Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possible rootkit infection - search results hijacked


  • This topic is locked This topic is locked
12 replies to this topic

#1 CRSinPhilly

CRSinPhilly

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:37 PM

Posted 11 December 2009 - 12:51 PM

Hello and thank you for taking the time to read about my problems.

I'm running Windows XP HE SP3 and McAfee Security Suite - my subscription is current and updates are set to autoinstall. Hopefully I'm not providing too much information below.

I truly have no idea how or when I was infected, but I became aware of it on 12 November 2009 when Firefox went crazy and started opening multiple tabs trying to go to a website called lightseek.biz. I closed out of Firefox using the task manager and ran an antivirus scan, then MBAM, SuperAntiSpyware, and SpybotS&D scans and nothing was found, but that lightseek.biz window would still open up on a regular basis in both Firefox and IE. It was around this time that I noticed my search results were being redirected no matter what browser or search provider I used. Later that evening McAfee told me it had found a Vundo trojan and automatically removed it.

Repeated scans using all of the programs listed above found nothing more but my browsers were still trying to connect to lightseek.biz. Then a friend suggested i try PCTools Spyware Doctor so I installed it and it told me if had found Spyware.Known_Bad_Sites and Spyware.180search_Assistant. After they were removed my browser stopped trying to open lightseek.biz repeatedly but the search results were still hijacked.

Then I started getting random event detection notifications from McAfee, not always when I was on the computer doing anything. On 18 November McAfee told me it had repaired/removed a JV/Selac trojan. On 19 November McAfee told me it found Exploit-ByteVerify trojan and repaired/removed it. On 20 November McAfee quarantined a JV/Selac trojan. On 22 November McAfee quarantined a generic!bg.gtr trojan and on the same day Spyware Doctor said it found and cleaned Adware.WebSearch_Toolbar. On 30 November Spyware Doctor found, quarantined, and cleaned Trojan.Virtumonde, Adware.Bargain_Buddy, and Adware.WebSearch_Toolbar.

Since 30 November I have had no further detections of any kind but I have found that I cannot boot into safe mode - I get a BSOD telling me i have a page fault in a nonpaged area with an error message of "STOP: 0x00000050 (0xc47cc3a4, 0x00000001, 0x80537009, 0x00000000)". I don't boot into safe mode often so I'm not sure if this problem is recent and related to the infections, but I can tell you that I have not recently added any hardware.

That's basically it. I'm concerned because none of the programs I have tried are able to find any problems, yet my search results are still hijacked and I do occasionally still get a tab in my browser that will open on its own trying to connect to some website.

Any help would be most appreciated!!!

Here is my DDS log:

DDS (Ver_09-12-01.01) - NTFSx86
Run by Charles at 10:54:31.25 on Fri 12/11/2009
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_17
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.124 [GMT -5:00]

AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\Program Files\APC\APC PowerChute Personal Edition\mainserv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
C:\Program Files\Carbonite\Carbonite Backup\carboniteservice.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Creative\Sound Blaster Live! 24-bit\Surround Mixer\CTSysVol.exe
C:\WINDOWS\system32\Rundll32.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Carbonite\Carbonite Backup\CarboniteUI.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft Money Plus\MNYCoreFiles\mnyinsit.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Windows Desktop Search\WindowsSearch.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\msdtc.exe
C:\PROGRA~1\McAfee\MSM\McSmtFwk.exe
C:\PROGRA~1\COMMON~1\McAfee\MSC\McUICnt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Microsoft Money Plus\MNYCoreFiles\msmoney.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Documents and Settings\Charles\Desktop\dds.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.drudgereport.com/
uSearch Page = hxxp://www.google.com
uDefault_Page_URL = hxxp://www.dell4me.com/myway
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: PC Tools Browser Guard BHO: {2a0f3d1b-0909-4ff4-b272-609cce6054e7} - c:\program files\spyware doctor\bdt\PCTBrowserDefender.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\tfswshx.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: PC Tools Browser Guard: {472734ea-242a-422b-adf8-83d1e48cc825} - c:\program files\spyware doctor\bdt\PCTBrowserDefender.dll
EB: {4528BBE0-4E08-11D5-AD55-00010333D0AD} - No File
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Yahoo! Pager] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [MoneyInsights] "c:\program files\microsoft money plus\mnycorefiles\mnyinsit.exe"
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [CTSysVol] c:\program files\creative\sound blaster live! 24-bit\surround mixer\CTSysVol.exe /r
mRun: [P17Helper] Rundll32 P17.dll,P17Helper
mRun: [UpdReg] c:\windows\UpdReg.EXE
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [Carbonite Backup] c:\program files\carbonite\carbonite backup\CarboniteUI.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\apcups~1.lnk - c:\program files\apc\apc powerchute personal edition\Display.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - c:\program files\windows desktop search\WindowsSearch.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: Google Sidewiki...
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
Trusted Zone: musicmatch.com\online
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {3DA5D23B-EFE1-4181-ADB7-7D457567AACA} - hxxp://zone.msn.com/bingame/pacz/default/pandaonline.cab
DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} - hxxp://office.microsoft.com/officeupdate/content/opuc.cab
DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} - hxxp://www1.snapfish.com/SnapfishActivia.cab
DPF: {4B9F2C37-C0CF-42BC-BB2D-DCFA8B25CABF} - hxxp://zone.msn.com/bingame/rock/default/popcaploader1.cab
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase8942.cab
DPF: {639658F3-B141-4D6B-B936-226F75A5EAC3} - hxxp://zone.msn.com/bingame/dsh2/default/DinerDash2.1.0.0.68.cab
DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} - hxxp://zone.msn.com/bingame/amun/default/mjolauncher.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {9AA73F41-EC64-489E-9A73-9CD52E528BC4} - hxxp://zone.msn.com/binGame/ZAxRcMgr.cab
DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} - hxxp://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
DPF: {BAE1D8DF-0B35-47E3-A1E7-EEB3FF2ECD19} - hxxp://zone.msn.com/bingame/fotg/default/ddfotg.1.0.0.37.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab
DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} - hxxp://zone.msn.com/bingame/feed/default/SproutLauncher.cab
DPF: {D719897A-B07A-4C0C-AEA9-9B663A28DFCB} - hxxp://ax.phobos.apple.com.edgesuite.net/detection/ITDetector.cab
DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} - hxxp://zone.msn.com/bingame/shpo/default/shapo.cab
DPF: {DAF5D9A2-D982-4671-83E4-0398706A5F6A} - hxxp://zone.msn.com/bingame/hsol/default/SCEWebLauncher.cab
DPF: {DC75FEF6-165D-4D25-A518-C8C4BDA7BAA6} - hxxp://zone.msn.com/bingame/dash/default/DinerDash.1.0.0.94.cab
DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} - hxxp://fdl.msn.com/zone/datafiles/heartbeat.cab
DPF: {E7DBFB6C-113A-47CF-B278-F5C6AF4DE1BD} - hxxp://download.abacast.com/download/files/abasetup162.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\charles\applic~1\mozilla\firefox\profiles\xeev4i02.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxp://www.drudgereport.com
FF - plugin: c:\documents and settings\charles\application data\move networks\plugins\npqmp071503000010.dll
FF - plugin: c:\documents and settings\charles\application data\move networks\plugins\npqmp071701000002.dll
FF - plugin: c:\progra~1\yahoo!\common\npyaxmpb.dll
FF - plugin: c:\program files\mozilla firefox\plugins\NPcol305.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npsabffx.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\windows\system32\superadblocker.com\npsabffx.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2009-11-16 207280]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-7-8 214664]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-11-23 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-11-23 74480]
R2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\spyware doctor\bdt\BDTUpdateService.exe [2009-11-16 112592]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2009-9-2 359952]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2009-9-2 144704]
R2 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-11-16 358600]
R2 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2009-11-16 1141200]
R3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2009-9-2 606736]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-9-2 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-9-2 35272]
R3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2009-9-2 34248]
R3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2009-9-2 40552]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-11-23 7408]

=============== Created Last 30 ================

2009-12-11 02:45:49 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-12-10 22:38:48 0 d-----w- c:\program files\Trend Micro
2009-12-05 05:10:01 0 d-----w- c:\program files\common files\Viewpoint
2009-12-01 23:00:30 157712 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2009-11-30 14:07:49 0 d-----w- C:\VundoFix Backups
2009-11-22 19:39:23 0 d-----w- c:\docume~1\charles\applic~1\Windows Search
2009-11-21 21:32:08 0 d-----w- c:\program files\common files\Windows Live
2009-11-21 21:29:26 0 d--h--w- c:\windows\PIF
2009-11-21 21:20:17 0 d-----w- C:\fbf501b08707e554d6751c6b
2009-11-21 21:20:12 0 d-----w- C:\9877e8a57ccf0865a8
2009-11-21 21:19:49 0 d-----w- c:\docume~1\charles\applic~1\Windows Desktop Search
2009-11-21 21:18:18 0 d-----w- c:\program files\Windows Desktop Search
2009-11-21 21:18:17 0 d-----w- c:\windows\system32\GroupPolicy
2009-11-21 21:16:55 98304 ------w- c:\windows\system32\dllcache\nlhtml.dll
2009-11-21 21:16:55 29696 ------w- c:\windows\system32\dllcache\mimefilt.dll
2009-11-21 21:16:55 192000 ------w- c:\windows\system32\dllcache\offfilt.dll
2009-11-19 19:21:16 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-11-16 15:35:00 767952 ----a-w- c:\windows\BDTSupport.dll
2009-11-16 15:34:59 883 ----a-w- c:\windows\RegSDImport.xml
2009-11-16 15:34:59 880 ----a-w- c:\windows\RegISSImport.xml
2009-11-16 15:34:59 165840 ----a-w- c:\windows\PCTBDRes.dll
2009-11-16 15:34:59 1636304 ----a-w- c:\windows\PCTBDCore.dll
2009-11-16 15:34:59 149456 ----a-w- c:\windows\SGDetectionTool.dll
2009-11-16 15:34:59 131 ----a-w- c:\windows\IDB.zip
2009-11-16 15:34:59 1152470 ----a-w- c:\windows\UDB.zip
2009-11-16 15:33:38 7387 ----a-w- c:\windows\system32\drivers\pctgntdi.cat
2009-11-16 15:33:38 229304 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2009-11-16 15:33:32 87784 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2009-11-16 15:33:32 7412 ----a-w- c:\windows\system32\drivers\PCTAppEvent.cat
2009-11-16 15:33:32 7383 ----a-w- c:\windows\system32\drivers\pctcore.cat
2009-11-16 15:33:32 207280 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2009-11-16 15:33:16 7383 ----a-w- c:\windows\system32\drivers\pctplsg.cat
2009-11-16 15:33:15 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2009-11-16 15:32:53 0 d-----w- c:\program files\common files\PC Tools
2009-11-16 15:32:52 0 d-----w- c:\program files\Spyware Doctor
2009-11-16 15:32:52 0 d-----w- c:\docume~1\charles\applic~1\PC Tools
2009-11-16 15:32:52 0 d-----w- c:\docume~1\alluse~1\applic~1\PC Tools

==================== Find3M ====================

2009-12-03 21:14:06 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-03 21:13:56 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-28 14:40:47 173056 ------w- c:\windows\system32\dllcache\ie4uinit.exe
2009-10-21 05:38:36 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38:36 75776 ------w- c:\windows\system32\dllcache\strmfilt.dll
2009-10-21 05:38:36 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-21 05:38:36 25088 ------w- c:\windows\system32\dllcache\httpapi.dll
2009-10-20 16:20:16 265728 ----a-w- c:\windows\system32\drivers\http.sys
2009-10-20 16:20:16 265728 ------w- c:\windows\system32\dllcache\http.sys
2009-10-13 10:30:16 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-13 10:30:16 270336 ------w- c:\windows\system32\dllcache\oakley.dll
2009-10-12 13:38:19 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38:19 149504 ------w- c:\windows\system32\dllcache\rastls.dll
2009-10-12 13:38:18 79872 ----a-w- c:\windows\system32\raschap.dll
2009-10-12 13:38:18 79872 ------w- c:\windows\system32\dllcache\raschap.dll
2008-11-29 11:35:18 2713 --sh--w- c:\windows\system32\visujowo.exe
2008-08-19 02:06:03 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008081820080819\index.dat

============= FINISH: 10:58:11.18 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:37 PM

Posted 12 December 2009 - 10:36 AM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I will ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.


We need to create an OTL Report
  • Please download OTL from here
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under the Custom Scan box paste this in

    netsvcs
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT




  • Click the "Quick Scan" button.
  • The scan should take just a few minutes.
  • Please copy and paste both logs back here in your next reply.


=============

The next log will show us any hidden files that are present.

Download GMER from here:
  • Unzip it to the desktop.
  • Open the program and click on the Rootkit tab.
  • Make sure all the boxes on the right of the screen are checked, EXCEPT for ‘Show All’.
  • Click on Scan.
  • When the scan has run click Copy and paste the results (if any) into this thread.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 CRSinPhilly

CRSinPhilly
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:37 PM

Posted 12 December 2009 - 01:17 PM

Hi Sam, thanks for helping out. Here are the logs you requested. GMER was large so I added it as an attachment.
-Charles

=======================================================================================
OTL logfile created on: 12/12/2009 11:35:04 AM - Run 1
OTL by OldTimer - Version 3.1.16.0 Folder = C:\Documents and Settings\Charles\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1022.07 Mb Total Physical Memory | 121.76 Mb Available Physical Memory | 11.91% Memory free
2.40 Gb Paging File | 1.19 Gb Available in Paging File | 49.53% Paging File free
Paging file location(s): C:\pagefile.sys 1536 3072 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 145.97 Gb Total Space | 84.19 Gb Free Space | 57.68% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: SPAZDELL
Current User Name: Charles
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: On
Skip Microsoft Files: On
File Age = 14 Days
Output = Standard
Quick Scan

========== Processes (SafeList) ==========

PRC - [2009/12/12 11:00:33 | 00,538,112 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Charles\Desktop\OTL.exe
PRC - [2009/11/23 08:43:26 | 02,001,648 | ---- | M] (SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
PRC - [2009/11/19 14:20:44 | 00,149,280 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jusched.exe
PRC - [2009/11/19 14:20:43 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jqs.exe
PRC - [2009/11/06 01:29:57 | 00,908,248 | ---- | M] (Mozilla Corporation) -- C:\Program Files\Mozilla Firefox\firefox.exe
PRC - [2009/10/29 06:54:44 | 01,218,008 | ---- | M] (McAfee, Inc.) -- c:\Program Files\McAfee.com\Agent\mcagent.exe
PRC - [2009/10/28 20:21:26 | 00,141,600 | ---- | M] (Apple Inc.) -- C:\Program Files\iTunes\iTunesHelper.exe
PRC - [2009/10/28 20:21:14 | 00,545,568 | ---- | M] (Apple Inc.) -- C:\Program Files\iPod\bin\iPodService.exe
PRC - [2009/10/27 11:19:46 | 00,895,696 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\MPF\MpfSrv.exe
PRC - [2009/10/08 11:31:44 | 00,112,592 | ---- | M] (Threat Expert Ltd.) -- C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
PRC - [2009/09/23 13:33:42 | 01,141,200 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsSvc.exe
PRC - [2009/09/23 12:17:22 | 00,358,600 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsAuxs.exe
PRC - [2009/09/22 17:11:32 | 01,243,088 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsTray.exe
PRC - [2009/09/16 10:23:32 | 00,262,160 | ---- | M] (McAfee, Inc.) -- c:\Program Files\McAfee\VirusScan\mcvsshld.exe
PRC - [2009/09/16 09:22:08 | 00,144,704 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan\Mcshield.exe
PRC - [2009/09/16 08:28:38 | 00,606,736 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan\mcsysmon.exe
PRC - [2009/07/09 23:26:20 | 00,865,832 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\MSC\mcmscsvc.exe
PRC - [2009/07/08 10:54:34 | 00,359,952 | ---- | M] (McAfee, Inc.) -- c:\Program Files\Common Files\McAfee\McProxy\McProxy.exe
PRC - [2009/07/07 18:10:02 | 02,482,848 | ---- | M] (McAfee, Inc.) -- c:\Program Files\Common Files\McAfee\MNA\McNASvc.exe
PRC - [2009/07/07 16:45:22 | 00,436,752 | ---- | M] (McAfee, Inc.) -- C:\Program Files\Common Files\McAfee\MSC\McUICnt.exe
PRC - [2009/05/29 12:41:26 | 00,144,712 | ---- | M] (Apple Inc.) -- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
PRC - [2009/05/07 22:30:22 | 00,192,128 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\MSM\McSmtFwk.exe
PRC - [2009/01/09 15:13:28 | 01,951,376 | R--- | M] (Carbonite, Inc. (www.carbonite.com)) -- C:\Program Files\Carbonite\Carbonite Backup\CarboniteService.exe
PRC - [2009/01/09 15:13:26 | 00,669,840 | R--- | M] (Carbonite, Inc.) -- C:\Program Files\Carbonite\Carbonite Backup\CarboniteUI.exe
PRC - [2008/12/12 10:17:38 | 00,238,888 | ---- | M] (Apple Inc.) -- C:\Program Files\Bonjour\mDNSResponder.exe
PRC - [2008/05/26 22:19:14 | 00,123,904 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Desktop Search\WindowsSearch.exe
PRC - [2008/04/13 19:12:19 | 01,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2008/02/19 12:07:04 | 00,502,800 | ---- | M] (Microsoft® Corporation) -- C:\Program Files\Microsoft Money Plus\MNYCoreFiles\mnyinsit.exe
PRC - [2006/11/30 21:49:06 | 00,103,928 | ---- | M] (Yahoo! Inc.) -- C:\Program Files\Yahoo!\Messenger\Ymsgr_tray.exe
PRC - [2004/11/16 00:05:00 | 00,127,035 | ---- | M] (Sonic Solutions) -- C:\WINDOWS\SYSTEM32\dla\tfswctrl.exe
PRC - [2004/08/25 14:26:56 | 00,389,120 | ---- | M] () -- C:\WINDOWS\SYSTEM32\ati2evxx.exe
PRC - [2004/01/21 08:44:28 | 00,155,770 | ---- | M] (American Power Conversion Corporation) -- C:\Program Files\APC\APC PowerChute Personal Edition\mainserv.exe
PRC - [2003/09/17 11:43:36 | 00,057,344 | ---- | M] (Creative Technology Ltd) -- C:\Program Files\Creative\Sound Blaster Live! 24-bit\Surround Mixer\CTSysVol.exe
PRC - [2003/05/31 19:02:32 | 07,544,916 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
PRC - [2000/06/26 08:44:20 | 00,053,520 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\SYSTEM32\MsPMSPSv.exe
PRC - [1999/12/13 10:01:00 | 00,044,032 | ---- | M] (Creative Technology Ltd) -- C:\WINDOWS\SYSTEM32\CTSVCCDA.EXE


========== Modules (SafeList) ==========

MOD - [2009/12/12 11:00:33 | 00,538,112 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Charles\Desktop\OTL.exe
MOD - [2009/09/29 16:30:56 | 00,147,992 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\PCTGMhk.dll
MOD - [2009/09/09 22:54:58 | 00,155,184 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\smum32.dll
MOD - [2004/08/04 06:00:00 | 00,014,848 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\SYSTEM32\SERWVDRV.DLL
MOD - [2004/08/04 06:00:00 | 00,013,312 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\SYSTEM32\UMDMXFRM.DLL


========== Win32 Services (SafeList) ==========

SRV - [2009/11/19 14:20:43 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) [Auto | Running] -- C:\Program Files\Java\jre6\bin\jqs.exe -- (JavaQuickStarterService)
SRV - [2009/10/28 20:21:14 | 00,545,568 | ---- | M] (Apple Inc.) [On_Demand | Running] -- C:\Program Files\iPod\bin\iPodService.exe -- (iPod Service)
SRV - [2009/10/27 11:19:46 | 00,895,696 | ---- | M] (McAfee, Inc.) [On_Demand | Running] -- C:\Program Files\McAfee\MPF\MPFSrv.exe -- (MpfService)
SRV - [2009/10/08 11:31:44 | 00,112,592 | ---- | M] (Threat Expert Ltd.) [Auto | Running] -- C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe -- (Browser Defender Update Service)
SRV - [2009/09/23 13:33:42 | 01,141,200 | ---- | M] (PC Tools) [Auto | Running] -- C:\Program Files\Spyware Doctor\pctsSvc.exe -- (sdCoreService)
SRV - [2009/09/23 12:17:22 | 00,358,600 | ---- | M] (PC Tools) [Auto | Running] -- C:\Program Files\Spyware Doctor\pctsAuxs.exe -- (sdAuxService)
SRV - [2009/09/16 10:23:32 | 00,365,072 | ---- | M] (McAfee, Inc.) [On_Demand | Stopped] -- C:\Program Files\McAfee\VirusScan\mcods.exe -- (McODS)
SRV - [2009/09/16 09:22:08 | 00,144,704 | ---- | M] (McAfee, Inc.) [Unknown | Running] -- C:\Program Files\McAfee\VirusScan\Mcshield.exe -- (McShield)
SRV - [2009/09/16 08:28:38 | 00,606,736 | ---- | M] (McAfee, Inc.) [On_Demand | Running] -- C:\Program Files\McAfee\VirusScan\mcsysmon.exe -- (McSysmon)
SRV - [2009/07/09 23:26:20 | 00,865,832 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\McAfee\MSC\mcmscsvc.exe -- (mcmscsvc)
SRV - [2009/07/08 19:22:22 | 00,068,112 | ---- | M] (McAfee) [On_Demand | Stopped] -- C:\Program Files\McAfee\MBK\MBackMonitor.exe -- (MBackMonitor)
SRV - [2009/07/08 10:54:34 | 00,359,952 | ---- | M] (McAfee, Inc.) [Auto | Running] -- c:\Program Files\Common Files\McAfee\McProxy\McProxy.exe -- (McProxy)
SRV - [2009/07/07 18:10:02 | 02,482,848 | ---- | M] (McAfee, Inc.) [Auto | Running] -- c:\Program Files\Common Files\McAfee\MNA\McNASvc.exe -- (McNASvc)
SRV - [2009/05/29 12:41:26 | 00,144,712 | ---- | M] (Apple Inc.) [Auto | Running] -- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe -- (Apple Mobile Device)
SRV - [2009/01/09 15:13:28 | 01,951,376 | R--- | M] (Carbonite, Inc. (www.carbonite.com)) [Auto | Running] -- C:\Program Files\Carbonite\Carbonite Backup\carboniteservice.exe -- (CarboniteService)
SRV - [2008/12/12 10:17:38 | 00,238,888 | ---- | M] (Apple Inc.) [Auto | Running] -- C:\Program Files\Bonjour\mDNSResponder.exe -- (Bonjour Service)
SRV - [2005/04/04 00:41:10 | 00,069,632 | ---- | M] (Macrovision Corporation) [On_Demand | Stopped] -- C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe -- (IDriverT)
SRV - [2004/08/25 14:26:56 | 00,389,120 | ---- | M] () [Auto | Running] -- C:\WINDOWS\SYSTEM32\ati2evxx.exe -- (Ati HotKey Poller)
SRV - [2004/07/15 02:49:26 | 00,032,768 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\aspnet_state.exe -- (aspnet_state)
SRV - [2004/01/21 08:44:28 | 00,155,770 | ---- | M] (American Power Conversion Corporation) [Auto | Running] -- C:\Program Files\APC\APC PowerChute Personal Edition\mainserv.exe -- (APC UPS Service)
SRV - [2003/12/17 14:59:48 | 00,143,360 | ---- | M] (Intel® Corporation) [On_Demand | Stopped] -- C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe -- (NetSvc)
SRV - [2003/07/28 13:28:22 | 00,089,136 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE -- (ose)
SRV - [2003/05/31 19:02:32 | 07,544,916 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe -- (MSSQL$MICROSOFTBCM)
SRV - [2002/12/17 20:23:30 | 00,311,872 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlagent.EXE -- (SQLAgent$MICROSOFTBCM)
SRV - [2000/06/26 08:44:20 | 00,053,520 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\WINDOWS\SYSTEM32\MsPMSPSv.exe -- (WMDM PMSP Service)
SRV - [1999/12/13 10:01:00 | 00,044,032 | ---- | M] (Creative Technology Ltd) [Auto | Running] -- C:\WINDOWS\SYSTEM32\CTSVCCDA.EXE -- (Creative Service for CDROM Access)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.google.com/ie
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.google.com/ie


IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,First Home Page = http://www.viewpoint.com/landing/v38a.html
IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/myway
IE - HKU\.DEFAULT\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\.DEFAULT\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local
IE - HKU\.DEFAULT\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = :0

IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,First Home Page = http://www.viewpoint.com/landing/v38a.html
IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/myway
IE - HKU\S-1-5-18\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-18\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local
IE - HKU\S-1-5-18\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = :0


IE - HKU\S-1-5-20\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://www.google.com
IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultName = Google
IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultURL = http://www.google.com/search?q={searchTerm...tf8&oe=utf8
IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.drudgereport.com/
IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\S-1-5-21-4235227392-585042843-2776331372-1008\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\S-1-5-21-4235227392-585042843-2776331372-1008\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local
IE - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\S-1-5-21-4235227392-585042843-2776331372-1008\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = :0

========== FireFox ==========

FF - prefs.js..browser.search.selectedEngine: "Bing"
FF - prefs.js..browser.search.suggest.enabled: false
FF - prefs.js..browser.search.useDBForOrder: true
FF - prefs.js..browser.startup.homepage: "http://www.drudgereport.com"
FF - prefs.js..extensions.enabledItems: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}:1.1.2
FF - prefs.js..extensions.enabledItems: {8f8fe09b-0bd3-4470-bc1b-8cad42b8203a}:0.15
FF - prefs.js..extensions.enabledItems: FFToolbar@upromise:6.2.2.1363

FF - HKLM\software\mozilla\Mozilla Firefox 3.5.5\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2009/12/07 10:49:20 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.5.5\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2009/11/19 14:21:16 | 00,000,000 | ---D | M]

[2009/02/10 15:01:38 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Mozilla\Extensions
[2009/12/12 10:28:59 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Mozilla\Firefox\Profiles\xeev4i02.default\extensions
[2009/07/24 07:48:20 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Mozilla\Firefox\Profiles\xeev4i02.default\extensions\{8f8fe09b-0bd3-4470-bc1b-8cad42b8203a}
[2009/12/12 10:28:51 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Mozilla\Firefox\Profiles\xeev4i02.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
[2009/09/28 07:36:43 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Mozilla\Firefox\Profiles\xeev4i02.default\extensions\FFToolbar@upromise
[2009/09/28 07:36:43 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Mozilla\Firefox\Profiles\xeev4i02.default\extensions\FFToolbar@upromise-trash
[2009/12/12 10:28:51 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Mozilla\Firefox\Profiles\xeev4i02.default\extensions\staged-xpis
[2009/11/18 21:38:55 | 00,002,172 | ---- | M] () -- C:\Documents and Settings\Charles\Application Data\Mozilla\Firefox\Profiles\xeev4i02.default\searchplugins\bing.xml
[2009/12/12 10:28:59 | 00,000,000 | ---D | M] -- C:\Program Files\Mozilla Firefox\extensions
[2006/07/31 12:41:00 | 00,364,544 | ---- | M] (BrightStreet.com) -- C:\Program Files\Mozilla Firefox\plugins\NPcol305.dll
[2005/12/05 21:31:00 | 00,114,688 | ---- | M] () -- C:\Program Files\Mozilla Firefox\plugins\npmozax.dll
[2007/09/05 13:56:00 | 00,352,256 | ---- | M] ( ) -- C:\Program Files\Mozilla Firefox\plugins\npsabffx.dll
[2008/09/15 10:52:06 | 00,376,832 | ---- | M] ( ) -- C:\Program Files\Mozilla Firefox\plugins\npsnapfish.dll

O1 HOSTS File: (734 bytes) - C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (Adobe PDF Link Helper) - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (Adobe Systems Incorporated)
O2 - BHO: (PC Tools Browser Guard BHO) - {2A0F3D1B-0909-4FF4-B272-609CCE6054E7} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O2 - BHO: (DriveLetterAccess) - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\SYSTEM32\dla\tfswshx.dll (Sonic Solutions)
O2 - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll (McAfee, Inc.)
O2 - BHO: (Java™ Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll (Sun Microsystems, Inc.)
O2 - BHO: (JQSIEStartDetectorImpl Class) - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll (Sun Microsystems, Inc.)
O3 - HKLM\..\Toolbar: (PC Tools Browser Guard) - {472734EA-242A-422B-ADF8-83D1E48CC825} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O3 - HKU\.DEFAULT\..\Toolbar\WebBrowser: (no name) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No CLSID value found.
O3 - HKU\S-1-5-18\..\Toolbar\WebBrowser: (no name) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No CLSID value found.
O3 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\..\Toolbar\ShellBrowser: (no name) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No CLSID value found.
O3 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\..\Toolbar\WebBrowser: (PC Tools Browser Guard) - {472734EA-242A-422B-ADF8-83D1E48CC825} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O4 - HKLM..\Run: [Adobe ARM] C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe (Adobe Systems Incorporated)
O4 - HKLM..\Run: [Adobe Reader Speed Launcher] C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe (Adobe Systems Incorporated)
O4 - HKLM..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe (Apple Inc.)
O4 - HKLM..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe (ATI Technologies, Inc.)
O4 - HKLM..\Run: [Carbonite Backup] C:\Program Files\Carbonite\Carbonite Backup\CarboniteUI.exe (Carbonite, Inc.)
O4 - HKLM..\Run: [CTSysVol] C:\Program Files\Creative\Sound Blaster Live! 24-bit\Surround Mixer\CTSysVol.exe (Creative Technology Ltd)
O4 - HKLM..\Run: [dla] C:\WINDOWS\SYSTEM32\dla\tfswctrl.exe (Sonic Solutions)
O4 - HKLM..\Run: [ISTray] C:\Program Files\Spyware Doctor\pctsTray.exe (PC Tools)
O4 - HKLM..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe (Apple Inc.)
O4 - HKLM..\Run: [mcagent_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe (McAfee, Inc.)
O4 - HKLM..\Run: [P17Helper] C:\WINDOWS\System32\P17.dll ()
O4 - HKLM..\Run: [QuickTime Task] C:\Program Files\QuickTime\QTTask.exe (Apple Inc.)
O4 - HKLM..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre6\bin\jusched.exe (Sun Microsystems, Inc.)
O4 - HKLM..\Run: [UpdateManager] C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe (Sonic Solutions)
O4 - HKLM..\Run: [UpdReg] C:\WINDOWS\Updreg.EXE (Creative Technology Ltd.)
O4 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008..\Run: [MoneyInsights] C:\Program Files\Microsoft Money Plus\MNYCoreFiles\mnyinsit.exe (Microsoft® Corporation)
O4 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe (SUPERAntiSpyware.com)
O4 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008..\Run: [Yahoo! Pager] C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe (Yahoo! Inc.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\APC UPS Status.lnk = C:\Program Files\APC\APC PowerChute Personal Edition\Display.exe (American Power Conversion Corporation)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk = C:\Program Files\Windows Desktop Search\WindowsSearch.exe (Microsoft Corporation)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoCDBurning = 0
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O10 - NameSpace_Catalog5\Catalog_Entries\000000000004 [] - C:\Program Files\Bonjour\mdnsNSP.dll (Apple Inc.)
O15 - HKLM\..Trusted Domains: localhost ([]http in Local intranet)
O15 - HKLM\..Trusted Domains: musicmatch.com ([online] https in Trusted sites)
O15 - HKLM\..Trusted Domains: 51 domain(s) and sub-domain(s) not assigned to a zone.
O15 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\..Trusted Domains: //@surf.mar@ ([]money in Local intranet)
O15 - HKU\S-1-5-21-4235227392-585042843-2776331372-1008\..Trusted Domains: //@surf.mar@/ ([]money in Local intranet)
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} http://download.macromedia.com/pub/shockwa...director/sw.cab (Shockwave ActiveX Control)
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} http://go.microsoft.com/fwlink/?linkid=39204 (Windows Genuine Advantage Validation Tool)
O16 - DPF: {3DA5D23B-EFE1-4181-ADB7-7D457567AACA} http://zone.msn.com/bingame/pacz/default/pandaonline.cab (TGOnlineCtrl Class)
O16 - DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} http://office.microsoft.com/officeupdate/content/opuc.cab (Office Update Installation Engine)
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} http://www1.snapfish.com/SnapfishActivia.cab (Snapfish Activia)
O16 - DPF: {4B9F2C37-C0CF-42BC-BB2D-DCFA8B25CABF} http://zone.msn.com/bingame/rock/default/popcaploader1.cab (Reg Error: Key error.)
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} http://cdn.scan.onecare.live.com/resource/...lscbase8942.cab (Windows Live Safety Center Base Module)
O16 - DPF: {639658F3-B141-4D6B-B936-226F75A5EAC3} http://zone.msn.com/bingame/dsh2/default/D...h2.1.0.0.68.cab (CPlayFirstDinerDash2Control Object)
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} http://zone.msn.com/bingame/amun/default/mjolauncher.cab (MJLauncherCtrl Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_17)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flash...t/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {9AA73F41-EC64-489E-9A73-9CD52E528BC4} http://zone.msn.com/binGame/ZAxRcMgr.cab (ZoneAxRcMgr Class)
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} http://cdn2.zone.msn.com/binFramework/v10/...ro.cab56649.cab (MSN Games - Installer)
O16 - DPF: {BAE1D8DF-0B35-47E3-A1E7-EEB3FF2ECD19} http://zone.msn.com/bingame/fotg/default/ddfotg.1.0.0.37.cab (CPlayFirstddfotgControl Object)
O16 - DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_07)
O16 - DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_17)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_17)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload.macromedia.com/get/flash...ent/swflash.cab (Shockwave Flash Object)
O16 - DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} http://zone.msn.com/bingame/feed/default/SproutLauncher.cab (SproutLauncherCtrl Class)
O16 - DPF: {D719897A-B07A-4C0C-AEA9-9B663A28DFCB} http://ax.phobos.apple.com.edgesuite.net/d.../ITDetector.cab (iTunesDetector Class)
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} http://zone.msn.com/bingame/shpo/default/shapo.cab (TikGames Online Control)
O16 - DPF: {DAF5D9A2-D982-4671-83E4-0398706A5F6A} http://zone.msn.com/bingame/hsol/default/SCEWebLauncher.cab (SCEWebLauncherCtl Object)
O16 - DPF: {DC75FEF6-165D-4D25-A518-C8C4BDA7BAA6} http://zone.msn.com/bingame/dash/default/D...sh.1.0.0.94.cab (CPlayFirstDinerDashControl Object)
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} http://fdl.msn.com/zone/datafiles/heartbeat.cab (Reg Error: Key error.)
O16 - DPF: {E7DBFB6C-113A-47CF-B278-F5C6AF4DE1BD} http://download.abacast.com/download/files/abasetup162.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 68.87.64.150 68.87.75.198
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll (SUPERAntiSpyware.com)
O28 - HKLM ShellExecuteHooks: {56F9679E-7826-4C84-81F3-532071A8BCC5} - C:\Program Files\Windows Desktop Search\MsnlNamespaceMgr.dll (Microsoft Corporation)
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2004/08/10 14:04:08 | 00,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - comfile [open] -- "%1" %*
O35 - exefile [open] -- "%1" %*

NetSvcs: 6to4 - File not found
NetSvcs: Ias - C:\WINDOWS\SYSTEM32\IAS [2004/12/12 09:50:14 | 00,000,000 | ---D | M]
NetSvcs: Iprip - File not found
NetSvcs: Irmon - File not found
NetSvcs: NWCWorkstation - File not found
NetSvcs: Nwsapagent - File not found
NetSvcs: Wmi - C:\WINDOWS\SYSTEM32\wmi.dll (Microsoft Corporation)
NetSvcs: WmdmPmSp - File not found

CREATERESTOREPOINT
Restore point Set: OTL Restore Point (58831718991265792)

========== Files/Folders - Created Within 14 Days ==========

[2009/12/12 11:00:31 | 00,538,112 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\Charles\Desktop\OTL.exe
[2009/12/11 11:02:32 | 00,472,064 | ---- | C] ( ) -- C:\Documents and Settings\Charles\Desktop\RootRepeal.exe
[2009/12/10 22:44:37 | 00,000,000 | ---D | C] -- C:\Program Files\Windows Live Safety Center
[2009/12/10 22:44:35 | 00,000,000 | ---D | C] -- C:\WINDOWS\LastGood
[2009/12/10 21:45:49 | 00,000,000 | ---D | C] -- C:\Program Files\Common Files\Wise Installation Wizard
[2009/12/10 17:38:48 | 00,000,000 | ---D | C] -- C:\Program Files\Trend Micro
[2009/12/05 00:10:11 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Local Settings\Application Data\Viewpoint
[2009/12/05 00:10:01 | 00,000,000 | ---D | C] -- C:\Program Files\Common Files\Viewpoint
[2009/12/01 18:00:30 | 00,157,712 | ---- | C] (Trend Micro Inc.) -- C:\WINDOWS\System32\drivers\tmcomm.sys
[2009/11/30 09:07:49 | 00,000,000 | ---D | C] -- C:\VundoFix Backups
[2009/11/21 16:36:35 | 00,000,000 | --SD | M] -- C:\Documents and Settings\LocalService\Application Data\Microsoft
[2009/07/25 00:05:48 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft
[2009/07/21 19:00:43 | 00,000,000 | ---D | M] -- C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft
[2007/08/13 21:30:01 | 00,000,000 | ---D | M] -- C:\Documents and Settings\NetworkService\Local Settings\Application Data\Apple
[2007/02/16 09:01:37 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Local Settings\Application Data\Google
[2007/02/16 09:01:37 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Application Data\Google
[2006/12/06 23:02:28 | 00,000,000 | --SD | M] -- C:\Documents and Settings\NetworkService\Application Data\Microsoft
[2005/01/27 20:34:00 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Application Data\Macromedia
[2005/01/06 18:23:02 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Application Data\GTek
[1980/01/01 01:00:00 | 00,151,552 | ---- | C] ( ) -- C:\WINDOWS\System32\ATIDEMGR.dll
[1980/01/01 01:00:00 | 00,065,536 | ---- | C] ( ) -- C:\WINDOWS\System32\A3d.dll
[8 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[8 C:\Documents and Settings\Charles\My Documents\*.tmp files -> C:\Documents and Settings\Charles\My Documents\*.tmp -> ]
[1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\*.tmp files -> C:\*.tmp -> ]

========== Files - Modified Within 14 Days ==========

[2009/12/12 11:33:22 | 37,883,904 | ---- | M] () -- C:\Documents and Settings\Charles\My Documents\My Money.mny
[2009/12/12 11:33:22 | 00,000,320 | ---- | M] () -- C:\Documents and Settings\Charles\My Documents\My Money.lrd
[2009/12/12 11:32:31 | 00,944,128 | ---- | M] () -- C:\Documents and Settings\Charles\Desktop\Master.xls
[2009/12/12 11:00:33 | 00,538,112 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Charles\Desktop\OTL.exe
[2009/12/11 22:40:00 | 00,014,963 | ---- | M] () -- C:\WINDOWS\System32\Config.MPF
[2009/12/11 11:02:59 | 00,000,000 | ---- | M] () -- C:\Documents and Settings\Charles\Desktop\settings.dat
[2009/12/11 11:02:32 | 00,472,064 | ---- | M] ( ) -- C:\Documents and Settings\Charles\Desktop\RootRepeal.exe
[2009/12/11 10:52:00 | 00,223,785 | ---- | M] () -- C:\Documents and Settings\Charles\Desktop\Master.zip
[2009/12/11 10:49:19 | 00,524,288 | ---- | M] () -- C:\Documents and Settings\Charles\Desktop\dds.scr
[2009/12/10 22:40:43 | 00,002,206 | ---- | M] () -- C:\WINDOWS\System32\WPA.DBL
[2009/12/10 22:39:29 | 00,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2009/12/10 22:39:22 | 00,002,048 | --S- | M] () -- C:\WINDOWS\BOOTSTAT.DAT
[2009/12/10 22:39:20 | 10,717,96224 | -HS- | M] () -- C:\hiberfil.sys
[2009/12/10 22:37:36 | 05,505,024 | -H-- | M] () -- C:\Documents and Settings\Charles\NTUSER.DAT
[2009/12/10 22:37:36 | 00,000,278 | -HS- | M] () -- C:\Documents and Settings\Charles\NTUSER.INI
[2009/12/10 21:46:41 | 00,000,780 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\SUPERAntiSpyware Free Edition.lnk
[2009/12/09 09:10:00 | 00,423,470 | ---- | M] () -- C:\WINDOWS\System32\PERFH009.DAT
[2009/12/09 09:09:59 | 00,068,984 | ---- | M] () -- C:\WINDOWS\System32\PERFC009.DAT
[2009/12/09 09:09:55 | 00,501,090 | ---- | M] () -- C:\WINDOWS\System32\PerfStringBackup.INI
[2009/12/09 08:59:46 | 00,001,374 | ---- | M] () -- C:\WINDOWS\imsins.BAK
[2009/12/07 07:48:06 | 00,000,284 | ---- | M] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2009/12/03 16:14:06 | 00,038,224 | ---- | M] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbamswissarmy.sys
[2009/12/03 16:13:56 | 00,019,160 | ---- | M] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2009/12/01 17:59:01 | 00,000,036 | ---- | M] () -- C:\Documents and Settings\Charles\Local Settings\Application Data\housecall.guid.cache
[2009/12/01 01:00:09 | 00,000,322 | ---- | M] () -- C:\WINDOWS\tasks\McQcTask.job
[8 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[8 C:\Documents and Settings\Charles\My Documents\*.tmp files -> C:\Documents and Settings\Charles\My Documents\*.tmp -> ]
[1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\*.tmp files -> C:\*.tmp -> ]

========== Files Created - No Company Name ==========

[2009/12/11 11:02:59 | 00,000,000 | ---- | C] () -- C:\Documents and Settings\Charles\Desktop\settings.dat
[2009/12/11 10:49:06 | 00,524,288 | ---- | C] () -- C:\Documents and Settings\Charles\Desktop\dds.scr
[2009/12/10 22:42:07 | 00,000,320 | ---- | C] () -- C:\Documents and Settings\Charles\My Documents\My Money.lrd
[2009/12/10 21:46:41 | 00,000,780 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\SUPERAntiSpyware Free Edition.lnk
[2009/12/01 17:59:01 | 00,000,036 | ---- | C] () -- C:\Documents and Settings\Charles\Local Settings\Application Data\housecall.guid.cache
[2009/11/16 10:35:00 | 00,767,952 | ---- | C] () -- C:\WINDOWS\BDTSupport.dll
[2008/08/15 14:47:57 | 00,870,128 | ---- | C] () -- C:\Documents and Settings\Charles\Application Data\mcs.rma
[2008/08/15 14:47:57 | 00,000,004 | ---- | C] () -- C:\Documents and Settings\Charles\Application Data\B63BF3
[2008/03/25 07:26:25 | 00,000,975 | ---- | C] () -- C:\WINDOWS\iScreensaver.ini
[2007/09/27 10:51:02 | 00,020,698 | ---- | C] () -- C:\WINDOWS\System32\idxcntrs.ini
[2007/09/27 10:48:48 | 00,030,628 | ---- | C] () -- C:\WINDOWS\System32\gsrvctr.ini
[2007/09/27 10:48:28 | 00,031,698 | ---- | C] () -- C:\WINDOWS\System32\gthrctr.ini
[2007/06/25 13:58:04 | 00,000,390 | ---- | C] () -- C:\WINDOWS\umaxuapi.ini
[2007/04/14 13:57:42 | 00,000,016 | ---- | C] () -- C:\WINDOWS\Temp.ini
[2007/04/12 07:01:22 | 00,000,026 | ---- | C] () -- C:\WINDOWS\Debug.ini
[2007/01/07 20:02:34 | 00,000,029 | ---- | C] () -- C:\WINDOWS\atid.ini
[2006/06/12 11:28:55 | 00,000,022 | ---- | C] () -- C:\WINDOWS\iexplore.ini
[2006/01/30 22:44:13 | 00,001,778 | ---- | C] () -- C:\Documents and Settings\All Users\Application Data\QTSBandwidthCache
[2005/06/10 00:19:25 | 00,000,449 | ---- | C] () -- C:\WINDOWS\cdPlayer.ini
[2005/05/28 21:22:23 | 00,000,819 | ---- | C] () -- C:\WINDOWS\CoDUO.INI
[2005/03/30 18:57:30 | 00,001,899 | ---- | C] () -- C:\WINDOWS\entpack.ini
[2005/03/26 16:51:10 | 00,000,766 | ---- | C] () -- C:\WINDOWS\CoD.INI
[2005/03/05 07:24:25 | 00,000,000 | ---- | C] () -- C:\WINDOWS\OPPRIN~1.INI
[2004/12/15 21:02:40 | 00,000,130 | ---- | C] () -- C:\Documents and Settings\Charles\Local Settings\Application Data\fusioncache.dat
[2004/12/15 19:48:53 | 00,000,002 | ---- | C] () -- C:\WINDOWS\msoffice.ini
[2004/12/15 02:16:53 | 00,000,120 | ---- | C] () -- C:\WINDOWS\setihome.ini
[2004/12/15 01:01:18 | 00,046,080 | ---- | C] () -- C:\Documents and Settings\Charles\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2004/12/12 10:33:16 | 00,000,061 | ---- | C] () -- C:\WINDOWS\smscfg.ini
[2004/12/12 10:27:52 | 00,000,347 | ---- | C] () -- C:\WINDOWS\wininit.ini
[2004/12/12 10:19:22 | 00,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2004/12/12 10:17:22 | 00,000,231 | ---- | C] () -- C:\WINDOWS\AC3API.INI
[2004/12/12 10:17:12 | 00,003,278 | ---- | C] () -- C:\WINDOWS\System32\LudaP17.ini
[2004/12/12 10:17:12 | 00,000,029 | ---- | C] () -- C:\WINDOWS\System32\ctzapxx.ini
[2004/12/12 10:17:07 | 00,000,072 | ---- | C] () -- C:\WINDOWS\SBWIN.INI
[2004/12/12 09:52:16 | 00,000,520 | ---- | C] () -- C:\WINDOWS\System32\OEMINFO.INI
[2004/09/15 23:03:14 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\px.ini
[2004/08/10 14:13:12 | 00,000,780 | ---- | C] () -- C:\WINDOWS\ORUN32.INI
[2004/08/04 06:00:00 | 00,001,793 | ---- | C] () -- C:\WINDOWS\System32\FXSPERF.INI
[2003/01/07 16:05:08 | 00,002,695 | ---- | C] () -- C:\WINDOWS\System32\OUTLPERF.INI
[1980/01/01 01:00:00 | 00,096,512 | ---- | C] () -- C:\WINDOWS\System32\drivers\atapi.sys
[1980/01/01 01:00:00 | 00,086,016 | ---- | C] () -- C:\WINDOWS\System32\ati2evxx.dll
[1980/01/01 01:00:00 | 00,060,928 | ---- | C] () -- C:\WINDOWS\System32\P17.dll
[1980/01/01 01:00:00 | 00,053,248 | ---- | C] () -- C:\WINDOWS\System32\P17CPI.dll
[1980/01/01 01:00:00 | 00,012,288 | ---- | C] () -- C:\WINDOWS\System32\e100bmsg.dll

========== LOP Check ==========

[2004/12/12 10:16:16 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\BVRP Software
[2008/09/18 01:09:12 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Carbonite
[2005/06/16 19:49:52 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\GameHouse
[2009/10/24 09:17:25 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\GARMIN
[2005/11/21 11:13:27 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\MumboJumbo
[2007/01/08 09:48:00 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\PlayFirst
[2004/12/28 15:54:33 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\PopCap
[2009/11/22 15:23:05 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\SupportSoft
[2009/12/12 05:46:37 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\TEMP
[2009/12/05 08:17:03 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Viewpoint
[2009/03/16 07:52:25 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\{00D89592-F643-4D8D-8F0F-AFAE0F14D4C3}
[2009/10/10 10:55:11 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
[2009/06/05 10:45:22 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}
[2005/03/11 21:33:22 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Amy\Application Data\Leadertech
[2005/06/24 07:17:21 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Amy\Application Data\Musicmatch
[2007/01/08 09:28:00 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Amy\Application Data\PlayFirst
[2007/04/11 09:00:25 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Amy\Application Data\Snapfish
[2009/11/24 09:00:32 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Amy\Application Data\Windows Desktop Search
[2007/01/07 20:04:04 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\acccore
[2009/11/18 14:44:40 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Aim
[2009/10/24 09:15:51 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\GARMIN
[2008/03/25 07:26:08 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\iScreensaver
[2005/11/19 02:46:28 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Jasc
[2005/01/16 00:59:04 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Leadertech
[2007/05/04 18:56:05 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Snapfish
[2007/02/05 02:25:56 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Viewpoint
[2007/05/04 18:45:57 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Walgreens
[2009/11/21 16:19:50 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Windows Desktop Search
[2009/11/22 14:39:23 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Charles\Application Data\Windows Search
[2009/11/15 01:22:58 | 00,000,344 | ---- | M] () -- C:\WINDOWS\Tasks\McDefragTask.job
[2009/12/01 01:00:09 | 00,000,322 | ---- | M] () -- C:\WINDOWS\Tasks\McQcTask.job
[2006/10/23 00:47:00 | 00,000,264 | ---- | M] () -- C:\WINDOWS\Tasks\SHUTDOWN.job

========== Purity Check ==========



========== Custom Scans ==========


< %SYSTEMDRIVE%\*.exe >


< MD5 for: AGP440.SYS >
[2008/04/13 13:36:38 | 00,042,368 | ---- | M] (Microsoft Corporation) MD5=08FD04AA961BDC77FB983F328334E3D7 -- C:\WINDOWS\ServicePackFiles\i386\agp440.sys
[2008/04/13 13:36:38 | 00,042,368 | ---- | M] (Microsoft Corporation) MD5=08FD04AA961BDC77FB983F328334E3D7 -- C:\WINDOWS\SYSTEM32\DRIVERS\agp440.sys
[2004/08/04 00:07:42 | 00,042,368 | ---- | M] (Microsoft Corporation) MD5=2C428FA0C3E3A01ED93C9B2A27D8D4BB -- C:\I386\AGP440.SYS
[2004/08/04 00:07:42 | 00,042,368 | ---- | M] (Microsoft Corporation) MD5=2C428FA0C3E3A01ED93C9B2A27D8D4BB -- C:\WINDOWS\$NtServicePackUninstall$\agp440.sys

< MD5 for: ATAPI.SYS >
[2008/04/13 13:40:30 | 00,096,512 | ---- | M] (Microsoft Corporation) MD5=9F3A2F5AA6875C72BF062C712CFA2674 -- C:\WINDOWS\ServicePackFiles\i386\atapi.sys
[2004/08/03 23:59:44 | 00,095,360 | ---- | M] (Microsoft Corporation) MD5=CDFE4411A69C224BD1D11B2DA92DAC51 -- C:\I386\atapi.sys
[2004/08/03 23:59:44 | 00,095,360 | ---- | M] (Microsoft Corporation) MD5=CDFE4411A69C224BD1D11B2DA92DAC51 -- C:\WINDOWS\$NtServicePackUninstall$\atapi.sys
[2004/08/03 23:59:44 | 00,095,360 | ---- | M] (Microsoft Corporation) MD5=CDFE4411A69C224BD1D11B2DA92DAC51 -- C:\WINDOWS\SYSTEM32\ReinstallBackups\0005\DriverFiles\i386\atapi.sys
[2004/08/03 23:59:44 | 00,095,360 | ---- | M] (Microsoft Corporation) MD5=CDFE4411A69C224BD1D11B2DA92DAC51 -- C:\WINDOWS\SYSTEM32\ReinstallBackups\0013\DriverFiles\i386\atapi.sys
[2008/04/13 13:40:30 | 00,096,512 | ---- | M] () Unable to obtain MD5 -- C:\WINDOWS\SYSTEM32\DRIVERS\atapi.sys

< MD5 for: EVENTLOG.DLL >
[2008/04/13 19:11:53 | 00,056,320 | ---- | M] (Microsoft Corporation) MD5=6D4FEB43EE538FC5428CC7F0565AA656 -- C:\WINDOWS\ServicePackFiles\i386\eventlog.dll
[2008/04/13 19:11:53 | 00,056,320 | ---- | M] (Microsoft Corporation) MD5=6D4FEB43EE538FC5428CC7F0565AA656 -- C:\WINDOWS\SYSTEM32\eventlog.dll
[2004/08/04 06:00:00 | 00,055,808 | ---- | M] (Microsoft Corporation) MD5=82B24CB70E5944E6E34662205A2A5B78 -- C:\I386\EVENTLOG.DLL
[2004/08/04 06:00:00 | 00,055,808 | ---- | M] (Microsoft Corporation) MD5=82B24CB70E5944E6E34662205A2A5B78 -- C:\WINDOWS\$NtServicePackUninstall$\eventlog.dll

< MD5 for: NETLOGON.DLL >
[2008/04/13 19:12:01 | 00,407,040 | ---- | M] (Microsoft Corporation) MD5=1B7F071C51B77C272875C3A23E1E4550 -- C:\WINDOWS\ServicePackFiles\i386\netlogon.dll
[2008/04/13 19:12:01 | 00,407,040 | ---- | M] (Microsoft Corporation) MD5=1B7F071C51B77C272875C3A23E1E4550 -- C:\WINDOWS\SYSTEM32\netlogon.dll
[2004/08/04 06:00:00 | 00,407,040 | ---- | M] (Microsoft Corporation) MD5=96353FCECBA774BB8DA74A1C6507015A -- C:\I386\NETLOGON.DLL
[2004/08/04 06:00:00 | 00,407,040 | ---- | M] (Microsoft Corporation) MD5=96353FCECBA774BB8DA74A1C6507015A -- C:\WINDOWS\$NtServicePackUninstall$\netlogon.dll

< MD5 for: SCECLI.DLL >
[2004/08/04 06:00:00 | 00,180,224 | ---- | M] (Microsoft Corporation) MD5=0F78E27F563F2AAF74B91A49E2ABF19A -- C:\I386\SCECLI.DLL
[2004/08/04 06:00:00 | 00,180,224 | ---- | M] (Microsoft Corporation) MD5=0F78E27F563F2AAF74B91A49E2ABF19A -- C:\WINDOWS\$NtServicePackUninstall$\scecli.dll
[2008/04/13 19:12:05 | 00,181,248 | ---- | M] (Microsoft Corporation) MD5=A86BB5E61BF3E39B62AB4C7E7085A084 -- C:\WINDOWS\ServicePackFiles\i386\scecli.dll
[2008/04/13 19:12:05 | 00,181,248 | ---- | M] (Microsoft Corporation) MD5=A86BB5E61BF3E39B62AB4C7E7085A084 -- C:\WINDOWS\SYSTEM32\scecli.dll

< %systemroot%\*. /mp /s >

========== Alternate Data Streams ==========

@Alternate Data Stream - 211 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2
@Alternate Data Stream - 163 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:7B212553
@Alternate Data Stream - 119 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:2B99FE60
@Alternate Data Stream - 114 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:A8ADE5D8
< End of report >

=======================================================================================

OTL Extras logfile created on: 12/12/2009 11:35:04 AM - Run 1
OTL by OldTimer - Version 3.1.16.0 Folder = C:\Documents and Settings\Charles\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1022.07 Mb Total Physical Memory | 121.76 Mb Available Physical Memory | 11.91% Memory free
2.40 Gb Paging File | 1.19 Gb Available in Paging File | 49.53% Paging File free
Paging file location(s): C:\pagefile.sys 1536 3072 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 145.97 Gb Total Space | 84.19 Gb Free Space | 57.68% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: SPAZDELL
Current User Name: Charles
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: On
Skip Microsoft Files: On
File Age = 14 Days
Output = Standard
Quick Scan

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.html [@ = FirefoxHTML] -- C:\Program Files\Mozilla Firefox\firefox.exe (Mozilla Corporation)

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
htmlfile [edit] -- "C:\Program Files\Microsoft Office\OFFICE11\msohtmed.exe" %1 (Microsoft Corporation)
htmlfile [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)
htmlfile [opennew] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)
http [open] -- "C:\Program Files\Mozilla Firefox\firefox.exe" -requestPending -osint -url "%1" (Mozilla Corporation)
https [open] -- "C:\Program Files\Mozilla Firefox\firefox.exe" -requestPending -osint -url "%1" (Mozilla Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Applications\iexplore.exe [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)
CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} [OpenHomePage] -- "C:\Program Files\Internet Explorer\iexplore.exe" (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"AntiVirusOverride" = 0
"FirewallOverride" = 0
"AntiVirusDisableNotify" = 0
"FirewallDisableNotify" = 0
"UpdatesDisableNotify" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring" = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]
"DisableMonitoring" = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe" = C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe:*:Enabled:AOL -- File not found
"C:\Program Files\Common Files\AOL\ACS\AOLDial.exe" = C:\Program Files\Common Files\AOL\ACS\AOLDial.exe:*:Enabled:AOL -- File not found
"C:\Program Files\America Online 9.0\waol.exe" = C:\Program Files\America Online 9.0\waol.exe:*:Enabled:AOL -- File not found
"C:\Program Files\AIM\aim.exe" = C:\Program Files\AIM\aim.exe:*:Enabled:AOL Instant Messenger -- File not found

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe" = C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe:*:Enabled:AOL -- File not found
"C:\Program Files\Common Files\AOL\ACS\AOLDial.exe" = C:\Program Files\Common Files\AOL\ACS\AOLDial.exe:*:Enabled:AOL -- File not found
"C:\Program Files\America Online 9.0\waol.exe" = C:\Program Files\America Online 9.0\waol.exe:*:Enabled:AOL -- File not found
"C:\Program Files\Yahoo!\Messenger\YPager.exe" = C:\Program Files\Yahoo!\Messenger\YPager.exe:*:Enabled:Yahoo! Messenger -- File not found
"C:\Program Files\Yahoo!\Messenger\YServer.exe" = C:\Program Files\Yahoo!\Messenger\YServer.exe:*:Enabled:Yahoo! FT Server -- (Yahoo! Inc.)
"C:\Program Files\AIM\aim.exe" = C:\Program Files\AIM\aim.exe:*:Enabled:AOL Instant Messenger -- File not found
"C:\Program Files\Common Files\AOL\Loader\aolload.exe" = C:\Program Files\Common Files\AOL\Loader\aolload.exe:*:Enabled:AOL Loader -- (AOL LLC)
"C:\Program Files\Internet Explorer\IEXPLORE.EXE" = C:\Program Files\Internet Explorer\IEXPLORE.EXE:*:Enabled:Internet Explorer -- (Microsoft Corporation)
"C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" = C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe:*:Enabled:Yahoo! Messenger -- (Yahoo! Inc.)
"C:\Program Files\McAfee\MPF\MpfSrv.exe" = C:\Program Files\McAfee\MPF\MpfSrv.exe:*:Enabled:MPFSrv -- (McAfee, Inc.)
"C:\Program Files\Bonjour\mDNSResponder.exe" = C:\Program Files\Bonjour\mDNSResponder.exe:*:Enabled:Bonjour -- (Apple Inc.)
"C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe" = C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:*:Enabled:McAfee Network Agent -- (McAfee, Inc.)
"C:\Program Files\iTunes\iTunes.exe" = C:\Program Files\iTunes\iTunes.exe:*:Enabled:iTunes -- (Apple Inc.)


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C}" = Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
"{03737893-5BEE-4C78-9C58-3AE7F172BBBE}" = Garmin Communicator Plugin
"{06F80017-8F98-4C94-B868-52358569FC32}" = Command & Conquer Generals
"{07287123-B8AC-41CE-8346-3D777245C35B}" = Bonjour
"{09DA4F91-2A09-4232-AB8C-6BC740096DE3}" = Sonic Update Manager
"{0BEDBD4E-2D34-47B5-9973-57E62B29307C}" = ATI Control Panel
"{0EB5D9B7-8E6C-4A9E-B74F-16B7EE89A67B}" = Microsoft Plus! Photo Story 2 LE
"{1206EF92-2E83-4859-ACCB-2048C3CB7DA6}" = Sonic DLA
"{17334AAF-C9E7-483B-9F45-E3FCAF07FFA7}" = Intel® PROSet for Wired Connections
"{26A24AE4-039D-4CA4-87B4-2F83216017FF}" = Java™ 6 Update 17
"{287ECFA4-719A-2143-A09B-D6A12DE54E40}" = Acrobat.com
"{2DFF31F9-7893-4922-AF66-C9A1EB4EBB31}" = Rhapsody Player Engine
"{33BB4982-DC52-4886-A03B-F4C5C80BEE89}" = Windows Media Player 10
"{350C97B0-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{35BDEFF1-A610-4956-A00D-15453C116395}" = Internet Explorer Default Page
"{3AC54383-31D1-4907-961B-B12CBB1D0AE8}" = MobileMe Control Panel
"{3D047C15-C859-45F7-81CE-F2681778069B}" = iPod for Windows 2006-01-10
"{3F92ABBB-6BBF-11D5-B229-002078017FBF}" = NetWaiting
"{4B9F45E8-E3CE-40B4-9463-80A9B3481DEF}" = Banctec Service Agreement
"{56F3E1FF-54FE-4384-A153-6CCABA097814}" = Creative MediaSource
"{5905F42D-3F5F-4916-ADA6-94A3646AEE76}" = Dell Driver Reset Tool
"{5A0C892E-FD1C-4203-941E-0956AED20A6A}" = APC PowerChute Personal Edition
"{65F9E1F3-A2C1-4AA9-9F33-A3AEB0255F0E}" = Garmin USB Drivers
"{66563AD8-637B-407F-BCA7-0233A16891AB}" = Business Contact Manager for Outlook 2003
"{6956856F-B6B3-4BE0-BA0B-8F495BE32033}" = Apple Software Update
"{6E179C77-7335-458D-9537-4F4EAC0181ED}" = Photo Click
"{6E45BA47-383C-4C1E-8ED0-0D4845C293D7}" = Microsoft Plus! Digital Media Edition Installer
"{728278A1-0BB7-45E4-AC5E-91D7C0FD1EDE}" = EarthLink setup files
"{7A3F0566-5E05-4919-9C98-456F6B5CF831}" = Get High Speed Internet!
"{7F142D56-3326-11D5-B229-002078017FBF}" = Modem Helper
"{7F1B3341-A94E-4F5C-B587-CA0EB964221E}" = Microsoft Money Shared Libraries
"{81A34902-9D0B-4920-A25C-4CDC5D14B328}" = Jasc Paint Shop Pro 8 Dell Edition
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-110322783}" = Big Kahuna Reef
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-112179547}" = Mystery Case Files Ravenhearst
"{85D3CC30-8859-481A-9654-FD9B74310BEF}" = Musicmatch® Jukebox
"{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}" = Microsoft Silverlight
"{91110409-6000-11D3-8CFE-0150048383C9}" = Microsoft Office Professional Edition 2003
"{92B94569-6683-4617-8C54-EB27A1B51B30}" = GTAIII
"{9541FED0-327F-4DF0-8B96-EF57EF622F19}" = Sonic RecordNow!
"{9A25302D-30C0-39D9-BD6F-21E6EC160475}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
"{9C48DCA4-00C2-449C-88D8-B1EE1692B44F}" = Safari
"{A2BCA9F1-566C-4805-97D1-7FDC93386723}" = Adobe AIR
"{A429C2AE-EBF1-4F81-A221-1C115CAADDAD}" = QuickTime
"{A5CC2A09-E9D3-49EC-923D-03874BBD4C2C}" = Windows Defender Signatures
"{A662E280-64A8-4CF5-8407-13D0808602B3}" = Call of Duty - United Offensive
"{AADEA55D-C834-4BCB-98A3-4B8D1C18F4EE}" = Apple Mobile Device Support
"{AC0EE5B0-A8FB-4D0A-AF03-2EDC518F841B}" = Dell Media Experience
"{AC76BA86-7AD7-1033-7B44-A92000000001}" = Adobe Reader 9.2
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy
"{B607C354-CD79-4D22-86D1-92DC94153F42}" = Apple Application Support
"{C2E8B236-7554-45FE-92C0-94EF76E4D182}" = Garmin City Navigator North America NT 2010.20
"{C3ABE126-2BB2-4246-BFE1-6797679B3579}" = LG USB Modem driver
"{CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1}" = Microsoft .NET Framework 1.1
"{CC000127-5E5D-4A1C-90CB-EEAAAC1E3AC0}" = Jasc Paint Shop Photo Album
"{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}" = SUPERAntiSpyware Free Edition
"{CDE4CC8B-134B-421E-943C-90799E56F664}" = Dell Media Experience Update
"{CEB481CC-F57C-4397-81A0-DADD22257047}" = Sound Blaster Live! 24-bit
"{D1A74FBB-CA8D-4CCA-9B89-BAAA436DB178}" = iTunes
"{D9F4A9F8-92C5-4289-9D04-F0F8F02D580A}" = iPod for Windows 2005-10-12
"{E1423608-F529-40A1-93CA-C7F396F30DF0}" = Google SketchUp
"{E3436EE2-D5CB-4249-840B-3A0140CC34C3}" = Classic PhoneTools
"{E646DCF0-5A68-11D5-B229-002078017FBF}" = Digital Line Detect
"{F3E9C243-122E-4D6B-ACC1-E1FEC02F6CA1}" = Command and ConquerTM Generals Zero Hour
"49CF605F02C7954F4E139D18828DE298CD59217C" = Windows Driver Package - Garmin (grmnusb) GARMIN Devices (06/03/2009 2.3.0.0)
"Abacast Client" = Abacast Client
"Adobe AIR" = Adobe AIR
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe Flash Player Plugin" = Adobe Flash Player 10 Plugin
"AIM_6.0" = AIM 6.0
"ATI Display Driver" = ATI Display Driver
"Audacity_is1" = Audacity 1.2.6
"Browser Defender_is1" = Browser Defender 2.0.6.10
"Call of Duty Game of the Year Edition" = Call of Duty Game of the Year Edition
"Canon Camera WIA Driver IXY 200a, PowerShot S200, IXUS v2" = Canon IXY 200a, PowerShot S200, IXUS v2 WIA Driver
"Canon PhotoStitch 3.1" = Canon Utilities PhotoStitch 3.1
"Canon Utilities RAW Image Converter2" = Canon Utilities RAW Image Converter2
"Carbonite Backup" = Carbonite
"CNXT_MODEM_PCI_VEN_14F1&DEV_2F20&SUBSYS_200F14F1" = Conexant D850 56K V.9x DFVc Modem
"CtraxAX" = CtraxAX
"Dell Digital Jukebox Driver" = Dell Digital Jukebox Driver
"IDNMitigationAPIs" = Microsoft Internationalized Domain Names Mitigation APIs
"ie7" = Windows Internet Explorer 7
"ie8" = Windows Internet Explorer 8
"InstallShield_{06F80017-8F98-4C94-B868-52358569FC32}" = Command & Conquer Generals
"InstallShield_{3D047C15-C859-45F7-81CE-F2681778069B}" = iPod for Windows 2006-01-10
"InstallShield_{A662E280-64A8-4CF5-8407-13D0808602B3}" = Call of Duty - United Offensive
"InstallShield_{D9F4A9F8-92C5-4289-9D04-F0F8F02D580A}" = iPod for Windows 2005-10-12
"InstallShield_{F3E9C243-122E-4D6B-ACC1-E1FEC02F6CA1}" = Command and ConquerTM Generals Zero Hour
"Macromedia Shockwave Player" = Macromedia Shockwave Player
"Malwarebytes' Anti-Malware_is1" = Malwarebytes' Anti-Malware
"Microsoft .NET Framework 1.1 (1033)" = Microsoft .NET Framework 1.1
"Money2008b" = Microsoft Money Plus
"Mozilla Firefox (3.5.5)" = Mozilla Firefox (3.5.5)
"MSC" = McAfee SecurityCenter
"MSCompPackV1" = Microsoft Compression Client Pack 1.0 for Windows XP
"NLSDownlevelMapping" = Microsoft National Language Support Downlevel APIs
"PhotoRecord" = Canon PhotoRecord
"PROSet" = Intel® PRO Network Adapters and Drivers
"RealArcade 1.2" = RealArcade
"RealPlayer 6.0" = RealPlayer Basic
"RemoteCapture" = Canon Utilities RemoteCapture 2.4
"RUSH 24-7 Pearls of Wisdom Screensaver" = RUSH 24-7 Pearls of Wisdom Screensaver
"Spyware Doctor" = Spyware Doctor 7.0
"StreetPlugin" = Learn2 Player (Uninstall Only)
"V CAST Music with Rhapsody" = V CAST Music with Rhapsody
"Windows Live OneCare safety scanner" = Windows Live OneCare safety scanner
"Windows Media Format Runtime" = Windows Media Format 11 runtime
"Windows Media Player" = Windows Media Player 11
"Windows XP Service Pack" = Windows XP Service Pack 3
"WMFDist11" = Windows Media Format 11 runtime
"wmp11" = Windows Media Player 11
"Wudf01000" = Microsoft User-Mode Driver Framework Feature Pack 1.0
"Yahoo! Messenger" = Yahoo! Messenger
"ZoomBrowserEXDeInstall" = Canon Utilities ZoomBrowser EX

========== HKEY_USERS Uninstall List ==========

[HKEY_USERS\S-1-5-21-4235227392-585042843-2776331372-1008\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"Move Media Player" = Move Media Player

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 12/2/2009 2:54:28 PM | Computer Name = SPAZDELL | Source = VSS | ID = 12292
Description = Volume Shadow Copy Service error: Error creating the Shadow Copy Provider
COM class with CLSID {65ee1dba-8ff4-4a58-ac1c-3470ee2f376a} [0x8007041d].

Error - 12/3/2009 1:43:06 AM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/5/2009 3:07:12 PM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/5/2009 3:14:18 PM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/5/2009 3:27:05 PM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/5/2009 3:30:11 PM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/8/2009 3:12:39 AM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/9/2009 2:38:28 PM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/10/2009 4:59:19 AM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application firefox.exe, version 1.9.1.3593, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 12/10/2009 5:39:09 AM | Computer Name = SPAZDELL | Source = Application Hang | ID = 1002
Description = Hanging application iexplore.exe, version 8.0.6001.18702, hang module
hungapp, version 0.0.0.0, hang address 0x00000000.

[ System Events ]
Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:34 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 10:06:35 AM | Computer Name = SPAZDELL | Source = Service Control Manager | ID = 7023
Description = The Application Management service terminated with the following error:
%%126

Error - 12/11/2009 11:39:27 PM | Computer Name = SPAZDELL | Source = Dhcp | ID = 1002
Description = The IP address lease 192.168.1.100 for the Network Card with network
address 0011117E9B36 has been denied by the DHCP server 192.168.1.1 (The DHCP Server
sent a DHCPNACK message).


< End of report >

Attached Files

  • Attached File  GMER.txt   410.78KB   1 downloads

Edited by CRSinPhilly, 12 December 2009 - 01:21 PM.


#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:37 PM

Posted 12 December 2009 - 03:41 PM

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 CRSinPhilly

CRSinPhilly
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:37 PM

Posted 12 December 2009 - 04:09 PM

OK. It doesn't say "Hidden service detected" but in the command prompt it does say "To finalize removal of infection and avoid loosing of data program will reboot your PC now. Close all programs and choose Y to restart or N to continue"

Should I choose Y to reboot now? Don't want to do anything unless you say so.

=====================================================================================

16:4:23:953 2896 ForceUnloadDriver: NtUnloadDriver error 2
16:4:23:953 2896 ForceUnloadDriver: NtUnloadDriver error 2
16:4:23:953 2896 ForceUnloadDriver: NtUnloadDriver error 2
16:4:23:984 2896 main: Driver KLMD successfully dropped
16:4:24:31 2896 main: Driver KLMD successfully loaded
16:4:24:31 2896
Scanning Registry ...
16:4:24:31 2896 ScanServices: Searching service UACd.sys
16:4:24:31 2896 ScanServices: Open/Create key error 2
16:4:24:31 2896 ScanServices: Searching service TDSSserv.sys
16:4:24:31 2896 ScanServices: Open/Create key error 2
16:4:24:31 2896 ScanServices: Searching service gaopdxserv.sys
16:4:24:31 2896 ScanServices: Open/Create key error 2
16:4:24:31 2896 ScanServices: Searching service gxvxcserv.sys
16:4:24:31 2896 ScanServices: Open/Create key error 2
16:4:24:31 2896 ScanServices: Searching service MSIVXserv.sys
16:4:24:31 2896 ScanServices: Open/Create key error 2
16:4:24:31 2896 UnhookRegistry: Kernel module file name: C:\windows\system32\ntkrnlpa.exe, base addr: 804D7000
16:4:24:78 2896 UnhookRegistry: Kernel local addr: 10E0000
16:4:24:109 2896 UnhookRegistry: KeServiceDescriptorTable addr: 1165700
16:4:24:218 2896 UnhookRegistry: KiServiceTable addr: 110D460
16:4:24:234 2896 UnhookRegistry: NtEnumerateKey service number (local): 47
16:4:24:234 2896 UnhookRegistry: NtEnumerateKey local addr: 122CFF2
16:4:24:234 2896 KLMD_OpenDevice: Trying to open KLMD device
16:4:24:234 2896 KLMD_GetSystemRoutineAddressA: Trying to get system routine address ZwEnumerateKey
16:4:24:234 2896 KLMD_GetSystemRoutineAddressW: Trying to get system routine address ZwEnumerateKey
16:4:24:234 2896 KLMD_ReadMem: Trying to ReadMemory 0x805002C9[0x4]
16:4:24:234 2896 UnhookRegistry: NtEnumerateKey service number (kernel): 47
16:4:24:234 2896 KLMD_ReadMem: Trying to ReadMemory 0x8050457C[0x4]
16:4:24:234 2896 UnhookRegistry: NtEnumerateKey real addr: 80623FF2
16:4:24:234 2896 UnhookRegistry: NtEnumerateKey calc addr: 80623FF2
16:4:24:234 2896 UnhookRegistry: No SDT hooks found on NtEnumerateKey
16:4:24:234 2896 KLMD_ReadMem: Trying to ReadMemory 0x80623FF2[0xA]
16:4:24:234 2896 UnhookRegistry: Splicing found on NtEnumerateKey
16:4:24:234 2896 KLMD_WriteMem: Trying to WriteMemory 0x80623FF2[0xA]
16:4:24:234 2896 UnhookRegistry: NtEnumerateKey (Splicing) unhooked successfully
16:4:24:234 2896
Scanning Kernel memory ...
16:4:24:234 2896 KLMD_OpenDevice: Trying to open KLMD device
16:4:24:234 2896 KLMD_GetSystemObjectAddressByNameA: Trying to get system object address by name \Driver\Disk
16:4:24:234 2896 KLMD_GetSystemObjectAddressByNameW: Trying to get system object address by name \Driver\Disk
16:4:24:234 2896 DetectCureTDL3: \Driver\Disk PDRIVER_OBJECT: 86D57990
16:4:24:234 2896 DetectCureTDL3: KLMD_GetDeviceObjectList returned 4 DevObjects
16:4:24:234 2896 DetectCureTDL3: 0 Curr stack PDEVICE_OBJECT: 86D449E0
16:4:24:234 2896 KLMD_GetLowerDeviceObject: Trying to get lower device object for 86D449E0
16:4:24:234 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D449E0[0x38]
16:4:24:234 2896 DetectCureTDL3: DRIVER_OBJECT addr: 86D57990
16:4:24:234 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D57990[0xA8]
16:4:24:234 2896 KLMD_ReadMem: Trying to ReadMemory 0xE17F2868[0x208]
16:4:24:234 2896 DetectCureTDL3: DRIVER_OBJECT name: \Driver\Disk, Driver Name: Disk
16:4:24:234 2896 DetectCureTDL3: IrpHandler (0) addr: F7558BB0
16:4:24:250 2896 DetectCureTDL3: IrpHandler (1) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (2) addr: F7558BB0
16:4:24:250 2896 DetectCureTDL3: IrpHandler (3) addr: F7552D1F
16:4:24:250 2896 DetectCureTDL3: IrpHandler (4) addr: F7552D1F
16:4:24:250 2896 DetectCureTDL3: IrpHandler (5) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (6) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (7) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (8) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (9) addr: F75532E2
16:4:24:250 2896 DetectCureTDL3: IrpHandler (10) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (11) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (12) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (13) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (14) addr: F75533BB
16:4:24:250 2896 DetectCureTDL3: IrpHandler (15) addr: F7556F28
16:4:24:250 2896 DetectCureTDL3: IrpHandler (16) addr: F75532E2
16:4:24:250 2896 DetectCureTDL3: IrpHandler (17) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (18) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (19) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (20) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (21) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (22) addr: F7554C82
16:4:24:250 2896 DetectCureTDL3: IrpHandler (23) addr: F755999E
16:4:24:250 2896 DetectCureTDL3: IrpHandler (24) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (25) addr: 804F4562
16:4:24:250 2896 DetectCureTDL3: IrpHandler (26) addr: 804F4562
16:4:24:250 2896 KLMD_ReadMem: Trying to ReadMemory 0x0[0x400]
16:4:24:250 2896 KLMD_ReadMem: DeviceIoControl error 1
16:4:24:250 2896 TDL3_StartIoHookDetect: Unable to get StartIo handler code
16:4:24:250 2896 TDL3_FileDetect: Processing driver: Disk
16:4:24:250 2896 TDL3_FileDetect: Parameters: C:\WINDOWS\system32\drivers\disk.sys, C:\WINDOWS\system32\Drivers\tsk_disk.sys, SYSTEM\CurrentControlSet\Services\Disk, system32\Drivers\tsk_disk.sys
16:4:24:250 2896 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\drivers\disk.sys
16:4:24:250 2896 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\drivers\disk.sys
16:4:24:265 2896 DetectCureTDL3: 1 Curr stack PDEVICE_OBJECT: 86D70C68
16:4:24:265 2896 KLMD_GetLowerDeviceObject: Trying to get lower device object for 86D70C68
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D70C68[0x38]
16:4:24:265 2896 DetectCureTDL3: DRIVER_OBJECT addr: 86D57990
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D57990[0xA8]
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0xE17F2868[0x208]
16:4:24:265 2896 DetectCureTDL3: DRIVER_OBJECT name: \Driver\Disk, Driver Name: Disk
16:4:24:265 2896 DetectCureTDL3: IrpHandler (0) addr: F7558BB0
16:4:24:265 2896 DetectCureTDL3: IrpHandler (1) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (2) addr: F7558BB0
16:4:24:265 2896 DetectCureTDL3: IrpHandler (3) addr: F7552D1F
16:4:24:265 2896 DetectCureTDL3: IrpHandler (4) addr: F7552D1F
16:4:24:265 2896 DetectCureTDL3: IrpHandler (5) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (6) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (7) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (8) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (9) addr: F75532E2
16:4:24:265 2896 DetectCureTDL3: IrpHandler (10) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (11) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (12) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (13) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (14) addr: F75533BB
16:4:24:265 2896 DetectCureTDL3: IrpHandler (15) addr: F7556F28
16:4:24:265 2896 DetectCureTDL3: IrpHandler (16) addr: F75532E2
16:4:24:265 2896 DetectCureTDL3: IrpHandler (17) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (18) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (19) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (20) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (21) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (22) addr: F7554C82
16:4:24:265 2896 DetectCureTDL3: IrpHandler (23) addr: F755999E
16:4:24:265 2896 DetectCureTDL3: IrpHandler (24) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (25) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (26) addr: 804F4562
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0x0[0x400]
16:4:24:265 2896 KLMD_ReadMem: DeviceIoControl error 1
16:4:24:265 2896 TDL3_StartIoHookDetect: Unable to get StartIo handler code
16:4:24:265 2896 TDL3_FileDetect: Processing driver: Disk
16:4:24:265 2896 TDL3_FileDetect: Parameters: C:\WINDOWS\system32\drivers\disk.sys, C:\WINDOWS\system32\Drivers\tsk_disk.sys, SYSTEM\CurrentControlSet\Services\Disk, system32\Drivers\tsk_disk.sys
16:4:24:265 2896 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\drivers\disk.sys
16:4:24:265 2896 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\drivers\disk.sys
16:4:24:265 2896 DetectCureTDL3: 2 Curr stack PDEVICE_OBJECT: 86D6D838
16:4:24:265 2896 KLMD_GetLowerDeviceObject: Trying to get lower device object for 86D6D838
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D6D838[0x38]
16:4:24:265 2896 DetectCureTDL3: DRIVER_OBJECT addr: 86D57990
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D57990[0xA8]
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0xE17F2868[0x208]
16:4:24:265 2896 DetectCureTDL3: DRIVER_OBJECT name: \Driver\Disk, Driver Name: Disk
16:4:24:265 2896 DetectCureTDL3: IrpHandler (0) addr: F7558BB0
16:4:24:265 2896 DetectCureTDL3: IrpHandler (1) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (2) addr: F7558BB0
16:4:24:265 2896 DetectCureTDL3: IrpHandler (3) addr: F7552D1F
16:4:24:265 2896 DetectCureTDL3: IrpHandler (4) addr: F7552D1F
16:4:24:265 2896 DetectCureTDL3: IrpHandler (5) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (6) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (7) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (8) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (9) addr: F75532E2
16:4:24:265 2896 DetectCureTDL3: IrpHandler (10) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (11) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (12) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (13) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (14) addr: F75533BB
16:4:24:265 2896 DetectCureTDL3: IrpHandler (15) addr: F7556F28
16:4:24:265 2896 DetectCureTDL3: IrpHandler (16) addr: F75532E2
16:4:24:265 2896 DetectCureTDL3: IrpHandler (17) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (18) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (19) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (20) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (21) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (22) addr: F7554C82
16:4:24:265 2896 DetectCureTDL3: IrpHandler (23) addr: F755999E
16:4:24:265 2896 DetectCureTDL3: IrpHandler (24) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (25) addr: 804F4562
16:4:24:265 2896 DetectCureTDL3: IrpHandler (26) addr: 804F4562
16:4:24:265 2896 KLMD_ReadMem: Trying to ReadMemory 0x0[0x400]
16:4:24:265 2896 KLMD_ReadMem: DeviceIoControl error 1
16:4:24:265 2896 TDL3_StartIoHookDetect: Unable to get StartIo handler code
16:4:24:265 2896 TDL3_FileDetect: Processing driver: Disk
16:4:24:265 2896 TDL3_FileDetect: Parameters: C:\WINDOWS\system32\drivers\disk.sys, C:\WINDOWS\system32\Drivers\tsk_disk.sys, SYSTEM\CurrentControlSet\Services\Disk, system32\Drivers\tsk_disk.sys
16:4:24:265 2896 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\drivers\disk.sys
16:4:24:265 2896 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\drivers\disk.sys
16:4:24:281 2896 DetectCureTDL3: 3 Curr stack PDEVICE_OBJECT: 86D7E030
16:4:24:281 2896 KLMD_GetLowerDeviceObject: Trying to get lower device object for 86D7E030
16:4:24:281 2896 DetectCureTDL3: 3 Curr stack PDEVICE_OBJECT: 86D57650
16:4:24:281 2896 KLMD_GetLowerDeviceObject: Trying to get lower device object for 86D57650
16:4:24:281 2896 DetectCureTDL3: 3 Curr stack PDEVICE_OBJECT: 86D88B00
16:4:24:281 2896 KLMD_GetLowerDeviceObject: Trying to get lower device object for 86D88B00
16:4:24:281 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D88B00[0x38]
16:4:24:281 2896 DetectCureTDL3: DRIVER_OBJECT addr: 8690D4F8
16:4:24:281 2896 KLMD_ReadMem: Trying to ReadMemory 0x8690D4F8[0xA8]
16:4:24:281 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D89D98[0x38]
16:4:24:281 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D9D670[0xA8]
16:4:24:281 2896 KLMD_ReadMem: Trying to ReadMemory 0xE17EA460[0x208]
16:4:24:281 2896 DetectCureTDL3: DRIVER_OBJECT name: \Driver\atapi, Driver Name: atapi
16:4:24:281 2896 DetectCureTDL3: IrpHandler (0) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (1) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (2) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (3) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (4) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (5) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (6) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (7) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (8) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (9) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (10) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (11) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (12) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (13) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (14) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (15) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (16) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (17) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (18) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (19) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (20) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (21) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (22) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (23) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (24) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (25) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: IrpHandler (26) addr: 86D7AE07
16:4:24:281 2896 DetectCureTDL3: All IRP handlers pointed to one addr: 86D7AE07
16:4:24:281 2896 KLMD_ReadMem: Trying to ReadMemory 0x86D7AE07[0x400]
16:4:24:281 2896 TDL3_IrpHookDetect: CheckParameters: 7, FFDF0308, 441, 99, 3, 88
16:4:24:281 2896 Driver "atapi" Irp handler infected by TDSS rootkit ... 16:4:24:281 2896 KLMD_WriteMem: Trying to WriteMemory 0x86D7AE6A[0xD]
16:4:24:281 2896 cured
16:4:24:281 2896 KLMD_ReadMem: Trying to ReadMemory 0xF72EA864[0x400]
16:4:24:281 2896 TDL3_StartIoHookDetect: CheckParameters: 0, 0, 316, 0
16:4:24:281 2896 TDL3_FileDetect: Processing driver: atapi
16:4:24:281 2896 TDL3_FileDetect: Parameters: C:\WINDOWS\system32\drivers\atapi.sys, C:\WINDOWS\system32\Drivers\tsk_atapi.sys, SYSTEM\CurrentControlSet\Services\atapi, system32\Drivers\tsk_atapi.sys
16:4:24:281 2896 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\drivers\atapi.sys
16:4:24:281 2896 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\drivers\atapi.sys
16:4:24:296 2896 File C:\WINDOWS\system32\drivers\atapi.sys infected by TDSS rootkit ... 16:4:24:296 2896 TDL3_FileCure: Processing driver file: C:\WINDOWS\system32\drivers\atapi.sys
16:4:24:296 2896 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\drivers\atapi.sys
16:4:24:296 2896 TDL3_FileCure: Dumping cured buffer to file C:\WINDOWS\system32\Drivers\tsk_atapi.sys
16:4:24:343 2896 TDL3_FileCure: Image path (system32\Drivers\tsk_atapi.sys) was set for service (SYSTEM\CurrentControlSet\Services\atapi)
16:4:24:343 2896 TDL3_FileCure: KLMD_PendCopyFileW (C:\WINDOWS\system32\Drivers\tsk_atapi.sys, C:\WINDOWS\system32\drivers\atapi.sys) success
16:4:24:343 2896 will be cured on next reboot
16:4:24:343 2896
Completed

Results:
16:4:24:343 2896 Infected objects in memory: 1
16:4:24:343 2896 Cured objects in memory: 1
16:4:24:343 2896 Infected objects on disk: 1
16:4:24:343 2896 Objects on disk cured on reboot: 1
16:4:24:343 2896 Objects on disk deleted on reboot: 0
16:4:24:343 2896 Registry nodes deleted on reboot: 0
16:4:24:343 2896

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:37 PM

Posted 12 December 2009 - 04:20 PM

Yes, reboot.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 CRSinPhilly

CRSinPhilly
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:37 PM

Posted 12 December 2009 - 04:35 PM

Reboot done.

Edited by CRSinPhilly, 12 December 2009 - 04:53 PM.


#8 CRSinPhilly

CRSinPhilly
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:37 PM

Posted 12 December 2009 - 08:19 PM

Well, the search redirect problem seems to be fixed, which is awesome! Many thanks! Do I need to run any of the scans again to make sure it's gone?

#9 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:37 PM

Posted 13 December 2009 - 11:10 AM

Let's run a full scan with malwarebytes to pick up any remnants that may still be hanging round.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#10 CRSinPhilly

CRSinPhilly
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:37 PM

Posted 13 December 2009 - 01:35 PM

OK. This is Charles' wife. He's out right now, but I'll have him do it when he gets back (should be in ~1/2 hour). Thanks again for all your help.

#11 CRSinPhilly

CRSinPhilly
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:37 PM

Posted 14 December 2009 - 12:28 AM

MBAM says there's nothing. Thank you for all your help Sam! Is there a common way this TDSS kit is getting installed so I can avoid it in the future?

Malwarebytes' Anti-Malware 1.42
Database version: 3355
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

12/14/2009 12:15:36 AM
mbam-log-2009-12-14 (00-15-36).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 203511
Time elapsed: 59 minute(s), 29 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#12 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:37 PM

Posted 14 December 2009 - 08:06 AM

It's very common right now so it's possible that it's spreading a number of different ways. In your case I don't see any file sharing programs or signs that there's file sharing happening on this computer so it's likely you became infected just by visiting an infected web site and reacting to a bogus popup. Any time you get a pop up from a website and it's asking you to click on it to close or there's an Ok button for you to click, don't do it. Just close your browser completely and don't visit that site again.

Here are some final steps and then some other recommendations for you.

It's time to clean up.
  • Double-click OTL.exe to run it.
  • Click on the CleanUp! button
  • You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.


================




Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :(
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#13 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:37 PM

Posted 26 December 2009 - 08:21 PM

Now that your problem appears to be resolved, this topic will be closed.
If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this topic in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users