Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan & Malware Infection w/DDS-GMER logs


  • This topic is locked This topic is locked
15 replies to this topic

#1 wes1584

wes1584

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 15 February 2010 - 01:55 PM

Hello, I originally posted in a thread here http://www.bleepingcomputer.com/forums/ind...p;#entry1630970

A mod helped me but eventually gave me a list of steps to take and then start a new thread here. In my original thread I mentioned how Stopzilla had detected a trojan named Vundo however I havent seen anything with that name since. I noticed when I was running GMER it had a lot of skynet logs. I had skynet along time ago and was able to wipe it out. Im not sure if its just remnants of that trojan or if I still have the Vundo one. The problems with my PC include constant popups like every 10 seconds, disabled system restore & regedit. Hijacked browser, and it deletes exe files of Malwarebytes after installation so that I can't run it.

Ill paste the DDS log below and attach the GMER "ark" log and the "attach" log as well



DDS (Ver_09-12-01.01) - NTFSx86
Run by Owner at 0:26:09.91 on Mon 02/15/2010
Internet Explorer: 6.0.2900.2180 BrowserJavaVersion: 1.6.0_06
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.254.10 [GMT -6:00]

AV: BitDefender Antivirus *On-access scanning disabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
C:\Program Files\Linksys\WUSB100\WUSB100.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
BHO: STOPzilla Browser Helper Object: {e3215f20-3212-11d6-9f8b-00d0b743919d} - c:\program files\stopzilla!\SZIEBHO.dll
TB: STOPzilla: {98828ded-a591-462f-83ba-d2f62a68b8b8} - c:\program files\stopzilla!\SZSG.dll
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [LVCOMS] c:\program files\common files\logitech\qcdriver3\LVCOMS.EXE
mRun: [WD Button Manager] WDBtnMgr.exe
mRun: [Ijewucamotig] rundll32.exe "c:\windows\eqabeyeyogomu.dll",Startup
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\wirele~1.lnk - c:\program files\linksys\wusb100\WUSB100.exe
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: DisableRegistryTools = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
mPolicies-system: EnableLUA = 0 (0x0)
dPolicies-system: DisableRegistryTools = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - c:\program files\aim\aim.exe
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {d9288080-1baa-4bc4-9cf8-a92d743db949} - c:\documents and settings\owner\start menu\programs\imvu\Run IMVU.lnk
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_06\bin\ssv.dll
Trusted Zone: buy-internetsecurity10.com
Trusted Zone: buy-is2010.com
Trusted Zone: is-software-download.com
Trusted Zone: is-software-download25.com
Trusted Zone: is10-soft-download.com
Trusted Zone: buy-internetsecurity10.com
Trusted Zone: buy-is2010.com
DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0008-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_08-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
TCP: NameServer = 93.188.163.31,93.188.161.18
TCP: {1CFB99DE-49FA-497F-907A-8771319C3C54} = 192.168.1.1
TCP: {BAE384C6-45E8-4AD0-A889-F26079C637A8} = 83.149.115.157,4.2.2.1,192.168.1.1
TCP: {F412EE39-8EFD-4C17-A3CA-40D809FE8F1C} = 83.149.115.157,4.2.2.1
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Notify: igfxcui - igfxsrvc.dll
AppInit_DLLs: app_dll.dll
LSA: Notification Packages = scecli poex32.dll wuwogola.dll
Hosts: 82.98.231.89 url.adtrgt.com
Hosts: 82.98.231.89 googleads2.gdoubleclick.net

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\owner\applic~1\mozilla\firefox\profiles\smdu8zd6.default\
FF - component: c:\program files\mozilla firefox\components\FFComm.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
FF - HiddenExtension: XULRunner: {228F33B9-DDD8-4FF4-A23D-FA088845E195} - c:\documents and settings\owner\local settings\application data\{228F33B9-DDD8-4FF4-A23D-FA088845E195}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R2 szkg5;szkg5;c:\windows\system32\drivers\SZKG.sys [2009-5-12 61328]
R3 rt2870;Linksys 802.11n USB Wireless LAN Card Driver;c:\windows\system32\drivers\rt2870.sys [2007-7-28 517632]
S3 dump_wmimmc;dump_wmimmc;\??\c:\nexon\maplestory\gameguard\dump_wmimmc.sys --> c:\nexon\maplestory\gameguard\dump_wmimmc.sys [?]
S3 XDva323;XDva323;\??\c:\windows\system32\xdva323.sys --> c:\windows\system32\XDva323.sys [?]

=============== Created Last 30 ================

2010-02-15 06:22:54 240 ----a-w- c:\windows\system32\drivers\kgpcpy.cfg
2010-02-15 06:10:43 0 ----a-w- c:\documents and settings\owner\defogger_reenable
2010-02-15 02:21:01 0 d--h--w- c:\windows\PIF
2010-02-14 22:36:01 0 ----a-w- c:\windows\system32\6334.exe
2010-02-14 22:30:24 50 ----a-w- C:\abcdefg.bat
2010-02-14 22:30:19 40960 ----a-w- C:\asfev8.exe
2010-02-14 22:30:16 77824 ----a-w- C:\2mbc9w.exe
2010-02-14 22:15:56 0 ----a-w- c:\windows\system32\18467.exe
2010-02-14 21:59:06 0 ----a-w- c:\windows\Ffumovoxadosexas.bin
2010-02-14 21:59:04 120 ----a-w- c:\windows\Rmurejivuluyetof.dat
2010-02-14 21:57:59 69120 ----a-w- c:\windows\system32\app_dll.dll
2010-02-14 21:55:41 0 ----a-w- c:\windows\system32\41.exe
2010-02-14 21:50:49 0 ----a-w- c:\windows\system32\IS15.exe
2010-02-14 21:50:48 27648 ----a-w- c:\windows\system32\helper32.dll
2010-02-14 21:50:37 38400 ----a-w- c:\windows\system32\smss32.exe
2010-02-14 21:50:37 38400 ----a-w- c:\windows\system32\smss32 .exe
2010-02-12 18:41:46 0 d-----w- c:\program files\Redbana

==================== Find3M ====================

2010-02-14 21:55:19 33280 ----a-w- c:\windows\system32\wdbtnmgr.exe
2010-02-14 21:55:16 33280 ----a-w- c:\windows\system32\hkcmd.exe
2010-02-14 21:55:15 33280 ----a-w- c:\windows\system32\igfxtray.exe
2009-07-11 22:50:55 7700 -c--a-w- c:\program files\licssck.txt
2007-09-09 05:27:51 143771 -c--a-w- c:\program files\graal_1189315661.png
1601-01-01 00:03:28 45568 --sha-w- c:\windows\system32\dijoromo.dll
1601-01-01 00:03:28 62464 --sha-w- c:\windows\system32\firahufu.dll
1601-01-01 00:03:52 52736 --sha-w- c:\windows\system32\kiduruka.dll
1601-01-01 00:03:28 51720 --sha-w- c:\windows\system32\mezoyoza.exe
1601-01-01 00:03:52 52736 --sha-w- c:\windows\system32\vavanoho.dll
1601-01-01 00:03:52 52736 --sha-w- c:\windows\system32\wuwogola.dll

============= FINISH: 0:28:07.71 ===============




BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:46 PM

Posted 15 February 2010 - 02:09 PM

Hello wes1584
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • Finally, please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.
  • I will be analyzing your log. I will get back to you with instructions.

1.
Download and Run RKill
    Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

2.
Download and Rename Combofix

Download Combofix from any of the links below. You must rename it 1234.scr before saving it to your desktop.

Link 1
Link 2






--------------------------------------------------------------------
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on 1234.scr & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.
  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt so we can continue cleaning the system.

3.
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

4.
Download DDS and save it to your desktop from here or here or here.
Disable any script blocker, and then double click dds.scr to run the tool.

* When done, DDS will open two (2) logs:

1. DDS.txt
2. Attach.txt

Save both reports to your desktop post the contents of the DDS.txt log. Save the other report incase I need to look at it later.


Things to include in your next reply:
Combofix.txt
Gmer log
DDS.txt
Attach.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 wes1584

wes1584
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 15 February 2010 - 02:13 PM

Hello, I already ran DDS and GMEr. I pasted the DDS log above and attached the GEMR and "attach" log with the browse button. I already have RKill downloaded as well because the mod who helped me in the other section had me try it. I will go and get combofix now.

#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:46 PM

Posted 15 February 2010 - 02:21 PM

Hello wes,

Make sure You run Rkill right before Combofix. Also I will need a new Gmer log after the Combofix has been run.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 wes1584

wes1584
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 15 February 2010 - 05:41 PM

Alright, ill post the ComboFix log below and attach the new GMER log for you.

NOTE: It seems after ComboFix was done the popups have stopped and I noticed my access to system restore is back so that's a good sign so far. Although my browser still seems to het hijacked when i use search engine and try to goto sites


ComboFix 10-02-12.01 - Owner 02/15/2010 14:00:27.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.254.71 [GMT -6:00]
Running from: c:\documents and settings\Owner\Desktop\1234.scr.exe
AV: BitDefender Antivirus *On-access scanning disabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\docume~1\Owner\LOCALS~1\Temp\1.wmv
c:\documents and settings\Owner\Application Data\.#
c:\documents and settings\Owner\Application Data\.#\MBX@13C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@13C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@158@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@158@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@160@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@160@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@184@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@184@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@18C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@18C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@1A0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@1A0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@22C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@22C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@24C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@24C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@254@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@254@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@260@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@260@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@278@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@278@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@284@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@284@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@2A4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@2A4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@2B0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@2B0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@310@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@310@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@314@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@314@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@354@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@354@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3B0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3B0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3C0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3C0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3C4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3C4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3CC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3CC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3F4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@3F4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@404@8AB48E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@404@8AB48F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@424@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@424@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@430@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@430@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@448@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@448@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@464@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@464@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@490@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@490@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@4C0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@4C0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@4DC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@4DC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@4F0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@4F0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@524@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@524@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@530@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@530@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@560@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@560@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@56C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@56C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@578@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@578@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5B8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5B8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5C0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5C0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5EC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5EC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@604@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@604@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@630@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@630@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@638@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@638@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@640@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@640@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@670@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@670@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@684@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@684@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@694@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@694@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@69C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@69C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@6E4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@6E4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@6F4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@6F4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@710@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@710@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@728@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@728@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@730@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@730@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@734@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@734@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@764@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@764@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@790@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@790@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7C8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7C8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7E8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7E8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7F0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7F0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7FC@8AB48E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7FC@8AB48F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@80@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@80@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@804@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@804@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@814@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@814@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@828@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@828@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@84@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@84@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@848@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@848@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@854@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@854@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@85C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@85C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@86C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@86C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@870@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@870@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@878@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@878@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@88C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@88C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@894@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@894@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8C8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8C8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8D0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8D0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8D4@8AB4900.###
c:\documents and settings\Owner\Application Data\.#\MBX@8D4@8AB4910.###
c:\documents and settings\Owner\Application Data\.#\MBX@8E4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8E4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8EC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@8EC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@900@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@900@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@914@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@914@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@924@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@924@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@928@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@928@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@954@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@954@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@958@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@958@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@96C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@96C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@984@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@984@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9AC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9AC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9E0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9E0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9E4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9E4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A18@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A18@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A1C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A1C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A24@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A24@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A64@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A64@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A90@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A90@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A9C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A9C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@ABC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@ABC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AC8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AC8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@ACC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@ACC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AD4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AD4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AEC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AEC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B24@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B24@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B30@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B30@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B38@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B38@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B48@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B48@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B4C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B4C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B50@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B50@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B5C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B5C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B70@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B70@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B84@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@B84@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BAC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BAC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BB0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BB0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BB4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BB4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BE0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BE0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BFC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BFC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C18@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C18@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C30@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C30@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C88@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C88@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CA0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CA0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CB8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CB8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CBC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CBC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CEC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CEC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CF4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CF4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CFC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@CFC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D20@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D20@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D30@8AB48E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D30@8AB48F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D30@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D30@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D38@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D38@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D4C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D4C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D54@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D54@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D68@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D68@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D74@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D74@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D78@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D78@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DB4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DB4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DC0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DC0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DC8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DC8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DD8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DD8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DDC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DDC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DE4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DE4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DFC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@DFC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E04@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E04@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E24@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E24@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E28@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E28@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E58@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E58@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E64@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E64@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E74@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E74@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E78@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E78@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EA0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EA0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EA4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EA4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EC4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EC4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EC8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EC8@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EDC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@EDC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F0C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F0C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F14@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F14@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F2C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F2C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F34@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F34@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F64@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F64@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F68@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F68@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F6C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F6C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F74@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F74@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F84@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F84@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F8C@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F8C@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F90@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@F90@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FA4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FA4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FB0@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FB0@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FB4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FB4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FCC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FCC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FDC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FDC@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FF4@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FF4@B048F0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FF8@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FF8@B048F0.###
c:\documents and settings\Owner\Application Data\Desktopicon
c:\documents and settings\Owner\Application Data\Desktopicon\eBayShortcuts.exe
c:\documents and settings\Owner\Local Settings\Application Data\MSASCui.exe
c:\documents and settings\Owner\Local Settings\Temporary Internet Files\1maj0.jpg
c:\documents and settings\Owner\Local Settings\Temporary Internet Files\bL16K.jpg
c:\documents and settings\Owner\Local Settings\Temporary Internet Files\Oaajx.jpg
c:\documents and settings\Owner\Local Settings\Temporary Internet Files\ppAKy8B5.jpg
c:\program files\Adobe\acrotray .exe
c:\program files\AVI Codec Pack
c:\program files\AVI Codec Pack\DivX 3.11\DivXa32.acm
c:\program files\AVI Codec Pack\DivX 3.11\L3codeca.acm
c:\program files\AVI Codec Pack\divx.chm
c:\program files\AVI Codec Pack\LAYER-3\L3CODECP.ACM
c:\program files\Internet Explorer\js.mui
c:\program files\Internet Explorer\wmpscfgs.exe
c:\windows\eqabeyeyogomu.dll
c:\windows\system32\18467.exe
c:\windows\system32\41.exe
c:\windows\system32\6334.exe
c:\windows\system32\app_dll.dll
c:\windows\system32\drivers\UACd.sys
c:\windows\system32\helper32.dll
c:\windows\system32\hkcmd .exe
c:\windows\system32\igfxtray .exe
c:\windows\system32\IS15.exe
c:\windows\system32\kiduruka.dll
c:\windows\system32\smss32 .exe
c:\windows\system32\smss32.exe
c:\windows\system32\spool\prtprocs\w32x86\00005ab1.tmp
c:\windows\system32\vavanoho.dll
c:\windows\system32\wdbtnmgr .exe
c:\windows\system32\wuwogola.dll
c:\windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job
c:\windows\Tasks\abfdnjwo.job
c:\windows\Temp\2916700052.exe

Infected copy of c:\windows\system32\DRIVERS\atapi.sys was found and disinfected
Restored copy from - c:\windows\system32\ReinstallBackups\0005\DriverFiles\i386\atapi.sys
.
((((((((((((((((((((((((( Files Created from 2010-01-15 to 2010-02-15 )))))))))))))))))))))))))))))))
.

2010-02-15 15:27 . 2010-02-15 15:27 -------- d-s---w- c:\documents and settings\NetworkService\UserData
2010-02-15 10:08 . 2010-02-15 10:08 0 ----a-w- c:\program files\13592671.dat
2010-02-15 10:08 . 2010-02-15 10:08 4 ----a-w- c:\program files\13592171.dat
2010-02-15 02:21 . 2010-02-15 02:21 -------- d--h--w- c:\windows\PIF
2010-02-15 01:02 . 2010-02-15 01:03 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-02-14 23:07 . 2010-02-14 23:12 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\wyiwkb
2010-02-14 22:30 . 2010-02-14 22:30 50 ----a-w- C:\abcdefg.bat
2010-02-14 22:30 . 2010-02-14 22:30 40960 ----a-w- C:\asfev8.exe
2010-02-14 22:30 . 2010-02-14 22:30 77824 ----a-w- C:\2mbc9w.exe
2010-02-14 21:59 . 2010-02-15 06:04 0 ----a-w- c:\windows\Ffumovoxadosexas.bin
2010-02-14 21:59 . 2010-02-15 19:28 120 ----a-w- c:\windows\Rmurejivuluyetof.dat
2010-02-14 21:58 . 2010-02-14 21:58 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\{228F33B9-DDD8-4FF4-A23D-FA088845E195}
2010-02-12 18:41 . 2010-02-12 18:41 -------- d-----w- c:\program files\Redbana

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-15 20:16 . 2006-09-29 18:07 -------- d-----w- c:\documents and settings\All Users\Application Data\STOPzilla!
2010-02-15 20:16 . 2010-02-15 20:16 840 ----a-w- c:\windows\system32\drivers\kgpcpy.cfg
2010-02-15 20:16 . 2010-02-15 20:16 424 ----a-w- c:\windows\system32\drivers\kgpfr2.cfg
2010-02-15 00:22 . 2009-11-01 20:19 -------- d-----w- c:\program files\Graal
2010-02-14 21:55 . 2008-11-20 01:44 33280 ----a-w- c:\windows\system32\wdbtnmgr.exe
2010-02-14 21:55 . 2006-09-29 17:48 33280 ----a-w- c:\windows\system32\hkcmd.exe
2010-02-14 21:55 . 2006-09-29 17:48 33280 ----a-w- c:\windows\system32\igfxtray.exe
2010-02-12 22:35 . 2009-05-21 23:34 -------- d-----w- c:\documents and settings\Owner\Application Data\Any Video Converter
2010-02-12 18:41 . 2006-09-29 03:37 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-01-07 20:14 . 2007-08-07 13:12 -------- d-----w- c:\documents and settings\Owner\Application Data\U3
2010-01-04 00:24 . 2010-01-04 00:24 -------- d-----w- c:\program files\Microsoft
2010-01-02 18:47 . 2007-04-26 05:20 -------- d-----w- c:\program files\LimeWire
2009-07-11 22:50 . 2009-07-11 22:50 7700 -c--a-w- c:\program files\licssck.txt
2007-09-09 05:27 . 2007-09-09 05:27 143771 -c--a-w- c:\program files\graal_1189315661.png
2009-03-05 23:08 . 2009-07-10 21:00 49664 ----a-w- c:\program files\mozilla firefox\components\FFComm.dll
2009-05-01 21:02 . 2009-05-01 21:02 1044480 -c--a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 -c--a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
1601-01-01 00:03 . 1601-01-01 00:03 62464 --sha-w- c:\windows\system32\bozehuka.dll
1601-01-01 00:03 . 1601-01-01 00:03 45568 --sha-w- c:\windows\system32\dijoromo.dll
1601-01-01 00:03 . 1601-01-01 00:03 51720 --sha-w- c:\windows\system32\mezoyoza.exe
.
CODE
<pre>
c:\program files\Common Files\Logitech\QCDriver3\lvcoms .exe
c:\program files\Windows Live\Messenger\msnmsgr .exe
</pre>


((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-02-14 33280]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-02-14 33280]
"LVCOMS"="c:\program files\Common Files\Logitech\QCDriver3\LVCOMS.EXE" [2010-02-14 33280]
"WD Button Manager"="WDBtnMgr.exe" [2010-02-14 33280]
"Ijewucamotig"="c:\windows\eqabeyeyogomu.dll" [N/A]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-06-29 286720]
"detumukube"="wuwogola.dll" [N/A]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Wireless Network Monitor.lnk - c:\program files\Linksys\WUSB100\WUSB100.exe [2007-10-30 5677056]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Notification Packages REG_MULTI_SZ scecli poex32.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Synchronizer.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Synchronizer.lnk
backup=c:\windows\pss\Adobe Reader Synchronizer.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
2005-06-07 05:46 57344 -c--a-w- c:\program files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-01-12 03:16 39792 -c--a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AIM]
2004-06-07 20:53 61440 ----a-w- c:\program files\AIM\aim.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BDAgent]
c:\program files\BitDefender\BitDefender 2009\bdagent.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BitDefender Antiphishing Helper]
c:\program files\BitDefender\BitDefender 2009\IEShow.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BitTorrent]
c:\program files\BitTorrent\bittorrent.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DeadAIM]
2004-02-23 09:16 144896 ----a-w- c:\progra~1\AIM\DeadAIM.ocm

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
c:\documents and settings\Owner\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2005-12-15 17:18 49152 -c--a-w- c:\program files\HP\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Ijewucamotig]
c:\windows\eqabeyeyogomu.dll [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogitechGalleryRepair]
2002-12-11 00:32 155648 -c--a-w- c:\program files\Logitech\ImageStudio\ISStart.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogitechImageStudioTray]
2002-12-11 00:31 61440 -c--a-w- c:\program files\Logitech\ImageStudio\LogiTray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-08-04 07:06 1667584 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\msnmsgr]
2009-07-26 22:44 3883856 ----a-w- c:\program files\Windows Live\Messenger\msnmsgr .exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\oxiusfqw]
c:\documents and settings\Owner\Local Settings\Application Data\wyiwkb\hgltsftav.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2007-06-29 11:24 286720 -c--a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealPlayer]
c:\program files\Real\RealOne Player\realplay.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealTray]
2008-02-28 21:35 214560 ----a-w- c:\program files\Real\RealPlayer\realplay.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Remote System Protection]
c:\windows\system32\qtn9hkak.dll [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SearchSettings]
c:\program files\Search Settings\SearchSettings.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
2004-10-14 20:42 1404928 -c--a-w- c:\program files\Analog Devices\Core\smax4pnp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\STYLEXP]
2006-05-24 18:31 1372160 -c--a-w- c:\program files\TGTSoft\StyleXP\StyleXP.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2008-03-25 09:28 144784 -c--a-w- c:\program files\Java\jre1.6.0_06\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
2008-02-28 21:35 185896 -c--a-w- c:\program files\Common Files\Real\Update_OB\realsched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UnlockerAssistant]
c:\program files\Unlocker\UnlockerAssistant.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinampAgent]
2009-07-01 16:37 37888 -c--a-w- c:\program files\Winamp\winampa.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\StubInstaller.exe"=
"c:\\Program Files\\AIM\\aim.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqnrs08.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"4778:TCP"= 4778:TCP:Akamai NetSession Interface
"5000:UDP"= 5000:UDP:Akamai NetSession Interface
"1636:TCP"= 1636:TCP:Akamai NetSession Interface
"1030:TCP"= 1030:TCP:Akamai NetSession Interface
"1067:TCP"= 1067:TCP:Akamai NetSession Interface
"1984:TCP"= 1984:TCP:Akamai NetSession Interface
"2416:TCP"= 2416:TCP:Akamai NetSession Interface
"1033:TCP"= 1033:TCP:Akamai NetSession Interface
"1063:TCP"= 1063:TCP:Akamai NetSession Interface
"1032:TCP"= 1032:TCP:Akamai NetSession Interface
"1065:TCP"= 1065:TCP:Akamai NetSession Interface
"1062:TCP"= 1062:TCP:Akamai NetSession Interface
"1034:TCP"= 1034:TCP:Akamai NetSession Interface
"1069:TCP"= 1069:TCP:Akamai NetSession Interface
"1035:TCP"= 1035:TCP:Akamai NetSession Interface
"1064:TCP"= 1064:TCP:Akamai NetSession Interface
"1031:TCP"= 1031:TCP:Akamai NetSession Interface
"1061:TCP"= 1061:TCP:Akamai NetSession Interface
"1177:TCP"= 1177:TCP:Akamai NetSession Interface
"1060:TCP"= 1060:TCP:Akamai NetSession Interface
"1072:TCP"= 1072:TCP:Akamai NetSession Interface
"1090:TCP"= 1090:TCP:Akamai NetSession Interface
"1348:TCP"= 1348:TCP:Akamai NetSession Interface
"1038:TCP"= 1038:TCP:Akamai NetSession Interface
"1066:TCP"= 1066:TCP:Akamai NetSession Interface
"1088:TCP"= 1088:TCP:Akamai NetSession Interface
"1041:TCP"= 1041:TCP:Akamai NetSession Interface
"1084:TCP"= 1084:TCP:Akamai NetSession Interface
"3989:TCP"= 3989:TCP:Akamai NetSession Interface
"1562:TCP"= 1562:TCP:Akamai NetSession Interface
"3248:TCP"= 3248:TCP:Akamai NetSession Interface
"1098:TCP"= 1098:TCP:Akamai NetSession Interface
"1094:TCP"= 1094:TCP:Akamai NetSession Interface
"1092:TCP"= 1092:TCP:Akamai NetSession Interface
"1593:TCP"= 1593:TCP:Akamai NetSession Interface
"1624:TCP"= 1624:TCP:Akamai NetSession Interface
"3660:TCP"= 3660:TCP:Akamai NetSession Interface
"3680:TCP"= 3680:TCP:Akamai NetSession Interface
"3701:TCP"= 3701:TCP:Akamai NetSession Interface
"1045:TCP"= 1045:TCP:Akamai NetSession Interface
"1087:TCP"= 1087:TCP:Akamai NetSession Interface
"1086:TCP"= 1086:TCP:Akamai NetSession Interface
"3473:TCP"= 3473:TCP:Akamai NetSession Interface
"3460:TCP"= 3460:TCP:Akamai NetSession Interface
"1097:TCP"= 1097:TCP:Akamai NetSession Interface
"4828:TCP"= 4828:TCP:Akamai NetSession Interface
"1747:TCP"= 1747:TCP:Akamai NetSession Interface
"1926:TCP"= 1926:TCP:Akamai NetSession Interface
"1095:TCP"= 1095:TCP:Akamai NetSession Interface
"1044:TCP"= 1044:TCP:Akamai NetSession Interface
"4177:TCP"= 4177:TCP:Akamai NetSession Interface
"4469:TCP"= 4469:TCP:Akamai NetSession Interface
"1091:TCP"= 1091:TCP:Akamai NetSession Interface
"3658:TCP"= 3658:TCP:Akamai NetSession Interface
"1089:TCP"= 1089:TCP:Akamai NetSession Interface
"1268:TCP"= 1268:TCP:Akamai NetSession Interface
"1529:TCP"= 1529:TCP:Akamai NetSession Interface
"2229:TCP"= 2229:TCP:Akamai NetSession Interface
"1040:TCP"= 1040:TCP:Akamai NetSession Interface
"1085:TCP"= 1085:TCP:Akamai NetSession Interface
"3832:TCP"= 3832:TCP:Akamai NetSession Interface
"3850:TCP"= 3850:TCP:Akamai NetSession Interface
"3872:TCP"= 3872:TCP:Akamai NetSession Interface
"1083:TCP"= 1083:TCP:Akamai NetSession Interface
"2436:TCP"= 2436:TCP:Akamai NetSession Interface
"1058:TCP"= 1058:TCP:Akamai NetSession Interface
"4724:TCP"= 4724:TCP:Akamai NetSession Interface
"4924:TCP"= 4924:TCP:Akamai NetSession Interface
"2325:TCP"= 2325:TCP:Akamai NetSession Interface
"1082:TCP"= 1082:TCP:Akamai NetSession Interface
"1354:TCP"= 1354:TCP:Akamai NetSession Interface
"1508:TCP"= 1508:TCP:Akamai NetSession Interface
"3006:TCP"= 3006:TCP:Akamai NetSession Interface
"1725:TCP"= 1725:TCP:Akamai NetSession Interface
"1818:TCP"= 1818:TCP:Akamai NetSession Interface
"3079:TCP"= 3079:TCP:Akamai NetSession Interface
"1099:TCP"= 1099:TCP:Akamai NetSession Interface
"1068:TCP"= 1068:TCP:Akamai NetSession Interface
"1142:TCP"= 1142:TCP:Akamai NetSession Interface
"1214:TCP"= 1214:TCP:Akamai NetSession Interface
"1259:TCP"= 1259:TCP:Akamai NetSession Interface
"1523:TCP"= 1523:TCP:Akamai NetSession Interface
"1585:TCP"= 1585:TCP:Akamai NetSession Interface
"1679:TCP"= 1679:TCP:Akamai NetSession Interface
"1759:TCP"= 1759:TCP:Akamai NetSession Interface
"1790:TCP"= 1790:TCP:Akamai NetSession Interface
"1856:TCP"= 1856:TCP:Akamai NetSession Interface
"2055:TCP"= 2055:TCP:Akamai NetSession Interface
"2579:TCP"= 2579:TCP:Akamai NetSession Interface
"1943:TCP"= 1943:TCP:Akamai NetSession Interface
"1965:TCP"= 1965:TCP:Akamai NetSession Interface
"2963:TCP"= 2963:TCP:Akamai NetSession Interface
"2847:TCP"= 2847:TCP:Akamai NetSession Interface
"2982:TCP"= 2982:TCP:Akamai NetSession Interface
"1964:TCP"= 1964:TCP:Akamai NetSession Interface
"2045:TCP"= 2045:TCP:Akamai NetSession Interface
"1732:TCP"= 1732:TCP:Akamai NetSession Interface
"1828:TCP"= 1828:TCP:Akamai NetSession Interface
"1846:TCP"= 1846:TCP:Akamai NetSession Interface
"1073:TCP"= 1073:TCP:Akamai NetSession Interface
"1081:TCP"= 1081:TCP:Akamai NetSession Interface
"1057:TCP"= 1057:TCP:Akamai NetSession Interface
"1037:TCP"= 1037:TCP:Akamai NetSession Interface
"2296:TCP"= 2296:TCP:Akamai NetSession Interface
"2323:TCP"= 2323:TCP:Akamai NetSession Interface
"1036:TCP"= 1036:TCP:Akamai NetSession Interface
"1712:TCP"= 1712:TCP:Akamai NetSession Interface
"1048:TCP"= 1048:TCP:Akamai NetSession Interface
"1052:TCP"= 1052:TCP:Akamai NetSession Interface
"1093:TCP"= 1093:TCP:Akamai NetSession Interface
"1043:TCP"= 1043:TCP:Akamai NetSession Interface
"4061:TCP"= 4061:TCP:Akamai NetSession Interface
"2997:TCP"= 2997:TCP:Akamai NetSession Interface
"2648:TCP"= 2648:TCP:Akamai NetSession Interface
"2671:TCP"= 2671:TCP:Akamai NetSession Interface
"1077:TCP"= 1077:TCP:Akamai NetSession Interface
"3160:TCP"= 3160:TCP:Akamai NetSession Interface
"2115:TCP"= 2115:TCP:Akamai NetSession Interface
"2850:TCP"= 2850:TCP:Akamai NetSession Interface
"1635:TCP"= 1635:TCP:Akamai NetSession Interface
"1368:TCP"= 1368:TCP:Akamai NetSession Interface
"2896:TCP"= 2896:TCP:Akamai NetSession Interface
"1527:TCP"= 1527:TCP:Akamai NetSession Interface
"1634:TCP"= 1634:TCP:Akamai NetSession Interface
"2205:TCP"= 2205:TCP:Akamai NetSession Interface
"4825:TCP"= 4825:TCP:Akamai NetSession Interface
"4373:TCP"= 4373:TCP:Akamai NetSession Interface
"2252:TCP"= 2252:TCP:Akamai NetSession Interface
"2701:TCP"= 2701:TCP:Akamai NetSession Interface

R2 szkg5;szkg5;c:\windows\system32\drivers\SZKG.sys [5/12/2009 1:13 PM 61328]
R3 rt2870;Linksys 802.11n USB Wireless LAN Card Driver;c:\windows\system32\drivers\rt2870.sys [7/28/2007 1:50 PM 517632]
S3 dump_wmimmc;dump_wmimmc;\??\c:\nexon\MapleStory\GameGuard\dump_wmimmc.sys --> c:\nexon\MapleStory\GameGuard\dump_wmimmc.sys [?]
S3 XDva323;XDva323;\??\c:\windows\system32\XDva323.sys --> c:\windows\system32\XDva323.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
Akamai REG_MULTI_SZ Akamai
.
Contents of the 'Scheduled Tasks' folder

2010-02-09 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-06-03 18:42]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: {{d9288080-1baa-4bc4-9cf8-a92d743db949} - c:\documents and settings\Owner\Start Menu\Programs\IMVU\Run IMVU.lnk
Trusted Zone: buy-internetsecurity10.com
Trusted Zone: buy-is2010.com
Trusted Zone: is-software-download.com
Trusted Zone: is-software-download25.com
Trusted Zone: is10-soft-download.com
Trusted Zone: buy-internetsecurity10.com
Trusted Zone: buy-is2010.com
TCP: {1CFB99DE-49FA-497F-907A-8771319C3C54} = 192.168.1.1
TCP: {BAE384C6-45E8-4AD0-A889-F26079C637A8} = 83.149.115.157,4.2.2.1,192.168.1.1
TCP: {F412EE39-8EFD-4C17-A3CA-40D809FE8F1C} = 83.149.115.157,4.2.2.1
FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\smdu8zd6.default\
FF - component: c:\program files\Mozilla Firefox\components\FFComm.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npmozax.dll
FF - HiddenExtension: XULRunner: {228F33B9-DDD8-4FF4-A23D-FA088845E195} - c:\documents and settings\Owner\Local Settings\Application Data\{228F33B9-DDD8-4FF4-A23D-FA088845E195}
.
- - - - ORPHANS REMOVED - - - -

BHO-{0f450961-460c-44bf-a01e-311d36d50cb2} - kiduruka.dll
Toolbar-SITEguard - (no file)
AddRemove-BitTorrent - c:\program files\BitTorrent\uninstall.exe
AddRemove-Google Chrome - c:\documents and settings\Owner\Local Settings\Application Data\Google\Chrome\Application\2.0.172.33\Installer\setup.exe
AddRemove-UniBall - c:\program files\UniBall\uninstal.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-15 14:16
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'lsass.exe'(888)
c:\windows\poex32.dll

- - - - - - - > 'explorer.exe'(1520)
c:\windows\poex32.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\TGTSoft\StyleXP\StyleXPService.exe
c:\windows\system32\HPZipm12.exe
c:\windows\system32\wdfmgr.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\taskmgr.exe
c:\program files\Adobe\Photoshop Album Starter Edition\3.0\Apps\ComponentLauncher.exe
c:\windows\system32\rundll32.exe
.
**************************************************************************
.
Completion time: 2010-02-15 14:26:39 - machine was rebooted
ComboFix-quarantined-files.txt 2010-02-15 20:26

Pre-Run: 3,251,630,080 bytes free
Post-Run: 4,155,285,504 bytes free

Current=15 Default=15 Failed=14 LastKnownGood=16 Sets=1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16
- - End Of File - - E1EF09EA3279229B59DD90975F2C3F26

Attached Files

  • Attached File  GMER.log   36.11KB   2 downloads

Edited by wes1584, 15 February 2010 - 07:47 PM.


#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:46 PM

Posted 15 February 2010 - 11:27 PM

Hello wes1584,



1.
One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. "If you would like to continue, then follow the steps below, otherwise please let me know"

2.
1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the codebox below into it:

CODE
http://www.bleepingcomputer.com/forums/t/295988/trojan-malware-infection-wdds-gmer-logs/
Killall::

File::
C:\asfev8.exe
C:\2mbc9w.exe
c:\windows\Ffumovoxadosexas.bin
c:\windows\Rmurejivuluyetof.dat
C:\Windows\system32\drivers\SKYNETkoscsrrv.sys
C:\windows\system32\SKYNETkiqwhkym.dll
C:\Windows\system32\SKYNETlog.dat                                            
C:\windows\system32\SKYNETrftrvsig.dat
C:\windows\system32\SKYNETwsp.dll
C:windows\system32\SKYNETwubqmiwf.dll
C:\windows\system32\SKYNETeewxnsbs.dat
C:\windows\SKYNET.dat
c:\documents and settings\Owner\Local Settings\Application Data\wyiwkb
c:\windows\system32\XDva323.sys

Collect::
c:\windows\system32\bozehuka.dll
c:\windows\system32\dijoromo.dll
c:\windows\system32\mezoyoza.exe
c:\windows\eqabeyeyogomu.dll
C:\windows\system32\wuwogola.dll
c:\documents and settings\Owner\Local Settings\Application Data\wyiwkb\hgltsftav.exe
c:\windows\poex32.dll

Domains::

RENV::
c:\program files\Common Files\Logitech\QCDriver3\lvcoms .exe
c:\program files\Windows Live\Messenger\msnmsgr .exe

DDS::
TCP: {BAE384C6-45E8-4AD0-A889-F26079C637A8} = 83.149.115.157,4.2.2.1,192.168.1.1
TCP: {F412EE39-8EFD-4C17-A3CA-40D809FE8F1C} = 83.149.115.157,4.2.2.1
IE: {{d9288080-1baa-4bc4-9cf8-a92d743db949} - c:\documents and settings\Owner\Start Menu\Programs\IMVU\Run IMVU.lnk

Registry::
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Ijewucamotig"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"detumukube"=-
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
"Notification Packages"=hex(7):73,63,65,63,6c,69,00,00
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\oxiusfqw]
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"=-
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"=-

Driver::
XDva323


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.




Upload Samples by ComboFix

When Combofix finishes running, the ComboFix log will open along with a message box. With the above script, ComboFix captured some files to submit for analysis.
  • Important: Ensure you are connected to the internet before clicking OK on the message box.
  • A blue-screen would appear auto-uploading the zipped file I requested.
  • After the uploading is done you should see a message near the bottom saying "Upload was Succesfull".

**NOTE**
=================
  • IF for some reason Combofix fails to upload anything please do the following:
  • Go to Start >> My Computer > C:\
  • Then Navigate to the C:\Qoobox\Quarantine folder.
  • Find the archive zip file called "[68]-Submit_Date_Time.zip"
  • Simply go to THIS CHANNEL and upload the submit.zip archive file to me.
  • Follow the instructions on that page to copy/paste/send the requested file.

3.
Please download Malwarebytes Anti-Malware (v1.43) and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.

4.
Download DDS and save it to your desktop from here or here or here.
Disable any script blocker, and then double click dds.scr to run the tool.

* When done, DDS will open two (2) logs:

1. DDS.txt
2. Attach.txt

Save both reports to your desktop post the contents of the DDS.txt log. Save the other report incase I need to look at it later.

Things to include in your next reply:
Combofix log
MBAM log
DDS.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 wes1584

wes1584
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 16 February 2010 - 12:23 AM

Alright all finished. I will paste the Combofix log below and attach the other 3 logs you requested. Also after combofix nothing popped up for me to upload so I uploaded it the other way you said I could do via the website.


ComboFix 10-02-12.01 - Owner 02/15/2010 22:40:10.3.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.254.103 [GMT -6:00]
Running from: c:\documents and settings\Owner\Desktop\1234.scr.exe
Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt.txt
AV: BitDefender Antivirus *On-access scanning disabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB}

FILE ::
"C:\2mbc9w.exe"
"C:\asfev8.exe"
"c:\documents and settings\Owner\Local Settings\Application Data\wyiwkb"
"c:\windows\Ffumovoxadosexas.bin"
"c:\windows\Rmurejivuluyetof.dat"
"c:\windows\SKYNET.dat"
"c:\windows\system32\drivers\SKYNETkoscsrrv.sys"
"c:\windows\system32\SKYNETeewxnsbs.dat"
"c:\windows\system32\SKYNETkiqwhkym.dll"
"c:\windows\system32\SKYNETlog.dat"
"c:\windows\system32\SKYNETrftrvsig.dat"
"c:\windows\system32\SKYNETwsp.dll"
"c:\windows\system32\XDva323.sys"

file zipped: c:\windows\poex32.dll
file zipped: c:\windows\system32\bozehuka.dll
file zipped: c:\windows\system32\dijoromo.dll
file zipped: c:\windows\system32\mezoyoza.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\2mbc9w.exe
C:\asfev8.exe
c:\documents and settings\Owner\Application Data\.#
c:\documents and settings\Owner\Application Data\.#\MBX@FEC@B048E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@FEC@B048F0.###
c:\windows\Ffumovoxadosexas.bin
c:\windows\poex32.dll
c:\windows\Rmurejivuluyetof.dat
c:\windows\system32\bozehuka.dll
c:\windows\system32\dijoromo.dll
c:\windows\system32\mezoyoza.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_XDVA323
-------\Service_XDva323


((((((((((((((((((((((((( Files Created from 2010-01-16 to 2010-02-16 )))))))))))))))))))))))))))))))
.

2010-02-15 15:27 . 2010-02-15 15:27 -------- d-s---w- c:\documents and settings\NetworkService\UserData
2010-02-15 10:08 . 2010-02-15 10:08 0 ----a-w- c:\program files\13592671.dat
2010-02-15 10:08 . 2010-02-15 10:08 4 ----a-w- c:\program files\13592171.dat
2010-02-15 02:21 . 2010-02-15 02:21 -------- d--h--w- c:\windows\PIF
2010-02-15 01:02 . 2010-02-15 01:03 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-02-14 23:07 . 2010-02-14 23:12 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\wyiwkb
2010-02-14 22:30 . 2010-02-14 22:30 50 ----a-w- C:\abcdefg.bat
2010-02-14 21:58 . 2010-02-14 21:58 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\{228F33B9-DDD8-4FF4-A23D-FA088845E195}
2010-02-12 18:41 . 2010-02-12 18:41 -------- d-----w- c:\program files\Redbana

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-16 04:52 . 2006-09-29 18:07 -------- d-----w- c:\documents and settings\All Users\Application Data\STOPzilla!
2010-02-16 04:14 . 2009-11-01 20:19 -------- d-----w- c:\program files\Graal
2010-02-14 21:55 . 2008-11-20 01:44 33280 ----a-w- c:\windows\system32\wdbtnmgr.exe
2010-02-14 21:55 . 2006-09-29 17:48 33280 ----a-w- c:\windows\system32\hkcmd.exe
2010-02-14 21:55 . 2006-09-29 17:48 33280 ----a-w- c:\windows\system32\igfxtray.exe
2010-02-12 22:35 . 2009-05-21 23:34 -------- d-----w- c:\documents and settings\Owner\Application Data\Any Video Converter
2010-02-12 18:41 . 2006-09-29 03:37 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-01-07 20:14 . 2007-08-07 13:12 -------- d-----w- c:\documents and settings\Owner\Application Data\U3
2010-01-04 00:24 . 2010-01-04 00:24 -------- d-----w- c:\program files\Microsoft
2010-01-02 18:47 . 2007-04-26 05:20 -------- d-----w- c:\program files\LimeWire
2009-07-11 22:50 . 2009-07-11 22:50 7700 -c--a-w- c:\program files\licssck.txt
2007-09-09 05:27 . 2007-09-09 05:27 143771 -c--a-w- c:\program files\graal_1189315661.png
2009-03-05 23:08 . 2009-07-10 21:00 49664 ----a-w- c:\program files\mozilla firefox\components\FFComm.dll
2009-05-01 21:02 . 2009-05-01 21:02 1044480 -c--a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 -c--a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-02-14 33280]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-02-14 33280]
"LVCOMS"="c:\program files\Common Files\Logitech\QCDriver3\LVCOMS.EXE" [2002-12-10 127022]
"WD Button Manager"="WDBtnMgr.exe" [2010-02-14 33280]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-06-29 286720]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Wireless Network Monitor.lnk - c:\program files\Linksys\WUSB100\WUSB100.exe [2007-10-30 5677056]

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Synchronizer.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Synchronizer.lnk
backup=c:\windows\pss\Adobe Reader Synchronizer.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
2005-06-07 05:46 57344 -c--a-w- c:\program files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-01-12 03:16 39792 -c--a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AIM]
2004-06-07 20:53 61440 ----a-w- c:\program files\AIM\aim.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DeadAIM]
2004-02-23 09:16 144896 ----a-w- c:\progra~1\AIM\DeadAIM.ocm

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2005-12-15 17:18 49152 -c--a-w- c:\program files\HP\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogitechGalleryRepair]
2002-12-11 00:32 155648 -c--a-w- c:\program files\Logitech\ImageStudio\ISStart.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogitechImageStudioTray]
2002-12-11 00:31 61440 -c--a-w- c:\program files\Logitech\ImageStudio\LogiTray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-08-04 07:06 1667584 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2007-06-29 11:24 286720 -c--a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealTray]
2008-02-28 21:35 214560 ----a-w- c:\program files\Real\RealPlayer\realplay.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
2004-10-14 20:42 1404928 -c--a-w- c:\program files\Analog Devices\Core\smax4pnp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\STYLEXP]
2006-05-24 18:31 1372160 -c--a-w- c:\program files\TGTSoft\StyleXP\StyleXP.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2008-03-25 09:28 144784 -c--a-w- c:\program files\Java\jre1.6.0_06\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
2008-02-28 21:35 185896 -c--a-w- c:\program files\Common Files\Real\Update_OB\realsched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinampAgent]
2009-07-01 16:37 37888 -c--a-w- c:\program files\Winamp\winampa.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\StubInstaller.exe"=
"c:\\Program Files\\AIM\\aim.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqnrs08.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"4778:TCP"= 4778:TCP:Akamai NetSession Interface
"5000:UDP"= 5000:UDP:Akamai NetSession Interface
"1636:TCP"= 1636:TCP:Akamai NetSession Interface
"1030:TCP"= 1030:TCP:Akamai NetSession Interface
"1067:TCP"= 1067:TCP:Akamai NetSession Interface
"1984:TCP"= 1984:TCP:Akamai NetSession Interface
"2416:TCP"= 2416:TCP:Akamai NetSession Interface
"1033:TCP"= 1033:TCP:Akamai NetSession Interface
"1063:TCP"= 1063:TCP:Akamai NetSession Interface
"1032:TCP"= 1032:TCP:Akamai NetSession Interface
"1065:TCP"= 1065:TCP:Akamai NetSession Interface
"1062:TCP"= 1062:TCP:Akamai NetSession Interface
"1034:TCP"= 1034:TCP:Akamai NetSession Interface
"1069:TCP"= 1069:TCP:Akamai NetSession Interface
"1035:TCP"= 1035:TCP:Akamai NetSession Interface
"1064:TCP"= 1064:TCP:Akamai NetSession Interface
"1031:TCP"= 1031:TCP:Akamai NetSession Interface
"1061:TCP"= 1061:TCP:Akamai NetSession Interface
"1177:TCP"= 1177:TCP:Akamai NetSession Interface
"1060:TCP"= 1060:TCP:Akamai NetSession Interface
"1072:TCP"= 1072:TCP:Akamai NetSession Interface
"1090:TCP"= 1090:TCP:Akamai NetSession Interface
"1348:TCP"= 1348:TCP:Akamai NetSession Interface
"1038:TCP"= 1038:TCP:Akamai NetSession Interface
"1066:TCP"= 1066:TCP:Akamai NetSession Interface
"1088:TCP"= 1088:TCP:Akamai NetSession Interface
"1041:TCP"= 1041:TCP:Akamai NetSession Interface
"1084:TCP"= 1084:TCP:Akamai NetSession Interface
"3989:TCP"= 3989:TCP:Akamai NetSession Interface
"1562:TCP"= 1562:TCP:Akamai NetSession Interface
"3248:TCP"= 3248:TCP:Akamai NetSession Interface
"1098:TCP"= 1098:TCP:Akamai NetSession Interface
"1094:TCP"= 1094:TCP:Akamai NetSession Interface
"1092:TCP"= 1092:TCP:Akamai NetSession Interface
"1593:TCP"= 1593:TCP:Akamai NetSession Interface
"1624:TCP"= 1624:TCP:Akamai NetSession Interface
"3660:TCP"= 3660:TCP:Akamai NetSession Interface
"3680:TCP"= 3680:TCP:Akamai NetSession Interface
"3701:TCP"= 3701:TCP:Akamai NetSession Interface
"1045:TCP"= 1045:TCP:Akamai NetSession Interface
"1087:TCP"= 1087:TCP:Akamai NetSession Interface
"1086:TCP"= 1086:TCP:Akamai NetSession Interface
"3473:TCP"= 3473:TCP:Akamai NetSession Interface
"3460:TCP"= 3460:TCP:Akamai NetSession Interface
"1097:TCP"= 1097:TCP:Akamai NetSession Interface
"4828:TCP"= 4828:TCP:Akamai NetSession Interface
"1747:TCP"= 1747:TCP:Akamai NetSession Interface
"1926:TCP"= 1926:TCP:Akamai NetSession Interface
"1095:TCP"= 1095:TCP:Akamai NetSession Interface
"1044:TCP"= 1044:TCP:Akamai NetSession Interface
"4177:TCP"= 4177:TCP:Akamai NetSession Interface
"4469:TCP"= 4469:TCP:Akamai NetSession Interface
"1091:TCP"= 1091:TCP:Akamai NetSession Interface
"3658:TCP"= 3658:TCP:Akamai NetSession Interface
"1089:TCP"= 1089:TCP:Akamai NetSession Interface
"1268:TCP"= 1268:TCP:Akamai NetSession Interface
"1529:TCP"= 1529:TCP:Akamai NetSession Interface
"2229:TCP"= 2229:TCP:Akamai NetSession Interface
"1040:TCP"= 1040:TCP:Akamai NetSession Interface
"1085:TCP"= 1085:TCP:Akamai NetSession Interface
"3832:TCP"= 3832:TCP:Akamai NetSession Interface
"3850:TCP"= 3850:TCP:Akamai NetSession Interface
"3872:TCP"= 3872:TCP:Akamai NetSession Interface
"1083:TCP"= 1083:TCP:Akamai NetSession Interface
"2436:TCP"= 2436:TCP:Akamai NetSession Interface
"1058:TCP"= 1058:TCP:Akamai NetSession Interface
"4724:TCP"= 4724:TCP:Akamai NetSession Interface
"4924:TCP"= 4924:TCP:Akamai NetSession Interface
"2325:TCP"= 2325:TCP:Akamai NetSession Interface
"1082:TCP"= 1082:TCP:Akamai NetSession Interface
"1354:TCP"= 1354:TCP:Akamai NetSession Interface
"1508:TCP"= 1508:TCP:Akamai NetSession Interface
"3006:TCP"= 3006:TCP:Akamai NetSession Interface
"1725:TCP"= 1725:TCP:Akamai NetSession Interface
"1818:TCP"= 1818:TCP:Akamai NetSession Interface
"3079:TCP"= 3079:TCP:Akamai NetSession Interface
"1099:TCP"= 1099:TCP:Akamai NetSession Interface
"1068:TCP"= 1068:TCP:Akamai NetSession Interface
"1142:TCP"= 1142:TCP:Akamai NetSession Interface
"1214:TCP"= 1214:TCP:Akamai NetSession Interface
"1259:TCP"= 1259:TCP:Akamai NetSession Interface
"1523:TCP"= 1523:TCP:Akamai NetSession Interface
"1585:TCP"= 1585:TCP:Akamai NetSession Interface
"1679:TCP"= 1679:TCP:Akamai NetSession Interface
"1759:TCP"= 1759:TCP:Akamai NetSession Interface
"1790:TCP"= 1790:TCP:Akamai NetSession Interface
"1856:TCP"= 1856:TCP:Akamai NetSession Interface
"2055:TCP"= 2055:TCP:Akamai NetSession Interface
"2579:TCP"= 2579:TCP:Akamai NetSession Interface
"1943:TCP"= 1943:TCP:Akamai NetSession Interface
"1965:TCP"= 1965:TCP:Akamai NetSession Interface
"2963:TCP"= 2963:TCP:Akamai NetSession Interface
"2847:TCP"= 2847:TCP:Akamai NetSession Interface
"2982:TCP"= 2982:TCP:Akamai NetSession Interface
"1964:TCP"= 1964:TCP:Akamai NetSession Interface
"2045:TCP"= 2045:TCP:Akamai NetSession Interface
"1732:TCP"= 1732:TCP:Akamai NetSession Interface
"1828:TCP"= 1828:TCP:Akamai NetSession Interface
"1846:TCP"= 1846:TCP:Akamai NetSession Interface
"1073:TCP"= 1073:TCP:Akamai NetSession Interface
"1081:TCP"= 1081:TCP:Akamai NetSession Interface
"1057:TCP"= 1057:TCP:Akamai NetSession Interface
"1037:TCP"= 1037:TCP:Akamai NetSession Interface
"2296:TCP"= 2296:TCP:Akamai NetSession Interface
"2323:TCP"= 2323:TCP:Akamai NetSession Interface
"1036:TCP"= 1036:TCP:Akamai NetSession Interface
"1712:TCP"= 1712:TCP:Akamai NetSession Interface
"1048:TCP"= 1048:TCP:Akamai NetSession Interface
"1052:TCP"= 1052:TCP:Akamai NetSession Interface
"1093:TCP"= 1093:TCP:Akamai NetSession Interface
"1043:TCP"= 1043:TCP:Akamai NetSession Interface
"4061:TCP"= 4061:TCP:Akamai NetSession Interface
"2997:TCP"= 2997:TCP:Akamai NetSession Interface
"2648:TCP"= 2648:TCP:Akamai NetSession Interface
"2671:TCP"= 2671:TCP:Akamai NetSession Interface
"1077:TCP"= 1077:TCP:Akamai NetSession Interface
"3160:TCP"= 3160:TCP:Akamai NetSession Interface
"2115:TCP"= 2115:TCP:Akamai NetSession Interface
"2850:TCP"= 2850:TCP:Akamai NetSession Interface
"1635:TCP"= 1635:TCP:Akamai NetSession Interface
"1368:TCP"= 1368:TCP:Akamai NetSession Interface
"2896:TCP"= 2896:TCP:Akamai NetSession Interface
"1527:TCP"= 1527:TCP:Akamai NetSession Interface
"1634:TCP"= 1634:TCP:Akamai NetSession Interface
"2205:TCP"= 2205:TCP:Akamai NetSession Interface
"4825:TCP"= 4825:TCP:Akamai NetSession Interface
"4373:TCP"= 4373:TCP:Akamai NetSession Interface
"2252:TCP"= 2252:TCP:Akamai NetSession Interface
"2701:TCP"= 2701:TCP:Akamai NetSession Interface

R2 szkg5;szkg5;c:\windows\system32\drivers\SZKG.sys [5/12/2009 1:13 PM 61328]
R3 rt2870;Linksys 802.11n USB Wireless LAN Card Driver;c:\windows\system32\drivers\rt2870.sys [7/28/2007 1:50 PM 517632]
S3 dump_wmimmc;dump_wmimmc;\??\c:\nexon\MapleStory\GameGuard\dump_wmimmc.sys --> c:\nexon\MapleStory\GameGuard\dump_wmimmc.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
Akamai REG_MULTI_SZ Akamai
.
Contents of the 'Scheduled Tasks' folder

2010-02-09 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-06-03 18:42]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: {{d9288080-1baa-4bc4-9cf8-a92d743db949} - c:\documents and settings\Owner\Start Menu\Programs\IMVU\Run IMVU.lnk
LSP: c:\program files\Common Files\iS3\Anti-Spyware\iS3lsp.dll
TCP: {1CFB99DE-49FA-497F-907A-8771319C3C54} = 192.168.1.1
FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\smdu8zd6.default\
FF - component: c:\program files\Mozilla Firefox\components\FFComm.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npmozax.dll
FF - HiddenExtension: XULRunner: {228F33B9-DDD8-4FF4-A23D-FA088845E195} - c:\documents and settings\Owner\Local Settings\Application Data\{228F33B9-DDD8-4FF4-A23D-FA088845E195}
.
- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-BDAgent - c:\program files\BitDefender\BitDefender 2009\bdagent.exe
MSConfigStartUp-BitDefender Antiphishing Helper - c:\program files\BitDefender\BitDefender 2009\IEShow.exe
MSConfigStartUp-BitTorrent - c:\program files\BitTorrent\bittorrent.exe
MSConfigStartUp-Google Update - c:\documents and settings\Owner\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
MSConfigStartUp-Ijewucamotig - c:\windows\eqabeyeyogomu.dll
MSConfigStartUp-msnmsgr - c:\program files\windows live\messenger\msnmsgr .exe
MSConfigStartUp-RealPlayer - c:\program files\Real\RealOne Player\realplay.exe
MSConfigStartUp-Remote System Protection - c:\windows\system32\qtn9hkak.dll
MSConfigStartUp-SearchSettings - c:\program files\Search Settings\SearchSettings.exe
MSConfigStartUp-UnlockerAssistant - c:\program files\Unlocker\UnlockerAssistant.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-15 22:53
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3548)
c:\program files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\HPZipm12.exe
c:\windows\system32\wdfmgr.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2010-02-15 23:01:14 - machine was rebooted
ComboFix-quarantined-files.txt 2010-02-16 05:01
ComboFix2.txt 2010-02-15 20:26

Pre-Run: 2,237,657,088 bytes free
Post-Run: 2,221,690,880 bytes free

Current=15 Default=15 Failed=14 LastKnownGood=16 Sets=1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16
- - End Of File - - 73AC42A7B4BBE66F258DDF09FE3F18B3

Attached Files



#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:46 PM

Posted 16 February 2010 - 01:24 AM

Hello wes1584,

Things are looking alot better now. thumbup2.gif
Let do some updating, check a few files, and a few other thing to make sure you are clean. whistling.gif


1.
Please update Malwarebytes Anti-Malware. Then run a Full Scan and post the results.

2.
Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Please click this link-->Jotti

When the jotti page has finished loading, click the browse button and navigate to the files listed below in bold, then click Submit. You will only be able to have one file scanned at a time.

c:\program files\13592671.dat
c:\program files\13592171.dat
c:\windows\system32\drivers\kgpcpy.cfg
c:\program files\graal_1189315661.png

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/
Please post back the results of the scan in your next post.

3.
Your log(s) show that you are using so called peer-to-peer or file-sharing programmes (in your case LimeWire). These programmes allow to share files between users as the name(s) suggest. In today's world the cyber crime has come to an enormous dimension and any means is used to infect personal computers to make use of their stored data or machine power for further propagation of the malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. Some further readings on this subject, along the included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

It is also important to note that sharing entertainment files and proprietary software infringes the copyright laws in many countries over the world and you are putting yourself at risk of being indicted through organisations watching over the rights of the authors of such files (i.e. the RIAA for music files, or the MPAA for movie files in the USA) or the authors of the files themselves.

Naturally there are also legal ways to use these services, such as downloading Linux distributions or office suites such as "Open Office."

4.
Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "JDK 6 Update 18 (JDK or JRE)".
  • Click the "Download JRE" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u18-windows-i586.exe to install the newest version.
  • If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
-- Starting with Java 6u10, the uninstaller incorporated in each new release uses Enhanced Auto update to automatically remove the previous version when updating to a later update release. It will not remove older versions, so they will need to be removed manually.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.

5.
New Adobe Reader Installation:
  • Go here and click on the Download button to download the latest version of Adobe Reader.
  • Save this file to your desktop and run it to install the latest version of Adobe Reader.

6.
I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
Note for Vista Users: Eset is compatible but Internet Explorer must be run as Administrator. To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select "Run as Administrator" from the context menu.)

You can refer to this short video by: neomage
**Note**
To optimize scanning time and produce a more sensible report for review:
  • Close any open programs
  • Turn off the real time scanner of any existing antivirus program while performing the online scan.

Things to include in your next reply:
MBAM log
Jotti results
Eset log
A new DDS.txt log
How is your machine running now? Any signs or symptoms of malware?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 wes1584

wes1584
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 16 February 2010 - 02:53 PM

Alrighty all finished. Ill post Jotti and Malawarebytes log below and attach the DDS and ESET logs. Computer seems a lot better now. Faster no popups and hijacking etc. Although after I was all done with everything you asked me to do I ran a full stopzilla scan and it found 12 things malwarebytes or ESET didn't catch. I quarantined and removed them though.

c:\program files\13592671.dat - Empty File
c:\program files\13592171.dat - Nothing Found
c:\windows\system32\drivers\kgpcpy.cfg - File wasn't there. Must have been deleted.
c:\program files\graal_1189315661.png - Nothing Found


---------------

Malwarebytes' Anti-Malware 1.44
Database version: 3744
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

2/16/2010 1:54:47 AM
mbam-log-2010-02-16 (01-54-47).txt

Scan type: Full Scan (C:\|)
Objects scanned: 198899
Time elapsed: 1 hour(s), 16 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 20

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\cache\6.0\19\4ae4aa53-52dd001c (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\cache\6.0\30\50f9da5e-2554388b (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\Adobe\352765.old (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\Windows Live\Messenger\msnmsgr.exe.delme182 (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\2mbc9w.exe.vir (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\asfev8.exe.vir (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\Documents and Settings\Owner\Application Data\Desktopicon\eBayShortcuts.exe.vir (Adware.ADON) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\Program Files\Adobe\acrotray .exe.vir (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\app_dll.dll.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\helper32.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\kiduruka.dll.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\smss32 .exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\smss32.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\vavanoho.dll.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wuwogola.dll.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\UACd.sys.vir (Trojan.TDSS.T) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\spool\prtprocs\w32x86\00005ab1.tmp.vir (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3C5F0FCE-D72A-4EAF-85A1-8A1AB6AA1B18}\RP1\A0004096.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3C5F0FCE-D72A-4EAF-85A1-8A1AB6AA1B18}\RP1\A0004089.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3C5F0FCE-D72A-4EAF-85A1-8A1AB6AA1B18}\RP1\A0004095.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.

Attached Files


Edited by wes1584, 16 February 2010 - 03:04 PM.


#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:46 PM

Posted 16 February 2010 - 09:14 PM

Hello wes1584,

QUOTE
Although after I was all done with everything you asked me to do I ran a full stopzilla scan and it found 12 things malwarebytes or ESET didn't catch. I quarantined and removed them though.

Stopzilla is known as a not very reliable antispyware. It is also known to cauuse fasle positive s to trick you into buying it.
Please read here. If it was up to me I would Uninstall this program and use MBAM it is much more reliable and constantly updating.

Everything is looking good on the logs. Most of what MBAM and Eset found was systeme restore files and Combofix Quarantine files. We will get rid of these after we know you are clean. We syll want to see all 0's with MBAM

1.Please update MBAM and do a Quickscan and post the results

2Please go to Kaspersky website and perform an online antivirus scan.

1. Read through the requirements and privacy statement and click on Accept button.
2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
3. When the downloads have finished, click on Settings.
4. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
Spyware, Adware, Dialers, and other potentially dangerous programs
Archives

5. Click on My Computer under Scan.
6. Once the scan is complete, it will display the results. Click on View Scan Report.
7. You will see a list of infected items there. Click on Save Report As....
8. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
9. Please post this log in your next reply along with a fresh DDS log.

Things to include in your next reply:
MBAM log
Kaspersky log
DDS. txt
No need for Attach.txt
How is your machine running now? Any signs or Symptoms of infection?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#11 wes1584

wes1584
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 17 February 2010 - 01:29 AM

Hello, Iam having trouble running Kaspersky. Right after I accept the agreement a few seconds later a message pops up that says "0 [Error:java.lang.NullPointerException]"

Any suggestions? huh.gif

#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:46 PM

Posted 17 February 2010 - 07:08 PM

Hello wes1584,

QUOTE
Hello, Iam having trouble running Kaspersky. Right after I accept the agreement a few seconds later a message pops up that says "0 [Error:java.lang.NullPointerException]"


For some reason certain people on certain machines have trouble running Kaspersky so don't feel like your the only one.
We will try another one

Please try to run one of the next two and post the results. Also post the logs I requested from the previous post.

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

Please run a BitDefender Online Scan
  • Click I Agree to agree to the EULA.
  • Allow the ActiveX control to install when prompted.
  • Click Click here to scan to begin the scan.
  • Please refrain from using the computer until the scan is finished. This might take a while to run, but it is important that nothing else is running while you scan.
  • When the scan is finished, click on Click here to export the scan results.
  • Save the report to your desktop so you can post it in your next reply.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 wes1584

wes1584
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 18 February 2010 - 02:36 PM

Okay all finished. Ill attach all the logs you needed thumbup2.gif

Attached Files



#14 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:46 PM

Posted 19 February 2010 - 06:22 PM

Hello, wes1584.
Congratulations! You now appear clean! specool.gif

Are things running okay? Do you have any more questions?

Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall



    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall


  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".


System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.

Recommendations
Below are some recommendations to lower your chances of (re)infection.
  1. Install and maintain an outbound firewall
  2. Install Spyware Blaster and update it regularly
    If you wish, the commercial version provides automatic updating.
  3. Install the MVPs hosts file, and update it regularly
    You can use the HostMan host file manager to do this automaticly if you wish.
    For more information on the hosts file, and what it can do for you, you can view the Tutorial on the Hosts file
  4. Install an Anti-Spyware program, and update it regularly
    Malware Byte's Anti Malware is an excellent Anti-Spyware scanner. It's scan times are usually under ten minutes, and has excellent detection and removal rates.
    SUPERAntiSpyware is another good scanner with high detection and removal rates.
    Both programs are free for non commercial home use but provide a resident and do not nag if you purchase the paid versions.
  5. Keep Windows (and your other Microsoft software) up to date!
    I cannot stress how important this is enough. Often holes are found in Internet Explorer or Windows itself that require patching. Sometimes these holes will allow an attacker unrestricted access to your computer.

    If you are using Windows XP or earlier
    Visit the Microsoft Update Website and follow the on screen instructions to setup Microsoft Update. Also follow the instructions to update your system. Please REBOOT and repeat this process until there are no more updates to install!!

    If you are using Windows Vista
    1. Click the "Start Menu" (or Windows Orb)
    2. Click "All Programs"
    3. Click "Windows Update"
    4. On the left, choose "Change Settings"
    5. Ensure that the checkbox "Use Microsoft Update" at the bottom of the window is checked.
    6. Press OK and accept the UAC prompt.
      Note: You shouldn't need to check this checkbox every single time you update, only the first time.
    7. Click "Check for Updates" in the upper left corner.
    8. Follow the instructions to install the latest updates.
    9. Reboot and repeat the "Check for Updates" until there are no more critical updates to install
  6. Keep your other software up to date as well
    Software does not need to be made by Microsoft to be insecure. You can use the Secunia Online Software occasionally to help you check for out of date software on your machine.
  7. Stay up to date!
    The MOST IMPORTANT part of any security setup is keeping the software up to date. Malware writers release new variants every single day. If your software updates don't keep up, then the malware will always be one step ahead. Not a good thing sad.gif.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#15 wes1584

wes1584
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 19 February 2010 - 10:27 PM

Hooray. Thanks a lot for your help I really appreciate it. And I finished cleaning up. Thanks again thumbup.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users