Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Potential Rootkit remnants, hijacked IExplorer.


  • This topic is locked This topic is locked
32 replies to this topic

#1 MadMrE

MadMrE

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:02:29 PM

Posted 08 November 2009 - 07:14 PM

Hello.
I have been referred to this section of the forum from another, however my post there includes a good amount of information on my symptoms so I will repost it here, along with the Hijackthis Log.

I have recently spent the last couple months or so attempting to clean up a large infection that has been plaguing my computer for some time.

I use Spyware Doctor as a form of detection system as even though I have the trail version it still has the ability to discover and inform me of a variety of infections that would be present on my computer and cannot be detected with more common freeware. Recently, it has discovered a rather nasty Rootkit.TDSS infection that was hiding within my System 32 folder, as well as a few other backdoors, trojans and general rouge spyware agents. Naturally, I proceeded to neutralize as many infections as I could on my own before coming for help.

Probably a bad decision, but I became a tad brave with it after a successful exposure and removal of the majority of the files under the Rootkit using a variety of do it yourself anti malware systems. I started with MBAM, did a little do it yourself registry cleaning with Spyware Doctor as my guide, and eventually downloaded a file known as the Ultimate Boot CD in order to finally remove the rootkit. So far, while I could not boot the computer using the CD (Setup.REG always becomes corrupt during the burning process and ends up as a file with a zero KB size, hopefully not sabotage.), I was able to double click it under C:\ and gain access to the thorough library of anti malware tools packaged with it. One of which managed to discover a small part of the rootkit and eliminate it, allowing the other files to expose themselves for regular deletion. However, I cannot clean the rootkit from the Registry, and even after removing it I'm still receiving a variety of issues that definitely hint at a deeper infection.

Recently, my IExplorer has become hijacked, for one. Randomly while using Opera or Firefox, I will receive a sort of hidden prompt or window change that will cancel out my typing and presence on the current browser, and in using Task Manager to discover what has popped up; will discover that IExplore is active for no reason and constantly returning with each "End Process" I attempt. Generally sucking 60-100k of Mem usage in the process. And, that if allowed to remain around for a while... will eventually start playing random Voice Advertisements, ranging from regular ads you'd expect on T.V, to what sounds like someone talking over a microphone, to an -actual- RickRoll so to speak in the form of the "Never Gonna Give you Up." song.

Along with this, backdoors, trojans, and other severe threats I have removed using either regular Malware-Bytes Anti-Malware scan cleanups or my own actions with Spyware Doctor as my guide (Such as, cleverly I hope; renaming a random file to that of the malwares filename under the infected folder and then "Replacing" the hidden infection with it and renaming back to it's original form so as to delete hidden malware files.) are constantly regenerating no matter how many times I remove them, and under my C:\WINDOWS folder I'm getting a large amount of obviously suspicious sounding recently added files such as "7513dow9loadez143.exe" and "z571spam9ot755.dll". And, at random there will also be a sudden spike of memory usage within a single SVChost.exe that numbers in the 150k's and always slows my computer down. It apparently goes to the virus, as during a rather not well thought out moment of mine I ended it's process as well, to no real issue in the computer. Normally, closing those results in a shutdown prompt that restarts the computer, or requires cancellation with the shutdown -a command, however this never does bring up that prompt no matter how many times I remove it, and as stated it has no ill effect on any programs or connections over my computer that I know of.

Anyways, I have downloaded Hijackthis, MBAM, UBCD and all of the freeware packaged with it, and a few rootkit/rouge spyware fixes.
My HijackThis log, is as follows:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:51:59 PM, on 11/7/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16915)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\svchost.exe
C:\Nexon\Mabinogi\npkcmsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\windows\system32\csrs32.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\Program Files\AWS\WeatherBug\Weather.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\DOCUME~1\COMPAQ~1\LOCALS~1\Temp\winamp.exe
C:\Program Files\Philips\GoGear VIBE Device Manager\GoGear_Vibe_DeviceManager.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Microsoft IntelliPoint\IPoint.exe
C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\FastNetSrv.exe
C:\Program Files\Opera\opera.exe
C:\Program Files\Winamp\winamp.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaul...rch/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaul...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaul...//www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaul...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaul...//www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaul...//www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - URLSearchHook: AOLTBSearch Class - {EA756889-2338-43DB-8F07-D1CA6FB9C90D} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn4\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn4\yt.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn4\yt.dll
O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: Embarq Toolbar - {4E7BD74F-2B8D-469E-92BE-BF2DFE9AAE2C} - C:\PROGRA~1\EMBARQ~1\EMBARQ~1.DLL
O3 - Toolbar: Viewpoint Toolbar - {F8AD5AA5-D966-4667-9DAF-2561D68B2012} - C:\Program Files\Common Files\Viewpoint\Toolbar Runtime\3.9.0\IEViewBar.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [LXCGCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [RECGUARD] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [FaxCenterServer] "C:\Program Files\Lexmark Fax Solutions\fm3032.exe" /s
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ArcSoft Connection Service] C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [csrs32] C:\windows\system32\csrs32.exe
O4 - HKLM\..\Run: [Ojumaxuwibiqoref] rundll32.exe "C:\WINDOWS\uzejehulalih.dll",Startup
O4 - HKLM\..\Run: [NetHelp] nethelp.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
O4 - HKCU\..\Run: [Weather] C:\Program Files\AWS\WeatherBug\Weather.exe 1
O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [Search Protection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [Yjafosi8kdf98winmdkmnkmfnwe] C:\DOCUME~1\COMPAQ~1\LOCALS~1\Temp\winamp.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKUS\S-1-5-18\..\Run: [AntiSpyware Service] C:\WINDOWS\TEMP\ekhap.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Windows System Recover!] C:\WINDOWS\TEMP\smss.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [hivew] C:\WINDOWS\system32\rundll32.exe C:\WINDOWS\TEMP\16052341754999.dll,Set1 (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Login Software 2009] C:\WINDOWS\TEMP\za0z94ss.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Yjafosi8kdf98winmdkmnkmfnwe] C:\WINDOWS\TEMP\mdm.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [wynB.tmp.exe] C:\WINDOWS\system32\wynB.tmp.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AntiSpyware Service] C:\WINDOWS\TEMP\ekhap.exe (User 'Default user')
O4 - .DEFAULT User Startup: Pin.lnk = C:\hp\bin\CLOAKER.EXE (User 'Default user')
O4 - Startup: Xfire.lnk = C:\Program Files\Xfire\Xfire.exe
O4 - Global Startup: Philips GoGear VIBE Device Manager.lnk = ?
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: Add To Compaq Organize... - C:\PROGRA~1\HEWLET~1\COMPAQ~1\bin/module.main/favorites\ie_add_to.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Save Flash - res://C:\Program Files\UnH Solutions\Flash Saving Plugin\FlashSButton.dll/210
O8 - Extra context menu item: Save YouTube Video - res://C:\Program Files\UnH Solutions\Flash Saving Plugin\FlashSButton.dll/217
O8 - Extra context menu item: SWF Capture tool - C:\Program Files\Eltima Software\Flash Decompiler\iebt.html
O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: HP Smart Select - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: Flash - {43CF38F3-5AEC-45a3-AD31-04EB06E9C6CA} - C:\Program Files\UnH Solutions\Flash Saving Plugin\FlashSButton.dll (HKCU)
O9 - Extra button: Flash Decompiler SWF Capture tool - {86B4FC19-8FA4-4FD3-B243-9AEDB42FA2D5} - C:\Program Files\Eltima Software\Flash Decompiler\iebt.dll (HKCU)
O9 - Extra 'Tools' menuitem: Flash Decompiler SWF Capture tool menu - {86B4FC19-8FA4-4FD3-B243-9AEDB42FA2D5} - C:\Program Files\Eltima Software\Flash Decompiler\iebt.dll (HKCU)
O16 - DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} (HGPlugin9USA Class) - http://gamedownload.ijjimax.com/gamedownlo...GPlugin9USA.cab
O16 - DPF: {CFCB7308-782F-11D4-BE27-000102598CE4} (NPX Control) - http://nprotect.roseonlinegame.com/nProtect/Netizen/npx.cab
O20 - AppInit_DLLs: C:\WINDOWS\TEMP\4059xxx.dll C:\WINDOWS\TEMP\34117333.dll C:\WINDOWS\TEMP\41174eve.dll c:\windows\system32\telemize.dll c:\windows\system32\bohupota.dll c:\windows\system32\nunupofa.dll c:\windows\system32\nepivoyi.dll c:\windows\system32\vagiluke.dll tolataga.dll c:\windows\system32\vevapada.dll c:\windows\system32\hegubagu.dll
O21 - SSODL: mejofurag - {1e22f887-2cef-4862-a828-29424e6b047f} - c:\windows\system32\nunupofa.dll (file missing)
O21 - SSODL: buzehatuz - {45d1940c-37b5-441d-8e25-e59fe34730ad} - c:\windows\system32\nepivoyi.dll (file missing)
O21 - SSODL: wayodugaw - {3c87b2df-0a5e-4e4f-8b06-5639c960b418} - c:\windows\system32\hegubagu.dll (file missing)
O22 - SharedTaskScheduler: ghya673gidh87we9inkff - {BF56A325-23F2-42AD-F4E4-00AAC39CAA53} - C:\WINDOWS\system32\tajf83ikdmf.dll (file missing)
O22 - SharedTaskScheduler: gsajkfh873whdngo8wuidgs4rgfr4 - {A2234B15-23F2-42AD-F4E4-00AAC39C0004} - (no file)
O22 - SharedTaskScheduler: kupuhivus - {45d1940c-37b5-441d-8e25-e59fe34730ad} - c:\windows\system32\nepivoyi.dll (file missing)
O22 - SharedTaskScheduler: mujuzedij - {1e22f887-2cef-4862-a828-29424e6b047f} - c:\windows\system32\nunupofa.dll (file missing)
O22 - SharedTaskScheduler: tokatiluy - {3c87b2df-0a5e-4e4f-8b06-5639c960b418} - c:\windows\system32\hegubagu.dll (file missing)
O23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft Inc. - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: fastnetsrv Service (fastnetsrv) - Netopsystems A - C:\WINDOWS\system32\FastNetSrv.exe
O23 - Service: Firebird Guardian - DefaultInstance (FirebirdGuardianDefaultInstance) - Firebird Project - C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe
O23 - Service: Firebird Server - DefaultInstance (FirebirdServerDefaultInstance) - Firebird Project - C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe
O23 - Service: Google Update Service (gupdate1ca47aa167a4e4) (gupdate1ca47aa167a4e4) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
O23 - Service: lxcg_device - - C:\WINDOWS\system32\lxcgcoms.exe
O23 - Service: McciCMService - Motive Communications, Inc. - C:\Program Files\Common Files\Motive\McciCMService.exe
O23 - Service: Norton AntiVirus - Symantec Corporation - C:\Program Files\Norton AntiVirus\Engine\16.5.0.134\ccSvcHst.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: npkcmsvc - INCA Internet Co., Ltd. - C:\Nexon\Mabinogi\npkcmsvc.exe
O23 - Service: npkcsvc - INCA Internet Co., Ltd. - C:\WINDOWS\system32\npkcsvc.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

--
End of file - 17140 bytes

If you require the rootkit log as well, I will provide it. As well as a list of scan results from Spyware Doctor.

BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,507 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:29 PM

Posted 08 November 2009 - 09:36 PM

Hello MadMrE,
  • Welcome to Bleeping Computer.
  • Sorry for delayed response. Forums have been really busy.
  • My name is fireman4it and I will be helping you with your Malware problem.
  • As I am still in training I will be helping you under supervision of our expert teachers, so there may be a delay between posts.
Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • Finally, please reply using the Posted Image button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.
  • I will be analyzing your log. I will get back to you with instructions after it is approved.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 MadMrE

MadMrE
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:02:29 PM

Posted 10 November 2009 - 06:47 AM

Thank you, Fireman.
The changes and modifications were made during a period of self repair after following online sources, since I have posted here there have been no further attempts to fix the issue, and I have disabled Spyware Doctor so it will no longer scan.

As I've noticed that these files have the ability to replicate and regeneration, I fear they may clog up my computer soon unless I use Malware Bytes Anti-Malware or some other form of temporary fix to clean them out regularly. So I hope it will not take long, I don't know how long it'll be before my internet fails from the infection. Right now, my Opera browser... a recent download I switched to due to Firefox suffering issues and using far too much memory/CPU as normally needed; is now starting to do the same thing. Using over 900k of memory and nearly all of the CPU. IExplore is still hijacked, with random Voice/Online advertisements hidden in the background I cannot pop up.

As mentioned, if you require any other logs, or require I download further files; I am more than willing to provide them or do so.

If I do not respond for a while, my internet may be down... so bear with me please.

Edited by MadMrE, 10 November 2009 - 06:48 AM.


#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,507 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:29 PM

Posted 10 November 2009 - 03:38 PM

Hello MadMrE,

1.
One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.

2.
We need to disable Spybot S&D's "TeaTimer"
TeaTimer works by preventing ANY changes to the system. It will attempt to undo any fixes we run, because it blocks these fixes from running.

In order to safeguard your system from problems that can be brought on by a half finished fix, we need to disable TeaTimer. We can reenable it when we're done if you like.
  • Open SpyBot Search and Destroy by going to Start -> All Programs -> Spybot Search and Destroy -> Spybot Search and Destroy.
  • If prompted with a legal dialog, accept the warning.
  • Click Posted Image and then on "Advanced Mode"
    Posted Image
  • You may be presented with a warning dialog. If so, press Posted Image
  • Click on Posted Image
  • Click on Posted Image
  • Uncheck this checkbox:
    Posted Image
  • Close/Exit Spybot Search and Destroy
3.
Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply
4.
Install Recovery Console and Run ComboFix

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.
  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.

5.
We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.
6.
Download DDS and save it to your desktop from here or here or here.
Disable any script blocker, and then double click dds.scr to run the tool.

* When done, DDS will open two (2) logs:

1. DDS.txt
2. Attach.txt

Save both reports to your desktop post the contents of the DDS.txt log. Save the other report incase I need to look at it later.

Things to include in your next reply:
Combofix.txt
RootRepeal.txt
DDS.txt
Attach.txt
How is your machine running now? Any Signs or Symptoms of Infection?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 MadMrE

MadMrE
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:02:29 PM

Posted 11 November 2009 - 04:49 AM

Alright, I've done the following. I only have one issue to report however.

For logs, they are:

Combofix.txt
----------------------------------------------------------------------------------------------------------------------------
ComboFix 09-11-09.02 - Compaq_Owner 11/11/2009 1:16.1.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2238.1739 [GMT -5:00]
Running from: c:\documents and settings\Compaq_Owner\Desktop\ComboFix.exe
AV: Norton AntiVirus *On-access scanning enabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Compaq_Owner\Application Data\Logs\scns.log
c:\documents and settings\Compaq_Owner\Local Settings\Application Data\{F5CDEA41-08BE-4032-B829-2D65D7CB6F87}
c:\documents and settings\Compaq_Owner\Local Settings\Application Data\{F5CDEA41-08BE-4032-B829-2D65D7CB6F87}\chrome.manifest
c:\documents and settings\Compaq_Owner\Local Settings\Application Data\{F5CDEA41-08BE-4032-B829-2D65D7CB6F87}\chrome\content\_cfg.js
c:\documents and settings\Compaq_Owner\Local Settings\Application Data\{F5CDEA41-08BE-4032-B829-2D65D7CB6F87}\chrome\content\overlay.xul
c:\documents and settings\Compaq_Owner\Local Settings\Application Data\{F5CDEA41-08BE-4032-B829-2D65D7CB6F87}\install.rdf
c:\program files\vidica
c:\program files\vidica\INSTALL.LOG
c:\program files\Windows Police Pro
c:\program files\Windows Police Pro\msvcm80.dll
c:\program files\Windows Police Pro\msvcp80.dll
c:\program files\Windows Police Pro\msvcr80.dll
C:\pvnwq.exe
c:\windows\10100spam5oz792.dll
c:\windows\10869hac5tzol296.bin
c:\windows\10zba9dware23995.ocx
c:\windows\112z3viru9555.exe
c:\windows\112z7v5rus449.exe
c:\windows\11497s5yz1.exe
c:\windows\12978h9cz5ool45f.dll
c:\windows\12z759irus5f9.cpl
c:\windows\13f5s9yzare1589.cpl
c:\windows\1499downzoade52950.bin
c:\windows\14czdownloa5er3908.exe
c:\windows\15105t9oj64z.cpl
c:\windows\15281spambot56z9.dll
c:\windows\15522wzrm1f9.ocx
c:\windows\159fbazkd9or66.dll
c:\windows\16640wo5z34d9.exe
c:\windows\166ebackdo9r2055z.dll
c:\windows\168539ot-z-virus1d.cpl
c:\windows\169985pambzt6d7.bin
c:\windows\16z96tr5920c.bin
c:\windows\171fste5l9049z.ocx
c:\windows\175z5hacktoolf9.dll
c:\windows\176z4tro9b5.ocx
c:\windows\17746ha9kz5ol3f8.ocx
c:\windows\18331worz5f99.exe
c:\windows\18585ir2z29.bin
c:\windows\1900zvirus5975.bin
c:\windows\19503trzj467.ocx
c:\windows\195steal317z.exe
c:\windows\19628zot-a9vi5us7e5.cpl
c:\windows\1975zhief2613.bin
c:\windows\1a759ddwzre2074.exe
c:\windows\1b65spar5e942z.dll
c:\windows\1d9z9ir950.dll
c:\windows\1dz95ir479.cpl
c:\windows\1z543worm439.ocx
c:\windows\20050z9oj657.bin
c:\windows\200545or964z.bin
c:\windows\20989ha9k5ool47z.exe
c:\windows\20z38no9-a-virus155.dll
c:\windows\2104backdz9r5847.exe
c:\windows\216z3s9y5c6.bin
c:\windows\22844not-a-5iruz792.ocx
c:\windows\2339v5r1z21.dll
c:\windows\234dv952682z.ocx
c:\windows\23528viruz129.exe
c:\windows\23789or55z2.dll
c:\windows\23796zirus55e.exe
c:\windows\2392895rus56z.bin
c:\windows\23e15aczdoor1903.ocx
c:\windows\24504w9rmzc9.dll
c:\windows\247185azktool9db.cpl
c:\windows\24955vi5us7z9.cpl
c:\windows\24964zot-a-vir5s593.dll
c:\windows\2515tzo94ca.cpl
c:\windows\25256not-a-vir9z2ee.exe
c:\windows\257239r5j75z.dll
c:\windows\25869hzcktool62d.bin
c:\windows\2589orz2bc.bin
c:\windows\258z6viru97ac.cpl
c:\windows\26150hacktoo95za.exe
c:\windows\26554h9ckzool6d1.bin
c:\windows\266965roj9ez.ocx
c:\windows\26z60hacktoo59dc.ocx
c:\windows\279015orm4bfz.bin
c:\windows\27905s5z3d8.dll
c:\windows\2805thief52z99.cpl
c:\windows\28107ha5ktool94dz.dll
c:\windows\282spar9e15z2.exe
c:\windows\2858hacktoo94za.dll
c:\windows\28632s5ambotz09.bin
c:\windows\291695izus54f.bin
c:\windows\2917ad5ware2z31.cpl
c:\windows\29196spambzt1cb5.dll
c:\windows\29456trojz7.bin
c:\windows\297z8spam5ot5c0.bin
c:\windows\2b90s5ywaze2269.dll
c:\windows\2b91backdoo514z.ocx
c:\windows\3079spazbotc5.dll
c:\windows\31997tro5zec.cpl
c:\windows\3267downl9ad5r2z22.cpl
c:\windows\3295dowzloader5093.exe
c:\windows\349ztroje35.cpl
c:\windows\38bzst5al1955.cpl
c:\windows\3a19zpy5ar92191.dll
c:\windows\3c9th5zat9807.dll
c:\windows\423ebac5dooz493.dll
c:\windows\4599s5y91z.cpl
c:\windows\4855hackt9ol3z.cpl
c:\windows\48c3t5z9f1168.dll
c:\windows\4acfviz5329.dll
c:\windows\4c50zi91795.exe
c:\windows\4zd4down5oad9r1619.exe
c:\windows\50389h5ef1271z.cpl
c:\windows\5071dzwnload9r3062.cpl
c:\windows\51e5viz2849.dll
c:\windows\525thr59tz2554.cpl
c:\windows\5409sparse21z.dll
c:\windows\5556s9ealz837.exe
c:\windows\55z08tr9j289.dll
c:\windows\55z5sparse992.dll
c:\windows\57679hreat50z07.cpl
c:\windows\579zvir558.exe
c:\windows\57a7thzef879.exe
c:\windows\5879spywar58z9.exe
c:\windows\595bstea5z3949.dll
c:\windows\599fzh5ef3045.dll
c:\windows\5d2cspywarz2950.cpl
c:\windows\5d61thr9az24289.cpl
c:\windows\5d87s5ywarz9534.dll
c:\windows\5f42stzal1953.dll
c:\windows\60e59zreat5906.cpl
c:\windows\62bd9ir5839z.exe
c:\windows\6348vz9579.dll
c:\windows\6448z5oj9c.exe
c:\windows\651daddwzre1689.exe
c:\windows\695spywarz1779.exe
c:\windows\724zb9ck5oor607.exe
c:\windows\73c6s5arsz26249.cpl
c:\windows\79adspzrs9555.dll
c:\windows\8151spambot4z59.cpl
c:\windows\903zddware1518.exe
c:\windows\92ast5az2314.exe
c:\windows\95281spambot287z.exe
c:\windows\9846trz5318.cpl
c:\windows\b90t5ief49z.dll
c:\windows\c35a9dwarz1566.exe
c:\windows\c849z5eat8905.exe
c:\windows\COUPON~1.OCX
c:\windows\CouponPrinter.ocx
c:\windows\irc.txt
c:\windows\run.log
c:\windows\svohost.exe
c:\windows\system32\10833z59mbot12f.dll
c:\windows\system32\12d95ir280z.dll
c:\windows\system32\12z1sparse96135.bin
c:\windows\system32\14920not-azvir5s675.dll
c:\windows\system32\14f0tzreat15219.dll
c:\windows\system32\15724.exe
c:\windows\system32\15z92hacktool48d.exe
c:\windows\system32\16854w9rm3z8.exe
c:\windows\system32\18467.exe
c:\windows\system32\19169.exe
c:\windows\system32\1z8955roj1f4.dll
c:\windows\system32\2029w5rz192.exe
c:\windows\system32\20917nzt-9-vir5s4e3.exe
c:\windows\system32\24429hzc9t5ol555.exe
c:\windows\system32\254bsp5warez978.dll
c:\windows\system32\26500.exe
c:\windows\system32\2785d9warez835.exe
c:\windows\system32\2898tro551dz.dll
c:\windows\system32\2d5csparsez5659.bin
c:\windows\system32\329625roz509.bin
c:\windows\system32\3995szyf5.bin
c:\windows\system32\41.exe
c:\windows\system32\4dcaazd5are2329.bin
c:\windows\system32\533fb59zdoor2412.bin
c:\windows\system32\5d48sz9war51024.dll
c:\windows\system32\5e95threaz55804.bin
c:\windows\system32\6334.exe
c:\windows\system32\7e6ctzief5699.dll
c:\windows\system32\9755sparsez886.dll
c:\windows\system32\9d1sz9al2725.dll
c:\windows\system32\9zh9eat17516.bin
c:\windows\system32\b79v5r29z7.bin
c:\windows\system32\c1ds5ea92z00.dll
c:\windows\system32\dbsinit.exe
c:\windows\system32\duyesedi.exe
c:\windows\system32\duzirasa.dll
c:\windows\system32\fezepope.dll
c:\windows\system32\fimamile.dll
c:\windows\system32\gimujewa.dll
c:\windows\system32\gofizesa.dll
c:\windows\system32\gosofuwu.dll.tmp
c:\windows\system32\guvegavu.exe
c:\windows\system32\hegerunu.exe
c:\windows\system32\images
c:\windows\system32\images\i1.gif
c:\windows\system32\images\i2.gif
c:\windows\system32\images\i3.gif
c:\windows\system32\images\j1.gif
c:\windows\system32\images\j2.gif
c:\windows\system32\images\j3.gif
c:\windows\system32\images\jj1.gif
c:\windows\system32\images\jj2.gif
c:\windows\system32\images\jj3.gif
c:\windows\system32\images\l1.gif
c:\windows\system32\images\l2.gif
c:\windows\system32\images\l3.gif
c:\windows\system32\images\pix.gif
c:\windows\system32\images\t1.gif
c:\windows\system32\images\t2.gif
c:\windows\system32\images\up1.gif
c:\windows\system32\images\up2.gif
c:\windows\system32\images\w1.gif
c:\windows\system32\images\w11.gif
c:\windows\system32\images\w2.gif
c:\windows\system32\images\w3.gif
c:\windows\system32\images\w3.jpg
c:\windows\system32\images\wt1.gif
c:\windows\system32\images\wt2.gif
c:\windows\system32\images\wt3.gif
c:\windows\system32\Install.txt
c:\windows\system32\isapeep.sys
c:\windows\system32\kepivuve.exe
c:\windows\system32\layezefu.dll.tmp
c:\windows\system32\liseruka.exe
c:\windows\system32\lizoneho.exe
c:\windows\system32\mndisk.sys
c:\windows\system32\nfr.assembly
c:\windows\system32\nfr.gpref
c:\windows\system32\npx.ocx
c:\windows\system32\NWCWorkstation.dll
c:\windows\system32\pivejehu.dll
c:\windows\system32\ratijipe.exe
c:\windows\system32\rijiraza.exe
c:\windows\system32\schtml
c:\windows\system32\schtml\dbsinit.exe
c:\windows\system32\schtml\images\i1.gif
c:\windows\system32\schtml\images\i2.gif
c:\windows\system32\schtml\images\i3.gif
c:\windows\system32\schtml\images\j1.gif
c:\windows\system32\schtml\images\j2.gif
c:\windows\system32\schtml\images\j3.gif
c:\windows\system32\schtml\images\jj1.gif
c:\windows\system32\schtml\images\jj2.gif
c:\windows\system32\schtml\images\jj3.gif
c:\windows\system32\schtml\images\l1.gif
c:\windows\system32\schtml\images\l2.gif
c:\windows\system32\schtml\images\l3.gif
c:\windows\system32\schtml\images\pix.gif
c:\windows\system32\schtml\images\t1.gif
c:\windows\system32\schtml\images\t2.gif
c:\windows\system32\schtml\images\up1.gif
c:\windows\system32\schtml\images\up2.gif
c:\windows\system32\schtml\images\w1.gif
c:\windows\system32\schtml\images\w11.gif
c:\windows\system32\schtml\images\w2.gif
c:\windows\system32\schtml\images\w3.gif
c:\windows\system32\schtml\images\w3.jpg
c:\windows\system32\schtml\images\word.doc
c:\windows\system32\schtml\images\wt1.gif
c:\windows\system32\schtml\images\wt2.gif
c:\windows\system32\schtml\images\wt3.gif
c:\windows\system32\schtml\wispex.html
c:\windows\system32\sfsp.cfo
c:\windows\system32\sikasiso.dll
c:\windows\system32\sohibesi.dll
c:\windows\system32\vogujesi.dll.tmp
c:\windows\system32\vuzofafu.dll
c:\windows\system32\wynB.tmp.exe
c:\windows\system32\yekugomo.dll
c:\windows\system32\z9252spamb9t593.exe
c:\windows\system32\zd59a9dware2104.bin
c:\windows\system32\zenoyovo.dll
c:\windows\system32\zffasp5w9re1598.dll
c:\windows\system32\zubayoro.dll
c:\windows\Temp\1056747992.exe
c:\windows\Temp\16052341754999.dll
c:\windows\Temp\165432843.exe
c:\windows\Temp\167025059.exe
c:\windows\Temp\16717961.exe
c:\windows\Temp\16753124.exe
c:\windows\Temp\1754273404.exe
c:\windows\TEMP\34117333.dll
c:\windows\Temp\3709811208.exe
c:\windows\TEMP\4059xxx.dll
c:\windows\TEMP\41174eve.dll
c:\windows\Temp\799036386.exe
c:\windows\Temp\948335904.exe
c:\windows\TEMP\mta13187.dll
c:\windows\uzejehulalih.dll
c:\windows\viassary-hp.reg
c:\windows\wf3.dat
c:\windows\wf4.dat
c:\windows\z3590virus792.dll
c:\windows\z571spam9ot755.dll
c:\windows\z754a9dware1866.dll
c:\windows\z8107s9y454.exe
D:\Autorun.inf

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_.NET_CLR
-------\Legacy_6TO4
-------\Legacy_ANTIPPRO2009_100
-------\Legacy_IAS
-------\Legacy_MNDISK
-------\Legacy_NWCWORKSTATION
-------\Service_kbiwkmvyxtqfui
-------\Service_mndisk
-------\Service_UACd.sys
-------\Legacy_isapeep
-------\Service_isapeep


((((((((((((((((((((((((( Files Created from 2009-10-11 to 2009-11-11 )))))))))))))))))))))))))))))))
.

2009-12-26 20:04 . 2009-12-26 20:04 9377 ----a-w- c:\windows\system32\z9597worm699.bin
2009-12-20 05:23 . 2009-12-20 05:23 3538 ----a-w- c:\windows\system32\9047not-a-v5rusz98.bin
2009-12-18 01:23 . 2009-12-18 01:23 9714 ----a-w- c:\windows\system32\94677zot-5-virus28f.bin
2009-12-17 02:56 . 2009-12-17 02:56 3941 ----a-w- c:\windows\system32\9559spy946z.exe
2009-12-12 14:42 . 2009-12-12 14:42 3859 ----a-w- c:\windows\system32\32247sp5m9oz4f.exe
2009-12-06 23:21 . 2009-12-06 23:21 3148 ----a-w- c:\windows\7513dow9loadez143.exe
2009-12-05 07:02 . 2009-12-05 07:02 9503 ----a-w- c:\windows\system32\392spz5are1590.bin
2009-12-04 23:22 . 2009-12-04 23:22 5999 ----a-w- c:\windows\system32\fazaddware9259.dll
2009-12-04 03:41 . 2009-12-04 03:41 6067 ----a-w- c:\windows\system32\1339tzr5at8924.exe
2009-11-14 00:38 . 2009-11-14 00:38 3530 ----a-w- c:\windows\system32\18z21h9c5toolbd.exe
2009-11-07 23:51 . 2009-11-07 23:51 -------- d-----w- c:\program files\Trend Micro
2009-11-01 13:38 . 2009-11-11 02:09 120 ----a-w- c:\windows\Ksixeyeyogom.dat
2009-10-29 19:25 . 2009-10-29 19:25 -------- d-----w- c:\documents and settings\Compaq_Owner\Local Settings\Application Data\Opera
2009-10-29 19:24 . 2009-10-29 19:24 -------- d-----w- c:\program files\Opera
2009-10-29 19:14 . 2008-07-12 12:18 3851784 ----a-w- c:\windows\system32\D3DX9_39.dll
2009-10-29 19:14 . 2009-10-29 19:14 -------- d-----w- c:\windows\Logs
2009-10-29 04:24 . 2009-10-29 04:24 -------- d-----w- c:\documents and settings\LocalService\Application Data\AdobeUM
2009-10-26 23:15 . 2009-10-30 07:08 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\mIRC
2009-10-26 23:15 . 2009-10-30 07:08 -------- d-----w- c:\program files\mIRC
2009-10-25 01:19 . 2009-10-25 01:19 2547 ----a-w- c:\windows\system32\z59fth95at5383.dll
2009-10-22 22:50 . 2009-10-22 22:50 102800 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2009-10-22 22:29 . 2009-10-22 22:29 -------- d-----w- c:\program files\Windows Resource Kits
2009-10-22 19:04 . 2009-10-22 19:04 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Mozilla
2009-10-22 15:13 . 2009-10-22 15:14 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-10-22 15:13 . 2009-10-22 15:13 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-10-22 15:13 . 2009-10-22 15:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2009-10-22 00:55 . 2009-10-22 14:38 -------- d-----w- c:\documents and settings\All Users\Application Data\65309225
2009-10-20 12:17 . 2009-10-20 12:17 0 ----a-w- c:\windows\system32\drivers\mxgl.sys
2009-10-20 11:31 . 2009-10-20 11:31 -------- d-----w- C:\New Folder
2009-10-20 08:04 . 2009-10-20 08:04 -------- d-----w- C:\Incredible Machine 2, The
2009-10-20 07:04 . 2009-10-21 20:43 -------- d-----w- C:\UBCD4Win
2009-10-20 00:48 . 2009-10-20 09:10 -------- d-----w- c:\documents and settings\All Users\Application Data\06579330
2009-10-19 06:50 . 2009-10-19 06:50 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-10-18 07:46 . 2009-10-18 10:06 -------- d-----w- c:\documents and settings\All Users\Application Data\87695136
2009-10-18 02:47 . 2009-10-18 02:47 3444 ----a-w- c:\windows\system32\573z1virus2af9.bin
2009-10-17 19:59 . 2009-10-17 19:59 536293 ----a-w- c:\windows\system32\39bb5b.dll
2009-10-17 19:46 . 2009-10-18 02:49 -------- d-----w- c:\documents and settings\All Users\Application Data\85227327
2009-10-17 19:04 . 2009-11-11 06:05 0 ----a-w- c:\windows\Ixoroqibuzix.bin
2009-10-17 18:41 . 2009-10-17 18:41 152 ----a-w- c:\windows\system32\api.reg
2009-10-17 18:41 . 2009-10-17 18:41 20480 ----a-w- c:\windows\system32\csrs32.exe
2009-10-17 18:39 . 2009-10-17 18:39 52736 ----a-w- C:\ojmrn.exe
2009-10-17 18:39 . 2009-10-17 18:39 247808 ----a-w- C:\midelwlj.exe
2009-10-17 18:39 . 2009-10-17 18:39 157696 ----a-w- C:\hfghdgh.exe
2009-10-17 18:39 . 2009-10-17 18:39 24576 ----a-w- C:\rdoums.exe
2009-10-17 18:39 . 2009-10-17 18:39 30208 ----a-w- C:\ngeisx.exe
2009-10-16 09:56 . 2009-10-16 09:56 -------- d-----w- c:\documents and settings\Compaq_Owner\Local Settings\Application Data\PCHealth
2009-10-16 04:41 . 2009-10-16 04:41 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Identities
2009-10-14 01:19 . 2009-11-01 12:19 -------- d-----w- c:\documents and settings\Compaq_Owner\Local Settings\Application Data\Temp

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-11-11 07:02 . 2009-03-24 22:52 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\EMBARQTOOLBAR
2009-11-11 06:46 . 2009-08-18 12:17 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\Logs
2009-11-11 06:01 . 2009-05-08 23:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-11-11 06:01 . 2005-11-14 15:41 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-11-11 06:01 . 2005-11-14 15:41 -------- d-----w- c:\program files\Symantec
2009-11-10 06:32 . 2006-04-05 00:08 -------- d-----w- c:\program files\Lx_cats
2009-11-07 23:47 . 2009-03-28 06:28 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-10-28 14:05 . 2008-08-01 03:27 -------- d-----w- c:\program files\Trillian
2009-10-26 20:09 . 2005-11-14 15:02 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-10-26 11:33 . 2009-03-31 05:07 -------- d-----w- c:\program files\Spyware Doctor
2009-10-19 17:38 . 2006-07-03 10:36 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\Xfire
2009-10-18 03:02 . 2009-08-18 22:56 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-10 16:59 . 2009-10-10 16:59 9933 ----a-w- c:\windows\6a455hiez979.dll
2009-10-09 18:44 . 2008-03-15 06:26 -------- d-----w- c:\program files\FREE Hi-Q Recorder
2009-10-09 16:08 . 2009-10-09 15:07 58 ----a-w- c:\windows\wp4.dat
2009-10-09 16:08 . 2009-10-09 15:07 4 ----a-w- c:\windows\wp3.dat
2009-10-08 00:50 . 2009-10-08 00:44 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\vlc
2009-10-08 00:43 . 2009-10-08 00:43 -------- d-----w- c:\program files\VideoLAN
2009-10-08 00:24 . 2009-10-08 00:24 -------- d-----w- c:\program files\AviSynth 2.5
2009-10-08 00:24 . 2009-10-08 00:24 -------- d-----w- c:\program files\Gabest
2009-10-08 00:15 . 2009-10-08 00:15 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\DivX
2009-10-08 00:01 . 2005-11-14 15:39 -------- d-----w- c:\program files\Google
2009-10-07 23:59 . 2006-09-06 23:29 -------- d-----w- c:\program files\DivX
2009-10-07 23:58 . 2009-10-07 23:57 -------- d-----w- c:\program files\Common Files\DivX Shared
2009-10-06 13:41 . 2009-10-06 13:41 4076 ----a-w- c:\windows\system32\3d99s5zal9127.exe
2009-10-04 19:36 . 2009-10-04 19:36 -------- d-----w- c:\documents and settings\LocalService\Application Data\Apple Computer
2009-10-03 18:04 . 2008-12-02 19:36 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2009-10-03 14:55 . 2009-10-03 14:55 13267 ----a-w- c:\windows\system32\30991hazkt59l18a.exe
2009-10-03 03:41 . 2006-04-05 00:03 -------- d-----w- c:\program files\Lexmark 2300 Series
2009-09-30 16:09 . 2006-04-13 12:33 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\uTorrent
2009-09-26 14:02 . 2009-09-26 14:02 12037 ----a-w- c:\windows\system32\2cz5a5dwar91884.exe
2009-09-25 23:05 . 2006-02-12 00:21 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo! Companion
2009-09-24 00:29 . 2009-09-24 00:29 6566 ----a-w- c:\windows\7356sp5mbzt491.dll
2009-09-23 18:50 . 2008-10-29 13:53 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\openrpg
2009-09-22 01:10 . 2009-09-22 01:10 14126 ----a-w- c:\windows\system32\15728t9zj3d6.dll
2009-09-19 04:01 . 2008-10-29 13:30 -------- d-----w- c:\program files\OpenRPG
2009-09-14 11:57 . 2009-09-14 11:57 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\Yahoo!
2009-09-12 04:16 . 2009-09-12 04:16 5637 ----a-w- c:\windows\z4428spamb5t939.dll
2009-09-11 14:33 . 2004-08-04 12:00 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-09 15:44 . 2009-09-09 15:44 8613 ----a-w- c:\windows\system32\z09669ack5ool42b.exe
2009-09-08 11:35 . 2009-09-08 11:35 12434 ----a-w- c:\windows\system32\1z69add95re2072.exe
2009-09-08 03:22 . 2009-03-31 05:08 206256 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2009-09-06 15:25 . 2009-09-06 15:25 18330 ----a-w- c:\windows\system32\90945spy555z.exe
2009-09-05 17:08 . 2009-09-05 17:08 262144 ----a-w- C:\ntuser.dat
2009-09-05 04:05 . 2009-09-05 04:05 11695 ----a-w- c:\windows\system32\fe9zhreat7513.exe
2009-09-05 04:02 . 2009-09-05 04:02 7189 ----a-w- c:\windows\system32\180czownloa5er13139.exe
2009-09-04 20:45 . 2004-08-04 12:00 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-09-03 00:51 . 2009-09-03 00:51 3387 ----a-w- c:\windows\4z35stea92181.bin
2009-09-02 00:35 . 2009-09-02 00:35 7806 ----a-w- c:\windows\3056vir9z27b.exe
2009-09-01 10:14 . 2006-02-20 04:04 56088 -c--a-w- c:\documents and settings\Compaq_Owner\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-08-29 07:36 . 2004-08-04 12:00 832512 ----a-w- c:\windows\system32\wininet.dll
2009-08-29 07:36 . 2004-08-04 12:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-08-29 07:36 . 2004-08-04 12:00 17408 ----a-w- c:\windows\system32\corpol.dll
2009-08-27 06:48 . 2009-08-27 06:48 4779 ----a-w- c:\windows\system32\5770dzwnloader591.exe
2009-08-26 09:16 . 2009-08-26 09:16 3510 ----a-w- c:\windows\system32\9z04sp5ware1149.exe
2009-08-26 08:16 . 2004-08-04 12:00 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-25 21:56 . 2009-08-25 21:56 11260 ----a-w- c:\windows\system32\7f4cbackdoor9095z.dll
2009-08-23 14:28 . 2009-08-23 14:28 9488 ----a-w- c:\windows\system32\59159py2z9.dll
2009-08-22 16:24 . 2009-08-22 16:24 14677 ----a-w- c:\windows\system32\50zfs9eal550.exe
2009-08-18 10:01 . 2009-08-18 10:01 6802 ----a-w- c:\windows\system32\5495virz455.bin
2009-08-15 13:40 . 2009-08-15 13:40 4776 ----a-w- c:\windows\5322s9eal11z8.exe
2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
2006-02-24 05:39 . 2006-02-24 05:39 22 -csha-w- c:\windows\SMINST\HPCD.sys
2009-07-17 18:45 . 2009-07-17 18:45 124928 --sha-w- c:\windows\system32\fuhazepi.exe
2009-07-17 18:45 . 2009-07-17 18:45 137216 --sha-w- c:\windows\system32\karirabo.exe
2009-07-17 18:45 . 2009-07-17 18:45 24576 --sha-w- c:\windows\system32\lusozawu.exe
2009-07-17 18:45 . 2009-07-17 18:45 252928 --sha-w- c:\windows\system32\nikoloki.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DAEMON Tools"="c:\program files\DAEMON Tools\daemon.exe" [2007-04-03 165784]
"Weather"="c:\program files\AWS\WeatherBug\Weather.exe" [2007-08-29 1347584]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2009-05-27 4351216]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-23 111856]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-11-14 68856]
"AIM"="c:\program files\AIM\aim.exe" [2006-08-01 67112]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LXCGCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll" [2005-07-20 73728]
"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" [2007-03-12 517768]
"RECGUARD"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-23 237568]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 59392]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"FaxCenterServer"="c:\program files\Lexmark Fax Solutions\fm3032.exe" [2005-07-12 299008]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2005-11-14 180269]
"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2009-10-10 203264]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2007-05-14 35328]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-23 111856]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-14 344064]
"csrs32"="c:\windows\system32\csrs32.exe" [2009-10-17 20480]
"NetHelp"="nethelp.exe" - c:\windows\system32\nethelp.exe [2009-10-21 10240]

c:\documents and settings\Administrator\Start Menu\Programs\Startup\
Pin.lnk - c:\hp\bin\CLOAKER.EXE [2005-11-14 27136]

c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\
Xfire.lnk - c:\program files\Xfire\Xfire.exe [2006-12-15 2337360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Philips GoGear VIBE Device Manager.lnk - c:\program files\Philips\GoGear VIBE Device Manager\GoGear_Vibe_DeviceManager.exe [2009-7-24 1611152]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
@=""

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Compaq Connections.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Compaq Connections.lnk
backup=c:\windows\pss\Compaq Connections.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^EMBARQ Help.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\EMBARQ Help.lnk
backup=c:\windows\pss\EMBARQ Help.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^MagicDisc.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\MagicDisc.lnk
backup=c:\windows\pss\MagicDisc.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^RollerCoaster Tycoon 3 Registration.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\RollerCoaster Tycoon 3 Registration.lnk
backup=c:\windows\pss\RollerCoaster Tycoon 3 Registration.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^Sid Registration.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\Sid Registration.lnk
backup=c:\windows\pss\Sid Registration.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^Xfire.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\Xfire.lnk
backup=c:\windows\pss\Xfire.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^Yahoo! Widget Engine.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\Yahoo! Widget Engine.lnk
backup=c:\windows\pss\Yahoo! Widget Engine.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Sierra\\SWAT 4\\Content\\System\\Swat4.exe"=
"c:\\Program Files\\AIM\\aim.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\AWS\\WeatherBug\\Weather.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Compaq Connections\\5577497\\Program\\Compaq Connections.exe"=
"c:\\Documents and Settings\\Compaq_Owner\\My Documents\\Alex\\utorrent.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Electronic Arts\\Battlefield 2142 Deluxe Edition\\BF2142.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Pando Networks\\Media Booster\\PMB.exe"=
"c:\\Program Files\\Google\\Update\\GoogleUpdate.exe"=
"c:\\Program Files\\Common Files\\Symantec Shared\\PIF\\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\\PIFSvc.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8097:TCP"= 8097:TCP:*:Disabled:EarthLink UHP Modem Support
"3389:TCP"= 3389:TCP:*:Disabled:@xpsp2res.dll,-22009
"58364:TCP"= 58364:TCP:Pando Media Booster
"58364:UDP"= 58364:UDP:Pando Media Booster

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [3/31/2009 12:08 AM 206256]
R0 sfdrv01a;StarForce Protection Environment Driver (version 1.x.a);c:\windows\system32\drivers\sfdrv01a.sys [7/5/2006 7:46 AM 63352]
R2 BtwSrv;BtwSrv;c:\windows\system32\svchost.exe -k netsvcs [8/4/2004 7:00 AM 14336]
R2 fastnetsrv;fastnetsrv Service;c:\windows\system32\FastNetSrv.exe [8/4/2004 7:00 AM 45056]
R2 FirebirdGuardianDefaultInstance;Firebird Guardian - DefaultInstance;c:\program files\Firebird\Firebird_2_1\bin\fbguard.exe [7/17/2008 8:16 AM 81920]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [1/11/2007 6:59 AM 24652]
R3 FirebirdServerDefaultInstance;Firebird Server - DefaultInstance;c:\program files\Firebird\Firebird_2_1\bin\fbserver.exe [7/17/2008 8:16 AM 2719744]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [5/16/2008 1:00 PM 21920]
S1 SASDIFSV;SASDIFSV;\??\c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASDIFSV.SYS --> c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASKUTIL.sys --> c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASKUTIL.sys [?]
S2 gupdate1ca47aa167a4e4;Google Update Service (gupdate1ca47aa167a4e4);c:\program files\Google\Update\GoogleUpdate.exe [10/7/2009 6:57 PM 133104]
S2 upxye;upxye;c:\windows\system32\drivers\mxgl.sys [10/20/2009 7:17 AM 0]
S3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\system32\drivers\ASPI32.SYS [10/6/2007 1:13 AM 16512]
S3 BW2NDIS5;BW2NDIS5;c:\windows\system32\Drivers\BW2NDIS5.sys --> c:\windows\system32\Drivers\BW2NDIS5.sys [?]
S3 mfsdisk;mfsdisk;c:\windows\system32\mfsdisk.sys [8/4/2004 7:00 AM 2304]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 pnicml;pnicml;\??\c:\docume~1\COMPAQ~1\LOCALS~1\Temp\pnicml.sys --> c:\docume~1\COMPAQ~1\LOCALS~1\Temp\pnicml.sys [?]
S3 samhid;samhid;c:\windows\system32\drivers\Samhid.sys [10/1/2007 3:33 AM 7548]
S3 SASENUM;SASENUM;\??\c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASENUM.SYS --> c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASENUM.SYS [?]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [4/1/2009 1:28 AM 348752]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - MBR
*Deregistered* - mbr

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.Net CLR REG_MULTI_SZ .Net CLR

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
BtwSrv
.
Contents of the 'Scheduled Tasks' folder

2009-11-09 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 19:57]

2009-11-11 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-10-07 23:57]

2009-11-11 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-10-07 23:57]

2008-05-15 c:\windows\Tasks\Microsoft_Hardware_Launch_IPoint_exe.job
- c:\program files\Microsoft IntelliPoint\ipoint.exe [2007-08-31 19:01]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = 127.0.0.1
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
IE: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
IE: &Yahoo! Search - file:///c:\program files\Yahoo!\Common/ycsrch.htm
IE: Add To Compaq Organize... - c:\progra~1\HEWLET~1\COMPAQ~1\bin/module.main/favorites\ie_add_to.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
IE: Save Flash - c:\program files\UnH Solutions\Flash Saving Plugin\FlashSButton.dll/210
IE: Save YouTube Video - c:\program files\UnH Solutions\Flash Saving Plugin\FlashSButton.dll/217
IE: SWF Capture tool - c:\program files\Eltima Software\Flash Decompiler\iebt.html
IE: Yahoo! &Dictionary - file:///c:\program files\Yahoo!\Common/ycdict.htm
IE: Yahoo! &Maps - file:///c:\program files\Yahoo!\Common/ycmap.htm
IE: Yahoo! &SMS - file:///c:\program files\Yahoo!\Common/ycsms.htm
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
FF - ProfilePath - c:\documents and settings\Compaq_Owner\Application Data\Mozilla\Firefox\Profiles\lnoykkb9.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.yahoo.com/search?fr=ffsp1&p=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=ffds1&p=
FF - component: c:\program files\ArcSoft\Media Converter for Philips\Internet Video Downloader\Plugin_FireFox\components\nsURLRecordEx.dll
FF - plugin: c:\documents and settings\Compaq_Owner\My Documents\Sparkplay Media\Sparkplayer (Beta)\npSparkPlayerNS.dll
FF - plugin: c:\progra~1\Yahoo!\Common\npyaxmpb.dll
FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiautoinstallpluginff.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiCHPlugin.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiFFPlugin1.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npOGAPlugin.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npPandoWebInst.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-Ojumaxuwibiqoref - c:\windows\uzejehulalih.dll
HKLM-Run-PCDrProfiler - (no file)
HKU-Default-Run-wynB.tmp.exe - c:\windows\system32\wynB.tmp.exe
SharedTaskScheduler-{45d1940c-37b5-441d-8e25-e59fe34730ad} - c:\windows\system32\nepivoyi.dll
SharedTaskScheduler-{1e22f887-2cef-4862-a828-29424e6b047f} - c:\windows\system32\nunupofa.dll
SharedTaskScheduler-{3c87b2df-0a5e-4e4f-8b06-5639c960b418} - c:\windows\system32\hegubagu.dll
SSODL-mejofurag-{1e22f887-2cef-4862-a828-29424e6b047f} - c:\windows\system32\nunupofa.dll
SSODL-buzehatuz-{45d1940c-37b5-441d-8e25-e59fe34730ad} - c:\windows\system32\nepivoyi.dll
SSODL-wayodugaw-{3c87b2df-0a5e-4e4f-8b06-5639c960b418} - c:\windows\system32\hegubagu.dll
AddRemove-AC Tool - c:\progra~1\ACTOOL~1\UNWISE.EXE
AddRemove-ACE-HIGH MP3 WAV WMA OGG Converter - c:\progra~1\ACE-HI~1\UNWISE.EXE
AddRemove-Activision_CSTUninstallKey - l:\progra~1\ACTIVI~1\CRUISE~1\UNINST~1\UNINST~1.EXE
AddRemove-Alt WAV MP3 WMA OGG Converter 6.0 Shareware_is1 - c:\program files\Alt WAV MP3 WMA OGG Converter\unins000.exe
AddRemove-Hospital - c:\program files\Bullfrog\Hospital\DeIsL1.isu
AddRemove-Network Addon Mod - c:\documents and settings\Compaq_Owner\My Documents\SimCity 4\Plugins\Network Addon Mod\uninst.exe
AddRemove-SimCopterv1.0 - c:\program files\Maxis\SimCopter\DeIsL1.isu
AddRemove-Win Police Pro - c:\program files\Windows Police Pro\AntiSpyware_Uninstall.exe
AddRemove-ijji.com - c:\ijji\ENGLISH\ijjiUninstall.exe
AddRemove-Upshift StrikeRacer - l:\program files\gPotato\Upshift StrikeRacer\uninst.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-11-11 02:00
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
LXCGCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A56F5F0]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\atapi -> 0x8a56f5f0
\Driver\iaStor -> 0x8a50d1e8
Warning: possible MBR rootkit infection !
user & kernel MBR OK
Use "Recovery Console" command "fixmbr" to clear infection !

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{e93fe38f-6977-482d-88a9-361454adb39e}\InprocServer32]
@DACL=(02 0000)
@="c:\\windows\\system32\\telemize.dll"
"ThreadingModel"="Both"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(504)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3776)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
c:\program files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\nexon\Mabinogi\npkcmsvc.exe
c:\windows\system32\PnkBstrA.exe
c:\windows\system32\PnkBstrB.exe
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\program files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac
c:\program files\Viewpoint\Viewpoint Manager\ViewMgr.exe
c:\windows\system32\msiexec.exe
c:\program files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
c:\windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
c:\\?\c:\windows\system32\WBEM\WMIADAP.EXE
c:\windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
.
**************************************************************************
.
Completion time: 2009-11-11 2:28 - machine was rebooted
ComboFix-quarantined-files.txt 2009-11-11 07:28

Pre-Run: 2,488,176,640 bytes free
Post-Run: 8,812,007,424 bytes free

- - End Of File - - 4812D373181EE80F78CA5D888AC75B64
--------------------------------------------------------------------------------------------------------

DDS.txt:
--------------------------------------------------------------------------------------------------------
DDS (Ver_09-10-26.01) - NTFSx86
Run by Compaq_Owner at 4:17:50.71 on Wed 11/11/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_01
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2238.1556 [GMT -5:00]

AV: Norton AntiVirus *On-access scanning enabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\FastNetSrv.exe
C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\Nexon\Mabinogi\npkcmsvc.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\windows\system32\csrs32.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe
C:\Program Files\Opera\opera.exe
C:\Program Files\Winamp\winamp.exe
C:\WINDOWS\system32\mspaint.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Compaq_Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.yahoo.com/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = 127.0.0.1
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
uURLSearchHooks: AOLTBSearch Class: {ea756889-2338-43db-8f07-d1ca6fb9c90d} - c:\program files\aol\aol toolbar 2.0\aoltb.dll
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn4\yt.dll
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn4\yt.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn4\yt.dll
TB: AOL Toolbar: {de9c389f-3316-41a7-809b-aa305ed9d922} - c:\program files\aol\aol toolbar 2.0\aoltb.dll
TB: Embarq Toolbar: {4e7bd74f-2b8d-469e-92be-bf2dfe9aae2c} - c:\progra~1\embarq~1\EMBARQ~1.DLL
TB: Viewpoint Toolbar: {f8ad5aa5-d966-4667-9daf-2561d68b2012} - c:\program files\common files\viewpoint\toolbar runtime\3.9.0\IEViewBar.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
TB: {C7768536-96F8-4001-B1A2-90EE21279187} - No File
uRun: [DAEMON Tools] "c:\program files\daemon tools\daemon.exe" -lang 1033
uRun: [Weather] c:\program files\aws\weatherbug\Weather.exe 1
uRun: [Messenger (Yahoo!)] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [Search Protection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [AIM] c:\program files\aim\aim.exe -cnetwait.odl
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [LXCGCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\LXCGtime.dll,_RunDLLEntry@16
mRun: [Symantec PIF AlertEng] "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\pifsvc.exe" /a /m "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\AlertEng.dll"
mRun: [RECGUARD] c:\windows\sminst\RECGUARD.EXE
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [FaxCenterServer] "c:\program files\lexmark fax solutions\fm3032.exe" /s
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [ArcSoft Connection Service] c:\program files\common files\arcsoft\connection service\bin\ACDaemon.exe
mRun: [WinampAgent] c:\program files\winamp\winampa.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [YSearchProtection] "c:\program files\yahoo!\search protection\SearchProtection.exe"
mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [csrs32] c:\windows\system32\csrs32.exe
mRun: [NetHelp] nethelp.exe
StartupFolder: c:\docume~1\compaq~1\startm~1\programs\startup\xfire.lnk - c:\program files\xfire\Xfire.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\philip~1.lnk - c:\program files\philips\gogear vibe device manager\GoGear_Vibe_DeviceManager.exe
IE: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-us\local\search.html
IE: &Yahoo! Search - file:///c:\program files\yahoo!\Common/ycsrch.htm
IE: Add To Compaq Organize... - c:\progra~1\hewlet~1\compaq~1\bin/module.main/favorites\ie_add_to.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: Save Flash - c:\program files\unh solutions\flash saving plugin\FlashSButton.dll/210
IE: Save YouTube Video - c:\program files\unh solutions\flash saving plugin\FlashSButton.dll/217
IE: SWF Capture tool - c:\program files\eltima software\flash decompiler\iebt.html
IE: Yahoo! &Dictionary - file:///c:\program files\yahoo!\Common/ycdict.htm
IE: Yahoo! &Maps - file:///c:\program files\yahoo!\Common/ycmap.htm
IE: Yahoo! &SMS - file:///c:\program files\yahoo!\Common/ycsms.htm
IE: {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - c:\program files\aim\aim.exe
IE: {E2D4D26B-0180-43a4-B05F-462D6D54C789} - c:\windows\pchealth\helpctr\vendors\cn=hewlett-packard,l=cupertino,s=ca,c=us\iebutton\support.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - c:\program files\yahoo!\messenger\YahooMessenger.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
IE: {3369AF0D-62E9-4bda-8103-B4C75499B578} - {DE9C389F-3316-41A7-809B-AA305ED9D922} - c:\program files\aol\aol toolbar 2.0\aoltb.dll
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\program files\yahoo!\common\yiesrvc.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_05-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} - hxxp://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\compaq~1\applic~1\mozilla\firefox\profiles\lnoykkb9.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.yahoo.com/search?fr=ffsp1&p=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=ffds1&p=
FF - component: c:\program files\arcsoft\media converter for philips\internet video downloader\plugin_firefox\components\nsURLRecordEx.dll
FF - plugin: c:\documents and settings\compaq_owner\my documents\sparkplay media\sparkplayer (beta)\npSparkPlayerNS.dll
FF - plugin: c:\progra~1\yahoo!\common\npyaxmpb.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npijjiautoinstallpluginff.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npijjiCHPlugin.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npijjiFFPlugin1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npOGAPlugin.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npPandoWebInst.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2009-3-31 206256]
R0 sfdrv01a;StarForce Protection Environment Driver (version 1.x.a);c:\windows\system32\drivers\sfdrv01a.sys [2006-7-5 63352]
R2 BtwSrv;BtwSrv;c:\windows\system32\svchost.exe -k netsvcs [2004-8-4 14336]
R2 fastnetsrv;fastnetsrv Service;c:\windows\system32\FastNetSrv.exe [2004-8-4 45056]
R2 FirebirdGuardianDefaultInstance;Firebird Guardian - DefaultInstance;c:\program files\firebird\firebird_2_1\bin\fbguard.exe [2008-7-17 81920]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2007-1-11 24652]
R2 YahooAUService;Yahoo! Updater;c:\program files\yahoo!\softwareupdate\YahooAUService.exe [2008-11-9 602392]
R3 FirebirdServerDefaultInstance;Firebird Server - DefaultInstance;c:\program files\firebird\firebird_2_1\bin\fbserver.exe [2008-7-17 2719744]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2008-5-16 21920]
S1 SASDIFSV;SASDIFSV;\??\c:\docume~1\admini~1\locals~1\temp\superas\sasdifsv.sys --> c:\docume~1\admini~1\locals~1\temp\superas\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\docume~1\admini~1\locals~1\temp\superas\saskutil.sys --> c:\docume~1\admini~1\locals~1\temp\superas\SASKUTIL.sys [?]
S2 gupdate1ca47aa167a4e4;Google Update Service (gupdate1ca47aa167a4e4);c:\program files\google\update\GoogleUpdate.exe [2009-10-7 133104]
S2 upxye;upxye;c:\windows\system32\drivers\mxgl.sys [2009-10-20 0]
S3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\system32\drivers\ASPI32.SYS [2007-10-6 16512]
S3 BW2NDIS5;BW2NDIS5;c:\windows\system32\drivers\bw2ndis5.sys --> c:\windows\system32\drivers\BW2NDIS5.sys [?]
S3 mfsdisk;mfsdisk;c:\windows\system32\mfsdisk.sys [2004-8-4 2304]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 pnicml;pnicml;\??\c:\docume~1\compaq~1\locals~1\temp\pnicml.sys --> c:\docume~1\compaq~1\locals~1\temp\pnicml.sys [?]
S3 rootrepeal;rootrepeal;\??\c:\windows\system32\drivers\rootrepeal.sys --> c:\windows\system32\drivers\rootrepeal.sys [?]
S3 samhid;samhid;c:\windows\system32\drivers\Samhid.sys [2007-10-1 7548]
S3 SASENUM;SASENUM;\??\c:\docume~1\admini~1\locals~1\temp\superas\sasenum.sys --> c:\docume~1\admini~1\locals~1\temp\superas\SASENUM.SYS [?]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-4-1 348752]

=============== Created Last 30 ================

2009-12-26 20:04:42 9377 ----a-w- c:\windows\system32\z9597worm699.bin
2009-12-25 20:33:19 11100 ----a-w- c:\windows\system32\91776spy685z.ocx
2009-12-20 05:23:58 3538 ----a-w- c:\windows\system32\9047not-a-v5rusz98.bin
2009-12-18 01:23:52 9714 ----a-w- c:\windows\system32\94677zot-5-virus28f.bin
2009-12-17 02:56:12 3941 ----a-w- c:\windows\system32\9559spy946z.exe
2009-12-15 07:21:31 13461 ----a-w- c:\windows\system32\29235spz587.ocx
2009-12-15 05:29:48 14627 ----a-w- c:\windows\system32\13215trzj912.ocx
2009-12-12 14:42:55 3859 ----a-w- c:\windows\system32\32247sp5m9oz4f.exe
2009-12-09 07:12:36 4764 ----a-w- c:\windows\system32\9769sz5ware2582.cpl
2009-12-06 23:21:26 3148 ----a-w- c:\windows\7513dow9loadez143.exe
2009-12-06 02:01:05 5729 ----a-w- c:\windows\system32\6996stezl2995.ocx
2009-12-05 07:02:09 9503 ----a-w- c:\windows\system32\392spz5are1590.bin
2009-12-04 23:22:46 5999 ----a-w- c:\windows\system32\fazaddware9259.dll
2009-12-04 03:41:43 6067 ----a-w- c:\windows\system32\1339tzr5at8924.exe
2009-11-24 22:05:24 14885 ----a-w- c:\windows\system32\19655vi9uz610.ocx
2009-11-18 23:45:53 18028 ----a-w- c:\windows\system32\16597viruszd9.ocx
2009-11-15 15:32:45 13269 ----a-w- c:\windows\system32\269899acztoo548d.cpl
2009-11-14 00:38:20 3530 ----a-w- c:\windows\system32\18z21h9c5toolbd.exe
2009-11-11 06:14:22 98816 ----a-w- c:\windows\sed.exe
2009-11-11 06:14:22 77312 ----a-w- c:\windows\MBR.exe
2009-11-11 06:14:22 267264 ----a-w- c:\windows\PEV.exe
2009-11-11 06:14:22 161792 ----a-w- c:\windows\SWREG.exe
2009-11-07 23:51:26 0 d-----w- c:\program files\Trend Micro
2009-11-01 13:38:31 120 ----a-w- c:\windows\Ksixeyeyogom.dat
2009-10-29 19:14:58 3851784 ----a-w- c:\windows\system32\D3DX9_39.dll
2009-10-29 19:14:50 0 d-----w- c:\windows\Logs
2009-10-26 23:15:11 0 d-----w- c:\program files\mIRC
2009-10-26 23:15:11 0 d-----w- c:\docume~1\compaq~1\applic~1\mIRC
2009-10-25 01:19:50 2547 ----a-w- c:\windows\system32\z59fth95at5383.dll
2009-10-24 22:57:02 11187 ----a-w- c:\windows\system32\363csza9se12325.ocx
2009-10-22 22:50:54 102800 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2009-10-22 22:29:29 0 d-----w- c:\program files\Windows Resource Kits
2009-10-22 15:13:17 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-10-22 00:55:06 0 d-----w- c:\docume~1\alluse~1\applic~1\65309225
2009-10-20 12:17:10 0 ----a-w- c:\windows\system32\drivers\mxgl.sys
2009-10-20 11:31:34 0 d-----w- C:\New Folder
2009-10-20 08:04:27 0 d-----w- C:\Incredible Machine 2, The
2009-10-20 07:04:11 0 d-----w- C:\UBCD4Win
2009-10-20 00:48:24 0 d-----w- c:\docume~1\alluse~1\applic~1\06579330
2009-10-19 01:59:32 7438 ----a-w- c:\windows\5d60thr9a522723z.ocx
2009-10-18 07:46:28 0 d-----w- c:\docume~1\alluse~1\applic~1\87695136
2009-10-18 02:47:37 3444 ----a-w- c:\windows\system32\573z1virus2af9.bin
2009-10-17 19:59:39 536293 ----a-w- c:\windows\system32\39bb5b.dll
2009-10-17 19:46:49 0 d-----w- c:\docume~1\alluse~1\applic~1\85227327
2009-10-17 19:04:57 0 ----a-w- c:\windows\Ixoroqibuzix.bin
2009-10-17 18:41:08 152 ----a-w- c:\windows\system32\api.reg
2009-10-17 18:41:05 20480 ----a-w- c:\windows\system32\csrs32.exe
2009-10-17 18:39:54 52736 ----a-w- C:\ojmrn.exe
2009-10-17 18:39:53 247808 ----a-w- C:\midelwlj.exe
2009-10-17 18:39:53 24576 ----a-w- C:\rdoums.exe
2009-10-17 18:39:53 157696 ----a-w- C:\hfghdgh.exe
2009-10-17 18:39:52 30208 ----a-w- C:\ngeisx.exe
2009-10-17 16:55:03 16745 ----a-w- c:\windows\system32\1a9cbzckd5or286.cpl

==================== Find3M ====================

2009-10-10 16:59:33 9933 ----a-w- c:\windows\6a455hiez979.dll
2009-10-06 13:41:20 4076 ----a-w- c:\windows\system32\3d99s5zal9127.exe
2009-10-03 18:04:56 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2009-10-03 14:55:06 13267 ----a-w- c:\windows\system32\30991hazkt59l18a.exe
2009-09-26 14:02:32 12037 ----a-w- c:\windows\system32\2cz5a5dwar91884.exe
2009-09-24 00:29:48 6566 ----a-w- c:\windows\7356sp5mbzt491.dll
2009-09-22 01:10:51 14126 ----a-w- c:\windows\system32\15728t9zj3d6.dll
2009-09-12 04:16:58 5637 ----a-w- c:\windows\z4428spamb5t939.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\dllcache\msv1_0.dll
2009-09-09 15:44:21 8613 ----a-w- c:\windows\system32\z09669ack5ool42b.exe
2009-09-08 11:35:52 12434 ----a-w- c:\windows\system32\1z69add95re2072.exe
2009-09-06 15:25:47 18330 ----a-w- c:\windows\system32\90945spy555z.exe
2009-09-05 17:08:20 262144 ----a-w- C:\ntuser.dat
2009-09-05 04:05:09 11695 ----a-w- c:\windows\system32\fe9zhreat7513.exe
2009-09-05 04:02:41 7189 ----a-w- c:\windows\system32\180czownloa5er13139.exe
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\dllcache\msasn1.dll
2009-09-03 00:51:29 3387 ----a-w- c:\windows\4z35stea92181.bin
2009-09-02 00:35:57 7806 ----a-w- c:\windows\3056vir9z27b.exe
2009-08-28 10:28:59 70656 ----a-w- c:\windows\system32\dllcache\ie4uinit.exe
2009-08-28 10:28:59 13824 ------w- c:\windows\system32\dllcache\ieudinit.exe
2009-08-27 06:48:08 4779 ----a-w- c:\windows\system32\5770dzwnloader591.exe
2009-08-27 05:18:44 634648 ----a-w- c:\windows\system32\dllcache\iexplore.exe
2009-08-27 05:18:41 161792 ----a-w- c:\windows\system32\dllcache\ieakui.dll
2009-08-26 09:16:52 3510 ----a-w- c:\windows\system32\9z04sp5ware1149.exe
2009-08-26 08:16:37 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-26 08:16:37 247326 ----a-w- c:\windows\system32\dllcache\strmdll.dll
2009-08-25 21:56:56 11260 ----a-w- c:\windows\system32\7f4cbackdoor9095z.dll
2009-08-23 14:28:29 9488 ----a-w- c:\windows\system32\59159py2z9.dll
2009-08-22 16:24:38 14677 ----a-w- c:\windows\system32\50zfs9eal550.exe
2009-08-18 10:01:29 6802 ----a-w- c:\windows\system32\5495virz455.bin
2009-08-15 13:40:45 4776 ----a-w- c:\windows\5322s9eal11z8.exe
2009-08-13 15:16:05 512000 ----a-w- c:\windows\system32\dllcache\jscript.dll
2006-02-24 05:39:41 22 -csha-w- c:\windows\sminst\HPCD.sys
2009-07-17 18:45:53 124928 --sha-w- c:\windows\system32\fuhazepi.exe
2009-07-17 18:45:54 137216 --sha-w- c:\windows\system32\karirabo.exe
2009-07-17 18:45:54 24576 --sha-w- c:\windows\system32\lusozawu.exe
2009-07-17 18:45:54 252928 --sha-w- c:\windows\system32\nikoloki.exe
2009-03-18 15:18:23 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009031820090319\index.dat

============= FINISH: 4:19:43.50 ===============
-----------------------------------------------------------------------------------------------------------------------------------

And the attached is attached as required.

Now, on to my issues.

For one, RKill ran, however, after doing a few things it simply shut off. I assume this is natural, and it ran at least; so I suppose it has finished. Anyways, my main issue however... is attempting to run Rootrepeal.

Any attempts result in an immediate lockup as the application under my Task Manager immediately begins sucking up memory, and CPU. Once it has maxed out, it locks up and I have to force a restart to fix it. If you have any suggestions on that, please inform me of what to do. It may be a corrupted file, in which case I will gladly redownload.
Also, I'm hoping that Combofix hasn't had any issues. For one, it continued to detect my defunct and already uninstalled Norton Antivirus as if it was currently active, even though I had removed it a while ago due to it becoming corrupt and no longer allowing me to access the program for any control. Secondly, when the computer had booted back up from the automatic restart Combofix had underwent, it told me not to activate any programs... however, my startup programs such as Yahoo and MSN and Winamp and the like all activated as normal and popped up. I would have modified the startup, however, I did not know it required restarting. Hopefully that will not affect it negatively in any way. Also, it stalled a few times and I had to minimize the window in order for it to function.

Anyways, I have yet to detect any new issues in my computer. I wanted to know, if say... one has saved scanned files of important documents such as ones Social Security number under their Documents, as an image file; can that be downloaded by a backdoor trojan and sent to the "Hacker" in question? Or are normal image files with custom filenames ignored?

And also, I have my Visa Chase card implemented as a form of payment for Xbox Live points, however I haven't used it since 6/6/2009, and do not have Gold that requires monthly membership payment. Can it still hijack my Visa and use it for illegitimate purchases, even though I haven't used it since this infection has presumably popped up?

Oh, and I have a Paypal account my father uses for eBay purchases. Same idea. It's used more commonly however due to him having more use for online purchases than myself.

Anyways, if it is alright I will attempt a scan using Spyware Doctor, as even though it is a trial it can still detect a large number of hostile programs like Rootkits. I can post the scan results on here as well if you'd like to see them. As I recall, the rootkit I DID have (Unsure if it may have regenerated already.) was completely wiped out by my own actions after a freeware app had detected a small crucial file to the whole kit, allowing the rest to be exposed for deletion. Even though the files are gone, the rootkits Registries still remain, and thus it still comes up as hostile under Spyware Doctor and a severe threat. I'm looking for how to clear the registries, as it will not allow me to delete them manually through RegEdit, but if you have any suggestions or want me to refrain from such actions I will.

Thank you for your time, I appreciate it deeply. :3

Oh, and EDIT: It will not allow me to upload the Attach.txt as a RAR file, though it told me after finishing the scan with DDS that I should upload it as so. If you require that I try with something else (I use WinRAR.), I'll remove the attachment and do so. So far I've simply uploaded it as a .txt file, apologies if that is not allowed. You did not specify when you told me to provide the attach.txt in my next post.

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,507 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:29 PM

Posted 13 November 2009 - 11:47 PM

Hello MadMrE,


or one, it continued to detect my defunct and already uninstalled Norton Antivirus as if it was currently active, even though I had removed it a while ago due to it becoming corrupt and no longer allowing me to access the program for any control.

The malware may have been the cause of Norton not working. Some malware disable your Antivirus and Antispyware programs. Having said this, there is some leftover Norton on your machine. Will get rid of it and I will give You a couple choices of Free Antivirus. I actually use one of these myself.

Anyways, if it is alright I will attempt a scan using Spyware Doctor,

Please make no changes or run other programs or download anything as I stated in my first post.
Doing so could hinder the cleaning process!

As for wanting to know about stealing of information.
Depending on when you where initially infected "any and all information you have stored or used your computer for could have been Sent to the hacker"

Now to the fix!

1.

Uninstall Norton


The following removal utility can be used to uninstall the program if the uninstall via Add/remove does not work:
  • Download the Norton Removal Tool to your desktop.
  • On the Windows desktop, double-click the Norton Removal Tool icon.
  • Follow the on-screen instructions.
    Note:Your computer may be restarted more than once, and you may be asked to repeat some steps after the computer restarts
Norton should now be removed from your PC.


For illustrated instructions please refer to here:
http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039

2.
We need to run a CFScript.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

Killall::

File::
c:\windows\system32\z9597worm699.bin
c:\windows\system32\91776spy685z.ocx
c:\windows\system32\9047not-a-v5rusz98.bin
c:\windows\system32\94677zot-5-virus28f.bin
c:\windows\system32\9559spy946z.exe
c:\windows\system32\29235spz587.ocx
c:\windows\system32\13215trzj912.ocx
c:\windows\system32\32247sp5m9oz4f.exe
c:\windows\system32\9769sz5ware2582.cpl
c:\windows\7513dow9loadez143.exe
c:\windows\system32\6996stezl2995.ocx
c:\windows\system32\392spz5are1590.bin
c:\windows\system32\fazaddware9259.dll
c:\windows\system32\1339tzr5at8924.exe
c:\windows\system32\19655vi9uz610.ocx
c:\windows\system32\16597viruszd9.ocx
c:\windows\system32\269899acztoo548d.cpl
c:\windows\system32\18z21h9c5toolbd.exe
c:\windows\Ksixeyeyogom.dat
c:\docume~1\compaq~1\applic~1\mIRC
c:\windows\system32\z59fth95at5383.dll
c:\windows\system32\363csza9se12325.ocx
c:\docume~1\alluse~1\applic~1\65309225
c:\docume~1\alluse~1\applic~1\06579330
c:\windows\5d60thr9a522723z.ocx
c:\docume~1\alluse~1\applic~1\87695136
c:\windows\system32\573z1virus2af9.bin
c:\windows\system32\39bb5b.dll
c:\docume~1\alluse~1\applic~1\85227327
c:\windows\Ixoroqibuzix.bin
c:\windows\system32\api.reg
C:\ojmrn.exe
C:\midelwlj.exe
C:\rdoums.exe
C:\hfghdgh.exe
C:\ngeisx.exe
c:\windows\system32\1a9cbzckd5or286.cpl
c:\windows\6a455hiez979.dll
c:\windows\system32\3d99s5zal9127.exe
c:\windows\system32\CmdLineExt03.dll
c:\windows\system32\30991hazkt59l18a.exe
c:\windows\system32\2cz5a5dwar91884.exe
c:\windows\7356sp5mbzt491.dll
c:\windows\system32\15728t9zj3d6.dll
c:\windows\z4428spamb5t939.dll
c:\windows\system32\z09669ack5ool42b.exe
c:\windows\system32\1z69add95re2072.exe
c:\windows\system32\90945spy555z.exe
c:\windows\system32\fe9zhreat7513.exe
c:\windows\system32\180czownloa5er13139.exe
c:\windows\4z35stea92181.bin
c:\windows\3056vir9z27b.exe
c:\windows\system32\5770dzwnloader591.exe
c:\windows\system32\9z04sp5ware1149.exe
c:\windows\system32\7f4cbackdoor9095z.dll
c:\windows\system32\59159py2z9.dll
c:\windows\system32\50zfs9eal550.exe
c:\windows\system32\5495virz455.bin
c:\windows\5322s9eal11z8.exe
c:\windows\system32\fuhazepi.exe
c:\windows\system32\karirabo.exe
c:\windows\system32\lusozawu.exe
c:\windows\system32\nikoloki.exe
c:\windows\system32\csrs32.exe
c:\windows\system32\drivers\mxgl.sys
c:\windows\system32\mfsdisk.sys
C:\WINDOWS\system32\FastNetSrv.exe
c:\docume~1\compaq~1\locals~1\temp\pnicml.sys
c:\windows\system32\telemize.dll
c:\windows\system32\nethelp.exe

Registry::
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NetHelp"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"csrs32"=-
HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=-
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=-
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=-

RegLockDel::
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{e93fe38f-6977-482d-88a9-361454adb39e}]

Driver::
mfsdisk
BtwSrv
upxye
fastnetsrv
pnicml

NetSvc::
BtwSrv

MBR::


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

3.
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

4.
  • Download and install an antivirus program, and make sure that you keep it updated
    New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
    Two good antivirus programs free for non-commercial home use are Avast! and Antivir
    Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
Things to include in your next reply:
Combofix.txt
Gmer log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,507 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:29 PM

Posted 15 November 2009 - 01:34 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 5-7 days the topic will need to be closed.

Thanks for understanding :(

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#8 kahdah

kahdah

  • Security Colleague
  • 11,138 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:29 PM

Posted 18 November 2009 - 06:55 PM

Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member with address of this thread. This applies only to the original topic starter. Everyone else please begin a New Topic.
Please do not pm for help, post it in the forums instead.

If I am helping you and have not responded for 48 hours please send me a pm as I don't always get notifications.

My help is always free, however, if you would like to make a donation to me for the help I have provided please click here Posted Image

#9 kahdah

kahdah

  • Security Colleague
  • 11,138 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:29 PM

Posted 19 November 2009 - 01:53 PM

Topic reopened per user's request.
Please do not pm for help, post it in the forums instead.

If I am helping you and have not responded for 48 hours please send me a pm as I don't always get notifications.

My help is always free, however, if you would like to make a donation to me for the help I have provided please click here Posted Image

#10 MadMrE

MadMrE
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:02:29 PM

Posted 20 November 2009 - 09:04 AM

Thank you.

I am responding from another computer right now to inform you that I have a slight issue with the GMER.

I will attempt to post the log from Combofix later, however for the GMER the scan times are ridiculous, and the computer is used by other members of the household. They have an unfortunate tendency to close the scanner out without bothering to save or ensure it is finished, and thus I'm forced to repeatedly rescan until I can remain on long enough to finish it. I will attempt to keep hold of the computer long enough to get that scan done, however I may not be able to if daily schedules and sheer unconcern for the repairing of this computer keep getting in my way.

Anyways, iExplore seems to no longer have hijack issues, however I've noticed gruelingly long load times for any attempt at accessing the "My Computer" directory... I can place C:\ or some other subfolder into the address and load them up instantly, however if I need to access a CD or virtual drive it takes forever to find the options... I'm not sure if this is virus oriented or what, it may be an issue with my Virtual CD's.

Anyways, please hang with me for a while here, schedules are keeping me rather busy so I cannot be online all the time... I will try to get both logs in within the next two days, tops.

#11 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,507 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:29 PM

Posted 20 November 2009 - 11:50 PM

Hello,

Post the logs when you can. However your Machine is not All clean yet. Surfing the net could lead to a reinfection until the machine is clean. Also can you please post a DDS log along with Combofix and Gmer logs.

Download DDS and save it to your desktop from here or here or here.
Disable any script blocker, and then double click dds.scr to run the tool.

* When done, DDS will open two (2) logs:

1. DDS.txt
2. Attach.txt

Save both reports to your desktop post the contents of the DDS.txt log. Save the other report incase I need to look at it later.

Edited by fireman4it, 20 November 2009 - 11:51 PM.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,507 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:29 PM

Posted 22 November 2009 - 12:52 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 5-7 days the topic will need to be closed.

Thanks for understanding :(

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 MadMrE

MadMrE
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:02:29 PM

Posted 23 November 2009 - 06:39 PM

Alright, finally managed to get onto this computer again.


DDS (Ver_09-10-26.01) - NTFSx86
Run by Compaq_Owner at 20:19:52.96 on Mon 11/23/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_01
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2238.1537 [GMT -5:00]


============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\Nexon\Mabinogi\npkcmsvc.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmctxth.exe
C:\documents and settings\all users\_qbothome\_qbotinj.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\Program Files\AWS\WeatherBug\Weather.exe
c:\program files\pure networks\network magic\nmapp.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac
c:\program files\internet explorer\iexplore.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Philips\GoGear VIBE Device Manager\GoGear_Vibe_DeviceManager.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmsrvc.exe
c:\documents and settings\all users\_qbothome\_qbotnti.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Compaq_Owner\Desktop\dds.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.yahoo.com/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = 127.0.0.1
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
uURLSearchHooks: AOLTBSearch Class: {ea756889-2338-43db-8f07-d1ca6fb9c90d} - c:\program files\aol\aol toolbar 2.0\aoltb.dll
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn4\yt.dll
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn4\yt.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn4\yt.dll
TB: AOL Toolbar: {de9c389f-3316-41a7-809b-aa305ed9d922} - c:\program files\aol\aol toolbar 2.0\aoltb.dll
TB: Embarq Toolbar: {4e7bd74f-2b8d-469e-92be-bf2dfe9aae2c} - c:\progra~1\embarq~1\EMBARQ~1.DLL
TB: Viewpoint Toolbar: {f8ad5aa5-d966-4667-9daf-2561d68b2012} - c:\program files\common files\viewpoint\toolbar runtime\3.9.0\IEViewBar.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
TB: {C7768536-96F8-4001-B1A2-90EE21279187} - No File
uRun: [DAEMON Tools] "c:\program files\daemon tools\daemon.exe" -lang 1033
uRun: [Weather] c:\program files\aws\weatherbug\Weather.exe 1
uRun: [Messenger (Yahoo!)] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [Search Protection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [AIM] c:\program files\aim\aim.exe -cnetwait.odl
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [LXCGCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\LXCGtime.dll,_RunDLLEntry@16
mRun: [RECGUARD] c:\windows\sminst\RECGUARD.EXE
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [FaxCenterServer] "c:\program files\lexmark fax solutions\fm3032.exe" /s
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [ArcSoft Connection Service] c:\program files\common files\arcsoft\connection service\bin\ACDaemon.exe
mRun: [WinampAgent] c:\program files\winamp\winampa.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [YSearchProtection] "c:\program files\yahoo!\search protection\SearchProtection.exe"
mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [nmctxth] "c:\program files\common files\pure networks shared\platform\nmctxth.exe"
mRun: [nmapp] "c:\documents and settings\all users\_qbothome\_qbotinj.exe" "c:\documents and settings\all users\_qbothome\_qbot.dll" /c "c:\program files\pure networks\network magic\nmapp.exe" -autorun -nosplash
StartupFolder: c:\docume~1\compaq~1\startm~1\programs\startup\xfire.lnk - c:\program files\xfire\Xfire.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\philip~1.lnk - c:\program files\philips\gogear vibe device manager\GoGear_Vibe_DeviceManager.exe
IE: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-us\local\search.html
IE: &Yahoo! Search - file:///c:\program files\yahoo!\Common/ycsrch.htm
IE: Add To Compaq Organize... - c:\progra~1\hewlet~1\compaq~1\bin/module.main/favorites\ie_add_to.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: Save Flash - c:\program files\unh solutions\flash saving plugin\FlashSButton.dll/210
IE: Save YouTube Video - c:\program files\unh solutions\flash saving plugin\FlashSButton.dll/217
IE: SWF Capture tool - c:\program files\eltima software\flash decompiler\iebt.html
IE: Yahoo! &Dictionary - file:///c:\program files\yahoo!\Common/ycdict.htm
IE: Yahoo! &Maps - file:///c:\program files\yahoo!\Common/ycmap.htm
IE: Yahoo! &SMS - file:///c:\program files\yahoo!\Common/ycsms.htm
IE: {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - c:\program files\aim\aim.exe
IE: {E2D4D26B-0180-43a4-B05F-462D6D54C789} - c:\windows\pchealth\helpctr\vendors\cn=hewlett-packard,l=cupertino,s=ca,c=us\iebutton\support.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - c:\program files\yahoo!\messenger\YahooMessenger.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
IE: {3369AF0D-62E9-4bda-8103-B4C75499B578} - {DE9C389F-3316-41A7-809B-AA305ED9D922} - c:\program files\aol\aol toolbar 2.0\aoltb.dll
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\program files\yahoo!\common\yiesrvc.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_05-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CD995117-98E5-4169-9920-6C12D4C0B548} - hxxp://gamedownload.ijjimax.com/gamedownload/dist/hgstart/HGPlugin9USA.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} -
Handler: pure-go - {4746C79A-2042-4332-8650-48966E44ABA8} - c:\program files\common files\pure networks shared\platform\puresp4.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\compaq~1\applic~1\mozilla\firefox\profiles\lnoykkb9.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.yahoo.com/search?fr=ffsp1&p=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=ffds1&p=
FF - component: c:\program files\arcsoft\media converter for philips\internet video downloader\plugin_firefox\components\nsURLRecordEx.dll
FF - plugin: c:\documents and settings\compaq_owner\my documents\sparkplay media\sparkplayer (beta)\npSparkPlayerNS.dll
FF - plugin: c:\progra~1\yahoo!\common\npyaxmpb.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npijjiautoinstallpluginff.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npijjiCHPlugin.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npijjiFFPlugin1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npOGAPlugin.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npPandoWebInst.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2009-3-31 206256]
R0 sfdrv01a;StarForce Protection Environment Driver (version 1.x.a);c:\windows\system32\drivers\sfdrv01a.sys [2006-7-5 63352]
R2 FirebirdGuardianDefaultInstance;Firebird Guardian - DefaultInstance;c:\program files\firebird\firebird_2_1\bin\fbguard.exe [2008-7-17 81920]
R2 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-4-1 348752]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2007-1-11 24652]
R2 YahooAUService;Yahoo! Updater;c:\program files\yahoo!\softwareupdate\YahooAUService.exe [2008-11-9 602392]
R3 FirebirdServerDefaultInstance;Firebird Server - DefaultInstance;c:\program files\firebird\firebird_2_1\bin\fbserver.exe [2008-7-17 2719744]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2008-5-16 21920]
S1 SASDIFSV;SASDIFSV;\??\c:\docume~1\admini~1\locals~1\temp\superas\sasdifsv.sys --> c:\docume~1\admini~1\locals~1\temp\superas\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\docume~1\admini~1\locals~1\temp\superas\saskutil.sys --> c:\docume~1\admini~1\locals~1\temp\superas\SASKUTIL.sys [?]
S2 gupdate1ca47aa167a4e4;Google Update Service (gupdate1ca47aa167a4e4);c:\program files\google\update\GoogleUpdate.exe [2009-10-7 133104]
S3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\system32\drivers\ASPI32.SYS [2007-10-6 16512]
S3 BW2NDIS5;BW2NDIS5;c:\windows\system32\drivers\bw2ndis5.sys --> c:\windows\system32\drivers\BW2NDIS5.sys [?]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 samhid;samhid;c:\windows\system32\drivers\Samhid.sys [2007-10-1 7548]
S3 SASENUM;SASENUM;\??\c:\docume~1\admini~1\locals~1\temp\superas\sasenum.sys --> c:\docume~1\admini~1\locals~1\temp\superas\SASENUM.SYS [?]

=============== Created Last 30 ================

2009-11-21 16:54:19 3501 ----a-w- c:\windows\system32\sconnect.js
2009-11-20 05:00:35 0 d-----w- c:\documents and settings\all users\_qbothome
2009-11-17 16:15:02 54156 ---ha-w- c:\windows\QTFont.qfn
2009-11-17 16:15:02 1409 ----a-w- c:\windows\QTFont.for
2009-11-17 12:49:01 0 d-----w- c:\program files\Pure Networks
2009-11-17 12:48:13 23984 ----a-w- c:\windows\system32\drivers\pnarp.sys
2009-11-17 12:48:07 25264 ----a-w- c:\windows\system32\drivers\purendis.sys
2009-11-17 12:47:59 0 d-----w- c:\program files\common files\Pure Networks Shared
2009-11-17 12:47:31 0 d-----w- c:\docume~1\alluse~1\applic~1\Pure Networks
2009-11-16 22:18:40 0 d-----w- c:\program files\Linksys
2009-11-16 22:13:26 0 d-----w- c:\program files\WebEx
2009-11-16 22:06:08 94208 ----a-w- c:\windows\system32\GTW32N50.dll
2009-11-16 22:06:08 31930 ----a-w- c:\windows\system32\GTNDIS3.VXD
2009-11-16 22:06:08 15872 ----a-w- c:\windows\system32\GTNDIS5.sys
2009-11-12 15:51:43 14848 ----a-w- c:\windows\system32\fc.exe
2009-11-12 15:51:43 14848 ----a-w- c:\windows\system32\dllcache\fc.exe
2009-11-12 08:17:34 163 ----a-w- c:\windows\win.ini
2009-11-12 08:14:01 0 d-----w- c:\windows\system32\MpEngineStore
2009-11-11 06:14:22 98816 ----a-w- c:\windows\sed.exe
2009-11-11 06:14:22 77312 ----a-w- c:\windows\MBR.exe
2009-11-11 06:14:22 260608 ----a-w- c:\windows\PEV.exe
2009-11-11 06:14:22 161792 ----a-w- c:\windows\SWREG.exe
2009-11-07 23:51:26 0 d-----w- c:\program files\Trend Micro
2009-10-29 19:14:58 3851784 ----a-w- c:\windows\system32\D3DX9_39.dll
2009-10-29 19:14:50 0 d-----w- c:\windows\Logs
2009-10-26 23:15:11 0 d-----w- c:\program files\mIRC
2009-10-26 23:15:11 0 d-----w- c:\docume~1\compaq~1\applic~1\mIRC

==================== Find3M ====================

2009-10-22 22:50:53 102800 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2009-10-21 14:11:37 7933 ----a-w- c:\windows\system32\680aback5ooz992.bin
2009-10-21 14:11:34 9549 ----a-w- c:\windows\system32\z5679t5oj699.bin
2009-10-21 14:11:34 8790 ----a-w- c:\windows\system32\6e02thief975z.dll
2009-10-21 14:11:34 2724 ----a-w- c:\windows\system32\bc9vi589z.exe
2009-10-21 14:11:33 8203 ----a-w- c:\windows\system32\9999v5r57z.bin
2009-10-21 14:11:33 3562 ----a-w- c:\windows\system32\9z6athief2245.exe
2009-10-21 14:11:32 3188 ----a-w- c:\windows\system32\7889zt5al2608.bin
2009-10-21 14:11:32 2622 ----a-w- c:\windows\system32\65275ownl9ader7z5.exe
2009-10-21 04:08:54 3598336 ----a-w- c:\windows\system32\dllcache\mshtml.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\dllcache\msv1_0.dll
2009-09-05 17:08:20 262144 ----a-w- C:\ntuser.dat
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\dllcache\msasn1.dll
2009-08-28 10:28:59 70656 ----a-w- c:\windows\system32\dllcache\ie4uinit.exe
2009-08-28 10:28:59 13824 ------w- c:\windows\system32\dllcache\ieudinit.exe
2009-08-27 05:18:44 634648 ----a-w- c:\windows\system32\dllcache\iexplore.exe
2009-08-27 05:18:41 161792 ----a-w- c:\windows\system32\dllcache\ieakui.dll
2009-08-26 08:16:37 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-26 08:16:37 247326 ----a-w- c:\windows\system32\dllcache\strmdll.dll
2006-02-24 05:39:41 22 -csha-w- c:\windows\sminst\HPCD.sys
2009-03-18 15:18:23 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009031820090319\index.dat

============= FINISH: 20:21:34.21 ===============

Attached Files


Edited by MadMrE, 23 November 2009 - 08:23 PM.


#14 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,507 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:29 PM

Posted 24 November 2009 - 10:31 PM

Hello MadMre

I can't stress the importance of using this computer before it is all clean. Also taking 3 or 4 days between replies and using your machine is more or less wasting my time as it is yours. As you have been reinfected.

1.
Please delete the copy of Combofix you have and download a fresh copy to your desktop from one of the following locations:
Then proceed with the step below for running a CfScript.

Link 1
Link 2

2.
We need to run a CFScript.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

Killall::

Rootkit::
c:\windows\system32\680aback5ooz992.bin
c:\windows\system32\z5679t5oj699.bin
c:\windows\system32\6e02thief975z.dll
c:\windows\system32\bc9vi589z.exe
c:\windows\system32\9999v5r57z.bin
c:\windows\system32\9z6athief2245.exe
c:\windows\system32\7889zt5al2608.bin
c:\windows\system32\65275ownl9ader7z5.exe

Folder::
C:\documents and settings\all users\_qbothome

Registry::
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"nmapp"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"C7768536-96F8-4001-B1A2-90EE21279187"=-


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

3.
Viewpoint Manager is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". This changed from what we know in 2006 read this article:

http://www.clickz.com/news/article.php/3561546

I suggest you remove the program now. Click on start > run > and then paste the following into the "open" field: appwiz.cpl and press OK. From within Add or Remove Programs uninstall the following if they exist: Viewpoint, Viewpoint Manager, Viewpoint Media Player,Viewpoint Toolbar.

4.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
Note for Vista Users: Eset is compatible but Internet Explorer must be run as Administrator. To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select "Run as Administrator" from the context menu.)
Posted Image
You can refer to this short video by: neomage
**Note**
To optimize scanning time and produce a more sensible report for review:
  • Close any open programs
  • Turn off the real time scanner of any existing antivirus program while performing the online scan.
5.
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.



Things to include in your next reply:
Combofix.txt
Eset .log
Gmer.log
How is your amchine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#15 MadMrE

MadMrE
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:02:29 PM

Posted 26 November 2009 - 01:22 AM

Apologies about using the computer, and spending a bit of time between responses...


Our computer is used as much as a library computer almost, my family seems to be unable to spend a day off of it without issue, so unfortunately it's near impossible to keep them from using it normally even though it may still be infected. I have attempted to stress the importance of not using it, however since I spend most of my days working it is difficult to ensure they do not use it too much. And that's also the reason for the long period between responses... when I get home I generally don't have a lot of time to myself, so it's difficult to log on if others are using the computer, or I get home late. And the other members of the household seem inept at cleaning it out as you suggest, so I can't really rely on them to do it for me.

So, apologies again for the wait and usage issues, hopefully these logs will give me an all clear so you can get back to helping others.


Anyways, for the computer... iExplore no longer shows symptoms of hijacking and I have yet to hear another voice advertisement in the background, currently other than potentially dormant issues in the background that have yet to flare up my only issue is the My Computer directory, which seems to take excessively long periods of time to reveal all directories inside it. I have a couple virtual CD drives (Daemon Tools and MagicCD), I assume they may be the issue... but I'm not sure. It seems to be only My Computer, as typing in C:\ or some other My Computer directory to the address bar quickly accesses the stated directory without issue. If you have any suggestions on that subject, I'd be glad to hear them. It may be a virus though... I'm not sure if this forum is dedicated to virus removal as well.

Anyways, here are the logs:


ComboFix 09-11-25.01 - Compaq_Owner 11/25/2009 16:10.4.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2238.1721 [GMT -5:00]
Running from: c:\documents and settings\Compaq_Owner\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Compaq_Owner\Desktop\CFScript.txt
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\all users\_qbothome
c:\documents and settings\all users\_qbothome\_qbot.cb
c:\documents and settings\all users\_qbothome\_qbot.dll
c:\documents and settings\all users\_qbothome\_qbot_installed
c:\documents and settings\all users\_qbothome\_qbotinj.exe
c:\documents and settings\all users\_qbothome\_qbotnti.exe
c:\documents and settings\all users\_qbothome\~efd9452.tmp
c:\documents and settings\all users\_qbothome\msadvapi32.dll
c:\documents and settings\all users\_qbothome\nbl_Compaq_Owner.txt
c:\documents and settings\all users\_qbothome\ps_dump_Compaq_Owner.txt
c:\documents and settings\all users\_qbothome\q1.10131
c:\documents and settings\all users\_qbothome\seclog.txt
c:\documents and settings\all users\_qbothome\si.txt
c:\documents and settings\all users\_qbothome\updates.cb
c:\documents and settings\all users\_qbothome\we.js
c:\windows\system32\5b93spywa5e313z.cpl
c:\windows\system32\5c1dow9loader2906z.cpl
c:\windows\system32\5c3astezl97895.cpl
c:\windows\system32\5c59steal39z3.cpl
c:\windows\system32\5c5thiez2779.cpl
c:\windows\system32\5ce4z5eal199.cpl
c:\windows\system32\5dbvzr4935.dll
c:\windows\system32\5dc6dzwnload5r1479.ocx
c:\windows\system32\5e16t9reat97z5.bin
c:\windows\system32\5f00szywa9e583.bin
c:\windows\system32\5fbeste5z29579.exe
c:\windows\system32\5z962spambo911a.exe
c:\windows\system32\6015spazs9551.ocx
c:\windows\system32\6198not-azvirus7265.dll
c:\windows\system32\64bszyware5519.dll
c:\windows\system32\64fzs9ea5718.dll
c:\windows\system32\65275ownl9ader7z5.exe
c:\windows\system32\655zspy9are1315.bin
c:\windows\system32\6582spywzre1985.bin
c:\windows\system32\6587s9yz53.bin
c:\windows\system32\658ebackdooz194.dll
c:\windows\system32\6805dzw9loader1771.exe
c:\windows\system32\680aback5ooz992.bin
c:\windows\system32\6899threat28z975.dll
c:\windows\system32\68c0d59zloader1655.bin
c:\windows\system32\6959threat4973z.dll
c:\windows\system32\698fv5rz5269.dll
c:\windows\system32\698spywar5z39.exe
c:\windows\system32\6bz5thre5t92581.exe
c:\windows\system32\6c425ze9l273.exe
c:\windows\system32\6c49t9reaz12755.bin
c:\windows\system32\6d9eaddwar5z420.cpl
c:\windows\system32\6dz8s9eal225.ocx
c:\windows\system32\6e02thief975z.dll
c:\windows\system32\6e50stzal3977.dll
c:\windows\system32\6fd4addwzre28159.cpl
c:\windows\system32\6z94thr5at28094.ocx
c:\windows\system32\7034zhrea9261605.exe
c:\windows\system32\7147d9wnzoader5041.bin
c:\windows\system32\7472ad9w5rez642.dll
c:\windows\system32\75fazpy59re2294.bin
c:\windows\system32\7605spa59otzb.ocx
c:\windows\system32\7798addwar5z668.dll
c:\windows\system32\77c5viz9350.exe
c:\windows\system32\7889zt5al2608.bin
c:\windows\system32\7935steal2z4.dll
c:\windows\system32\79b39pywa5e507z.ocx
c:\windows\system32\7abste59z530.cpl
c:\windows\system32\7b81zownloa5e9550.bin
c:\windows\system32\7c729irz571.cpl
c:\windows\system32\7f395za9se2031.exe
c:\windows\system32\7f67st9z5720.exe
c:\windows\system32\7f995parsz633.cpl
c:\windows\system32\7z199pam5ot750.dll
c:\windows\system32\7z52wo9m1f5.cpl
c:\windows\system32\7z9295ief1659.bin
c:\windows\system32\7z96steal547.cpl
c:\windows\system32\8255hzcktoo9659.exe
c:\windows\system32\8566zpy979.bin
c:\windows\system32\8803vzrus5995.dll
c:\windows\system32\8847hackto955fbz.exe
c:\windows\system32\895zno5-a-virus91d.cpl
c:\windows\system32\9003h5ck9ozl374.bin
c:\windows\system32\90351spy653z.exe
c:\windows\system32\90c1sparse545z.cpl
c:\windows\system32\91z85ac9tool3f.bin
c:\windows\system32\9251not-a-5irus666z.ocx
c:\windows\system32\9258viru9z35.dll
c:\windows\system32\92995tzoj6455.ocx
c:\windows\system32\93858viru518az.exe
c:\windows\system32\939z65acktool7f1.dll
c:\windows\system32\94644hacztool555.bin
c:\windows\system32\94964spz353.cpl
c:\windows\system32\95355troj776z.exe
c:\windows\system32\9551thzeat27990.ocx
c:\windows\system32\95748zi5us16e.cpl
c:\windows\system32\9576zir236.ocx
c:\windows\system32\95832tro523z.exe
c:\windows\system32\963szeal13995.ocx
c:\windows\system32\9695ztroj6e2.ocx
c:\windows\system32\9749ha9zto5l649.exe
c:\windows\system32\9759zirus656.exe
c:\windows\system32\977z9ir5s49.exe
c:\windows\system32\98805spambot25z.ocx
c:\windows\system32\99371viz5s193.dll
c:\windows\system32\99435rzj505.exe
c:\windows\system32\99599py4z35.bin
c:\windows\system32\9963tro57z5.ocx
c:\windows\system32\9975zackdo5r2965.exe
c:\windows\system32\9999v5r57z.bin
c:\windows\system32\9cazt5ief2213.exe
c:\windows\system32\9cesz59l1039.dll
c:\windows\system32\9de7sparze9015.bin
c:\windows\system32\9f48dzwn5oader287.bin
c:\windows\system32\9z6athief2245.exe
c:\windows\system32\a5a5pa9se35z.cpl
c:\windows\system32\ba5zddware1459.ocx
c:\windows\system32\bc9vi589z.exe
c:\windows\system32\BtwSrv.dll
c:\windows\system32\c23spar95235z.cpl
c:\windows\system32\c97threat2615z.cpl
c:\windows\system32\d2z5i91527.cpl
c:\windows\system32\da9t9zef3035.ocx
c:\windows\system32\ec45hz9f1815.exe
c:\windows\system32\eeczhr5at9961.bin
c:\windows\system32\lsm32.sys
c:\windows\system32\opeia.exe
c:\windows\system32\wmdtc.exe
c:\windows\system32\z1633hackto9l4765.cpl
c:\windows\system32\z2353s953d3.cpl
c:\windows\system32\z323sp5921.exe
c:\windows\system32\z4236w5rm4d9.cpl
c:\windows\system32\z5594not-a-virus45f.exe
c:\windows\system32\z564wor92d6.ocx
c:\windows\system32\z5679t5oj699.bin
c:\windows\system32\z644ha9kt5ol2d3.dll
c:\windows\system32\z69249irus5e5.ocx
c:\windows\system32\z8939ha5kt9ol496.dll
c:\windows\system32\z895hac5tool45d.ocx
c:\windows\system32\za42sp5rse1589.ocx
c:\windows\system32\zc05hreat9294.ocx
c:\windows\system32\zc5spar5e2519.dll
c:\windows\system32\ze11spar5e9489.exe
c:\windows\system32\zf7daddware91935.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ANTIPPRO2009_100


((((((((((((((((((((((((( Files Created from 2009-10-25 to 2009-11-25 )))))))))))))))))))))))))))))))
.

2009-11-25 21:03 . 2009-11-25 21:41 -------- d-----w- \ComboFix
2009-11-17 12:49 . 2009-11-17 12:49 -------- d-----w- c:\program files\Pure Networks
2009-11-17 12:47 . 2009-11-17 12:47 -------- d-----w- c:\program files\Common Files\Pure Networks Shared
2009-11-17 12:47 . 2009-02-03 00:23 30418224 ----a-r- c:\documents and settings\All Users\Application Data\Pure Networks\Setup\nmsetup.exe
2009-11-17 12:47 . 2009-11-17 12:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Pure Networks
2009-11-16 22:18 . 2009-11-17 13:18 -------- d-----w- c:\program files\Linksys
2009-11-16 22:13 . 2009-11-16 22:13 -------- d-----w- c:\program files\WebEx
2009-11-07 23:51 . 2009-11-07 23:51 -------- d-----w- c:\program files\Trend Micro
2009-11-07 23:45 . 2009-11-25 21:40 -------- d---a-w- \Qoobox
2009-10-29 19:25 . 2009-10-29 19:25 -------- d-----w- c:\documents and settings\Compaq_Owner\Local Settings\Application Data\Opera
2009-10-29 19:24 . 2009-10-29 19:24 -------- d-----w- c:\program files\Opera
2009-10-29 19:14 . 2009-10-29 19:14 -------- d-----w- c:\windows\Logs
2009-10-29 04:24 . 2009-10-29 04:24 -------- d-----w- c:\documents and settings\LocalService\Application Data\AdobeUM
2009-10-26 23:15 . 2009-10-30 07:08 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\mIRC
2009-10-26 23:15 . 2009-10-30 07:08 -------- d-----w- c:\program files\mIRC

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-11-25 21:41 . 2009-03-28 06:28 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-11-25 20:40 . 2009-03-24 22:52 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\EMBARQTOOLBAR
2009-11-25 12:40 . 2006-02-20 04:04 56536 -c--a-w- c:\documents and settings\Compaq_Owner\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-11-23 09:21 . 2006-04-05 00:08 -------- d-----w- c:\program files\Lx_cats
2009-11-17 12:48 . 2009-11-16 22:13 8673792 ----a-w- c:\documents and settings\All Users\Application Data\atscie.msi
2009-11-16 22:06 . 2005-11-14 15:02 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-15 07:55 . 2006-07-03 10:36 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\Xfire
2009-11-15 04:51 . 2005-11-14 15:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-11-15 04:51 . 2005-11-14 15:41 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-11-11 06:46 . 2009-08-18 12:17 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\Logs
2009-11-11 06:01 . 2009-05-08 23:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-10-28 14:05 . 2008-08-01 03:27 -------- d-----w- c:\program files\Trillian
2009-10-26 11:33 . 2009-03-31 05:07 -------- d-----w- c:\program files\Spyware Doctor
2009-10-22 22:29 . 2009-10-22 22:29 -------- d-----w- c:\program files\Windows Resource Kits
2009-10-22 15:14 . 2009-10-22 15:13 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-10-22 15:13 . 2009-10-22 15:13 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-10-22 15:13 . 2009-10-22 15:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2009-10-22 14:38 . 2009-10-22 00:55 -------- d-----w- c:\documents and settings\All Users\Application Data\65309225
2009-10-20 09:10 . 2009-10-20 00:48 -------- d-----w- c:\documents and settings\All Users\Application Data\06579330
2009-10-19 06:50 . 2009-10-19 06:50 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-10-18 10:06 . 2009-10-18 07:46 -------- d-----w- c:\documents and settings\All Users\Application Data\87695136
2009-10-18 03:02 . 2009-08-18 22:56 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-18 02:49 . 2009-10-17 19:46 -------- d-----w- c:\documents and settings\All Users\Application Data\85227327
2009-10-09 18:44 . 2008-03-15 06:26 -------- d-----w- c:\program files\FREE Hi-Q Recorder
2009-10-09 16:08 . 2009-10-09 15:07 58 ----a-w- c:\windows\wp4.dat
2009-10-09 16:08 . 2009-10-09 15:07 4 ----a-w- c:\windows\wp3.dat
2009-10-08 00:50 . 2009-10-08 00:44 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\vlc
2009-10-08 00:43 . 2009-10-08 00:43 -------- d-----w- c:\program files\VideoLAN
2009-10-08 00:24 . 2009-10-08 00:24 -------- d-----w- c:\program files\AviSynth 2.5
2009-10-08 00:24 . 2009-10-08 00:24 -------- d-----w- c:\program files\Gabest
2009-10-08 00:15 . 2009-10-08 00:15 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\DivX
2009-10-08 00:01 . 2005-11-14 15:39 -------- d-----w- c:\program files\Google
2009-10-07 23:59 . 2006-09-06 23:29 -------- d-----w- c:\program files\DivX
2009-10-07 23:58 . 2009-10-07 23:57 -------- d-----w- c:\program files\Common Files\DivX Shared
2009-10-04 19:36 . 2009-10-04 19:36 -------- d-----w- c:\documents and settings\LocalService\Application Data\Apple Computer
2009-10-03 03:41 . 2006-04-05 00:03 -------- d-----w- c:\program files\Lexmark 2300 Series
2009-09-30 16:09 . 2006-04-13 12:33 -------- d-----w- c:\documents and settings\Compaq_Owner\Application Data\uTorrent
2009-09-05 17:08 . 2009-09-05 17:08 262144 ----a-w- C:\ntuser.dat
2009-09-05 17:08 . 2009-09-05 17:08 262144 ----a-w- \ntuser.dat
2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
2006-02-24 05:39 . 2006-02-24 05:39 22 -csha-w- c:\windows\SMINST\HPCD.sys
.

((((((((((((((((((((((((((((( SnapShot_2009-11-18_22.50.28 )))))))))))))))))))))))))))))))))))))))))
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DAEMON Tools"="c:\program files\DAEMON Tools\daemon.exe" [2007-04-03 165784]
"Weather"="c:\program files\AWS\WeatherBug\Weather.exe" [2007-08-29 1347584]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2009-05-27 4351216]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-23 111856]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-11-14 68856]
"AIM"="c:\program files\AIM\aim.exe" [2006-08-01 67112]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LXCGCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll" [2005-07-20 73728]
"RECGUARD"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-23 237568]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 59392]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"FaxCenterServer"="c:\program files\Lexmark Fax Solutions\fm3032.exe" [2005-07-12 299008]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2005-11-14 180269]
"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2009-10-10 203264]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2007-05-14 35328]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-23 111856]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-14 344064]
"ISTray"="c:\program files\Spyware Doctor\pctsTray.exe" [2009-09-04 1181064]
"nmctxth"="c:\program files\Common Files\Pure Networks Shared\Platform\nmctxth.exe" [2008-12-12 642856]

c:\documents and settings\Default User\Start Menu\Programs\Startup\
Pin.lnk - c:\hp\bin\CLOAKER.EXE [2005-11-14 27136]

c:\documents and settings\Administrator\Start Menu\Programs\Startup\
Pin.lnk - c:\hp\bin\CLOAKER.EXE [2005-11-14 27136]

c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\
Xfire.lnk - c:\program files\Xfire\Xfire.exe [2006-12-15 2337360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Philips GoGear VIBE Device Manager.lnk - c:\program files\Philips\GoGear VIBE Device Manager\GoGear_Vibe_DeviceManager.exe [2009-7-24 1611152]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
@=""

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Compaq Connections.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Compaq Connections.lnk
backup=c:\windows\pss\Compaq Connections.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^EMBARQ Help.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\EMBARQ Help.lnk
backup=c:\windows\pss\EMBARQ Help.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^MagicDisc.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\MagicDisc.lnk
backup=c:\windows\pss\MagicDisc.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^RollerCoaster Tycoon 3 Registration.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\RollerCoaster Tycoon 3 Registration.lnk
backup=c:\windows\pss\RollerCoaster Tycoon 3 Registration.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^Sid Registration.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\Sid Registration.lnk
backup=c:\windows\pss\Sid Registration.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^Xfire.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\Xfire.lnk
backup=c:\windows\pss\Xfire.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Compaq_Owner^Start Menu^Programs^Startup^Yahoo! Widget Engine.lnk]
path=c:\documents and settings\Compaq_Owner\Start Menu\Programs\Startup\Yahoo! Widget Engine.lnk
backup=c:\windows\pss\Yahoo! Widget Engine.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Sierra\\SWAT 4\\Content\\System\\Swat4.exe"=
"c:\\Program Files\\AIM\\aim.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\AWS\\WeatherBug\\Weather.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Compaq Connections\\5577497\\Program\\Compaq Connections.exe"=
"c:\\Documents and Settings\\Compaq_Owner\\My Documents\\Alex\\utorrent.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Electronic Arts\\Battlefield 2142 Deluxe Edition\\BF2142.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Pando Networks\\Media Booster\\PMB.exe"=
"c:\\Program Files\\Google\\Update\\GoogleUpdate.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8097:TCP"= 8097:TCP:*:Disabled:EarthLink UHP Modem Support
"3389:TCP"= 3389:TCP:*:Disabled:@xpsp2res.dll,-22009
"58364:TCP"= 58364:TCP:Pando Media Booster
"58364:UDP"= 58364:UDP:Pando Media Booster
"67:UDP"= 67:UDP:DHCP Discovery Service

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [3/31/2009 12:08 AM 206256]
R0 sfdrv01a;StarForce Protection Environment Driver (version 1.x.a);c:\windows\system32\drivers\sfdrv01a.sys [7/5/2006 7:46 AM 63352]
R0 sptd;sptd;c:\windows\system32\drivers\sptd.sys [7/13/2007 1:53 AM 682232]
R2 FirebirdGuardianDefaultInstance;Firebird Guardian - DefaultInstance;c:\program files\Firebird\Firebird_2_1\bin\fbguard.exe [7/17/2008 8:16 AM 81920]
R2 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [4/1/2009 1:28 AM 348752]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [1/11/2007 6:59 AM 24652]
R3 FirebirdServerDefaultInstance;Firebird Server - DefaultInstance;c:\program files\Firebird\Firebird_2_1\bin\fbserver.exe [7/17/2008 8:16 AM 2719744]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [5/16/2008 1:00 PM 21920]
S1 SASDIFSV;SASDIFSV;\??\c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASDIFSV.SYS --> c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASKUTIL.sys --> c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASKUTIL.sys [?]
S2 gupdate1ca47aa167a4e4;Google Update Service (gupdate1ca47aa167a4e4);c:\program files\Google\Update\GoogleUpdate.exe [10/7/2009 6:57 PM 133104]
S3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\system32\drivers\ASPI32.SYS [10/6/2007 1:13 AM 16512]
S3 BW2NDIS5;BW2NDIS5;c:\windows\system32\Drivers\BW2NDIS5.sys --> c:\windows\system32\Drivers\BW2NDIS5.sys [?]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 samhid;samhid;c:\windows\system32\drivers\Samhid.sys [10/1/2007 3:33 AM 7548]
S3 SASENUM;SASENUM;\??\c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASENUM.SYS --> c:\docume~1\ADMINI~1\LOCALS~1\Temp\superas\SASENUM.SYS [?]

--- Other Services/Drivers In Memory ---

*Deregistered* - mchInjDrv

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.Net CLR REG_MULTI_SZ .Net CLR
.
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.yahoo.com/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = 127.0.0.1
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
IE: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
IE: &Yahoo! Search - file:///c:\program files\Yahoo!\Common/ycsrch.htm
IE: Add To Compaq Organize... - c:\progra~1\HEWLET~1\COMPAQ~1\bin/module.main/favorites\ie_add_to.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
IE: Save Flash - c:\program files\UnH Solutions\Flash Saving Plugin\FlashSButton.dll/210
IE: Save YouTube Video - c:\program files\UnH Solutions\Flash Saving Plugin\FlashSButton.dll/217
IE: SWF Capture tool - c:\program files\Eltima Software\Flash Decompiler\iebt.html
IE: Yahoo! &Dictionary - file:///c:\program files\Yahoo!\Common/ycdict.htm
IE: Yahoo! &Maps - file:///c:\program files\Yahoo!\Common/ycmap.htm
IE: Yahoo! &SMS - file:///c:\program files\Yahoo!\Common/ycsms.htm
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
FF - ProfilePath - c:\documents and settings\Compaq_Owner\Application Data\Mozilla\Firefox\Profiles\lnoykkb9.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.yahoo.com/search?fr=ffsp1&p=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=ffds1&p=
FF - component: c:\program files\ArcSoft\Media Converter for Philips\Internet Video Downloader\Plugin_FireFox\components\nsURLRecordEx.dll
FF - plugin: c:\documents and settings\Compaq_Owner\My Documents\Sparkplay Media\Sparkplayer (Beta)\npSparkPlayerNS.dll
FF - plugin: c:\progra~1\Yahoo!\Common\npyaxmpb.dll
FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiautoinstallpluginff.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiCHPlugin.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiFFPlugin1.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npOGAPlugin.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npPandoWebInst.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.
- - - - ORPHANS REMOVED - - - -

AddRemove-EMBARQ Help - c:\progra~1\VIRTUA~1\Uninstall.exe Sprint
AddRemove-Install WeatherBug - c:\hp\bin\cloaker.exe c:\hp\bin\commands.exe
AddRemove-mIRC - c:\program files\mIRC\uninstall.exe _?=c:\program files\mIRC
AddRemove-RealJukebox 1.0 - c:\program files\Common Files\Real\Update_OB\r1puninst.exe RealNetworks|RealPlayer|6.0
AddRemove-RealPlayer 6.0 - c:\program files\Common Files\Real\Update_OB\r1puninst.exe RealNetworks|RealPlayer|6.0
AddRemove-{91810AFC-A4F8-4EBA-A5AA-B198BBC81144} - c:\program files\InstallShield Installation Information\{91810AFC-A4F8-4EBA-A5AA-B198BBC81144}\setup.exe REMOVEALL



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-11-25 16:40
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
LXCGCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A4E5308]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xba90cfc3
\Driver\ACPI -> ACPI.sys @ 0xba67fcb8
\Driver\atapi -> 0x8a4e5308
\Driver\iaStor -> 0x8a50d1e8
IoDeviceObjectType -> ParseProcedure -> ntkrnlpa.exe @ 0x8058155c
SecurityProcedure -> ntkrnlpa.exe @ 0x80582abe
\Device\Harddisk0\DR0 -> ParseProcedure -> ntkrnlpa.exe @ 0x8058155c
SecurityProcedure -> ntkrnlpa.exe @ 0x80582abe
NDIS: Realtek RTL8139/810x Family Fast Ethernet NIC -> SendCompleteHandler -> NDIS.sys @ 0xba3cfbc3
PacketIndicateHandler -> NDIS.sys @ 0xba3dbb21
SendHandler -> NDIS.sys @ 0xba3cfd33
Warning: possible MBR rootkit infection !
user & kernel MBR OK

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
------------------------ Other Running Processes ------------------------
.
c:\windows\System32\smss.exe
c:\windows\system32\csrss.exe
c:\windows\system32\winlogon.exe
c:\windows\system32\services.exe
c:\windows\system32\lsass.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\svchost.exe
c:\windows\system32\svchost.exe
c:\windows\System32\svchost.exe
c:\windows\system32\svchost.exe
c:\windows\system32\svchost.exe
c:\windows\system32\svchost.exe
c:\windows\system32\spoolsv.exe
c:\windows\system32\svchost.exe
c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
c:\windows\system32\svchost.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\windows\System32\svchost.exe
c:\nexon\Mabinogi\npkcmsvc.exe
c:\windows\System32\svchost.exe
c:\windows\system32\PnkBstrA.exe
c:\windows\system32\PnkBstrB.exe
c:\program files\Spyware Doctor\pctsSvc.exe
c:\windows\system32\svchost.exe
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\program files\Common Files\Pure Networks Shared\Platform\nmsrvc.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Viewpoint\Viewpoint Manager\ViewMgr.exe
c:\windows\system32\wuauclt.exe
c:\windows\system32\wscntfy.exe
c:\windows\System32\alg.exe
c:\program files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac
.
**************************************************************************
.
Completion time: 2009-11-25 17:00 - machine was rebooted
ComboFix-quarantined-files.txt 2009-11-25 21:59
ComboFix2.txt 2009-11-18 23:09
ComboFix3.txt 2009-11-11 07:28

Pre-Run: 6,298,406,912 bytes free
Post-Run: 7,273,005,056 bytes free

- - End Of File - - 278E7786F2ADEF1EE08E02FB134B47DF



GMER 1.0.15.15227 - http://www.gmer.net
Rootkit scan 2009-11-25 01:59:31
Windows 5.1.2600 Service Pack 2
Running: zbnd0u23.exe; Driver: C:\DOCUME~1\COMPAQ~1\LOCALS~1\Temp\pfliiuow.sys


---- System - GMER 1.0.15 ----

SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateKey [0xBA4C5D72]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateProcess [0xBA4A69A6]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateProcessEx [0xBA4A6B98]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwDeleteKey [0xBA4C6568]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwDeleteValueKey [0xBA4C6820]
SSDT sptd.sys ZwEnumerateKey [0xBA6C5E2C]
SSDT sptd.sys ZwEnumerateValueKey [0xBA6C61BA]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwOpenKey [0xBA4C4A80]
SSDT sptd.sys ZwQueryKey [0xBA6C6292]
SSDT sptd.sys ZwQueryValueKey [0xBA6C6112]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwRenameKey [0xBA4C6C8A]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwSetValueKey [0xBA4C6036]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwTerminateProcess [0xBA4A6656]

---- Kernel code sections - GMER 1.0.15 ----

? C:\WINDOWS\system32\drivers\sptd.sys The process cannot access the file because it is being used by another process.
.text USBPORT.SYS!DllUnload B969462C 5 Bytes JMP 8A180780
? System32\Drivers\ahuss3qr.SYS The system cannot find the path specified. !
? C:\WINDOWS\system32\Drivers\mchInjDrv.sys The system cannot find the file specified. !

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT atapi.sys[HAL.dll!READ_PORT_UCHAR] [BA6C0AD4] sptd.sys
IAT atapi.sys[HAL.dll!READ_PORT_BUFFER_USHORT] [BA6C0C1A] sptd.sys
IAT atapi.sys[HAL.dll!READ_PORT_USHORT] [BA6C0B9C] sptd.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_BUFFER_USHORT] [BA6C1748] sptd.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_UCHAR] [BA6C161E] sptd.sys
IAT \SystemRoot\system32\DRIVERS\i8042prt.sys[HAL.dll!READ_PORT_UCHAR] [BA6D5ACA] sptd.sys

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 8A72B1E8

AttachedDevice \FileSystem\Ntfs \Ntfs bb-run.sys (Promise Disk Accelerator/Promise Technology, Inc.)

Device \FileSystem\Fastfat \FatCdrom 899811E8
Device \Driver\usbohci \Device\USBPDO-0 8A192578
Device \Driver\usbohci \Device\USBPDO-1 8A192578
Device \Driver\usbehci \Device\USBPDO-2 8A22D1E8
Device \Driver\Ftdisk \Device\HarddiskVolume1 8A7981E8
Device \Driver\Ftdisk \Device\HarddiskVolume2 8A7981E8
Device \Driver\Cdrom \Device\CdRom0 8A0F77A0
Device \Driver\atapi \Device\Ide\IdePort0 8A7971E8
Device \Driver\atapi \Device\Ide\IdePort0 8A68BD80
Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-3 8A7971E8
Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-3 8A68BD80
Device \Driver\atapi \Device\Ide\IdePort1 8A7971E8
Device \Driver\atapi \Device\Ide\IdePort1 8A68BD80
Device \Driver\atapi \Device\Ide\IdePort2 8A7971E8
Device \Driver\atapi \Device\Ide\IdePort2 8A68BD80
Device \Driver\atapi \Device\Ide\IdePort3 8A7971E8
Device \Driver\atapi \Device\Ide\IdePort3 8A68BD80
Device \Driver\atapi \Device\Ide\IdeDeviceP3T0L0-10 8A7971E8
Device \Driver\atapi \Device\Ide\IdeDeviceP3T0L0-10 8A68BD80
Device \Driver\Cdrom \Device\CdRom1 8A0F77A0
Device \Driver\NetBT \Device\NetBT_Tcpip_{8B6244F4-EC8C-42D0-A9C3-334B2582B5E2} 89A971E8
Device \Driver\Cdrom \Device\CdRom2 8A0F77A0
Device \Driver\Cdrom \Device\CdRom3 8A0F77A0
Device \Driver\Cdrom \Device\CdRom4 8A0F77A0
Device \Driver\NetBT \Device\NetBt_Wins_Export 89A971E8
Device \Driver\usbstor \Device\00000083 89DC94A8
Device \Driver\usbstor \Device\00000083 89A61110
Device \Driver\NetBT \Device\NetbiosSmb 89A971E8
Device \Driver\usbstor \Device\00000087 89DC94A8
Device \Driver\usbstor \Device\00000087 89A61110
Device \Driver\mcdbus \Device\mcdbus 89DC7CE8
Device \Driver\usbstor \Device\00000088 89DC94A8
Device \Driver\usbstor \Device\00000088 89A61110
Device \Driver\PCI_NTPNP1812 \Device\0000005c sptd.sys
Device \Driver\usbstor \Device\00000089 89DC94A8
Device \Driver\usbstor \Device\00000089 89A61110
Device \Driver\usbohci \Device\USBFDO-0 8A192578
Device \Driver\usbohci \Device\USBFDO-1 8A192578
Device \FileSystem\MRxSmb \Device\LanmanDatagramReceiver 89D787A0
Device \Driver\usbehci \Device\USBFDO-2 8A22D1E8
Device \FileSystem\MRxSmb \Device\LanmanRedirector 89D787A0
Device \Driver\Ftdisk \Device\FtControl 8A7981E8
Device \Driver\usbstor \Device\0000008a 89DC94A8
Device \Driver\usbstor \Device\0000008a 89A61110
Device \Driver\mcdbus \Device\0000007e 89DC7CE8
Device \Driver\mcdbus \Device\0000007f 89DC7CE8
Device \Driver\ahuss3qr \Device\Scsi\ahuss3qr1 89D9E1E8
Device \Driver\ahuss3qr \Device\Scsi\ahuss3qr1 89FE4CD8
Device \Driver\ahuss3qr \Device\Scsi\ahuss3qr1Port5Path0Target0Lun0 89D9E1E8
Device \Driver\ahuss3qr \Device\Scsi\ahuss3qr1Port5Path0Target0Lun0 89FE4CD8
Device \Driver\ahuss3qr \Device\Scsi\ahuss3qr1Port5Path0Target1Lun0 89D9E1E8
Device \Driver\ahuss3qr \Device\Scsi\ahuss3qr1Port5Path0Target1Lun0 89FE4CD8
Device \FileSystem\Fastfat \Fat 899811E8

AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device \FileSystem\Cdfs \Cdfs 89EA92E8
Device \Driver\atapi -> \Driver\atapi \Device\Harddisk0\DR0 8A7971E8

---- Processes - GMER 1.0.15 ----

Process C:\Documents and Settings\All Users\_qbothome\_qbotinj.exe (*** hidden *** ) 1324
Process C:\Documents and Settings\All Users\_qbothome\_qbotnti.exe (*** hidden *** ) 2204
Process C:\Program Files\Internet Explorer\iexplore.exe (*** hidden *** ) 3788

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 C:\Program Files\DAEMON Tools\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xD5 0xB1 0xE4 0x6C ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x9B 0x27 0x42 0xA7 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xF4 0xFD 0x91 0x78 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41@khjeh 0x4F 0x7D 0xB9 0x02 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 C:\Program Files\DAEMON Tools\
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xD5 0xB1 0xE4 0x6C ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x9B 0x27 0x42 0xA7 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xF4 0xFD 0x91 0x78 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41@khjeh 0x4F 0x7D 0xB9 0x02 ...
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run@nmapp "c:\documents and settings\all users\_qbothome\_qbotinj.exe" "c:\documents and settings\all users\_qbothome\_qbot.dll" /c "c:\program files\pure networks\network magic\nmapp.exe" -autorun -nosplash
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\documents and settings\all users\_qbothome\_qbotinj.exe _qbotinj
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\msi.dll,-34 Windows Installer Package
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31264 Move the selected items
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31266 Copy the selected items
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31268 Publish the selected items to the Web
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31362 E-mail the selected items
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31270 Delete the selected items
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\Program Files\Windows NT\Accessories\WORDPAD.EXE WordPad
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31361 Provides options for you to customize the appearance and functionality of your computer.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31328 Provides the steps necessary to add a new program, or to change or remove an existing program.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31295 Shows information about your computer, such as the processor speed and the amount of installed memory.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\SHELL32.dll,-22912 Shows shortcuts to Web sites, network computers, and FTP sites.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31275 This section displays the size, file type, and other information about a selected item.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\NetMeeting\conf.exe,-12345 H.323 Internet Telephony
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\accwiz.exe,-16 Accessibility Wizard settings
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9903 AIFF Format Sound
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\SHELL32.dll,-22978 Briefcase
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\pdh.dll,-10023 Performance Monitor File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\cryptext.dll,-6145 Security Catalog
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-5 Audio CD Track
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\cryptext.dll,-6108 Security Certificate
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\NetMeeting\conf.exe,-12346 SpeedDial
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\fxscover.exe,-2523 Fax Cover Page File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\icardres.dll.mui,-4162 Managed Information Card file
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\icardres.dll.mui,-4146 Windows CardSpace backup file
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\cryptext.dll,-6110 Certificate Revocation List
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\netshell.dll,-1300 Dialup Networking File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9927 Microsoft Recorded TV Show
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\shimgvw.dll,-301 EMF Image
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\NetMeeting\conf.exe,-12347 Intel IPhone Compatible
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\setupapi.dll,-2000 Setup Information
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\Internet Explorer\Connection Wizard\icwres.dll,-20003 Internet Communication Settings
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-200 iPod Game File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-201 iPod Software Update File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-6 iTunes Music Database File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-16 iTunes Music Store URL
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-17 Podcast Subscription File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\wshext.dll,-4804 JScript Script File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\wshext.dll,-4805 JScript Encoded Script File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-2 MPEG-4 Audio File (Protected)
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9902 Movie Clip
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\mmcbase.dll,-130 Microsoft Common Console Document
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\msi.dll,-35 Windows Installer Patch
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\RCBdyctl.dll,-150 Microsoft Remote Assistance Incident
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\Movie Maker\wmm2res.dll,-63097 Windows Movie Maker Project
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\PCHealth\HelpCtr\Binaries\msinfo.dll,-391 MSInfo Document
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\NetMeeting\nmwb.dll,-1234 Microsoft NetMeeting T126 Compatible Whiteboard Document
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\cryptext.dll,-6111 PKCS #7 Certificates
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\cryptext.dll,-6113 PKCS #7 Signature
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-18 Podcast Subscription File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\scrobj.dll,-8192 Windows Script Component
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\shscrap.dll,-258 Scrap object
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9904 AU Format Sound
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\cryptext.dll,-6112 Microsoft Serialized Certificate Store
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\cryptext.dll,-6109 Certificate Trust List
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\shimgvw.dll,-306 TIF Image
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\wshext.dll,-4803 VBScript Encoded Script File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\wshext.dll,-4802 VBScript Script File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\Program Files\iTunes\iTunes.Resources\iTunesRegistry.DLL,-15 WAVE Audio File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9911 Windows Media Audio shortcut
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9909 Windows Media Audio/Video file
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9920 Windows Media Player Download Package
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\shimgvw.dll,-307 WMF Image
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9915 Windows Media Player Skin File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9910 Windows Media Audio/Video playlist
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9916 Windows Media Player Skin Package
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@"C:\Program Files\Windows NT\Accessories\WORDPAD.EXE",-208 Write Document
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\wshext.dll,-4801 Windows Script File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\System32\wshext.dll,-4800 Windows Script Host Settings File
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\inf\unregmp2.exe,-9913 Windows Media Audio/Video playlist
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\msxml3r.dll,-1 XML Document
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\msxml3r.dll,-2 XSL Stylesheet
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-31382 Eject this disk
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@C:\WINDOWS\system32\fxsres.dll,-118 Fax
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\WINDOWS\system32\calc.exe Windows Calculator
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxcgPSWX.EXE Printer Status Window Interface
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxcgjswx.exe Job Status Window Interface
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\Program Files\Apple Software Update\SoftwareUpdate.exe Apple Software Update
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@explorer.exe,-7001 Opens a central location for Help topics, tutorials, troubleshooting, and other support services.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\Documents and Settings\Compaq_Owner\Desktop\dds.scr dds
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\WINDOWS\system32\wscript.exe Microsoft ® Windows Based Script Host
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@Shell32.dll,-12692 Shows recently opened files and folders.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@explorer.exe,-7000 Opens a window where you can pick search options and work with search results.
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@shell32.dll,-12710 &Run
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@C:\WINDOWS\system32\shell32.dll Windows Shell Common Dll
Reg HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache@@xpob2res.dll,-41519 Windows Messenger

---- Files - GMER 1.0.15 ----

File C:\Program Files\Sierra\SWAT 4\OriginalBackupFiles\Content\Classes 0 bytes

---- EOF - GMER 1.0.15 ----



C:\Documents and Settings\Compaq_Owner\Desktop\LuxuryLinerTycoon_Setup-dm(2).exe Win32/Adware.Trymedia application cleaned by deleting - quarantined
C:\Documents and Settings\Compaq_Owner\Desktop\LuxuryLinerTycoon_Setup-dm.exe Win32/Adware.Trymedia application cleaned by deleting - quarantined
C:\Documents and Settings\Compaq_Owner\My Documents\Desktop Stuff\generators_3E.zip probably unknown NewHeur_PE virus deleted - quarantined
C:\Documents and Settings\Compaq_Owner\My Documents\Downloads\AV.Voice.Changer.Diamond.v6.0.10.Retail.Incl.Keygen-ViRiLiTY\VCS_Diamond60.exe a variant of Win32/Adware.Virtumonde.NCC application deleted - quarantined
C:\Documents and Settings\Compaq_Owner\My Documents\My Games\SlaveZeroSetup-dm.exe Win32/Adware.Trymedia application cleaned by deleting - quarantined
C:\Documents and Settings\Compaq_Owner\My Documents\Sims Mods\Civ2TOT-dm.exe Win32/Adware.Trymedia application cleaned by deleting - quarantined
C:\hp\bin\wbug\CompaqPresario_Spring06.exe a variant of Win32/Toolbar.MyWebSearch application deleted - quarantined
C:\Qoobox\Quarantine\[4]-Submit_2009-11-15_02.06.27.zip multiple threats deleted - quarantined
C:\Qoobox\Quarantine\C\pvnwq.exe.vir Win32/Cimag.AU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\BtwSrv.dll.vir Win32/Refpron.CD trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\duyesedi.exe.vir a variant of Win32/Kryptik.AXJ trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\duzirasa.dll.vir a variant of Win32/Kryptik.AMH trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\FastNetSrv.exe.vir Win32/Refpron.CC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\fezepope.dll.vir a variant of Win32/Kryptik.AMH trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\fimamile.dll.vir a variant of Win32/Kryptik.BAC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\gimujewa.dll.vir Win32/KillAV.NFM trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\gofizesa.dll.vir a variant of Win32/Kryptik.AEJ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\gosofuwu.dll.tmp.vir a variant of Win32/Kryptik.AEJ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\guvegavu.exe.vir a variant of Win32/Kryptik.AVX trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\hegerunu.exe.vir a variant of Win32/Kryptik.AWF trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\isapeep.sys.vir Win32/Agent.QEV trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\kepivuve.exe.vir a variant of Win32/Kryptik.AVV trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\layezefu.dll.tmp.vir a variant of Win32/Kryptik.AEJ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\liseruka.exe.vir a variant of Win32/Kryptik.AVX trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\lizoneho.exe.vir a variant of Win32/Kryptik.AVX trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\lsm32.sys.vir a variant of Win32/TrojanClicker.VB.NLI trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\mndisk.sys.vir Win32/Agent.QBH trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\opeia.exe.vir a variant of Win32/Refpron.CE trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\pivejehu.dll.vir a variant of Win32/Kryptik.AMH trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\ratijipe.exe.vir a variant of Win32/Kryptik.AVV trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\rijiraza.exe.vir a variant of Win32/Kryptik.AWF trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\sikasiso.dll.vir a variant of Win32/Kryptik.BAC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\sohibesi.dll.vir a variant of Win32/Kryptik.BAC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\vogujesi.dll.tmp.vir a variant of Win32/Kryptik.AEJ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\vuzofafu.dll.vir a variant of Win32/Kryptik.BAC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\wmdtc.exe.vir a variant of Win32/Refpron.CE trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\wynB.tmp.exe.vir Win32/Adware.WiniGuard application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\yekugomo.dll.vir a variant of Win32/Kryptik.AMH trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\zenoyovo.dll.vir a variant of Win32/Kryptik.BAC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\zubayoro.dll.vir a variant of Win32/Kryptik.AMH trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\schtml\dbsinit.exe.vir Win32/Adware.WinAntiVirus application deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\schtml\wispex.html.vir Win32/Adware.WinAntiVirus application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\Temp\34117333.dll.vir Win32/PSW.OnLineGames.OPG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\Temp\4059xxx.dll.vir a variant of Win32/PSW.OnLineGames.OPH trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP1\A0000221.exe Win32/Refpron.CC trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0003828.dll Win32/Refpron.CD trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0003834.sys a variant of Win32/TrojanClicker.VB.NLI trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0003835.exe a variant of Win32/Refpron.CE trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0003836.exe a variant of Win32/Refpron.CE trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0003999.exe Win32/Adware.Trymedia application cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0004000.exe Win32/Adware.Trymedia application cleaned by deleting - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0004007.exe a variant of Win32/Toolbar.MyWebSearch application deleted - quarantined
C:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP8\A0003552.exe a variant of Win32/Kryptik.BEA trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Internet Explorer\Desktop.htt Win32/TrojanDownloader.FakeAlert.ADM trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\5Q0US5S6\dfghfghgfj[1].dll Win32/Adware.CoreguardAntivirus application cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\6EAW4RXP\hrobc[1].htm Win32/TrojanDownloader.FakeAlert.AED trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\6EAW4RXP\SetupAdvancedVirusRemover[1].exe Win32/Adware.AdvancedVirusRemover.B application cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\BZJ10YRQ\adjjkma[1].htm Win32/TrojanDownloader.Small.NTQ trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\BZJ10YRQ\leoolvw[1].htm Win32/TrojanDownloader.Small.NJI trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\BZJ10YRQ\unaooftg[1].htm a variant of Win32/Kryptik.AOK trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\BZJ10YRQ\vsoptt[1].htm Win32/Cimag.AU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\JWDLG3QQ\mollmz[1].htm a variant of Win32/Kryptik.AEJ trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\JWDLG3QQ\soft1[1].exe a variant of Win32/Kryptik.ATX trojan cleaned by deleting - quarantined
C:\_OTM\MovedFiles\08182009_183150\WINDOWS\system32\dddesot.dll a variant of Win32/Adware.WindowsAntivirusPro.B application cleaned by deleting - quarantined
D:\I386\Apps\APP32073\src\CompaqPresario_Spring06.exe a variant of Win32/Toolbar.MyWebSearch application deleted - quarantined
D:\I386\Apps\APP32073\src\HPPavillion_Spring06.exe a variant of Win32/Toolbar.MyWebSearch application deleted - quarantined
D:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0004016.exe a variant of Win32/Toolbar.MyWebSearch application deleted - quarantined
D:\System Volume Information\_restore{A2578CBA-012A-4EE9-9E3D-27D3F494A2B6}\RP10\A0004017.exe a variant of Win32/Toolbar.MyWebSearch application deleted - quarantined


End of logs.

Combofix had slight issues at first, it seems to work now however. Restarted twice, first to finish updating, and again to finish the CFScript so the log could be created.
GMER took forever as usual, however I finally managed to get it to work.
ESET also took a bit of time, and was ran in stand alone form downloaded from the website since I am using Opera, worked however.
So far, other than the aforementioned above I see no other problems... Spyware Doctor is still auto scanning even though I've tried to disable it for the purpose of the cleanup, scan results in that still show nothing above Medium Severity. I'm merely adding this since it had finished during the cleanup phase without me telling it to, so I figured I may as well mention it too. The majority of detected infections are low risk adware cookies, 400+ or so.

Thank you for sticking with me.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users