAT
+ 2004-02-16 14:11 . 2009-10-23 15:01 32768 c:\windows\SYSTEM32\CONFIG\systemprofile\Cookies\INDEX.DAT
+ 2009-08-30 03:11 . 2004-08-04 07:56 5120 c:\windows\SYSTEM32\DLLCACHE\cache\sfc.dll
+ 2009-08-30 03:11 . 2002-08-29 10:00 2944 c:\windows\SYSTEM32\DLLCACHE\cache\NULL.SYS
+ 2009-08-30 03:11 . 2002-08-29 10:00 4224 c:\windows\SYSTEM32\DLLCACHE\cache\BEEP.SYS
+ 2009-08-30 03:11 . 2004-08-04 07:56 129536 c:\windows\SYSTEM32\DLLCACHE\cache\xmlprov.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 502272 c:\windows\SYSTEM32\DLLCACHE\cache\winlogon.exe
+ 2009-08-30 03:11 . 2009-07-03 17:09 915456 c:\windows\SYSTEM32\DLLCACHE\cache\wininet.dll
+ 2009-08-30 03:11 . 2007-03-08 15:36 577536 c:\windows\SYSTEM32\DLLCACHE\cache\user32.dll
+ 2009-08-30 03:11 . 2007-02-05 20:17 185344 c:\windows\SYSTEM32\DLLCACHE\cache\upnphost.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 295424 c:\windows\SYSTEM32\DLLCACHE\cache\termsrv.dll
+ 2009-08-30 03:11 . 2008-06-20 10:45 360320 c:\windows\SYSTEM32\DLLCACHE\cache\tcpip.sys
+ 2009-08-30 03:11 . 2005-07-08 16:27 249344 c:\windows\SYSTEM32\DLLCACHE\cache\tapisrv.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 170496 c:\windows\SYSTEM32\DLLCACHE\cache\srsvc.dll
+ 2009-08-30 03:11 . 2006-12-19 21:52 134656 c:\windows\SYSTEM32\DLLCACHE\cache\shsvcs.dll
+ 2009-08-30 03:11 . 2009-02-06 17:14 110592 c:\windows\SYSTEM32\DLLCACHE\cache\services.exe
+ 2009-08-30 03:11 . 2004-08-04 07:56 190976 c:\windows\SYSTEM32\DLLCACHE\cache\schedsvc.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 180224 c:\windows\SYSTEM32\DLLCACHE\cache\scecli.dll
+ 2009-08-30 03:11 . 2009-02-09 10:20 399360 c:\windows\SYSTEM32\DLLCACHE\cache\rpcss.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 382464 c:\windows\SYSTEM32\DLLCACHE\cache\qmgr.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 435200 c:\windows\SYSTEM32\DLLCACHE\cache\ntmssvc.dll
+ 2009-08-30 03:11 . 2007-02-09 11:10 574464 c:\windows\SYSTEM32\DLLCACHE\cache\ntfs.sys
+ 2009-08-30 03:11 . 2005-08-22 18:29 197632 c:\windows\SYSTEM32\DLLCACHE\cache\netman.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 407040 c:\windows\SYSTEM32\DLLCACHE\cache\netlogon.dll
+ 2009-08-30 03:11 . 2004-08-04 06:14 182912 c:\windows\SYSTEM32\DLLCACHE\cache\ndis.sys
+ 2009-08-30 03:11 . 2008-06-20 17:41 245248 c:\windows\SYSTEM32\DLLCACHE\cache\mswsock.dll
+ 2009-08-30 03:11 . 2006-11-01 19:17 927504 c:\windows\SYSTEM32\DLLCACHE\cache\mfc40u.dll
+ 2009-08-30 03:11 . 2009-03-21 14:18 986112 c:\windows\SYSTEM32\DLLCACHE\cache\kernel32.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 110080 c:\windows\SYSTEM32\DLLCACHE\cache\imm32.dll
+ 2009-08-30 03:11 . 2008-07-07 20:32 253952 c:\windows\SYSTEM32\DLLCACHE\cache\es.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 792064 c:\windows\SYSTEM32\DLLCACHE\cache\comres.dll
+ 2009-08-30 03:11 . 2006-08-25 15:45 617472 c:\windows\SYSTEM32\DLLCACHE\cache\comctl32.dll
+ 2009-08-30 03:11 . 2004-08-04 07:56 167936 c:\windows\SYSTEM32\DLLCACHE\cache\appmgmts.dll
+ 2009-08-30 03:11 . 2006-02-15 00:22 142464 c:\windows\SYSTEM32\DLLCACHE\cache\aec.sys
+ 2009-08-30 03:11 . 2004-08-04 07:56 1580544 c:\windows\SYSTEM32\DLLCACHE\cache\sfcfiles.dll
+ 2009-08-30 03:11 . 2009-02-06 17:24 2180480 c:\windows\SYSTEM32\DLLCACHE\cache\ntoskrnl.exe
+ 2009-08-30 03:11 . 2009-02-06 16:49 2057728 c:\windows\SYSTEM32\DLLCACHE\cache\ntkrnlpa.exe
+ 2009-08-30 03:11 . 2009-07-19 13:18 5937152 c:\windows\SYSTEM32\DLLCACHE\cache\mshtml.dll
+ 2009-08-30 03:11 . 2007-06-13 10:23 1033216 c:\windows\SYSTEM32\DLLCACHE\cache\explorer.exe
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-19 204288]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DVDSentry"="c:\windows\System32\DSentry.exe" [2002-08-14 28672]
"Synchronization Manager"="c:\windows\system32\mobsync.exe" [2004-08-04 143360]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\UdaterUI.exe" [2006-11-17 136768]
"EPSON Stylus Photo R320 Series"="c:\windows\System32\spool\DRIVERS\W32X86\3\E_FATI9FA.EXE" [2004-04-26 98304]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2009-08-13 177440]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-08-30 149280]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-08-17 81000]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-09-21 305440]
"yarehaway"="c:\windows\system32\jejobadi.dll" [BU]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"EFI Job Monitor"="c:\windows\System32\spool\DRIVERS\W32X86\3\efjm.dll" [2003-11-20 2400256]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicIT3_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTRECVB.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\3\0]
"Script"=d:\windows.0\SYSVOL\sysvol\rush03.rushtrucking.com\scripts\PRTOPS.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_Toyota_T.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTMNTVB.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTBILHQ2.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTRECVB.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicIT3_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\4\0]
"Script"=d:\windows.0\SYSVOL\sysvol\rush03.rushtrucking.com\scripts\Group_OpsMan_J.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\5\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTOPSHQ1.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTIT01.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\0\1]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicIT3_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTRECVB.vbs

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\WINDOWS\\PCHealth\\HelpCtr\\Binaries\\helpctr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Documents and Settings\\user1\\Desktop\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\iPod\\bin\\iPodService.exe"=
"c:\\WINDOWS\\SYSTEM32\\igfxpers.exe"=

R1 aswSP;avast! Self Protection;c:\windows\SYSTEM32\DRIVERS\aswSP.sys [9/1/2009 5:18 PM 114768]
R2 ASFAgent;ASF Agent;c:\program files\Intel\ASF Agent\ASFAgent.exe [2/10/2003 5:52 AM 114688]
R2 AsfAlrt;AsfAlrt;c:\windows\SYSTEM32\DRIVERS\Asfalrt.sys [12/18/2002 5:31 AM 36064]
R2 aswFsBlk;aswFsBlk;c:\windows\SYSTEM32\DRIVERS\aswFsBlk.sys [9/1/2009 5:18 PM 20560]
S3 USBNET_XP;Instant Wireless XP USB Network Adapter ver.2.6 Driver;c:\windows\SYSTEM32\DRIVERS\netusbxp.sys [2/2/2005 8:28 PM 72576]
.
Contents of the 'Scheduled Tasks' folder

2009-10-24 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.comcast.net/home.html
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: {5767B741-BC4B-4943-90B4-590354331F4C} = 207.217.126.81,207.217.77.82,68.87.66.196,68.87.64.196
DPF: {460324E8-CFB4-4357-85EF-CE3EBFE23A62} - hxxps://www.driveraudit.com/trippak/ActiveXViewer11.cab
.
- - - - ORPHANS REMOVED - - - -

BHO-{a9d27162-f9a6-4de5-8b29-45f76cfeaad7} - sikizela.dll
HKLM-Run-77382532 - c:\documents and settings\All Users\Application Data\77382532\77382532.exe
HKLM-Run-furokuruvi - dovipele.dll
SharedTaskScheduler-{d94577c9-4e2e-4909-b1af-458ca03be6b6} - c:\windows\system32\jejobadi.dll
SSODL-razalosig-{d94577c9-4e2e-4909-b1af-458ca03be6b6} - c:\windows\system32\jejobadi.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-25 02:55
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,b6,7f,00,2e,01,57,74,49,b6,d9,d2,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,b6,7f,00,2e,01,57,74,49,b6,d9,d2,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3448)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Alwil Software\Avast4\aswUpdSv.exe
c:\program files\Alwil Software\Avast4\ashServ.exe
c:\combo-fix\CF444.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\McAfee\Common Framework\McTray.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\McAfee\Common Framework\FrameworkService.exe
c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
c:\program files\McAfee\Common Framework\naPrdMgr.exe
c:\program files\Windows Media Player\WMPNetwk.exe
c:\program files\Alwil Software\Avast4\ashMaiSv.exe
c:\program files\Alwil Software\Avast4\ashWebSv.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Java\jre6\bin\jucheck.exe
c:\combo-fix\PEV.cfxxe
.
**************************************************************************
.
Completion time: 2009-10-25 3:03 - machine was rebooted
ComboFix-quarantined-files.txt 2009-10-25 07:02
ComboFix2.txt 2009-10-23 15:06
ComboFix3.txt 2009-08-30 03:12

Pre-Run: 22,334,922,752 bytes free
Post-Run: 22,384,181,248 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

- - End Of File - - 0161F94839DD2C80946B1B9F73F813A3

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:55 PM

Posted 25 October 2009 - 10:55 AM

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

File::
c:\windows\system32\jejobadi.dll
c:\windows\SYSTEM32\fepabavi.exe
c:\windows\SYSTEM32\wejuwava.exe

Registry::
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"yarehaway"=-
Prior to running Combofix.exe you should disable your antivirus program.

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.

Posted Image

This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.


======================



Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 plzhelpme1

plzhelpme1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:55 PM

Posted 25 October 2009 - 01:44 PM

Well I can finally access the forums now from the infected computer. Below are both the Combofix log and MBAM log.

ComboFix 09-10-24.01 - user1 10/25/2009 13:08.4.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.234 [GMT -4:00]
Running from: c:\documents and settings\user1\Desktop\combo-fix.exe
Command switches used :: c:\documents and settings\user1\Desktop\CFScript.txt
AV: avast! antivirus 4.8.1351 [VPS 091024-0] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}

FILE ::
"c:\windows\SYSTEM32\fepabavi.exe"
"c:\windows\system32\jejobadi.dll"
"c:\windows\SYSTEM32\wejuwava.exe"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\SYSTEM32\fepabavi.exe
c:\windows\SYSTEM32\wejuwava.exe

.
((((((((((((((((((((((((( Files Created from 2009-09-25 to 2009-10-25 )))))))))))))))))))))))))))))))
.

2009-10-25 07:04 . 2009-10-25 07:04 -------- d-----w- c:\windows\LastGood
2009-10-23 15:12 . 2009-08-03 17:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-23 15:12 . 2009-10-23 15:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-23 15:12 . 2009-08-03 17:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-11 15:09 . 2009-10-23 14:52 -------- d-----w- c:\documents and settings\All Users\Application Data\74558433
2009-10-03 12:13 . 2009-10-03 12:14 -------- d-----w- c:\documents and settings\user1\Application Data\Move Networks
2009-10-03 02:57 . 2009-10-03 02:57 -------- d-----w- c:\program files\iPod
2009-09-30 10:41 . 2009-09-30 10:41 -------- d-sh--w- c:\documents and settings\user1\IECompatCache

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-11 14:59 . 2009-10-23 15:17 156672 ------w- c:\windows\trz6.tmp
2009-10-03 02:58 . 2005-02-26 06:08 -------- d-----w- c:\program files\iTunes
2009-10-03 02:57 . 2008-12-24 04:04 -------- d-----w- c:\program files\Common Files\Apple
2009-09-27 13:31 . 2008-12-24 04:09 -------- d-----w- c:\documents and settings\user1\Application Data\Apple Computer
2009-09-27 11:14 . 2007-06-05 15:01 64432 ----a-w- c:\documents and settings\user1\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-12 02:33 . 2009-09-12 02:31 -------- d-----w- c:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-09-12 02:29 . 2009-09-12 02:29 -------- d-----w- c:\program files\QuickTime
2009-09-01 21:09 . 2007-06-05 13:41 -------- d-----w- c:\program files\McAfee
2009-09-01 21:09 . 2007-06-05 13:42 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-08-30 03:45 . 2009-08-30 03:47 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-08-30 03:45 . 2004-04-08 11:14 -------- d-----w- c:\program files\Java
2009-08-30 03:16 . 2009-08-30 03:16 -------- d-----w- c:\documents and settings\user1\Application Data\Malwarebytes
2009-08-30 03:16 . 2009-08-30 03:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-08-28 23:42 . 2009-03-14 19:49 2065696 ----a-w- c:\windows\system32\usbaaplrc.dll
2009-08-28 23:42 . 2008-12-24 04:05 40448 ----a-w- c:\windows\system32\drivers\usbaapl.sys
2009-08-17 16:10 . 2009-09-01 21:18 1279456 ----a-w- c:\windows\system32\aswBoot.exe
2009-08-17 16:06 . 2009-09-01 21:18 93392 ----a-w- c:\windows\system32\drivers\aswmon.sys
2009-08-17 16:06 . 2009-09-01 21:18 94160 ----a-w- c:\windows\system32\drivers\aswmon2.sys
2009-08-17 16:05 . 2009-09-01 21:18 114768 ----a-w- c:\windows\system32\drivers\aswSP.sys
2009-08-17 16:05 . 2009-09-01 21:18 20560 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
2009-08-17 16:04 . 2009-09-01 21:18 51376 ----a-w- c:\windows\system32\drivers\aswTdi.sys
2009-08-17 16:04 . 2009-09-01 21:18 23152 ----a-w- c:\windows\system32\drivers\aswRdr.sys
2009-08-17 16:03 . 2009-09-01 21:18 26944 ----a-w- c:\windows\system32\drivers\aavmker4.sys
2009-08-17 16:02 . 2009-09-01 21:18 97480 ----a-w- c:\windows\system32\AvastSS.scr
2009-08-06 23:24 . 2004-08-03 19:02 327896 ----a-w- c:\windows\system32\wucltui.dll
2009-08-06 23:24 . 2004-08-03 18:59 209632 ----a-w- c:\windows\system32\wuweb.dll
2009-08-06 23:24 . 2005-05-26 08:16 44768 ----a-w- c:\windows\system32\wups2.dll
2009-08-06 23:24 . 2004-08-03 18:59 35552 ----a-w- c:\windows\system32\wups.dll
2009-08-06 23:24 . 2002-08-29 10:00 53472 ------w- c:\windows\system32\wuauclt.exe
2009-08-06 23:24 . 2002-08-29 10:00 96480 ----a-w- c:\windows\system32\cdm.dll
2009-08-06 23:23 . 2004-08-03 19:00 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-08-06 23:23 . 2007-06-05 12:09 274288 ----a-w- c:\windows\system32\mucltui.dll
2009-08-06 23:23 . 2005-05-26 08:19 215920 ----a-w- c:\windows\system32\muweb.dll
2009-08-06 23:23 . 2002-08-29 10:00 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2009-08-05 09:11 . 2004-11-15 19:20 204800 ----a-w- c:\windows\system32\mswebdvd.dll
.

((((((((((((((((((((((((((((( SnapShot_2009-10-25_06.56.18 )))))))))))))))))))))))))))))))))))))))))
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-19 204288]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DVDSentry"="c:\windows\System32\DSentry.exe" [2002-08-14 28672]
"Synchronization Manager"="c:\windows\system32\mobsync.exe" [2004-08-04 143360]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\UdaterUI.exe" [2006-11-17 136768]
"EPSON Stylus Photo R320 Series"="c:\windows\System32\spool\DRIVERS\W32X86\3\E_FATI9FA.EXE" [2004-04-26 98304]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2009-08-13 177440]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-08-30 149280]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-08-17 81000]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-09-21 305440]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"EFI Job Monitor"="c:\windows\System32\spool\DRIVERS\W32X86\3\efjm.dll" [2003-11-20 2400256]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicIT3_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1123\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTRECVB.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\3\0]
"Script"=d:\windows.0\SYSVOL\sysvol\rush03.rushtrucking.com\scripts\PRTOPS.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1156\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_Toyota_T.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTMNTVB.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1169\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1211\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTBILHQ2.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTRECVB.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1230\Scripts\Logon\4\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1232\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicIT3_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\4\0]
"Script"=d:\windows.0\SYSVOL\sysvol\rush03.rushtrucking.com\scripts\Group_OpsMan_J.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1246\Scripts\Logon\5\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTOPSHQ1.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg_RushTemplates.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicFS1_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1256\Scripts\Logon\3\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTIT01.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logoff\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItOut.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\0\0]
"Script"=\\rush03.rushtrucking.com\sysvol\rush03.rushtrucking.com\scripts\LogItIn.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\0\1]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\chgreg2_INetCacheLimit.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\1\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\Group_PublicIT3_H.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2172132020-734557647-3038363128-1647\Scripts\Logon\2\0]
"Script"=\\rush03.rushtrucking.com\SysVol\rush03.rushtrucking.com\scripts\PRTRECVB.vbs

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\WINDOWS\\PCHealth\\HelpCtr\\Binaries\\helpctr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Documents and Settings\\user1\\Desktop\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\iPod\\bin\\iPodService.exe"=
"c:\\WINDOWS\\SYSTEM32\\igfxpers.exe"=

R1 aswSP;avast! Self Protection;c:\windows\SYSTEM32\DRIVERS\aswSP.sys [9/1/2009 5:18 PM 114768]
R2 ASFAgent;ASF Agent;c:\program files\Intel\ASF Agent\ASFAgent.exe [2/10/2003 5:52 AM 114688]
R2 AsfAlrt;AsfAlrt;c:\windows\SYSTEM32\DRIVERS\Asfalrt.sys [12/18/2002 5:31 AM 36064]
R2 aswFsBlk;aswFsBlk;c:\windows\SYSTEM32\DRIVERS\aswFsBlk.sys [9/1/2009 5:18 PM 20560]
S3 USBNET_XP;Instant Wireless XP USB Network Adapter ver.2.6 Driver;c:\windows\SYSTEM32\DRIVERS\netusbxp.sys [2/2/2005 8:28 PM 72576]
.
Contents of the 'Scheduled Tasks' folder

2009-10-24 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.comcast.net/home.html
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: {5767B741-BC4B-4943-90B4-590354331F4C} = 207.217.126.81,207.217.77.82,68.87.66.196,68.87.64.196
DPF: {460324E8-CFB4-4357-85EF-CE3EBFE23A62} - hxxps://www.driveraudit.com/trippak/ActiveXViewer11.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-25 13:14
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,b6,7f,00,2e,01,57,74,49,b6,d9,d2,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,b6,7f,00,2e,01,57,74,49,b6,d9,d2,\
.
Completion time: 2009-10-25 13:16
ComboFix-quarantined-files.txt 2009-10-25 17:15
ComboFix2.txt 2009-10-25 07:03
ComboFix3.txt 2009-10-23 15:06
ComboFix4.txt 2009-08-30 03:12

Pre-Run: 22,294,695,936 bytes free
Post-Run: 22,277,361,664 bytes free

- - End Of File - - CDBFC77409EE05D0E609DD7A5B3B6937



Malwarebytes' Anti-Malware 1.41
Database version: 3030
Windows 5.1.2600 Service Pack 2

10/25/2009 2:34:28 PM
mbam-log-2009-10-25 (14-34-28).txt

Scan type: Full Scan (C:\|)
Objects scanned: 165956
Time elapsed: 59 minute(s), 31 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 29

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\All Users\Application Data\74558433 (Rogue.Multiple) -> Quarantined and deleted successfully.

Files Infected:
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\77382532\77382532.exe.vir (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\fepabavi.exe.vir (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\jegivige.exe.vir (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\kiganopo.exe.vir (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\mowehujo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nikeroko.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACbakxrvyoue.dll.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACgrcdabwuap.dll.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACmwbpgvyqdm.dll.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACnjyobqptmp.dll.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACqjeyablgnk.dll.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wejuwava.exe.vir (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\UACrwqrxfubox.sys.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP800\A0119245.sys (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP800\A0119246.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP800\A0119247.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP800\A0119249.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP800\A0119250.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP800\A0119251.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP801\A0119281.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP833\A0123748.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP833\A0123759.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP835\A0124837.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP835\A0124842.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP835\A0124845.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP835\A0124847.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP835\A0124848.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP835\A0125018.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP835\A0125019.exe (Rogue.Installer) -> Quarantined and deleted successfully.

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:55 PM

Posted 26 October 2009 - 02:52 AM

Looks much better. How is your computer behaving now? Any problems?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 plzhelpme1

plzhelpme1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:55 PM

Posted 26 October 2009 - 12:21 PM

Looks good so far everything seems to be working again and no system problems. Am I good to go?

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:55 PM

Posted 26 October 2009 - 06:52 PM

Just a few last steps and then I'll post some recommendations for you.


We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :(
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 plzhelpme1

plzhelpme1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:55 PM

Posted 26 October 2009 - 10:17 PM

Thanks for the help buckeye_sam! :(

#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:55 PM

Posted 27 October 2009 - 07:44 AM

I'm glad I could help you out! :(

Now that your problem appears to be resolved, this thread will be closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users