Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Am I clean?


  • This topic is locked This topic is locked
16 replies to this topic

#1 meltdown

meltdown

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 24 February 2010 - 11:13 PM

I had a an issue with mozilla occasionally re-routing my pages to adds. I used Malwarebytes anti malware and found 87 threats then I tried superantispyware (professional, trial version) and it found 107 threats. Both times I had them fix the problems. I currently have Norton suite running (Version: 3.8.0.41, it came with comcast subscription) and now the superantispyware is running an antispyware realtime protection program (at least till the free week ends).

In any case. I want to make sure I am clean. I have the log's from both malware and superantispyware. I also have a hijackthis log but I didn't have highack do anything. I'll past them below. So far I have not had any other re-routes but i just ran the programs and having around 200 scared me so I want to be sure. Thx

p.s. I'm also curious why Malwarebytes didnt pick up the 107 threats that Super's did and should I use one over the other next time?

--------------------------------------------------
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/24/2010 at 05:40 PM

Application Version : 4.34.1000

Core Rules Database Version : 4617
Trace Rules Database Version: 2429

Scan type : Complete Scan
Total Scan Time : 00:16:27

Memory items scanned : 798
Memory threats detected : 0
Registry items scanned : 7966
Registry threats detected : 33
File items scanned : 20608
File threats detected : 107

Adware.HBHelper
HKLM\Software\Classes\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32#ThreadingModel
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\ProgID
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\TypeLib
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\VersionIndependentProgID
HKCR\URLSearchHook.ToolbarURLSearchHook.1
HKCR\URLSearchHook.ToolbarURLSearchHook.1\CLSID
HKCR\URLSearchHook.ToolbarURLSearchHook
HKCR\URLSearchHook.ToolbarURLSearchHook\CLSID
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0\win32
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\FLAGS
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\HELPDIR
C:\PROGRAM FILES\SEARCH TOOLBAR\TBHELPER.DLL
HKU\S-1-5-21-1858719236-4112305457-2979804266-1001\Software\Microsoft\Internet Explorer\URLSearchHooks#{CA3EB689-8F09-4026-AA10-B9534C691CE0}
HKU\S-1-5-21-1858719236-4112305457-2979804266-1001_Classes\Software\Microsoft\Internet Explorer\URLSearchHooks#{CA3EB689-8F09-4026-AA10-B9534C691CE0}

Adware.Tracking Cookie
C:\Users\Kevin\AppData\Roaming\Microsoft\Windows\Cookies\kevin@popularscreensavers[1].txt
C:\Users\Kevin\AppData\Roaming\Microsoft\Windows\Cookies\kevin@www.windowsmedia[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ehg-upperdeck.hitbox[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@atdmt[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@tribalfusion[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@casalemedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@interclick[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@fastclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ad.yieldmanager[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@specificclick[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@advertising[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@dc.tremormedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@247realmedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@casalemedia[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@mediaplex[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@overture[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@trafficmp[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@apmebf[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@2o7[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@statse.webtrendslive[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@www.burstnet[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@interclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@microsoftwindows.112.2o7[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@content.yieldmanager[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ad.candystand[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ehg-upperdeck.hitbox[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@questionmarket[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@pointroll[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@atdmt[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@tribalfusion[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@content.yieldmanager[3].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ads.pointroll[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@specificmedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@fastclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@bs.serving-sys[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@specificclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@serving-sys[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@media6degrees[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@burstnet[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ad.wsod[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@adserver.adtechus[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ad.yieldmanager[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@imrworldwide[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@realmedia[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@advertising[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@doubleclick[1].txt
C:\Users\Kevin\AppData\Roaming\Microsoft\Windows\Cookies\Low\kevin@ads.cnn[1].txt
C:\Users\Kevin\AppData\Roaming\Microsoft\Windows\Cookies\Low\kevin@interclick[2].txt
C:\Users\Kevin\AppData\Roaming\Microsoft\Windows\Cookies\Low\kevin@account.live[2].txt
C:\Users\Kevin\AppData\Roaming\Microsoft\Windows\Cookies\Low\kevin@mywebsearch[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\kids@casalemedia[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\kids@ad.yieldmanager[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\kids@adtech[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\kids@atdmt[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\kids@doubleclick[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\kids@qnsr[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\kids@www.findyour-replacementwindows[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@www.burstnet[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@msnaccountservices.112.2o7[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@imrworldwide[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@microsoftinternetexplorer.112.2o7[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@content.yieldmanager[3].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@casalemedia[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@interclick[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@serving-sys[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@ad.candystand[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@mediaplex[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@adserver.adtechus[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@ad.wsod[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@ad.yieldmanager[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@ads.cartoonnetwork[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@advertising[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@neoedge.adbureau[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@collective-media[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@trafficmp[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@a1.interclick[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@ads.pointroll[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@bs.serving-sys[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@247realmedia[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@2o7[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@at.atwola[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@ads.webkinz[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@apmebf[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@atdmt[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@burstbeacon[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@burstnet[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@citi.bridgetrack[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@content.yieldmanager[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@dc.tremormedia[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@doubleclick[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@eyewonder[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@fastclick[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@insightexpressai[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@microsoftwindows.112.2o7[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@media6degrees[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@msnportal.112.2o7[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@network.realmedia[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@pointroll[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@questionmarket[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@realmedia[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@richmedia.yahoo[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@specificclick[1].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@specificmedia[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@tacoda[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@tribalfusion[2].txt
C:\Users\Kids\AppData\Roaming\Microsoft\Windows\Cookies\Low\kids@www.burstbeacon[2].txt

Browser Hijacker.Tubby
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar#DisplayVersion
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar#URLInfoAbout
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar#Publisher
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar#EstimatedSize
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar#UninstallString
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Search Toolbar#DisplayIcon

Browser Hijacker.Deskbar
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib#Version

---------------------------------------------------------------------------------------
Malwarebytes' Anti-Malware 1.44
Database version: 3787
Windows 6.1.7600
Internet Explorer 8.0.7600.16385

2/24/2010 5:15:21 PM
mbam-log-2010-02-24 (17-15-21).txt

Scan type: Full Scan (C:\|)
Objects scanned: 250507
Time elapsed: 34 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 32
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 12
Files Infected: 43

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{fe5b2d9d-91b0-b04b-ac20-14a260769687} (Adware.ColorSoft) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\vw-z_ony_rd (Adware.AdRotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\flv direct player (Adware.BHO.FL) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AppDataLow\HavingFunOnline (Adware.BHO.FL) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0c0a0c3d-3451-06fe-0ebc-d6b724f7b3d6} (Adware.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0c0a0c3d-3451-06fe-0ebc-d6b724f7b3d6} (Adware.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\FLV Direct Player (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Button (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\ComboBox (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Menu (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Files Infected:
C:\Windows\System32\vw-Z_ONy_rd.exe (Adware.AdRotator) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\downloading.swf (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\dskinliteu.dll (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\FLVPlayer.exe (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\player.dat (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\preload.swf (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\uninstall.exe (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin.xml (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Button\button_default.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Button\button_disable.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Button\button_down.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Button\button_hot.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Button\button_normal.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\ComboBox\combobox_buttonDown.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\ComboBox\combobox_buttonHot.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\ComboBox\combobox_buttonNor.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\ComboBox\edit_back.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Menu\menubg.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Menu\menuItem_arrow.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Menu\menuItem_check.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Menu\menuitem_select.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Menu\menuItem_seperator.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_close_down.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_close_hot.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_close_nor.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_max_down.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_max_hot.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_max_nor.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_min_down.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_min_hot.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_min_nor.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_restore_down.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_restore_hot.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\SysButton\sys_restore_nor.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window\BottomBorder.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window\downarrow.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window\LeftBorder.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window\Logo.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window\main.ico (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window\RightBorder.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\FLV Direct Player\SkinDirectFLV\skin\Window\TitlePattern.bmp (Adware.BHO.FL) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Windows\System32\6F_dyjK-7eB-.dll (Adware.BHO) -> Quarantined and deleted successfully.

----------------------------------------------------------------------------------------------------------------
Logfile of Trend Micro HijackThis v2.0.3 (BETA)
Scan saved at 6:24:55 PM, on 2/24/2010
Platform: Unknown Windows (WinNT 6.01.3504)
MSIE: Internet Explorer v8.00 (8.00.7600.16385)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskhost.exe
C:\Program Files\Norton Security Suite\Engine\3.8.0.41\ccSvcHst.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Windows Live\Family Safety\fsui.exe
C:\Program Files\CyberLink\Shared Files\brs.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Windows\system32\taskhost.exe
C:\Windows\system32\taskeng.exe
C:\hijackthis\TrendMicro\HiJackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://bing.zugo.com/?cfg=2-80-0-nuaP

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Windows Live Family Safety Browser Helper - {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} - C:\Program Files\Windows Live\Family Safety\fssbho.dll
O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton Security Suite\Engine\3.8.0.41\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton Security Suite\Engine\3.8.0.41\IPSBHO.DLL
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: TBSB05974 - {FCBCCB87-9224-4B8D-B117-F56D924BEB18} - C:\Program Files\Search Toolbar\tbcore3.dll
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton Security Suite\Engine\3.8.0.41\coIEPlg.dll
O3 - Toolbar: Search Toolbar - {0C8413C1-FAD1-446C-8584-BE50576F863E} - C:\Program Files\Search Toolbar\tbcore3.dll
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [fssui] "C:\Program Files\Windows Live\Family Safety\fsui.exe" -autorun
O4 - HKLM\..\Run: [BDRegion] C:\Program Files\Cyberlink\Shared Files\brs.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [LanguageShortcut] "C:\Program Files\CyberLink\PowerDVD\Language\Language.exe"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe" /hide
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [Speech Recognition] "C:\Windows\Speech\Common\sapisvr.exe" -SpeechUX -Startup
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETWORK SERVICE')
O4 - Startup: MagicDisc.lnk = C:\Program Files\MagicDisc\MagicDisc.exe
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\Office12\EXCEL.EXE/3000
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\program files\common files\microsoft shared\windows live\wlidnsp.dll
O10 - Unknown file in Winsock LSP: c:\program files\common files\microsoft shared\windows live\wlidnsp.dll
O13 - Gopher Prefix:
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton Security Suite\Engine\3.8.0.41\coIEPlg.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Dragon Age: Origins - Content Updater (DAUpdaterSvc) - BioWare - C:\Program Files\Dragon Age\bin_ship\DAUpdaterSvc.Service.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logitech\Bluetooth\LBTServ.exe
O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
O23 - Service: Norton Security Suite (N360) - Symantec Corporation - C:\Program Files\Norton Security Suite\Engine\3.8.0.41\ccSvcHst.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) - NVIDIA Corporation - C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
O23 - Service: Web Update Wizard Service V4 (WebUpdate4) - Data Perceptions / PowerProgrammer - C:\Windows\system32\WebUpdateSvc4.exe

--
End of file - 8209 bytes

Edited by Pandy, 25 February 2010 - 12:27 AM.
Moved from AntiVirus, Firewall and Privacy Products and Protection Methods as it includes logfiles ~Pandy


BC AdBot (Login to Remove)

 


#2 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 25 February 2010 - 08:06 PM

I guess I'm still bugged. I got the adds again. I did some looking and its the primawega junk that everyone is messing with. I would like to try to fix the issue before I re-install firefox. I'll patiently wait for help. Thx again, this is an awesome site for help on this stuff.

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:18 AM

Posted 26 February 2010 - 10:39 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below I will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

Please download DeFogger to your desktop.

Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.


Then

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#4 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 26 February 2010 - 11:16 PM

I'll be able to get this done tomorrow. I'm out of town for the day. Thx for the help

#5 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 27 February 2010 - 04:37 PM

ok here is the stuff

DDS (Ver_09-12-01.01) - NTFSx86
Run by Kevin at 14:10:10.97 on Sat 02/27/2010
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 1.6.0_16
Microsoft Windows 7 Professional 6.1.7600.0.1252.1.1033.18.3070.1881 [GMT -7:00]


============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\nvvsvc.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\Windows Live\Family Safety\fsssvc.exe
C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
C:\Program Files\Norton Security Suite\Engine\3.8.0.41\ccSvcHst.exe
C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\WebUpdateSvc4.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Windows Live\Family Safety\fsui.exe
C:\Program Files\CyberLink\Shared Files\brs.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\MagicDisc\MagicDisc.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\Norton Security Suite\Engine\3.8.0.41\ccSvcHst.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\explorer.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Users\Kevin\Downloads\dds.scr
C:\Windows\system32\conhost.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://bing.zugo.com/?cfg=2-80-0-nuaP
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Windows Live Family Safety Browser Helper Class: {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} - c:\program files\windows live\family safety\fssbho.dll
BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton security suite\engine\3.8.0.41\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\program files\norton security suite\engine\3.8.0.41\IPSBHO.DLL
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: TBSB05974 Class: {fcbccb87-9224-4b8d-b117-f56d924beb18} - c:\program files\search toolbar\tbcore3.dll
TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton security suite\engine\3.8.0.41\coIEPlg.dll
TB: Search Toolbar: {0c8413c1-fad1-446c-8584-be50576f863e} - c:\program files\search toolbar\tbcore3.dll
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [fssui] "c:\program files\windows live\family safety\fsui.exe" -autorun
mRun: [BDRegion] c:\program files\cyberlink\shared files\brs.exe
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [LanguageShortcut] "c:\program files\cyberlink\powerdvd\language\Language.exe"
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [LogitechQuickCamRibbon] "c:\program files\logitech\logitech webcam software\LWS.exe" /hide
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
StartupFolder: c:\users\kevin\appdata\roaming\micros~1\windows\startm~1\programs\startup\magicd~1.lnk - c:\program files\magicdisc\MagicDisc.exe
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\setpoint\SetPoint.exe
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~1\office12\EXCEL.EXE/3000
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~1\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~1\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Handler: symres - {AA1061FE-6C41-421f-9344-69640C9732AB} - c:\program files\norton security suite\engine\3.8.0.41\CoIEPlg.dll
Notify: LBTWlgn - c:\program files\common files\logitech\bluetooth\LBTWlgn.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\kevin\appdata\roaming\mozilla\firefox\profiles\5zm3xdo5.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.bing.com/search?FORM=IEFM1&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-US.start3.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
FF - prefs.js: keyword.URL - hxxp://bing.zugotoolbar.com/s/?iesrc=IE-Address&site=Bing&q=
FF - component: c:\program files\mozilla firefox\extensions\{84160987-7d07-1e78-4b4b-5dede544193d}\components\--b-KbSvp-.dll
FF - component: c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\coffplgn\components\coFFPlgn.dll
FF - component: c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\ipsffplgn\components\IPSFFPl.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npFoxitReaderPlugin.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npMozCouponPrinter.dll
FF - plugin: c:\program files\mozilla firefox\plugins\NPTURNMED.dll
FF - plugin: c:\program files\nvidia corporation\3d vision\npnv3dv.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll
FF - plugin: c:\users\kevin\appdata\roaming\move networks\plugins\npqmp071503000010.dll
FF - HiddenExtension: LoudMo Contextual Ad Assistant: No Registry Reference - c:\program files\mozilla firefox\extensions\{84160987-7d07-1e78-4b4b-5dede544193d}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
FF - user.js: google.toolbar.linkdoctor.enabled - false
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-2-25 64288]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\n360\0308000.029\SymEFA.sys [2010-2-4 310320]
R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\n360\0308000.029\BHDrvx86.sys [2010-2-4 259632]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\n360\0308000.029\cchpx86.sys [2010-2-4 482432]
R1 IDSVix86;IDSVix86;c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\ipsdefs\20100224.002\IDSvix86.sys [2010-2-25 343088]
R2 fssfltr;fssfltr;c:\windows\system32\drivers\fssfltr.sys [2009-11-1 54632]
R2 fsssvc;Windows Live Family Safety Service;c:\program files\windows live\family safety\fsssvc.exe [2009-8-5 704864]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2010-2-4 1229232]
R2 MLPTDR_Q;MLPTDR_Q;c:\windows\system32\MLPTDR_Q.SYS [2004-11-19 18848]
R2 N360;Norton Security Suite;c:\program files\norton security suite\engine\3.8.0.41\ccSvcHst.exe [2010-2-4 117640]
R2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files\nvidia corporation\3d vision\nvSCPAPISvr.exe [2009-11-20 240232]
R2 WebUpdate4;Web Update Wizard Service V4;c:\windows\system32\WebUpdateSvc4.exe [2008-9-15 262360]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-2-3 102448]
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\drivers\Rt86win7.sys [2009-3-1 139776]
R3 SYMNDISV;Symantec Network Filter Driver;c:\windows\system32\drivers\n360\0308000.029\symndisv.sys [2010-2-4 48688]
S3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\system32\drivers\ASPI32.SYS [2010-1-10 84832]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
S3 DAUpdaterSvc;Dragon Age: Origins - Content Updater;c:\program files\dragon age\bin_ship\daupdatersvc.service.exe [2009-12-21 25832]
S3 StorSvc;Storage Service;c:\windows\system32\svchost.exe -k LocalSystemNetworkRestricted [2009-7-13 20992]

=============== Created Last 30 ================

2010-02-26 16:56:13 0 d-----w- c:\users\kevin\appdata\roaming\Foxit Software
2010-02-26 00:48:22 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-02-25 18:55:16 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-02-25 18:53:43 0 dc-h--w- c:\programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-02-25 18:53:22 0 d-----w- c:\program files\Lavasoft
2010-02-25 05:51:15 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-02-25 05:48:06 0 d-----w- c:\programdata\Lavasoft
2010-02-25 01:19:33 0 d-----w- C:\hijackthis
2010-02-25 00:21:04 0 d-----w- c:\programdata\SUPERAntiSpyware.com
2010-02-25 00:20:54 0 d-----w- c:\users\kevin\appdata\roaming\SUPERAntiSpyware.com
2010-02-24 23:24:56 0 d-----w- c:\users\kevin\appdata\roaming\Malwarebytes
2010-02-24 23:24:52 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-24 23:24:50 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-24 23:24:50 0 d-----w- c:\programdata\Malwarebytes
2010-02-24 23:24:50 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-02-24 14:36:24 641536 ----a-w- c:\windows\system32\CPFilters.dll
2010-02-24 14:36:24 417792 ----a-w- c:\windows\system32\msdri.dll
2010-02-24 14:36:24 204288 ----a-w- c:\windows\system32\MSNP.ax
2010-02-24 14:36:23 465408 ----a-w- c:\windows\system32\psisdecd.dll
2010-02-24 14:36:21 2048 ----a-w- c:\windows\system32\tzres.dll
2010-02-20 01:41:46 0 d-----w- c:\program files\Mass Effect 2
2010-02-19 23:39:24 0 d---a-w- c:\programdata\TEMP
2010-02-19 23:39:16 0 d-----w- c:\program files\Any DVD Cloner Platinum
2010-02-16 17:58:54 116736 ----a-w- c:\windows\system32\drivers\mcdbus.sys
2010-02-16 17:58:53 0 d-----w- c:\program files\MagicDisc
2010-02-16 17:26:01 0 d-----w- c:\program files\Search Toolbar
2010-02-13 03:41:12 0 d-----w- c:\program files\iPod
2010-02-13 03:41:11 0 d-----w- c:\program files\iTunes
2010-02-11 22:16:24 0 d-----w- c:\program files\Coupons
2010-02-08 19:39:24 82289 ----a-w- c:\windows\system32\lvcoinst.ini
2010-02-08 19:39:24 539160 ----a-w- c:\windows\system32\LVUI2RC.dll
2010-02-08 19:39:24 539160 ----a-w- c:\windows\system32\LVUI2.dll
2010-02-08 19:39:24 416280 ----a-w- c:\windows\system32\LVCodec2.dll
2010-02-08 19:39:24 34068 ----a-w- c:\windows\system32\Repository.reg
2010-02-08 19:39:24 265496 ----a-w- c:\windows\system32\drivers\lvrs.sys
2010-02-08 19:39:24 199192 ----a-w- c:\windows\system32\lvci1201278.dll
2010-02-08 19:39:24 13976 ----a-w- c:\windows\system32\drivers\lv302af.sys
2010-02-06 16:54:26 0 d-----w- c:\program files\Logitech Touch Mouse Server
2010-02-04 18:45:34 0 d-----w- c:\programdata\Symantec
2010-02-04 01:08:36 26600 ----a-r- c:\windows\system32\drivers\GEARAspiWDM.sys
2010-02-04 01:08:36 107368 ----a-r- c:\windows\system32\GEARAspi.dll
2010-02-04 01:08:35 25648 ----a-r- c:\windows\system32\drivers\SymIMV.sys
2010-02-04 01:08:32 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-02-04 01:08:32 7456 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-02-04 01:08:32 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-02-04 01:08:26 0 d-----w- c:\program files\Symantec
2010-02-04 01:08:26 0 d-----w- c:\program files\common files\Symantec Shared
2010-02-04 01:08:02 0 d-----w- c:\windows\system32\drivers\N360
2010-02-04 01:08:01 0 d-----w- c:\programdata\Norton
2010-02-04 01:08:01 0 d-----w- c:\program files\Norton Security Suite
2010-02-04 01:07:16 0 d-----w- c:\programdata\NortonInstaller
2010-02-04 01:07:16 0 d-----w- c:\program files\NortonInstaller

==================== Find3M ====================

2010-01-18 23:29:31 85504 ----a-w- c:\windows\system32\secproc_ssp_isv.dll
2010-01-18 23:29:31 85504 ----a-w- c:\windows\system32\secproc_ssp.dll
2010-01-18 23:29:31 365568 ----a-w- c:\windows\system32\secproc_isv.dll
2010-01-18 23:29:30 369152 ----a-w- c:\windows\system32\secproc.dll
2010-01-18 23:28:33 324608 ----a-w- c:\windows\system32\RMActivate_isv.exe
2010-01-18 23:28:33 277504 ----a-w- c:\windows\system32\RMActivate_ssp_isv.exe
2010-01-18 23:28:30 320512 ----a-w- c:\windows\system32\RMActivate.exe
2010-01-18 23:28:30 280064 ----a-w- c:\windows\system32\RMActivate_ssp.exe
2010-01-14 18:12:06 181120 ------w- c:\windows\system32\MpSigStub.exe
2010-01-08 03:18:02 221184 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-01-08 03:17:36 123392 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2009-12-19 09:02:55 977920 ----a-w- c:\windows\system32\wininet.dll
2009-12-19 09:02:52 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2009-12-19 09:02:48 1328640 ----a-w- c:\windows\system32\quartz.dll
2009-12-19 09:02:46 22016 ----a-w- c:\windows\system32\msyuv.dll
2009-12-19 09:02:45 31744 ----a-w- c:\windows\system32\msvidc32.dll
2009-12-19 09:02:45 13312 ----a-w- c:\windows\system32\msrle32.dll
2009-12-19 09:02:40 84480 ----a-w- c:\windows\system32\mciavi32.dll
2009-12-19 09:02:39 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2009-12-19 09:02:01 91648 ----a-w- c:\windows\system32\avifil32.dll
2009-12-12 16:51:01 56 ---ha-w- c:\programdata\ezsidmv.dat
2009-12-08 11:40:12 3955288 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-12-08 11:40:12 3899464 ----a-w- c:\windows\system32\ntoskrnl.exe
2009-12-08 11:32:02 292864 ----a-w- c:\windows\system32\apphelp.dll
2009-12-04 21:57:25 47633 ----a-w- c:\windows\system32\wuwuninst.exe
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2009-07-14 04:41:57 174 --sha-w- c:\program files\desktop.ini
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-06-10 21:26:35 9633792 --sha-r- c:\windows\fonts\StaticCache.dat
2009-11-27 16:32:58 245760 --sha-w- c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\windows\ietldcache\index.dat
2009-07-14 01:14:45 396800 --sha-w- c:\windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_f12e83abb108c86c\WinMail.exe

============= FINISH: 14:10:44.72 ===============



this is the gmer.log

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-02-27 14:33:20
Windows 6.1.7600
Running: u5tlu780.exe; Driver: C:\Users\Kevin\AppData\Local\Temp\fxtdipob.sys


---- System - GMER 1.0.15 ----

SSDT 8606B048 ZwAlertResumeThread
SSDT 8604D240 ZwAlertThread
SSDT 860A50A0 ZwAllocateVirtualMemory
SSDT 84DDFA00 ZwAlpcConnectPort
SSDT 860C4748 ZwAssignProcessToJobObject
SSDT 860C1C40 ZwCreateMutant
SSDT 860C56D8 ZwCreateSymbolicLinkObject
SSDT 8606D428 ZwCreateThread
SSDT 860C5B68 ZwCreateThreadEx
SSDT 860C3590 ZwDebugActiveProcess
SSDT 860A52B8 ZwDuplicateObject
SSDT 860A6A68 ZwFreeVirtualMemory
SSDT 8607C048 ZwImpersonateAnonymousToken
SSDT 8608F048 ZwImpersonateThread
SSDT 85FB0C08 ZwLoadDriver
SSDT 860A6948 ZwMapViewOfSection
SSDT 86093048 ZwOpenEvent
SSDT 860A5518 ZwOpenProcess
SSDT 8603F740 ZwOpenProcessToken
SSDT 860A7048 ZwOpenSection
SSDT 860A53C8 ZwOpenThread
SSDT 860C42B8 ZwProtectVirtualMemory
SSDT 8602EC18 ZwResumeThread
SSDT 8603B138 ZwSetContextThread
SSDT 860A66B0 ZwSetInformationProcess
SSDT 860BC048 ZwSetSystemInformation
SSDT 8607F628 ZwSuspendProcess
SSDT 86042C28 ZwSuspendThread
SSDT 86033068 ZwTerminateProcess
SSDT 86034380 ZwTerminateThread
SSDT 86042158 ZwUnmapViewOfSection
SSDT 860A6D78 ZwWriteVirtualMemory

INT 0x1F \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E36AF8
INT 0x37 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E36104
INT 0xC1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E363F4
INT 0xD1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E1E634
INT 0xD2 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E1E898
INT 0xDF \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E361DC
INT 0xE1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E36958
INT 0xE3 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E366F8
INT 0xFD \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E36F2C
INT 0xFE \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 82E371A8

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwSaveKeyEx + 13BD 82A4F5C9 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 82A74052 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text ntkrnlpa.exe!RtlSidHashLookup + 254 82A7B854 8 Bytes [48, B0, 06, 86, 40, D2, 04, ...] {DEC EAX; MOV AL, 0x6; XCHG [EAX-0x2e], AL; ADD AL, 0x86}
.text ntkrnlpa.exe!RtlSidHashLookup + 26C 82A7B86C 4 Bytes [A0, 50, 0A, 86]
.text ntkrnlpa.exe!RtlSidHashLookup + 278 82A7B878 4 Bytes [00, FA, DD, 84]
.text ntkrnlpa.exe!RtlSidHashLookup + 2CC 82A7B8CC 4 Bytes [48, 47, 0C, 86] {DEC EAX; INC EDI; OR AL, 0x86}
.text ntkrnlpa.exe!RtlSidHashLookup + 348 82A7B948 4 Bytes [40, 1C, 0C, 86]
.text ...
.text peauth.sys 9CE21C9D 28 Bytes [44, A3, 73, F8, B0, 75, 04, ...]
.text peauth.sys 9CE21CC1 28 Bytes [44, A3, 73, F8, B0, 75, 04, ...]
PAGE peauth.sys 9CE27E20 101 Bytes [49, AA, DF, 48, 30, 87, 27, ...]
PAGE peauth.sys 9CE2802C 102 Bytes [D0, DB, 0D, 43, 10, 7D, 91, ...]
.text C:\Program Files\CyberLink\PowerDVD\000.fcl section is writeable [0x9CEEC000, 0x2892, 0xE8000020]
.vmp2 C:\Program Files\CyberLink\PowerDVD\000.fcl entry point in ".vmp2" section [0x9CF0F050]
PAGE spsys.sys!?SPRevision@@3PADA + 4F90 A904D000 290 Bytes [8B, FF, 55, 8B, EC, 33, C0, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 50B3 A904D123 629 Bytes [85, 04, A9, FE, 05, 34, 85, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 5329 A904D399 101 Bytes [6A, 28, 59, A5, 5E, C6, 03, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 538F A904D3FF 148 Bytes [18, 5D, C2, 14, 00, 8B, FF, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 543B A904D4AB 2228 Bytes [8B, FF, 55, 8B, EC, FF, 75, ...]
PAGE ...

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Windows Live\Family Safety\fsssvc.exe[1684] ADVAPI32.dll!RegOpenKeyExA 75CEBC0D 5 Bytes JMP 0089237E C:\Program Files\Windows Live\Family Safety\fsssvc.exe (Windows Live Family Safety Service/Microsoft Corporation)

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Windows\system32\WebUpdateSvc4.exe[1988] @ C:\Windows\system32\WININET.dll [KERNEL32.dll!GetProcAddress] [755A5E25] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\system32\WebUpdateSvc4.exe[1988] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [755A5E25] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\system32\WebUpdateSvc4.exe[1988] @ C:\Windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [755A5E25] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\system32\WebUpdateSvc4.exe[1988] @ C:\Windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [755A5E25] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\system32\WebUpdateSvc4.exe[1988] @ C:\Windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [755A5E25] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\system32\WebUpdateSvc4.exe[1988] @ C:\Windows\system32\CRYPT32.dll [KERNEL32.dll!GetProcAddress] [755A5E25] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc] [73E02494] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup] [73DE5624] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown] [73DE56E2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree] [73E0250F] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics] [73DF8573] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage] [73DF4D27] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth] [73DF50CE] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight] [73DF51A3] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromHBITMAP] [73DF66D0] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC] [73DF82CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode] [73DF8819] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode] [73DF907A] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI] [73DFE21D] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[2448] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage] [73DF4C59] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7600.16385_none_72fc7cbf861225ca\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device \Driver\ACPI_HAL \Device\00000053 halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)

AttachedDevice \Driver\tdx \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

---- EOF - GMER 1.0.15 ----

Attached Files



#6 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 27 February 2010 - 04:42 PM

on a side note... while running gmer.log it froze and the computer went to blue screen death. I restarted and tried it again and it did fine. Not sure what that was but I just wanted to let you know just in case.

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:18 AM

Posted 27 February 2010 - 06:45 PM

Gmer can do that, not necessarily any malware thing.

The logs so far are squeaky clean so let's try two more scans and if they're clean then we can finish up next.

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


And

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

Posted Image
m0le is a proud member of UNITE

#8 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 28 February 2010 - 12:04 PM

Eset did not find anything and would not let me print out a log. Malware found one trojan on my non OS drive and took it off. Otherwise its all clean. My browser still redirects but I was looking at other posts and they say the only way to get ride of the primawega is to uninstall firefox and reinstall it. sad.gif But at least I know I have no other viruses. Thanks for all the help.

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:18 AM

Posted 28 February 2010 - 01:49 PM

Don't go anywhere, meltdown.

If you still have redirects then you are not clean.

Please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks smile.gif
Posted Image
m0le is a proud member of UNITE

#10 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 28 February 2010 - 05:24 PM

here is the file. It did restart my computer once and windows said it had to close down a couple programs while in the process. BUT here is the file.


ComboFix 10-02-27.04 - Kevin 02/28/2010 15:11:19.1.2 - x86
Microsoft Windows 7 Professional 6.1.7600.0.1252.1.1033.18.3070.1997 [GMT -7:00]
Running from: c:\users\Kevin\Downloads\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\programdata\Microsoft\Network\Downloader\qmgr0.dat
c:\programdata\Microsoft\Network\Downloader\qmgr1.dat
c:\users\Kevin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MagicDisc.lnk
c:\windows\COUPON~1.OCX
c:\windows\CouponPrinter.ocx
c:\windows\TEMP\logishrd\LVPrcInj01.dll

----- BITS: Possible infected sites -----

hxxp://armmf.adobe.com
.
((((((((((((((((((((((((( Files Created from 2010-01-28 to 2010-02-28 )))))))))))))))))))))))))))))))
.

2010-02-28 22:15 . 2010-02-28 22:17 -------- d-----w- c:\users\Kevin\AppData\Local\temp
2010-02-28 20:46 . 2010-02-28 20:47 -------- d-----w- c:\program files\Microsoft Security Essentials
2010-02-27 21:39 . 2010-02-27 21:39 -------- d-----w- c:\windows\system32\Wat
2010-02-26 16:56 . 2010-02-26 16:56 -------- d-----w- c:\users\Kevin\AppData\Roaming\Foxit Software
2010-02-26 00:48 . 2010-02-25 18:55 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-02-25 18:55 . 2010-02-04 15:53 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-02-25 18:55 . 2010-02-25 18:55 598368 ----a-w- c:\programdata\Lavasoft\Ad-Aware\Update\EmailScanner.dll
2010-02-25 18:55 . 2010-02-25 18:55 884176 ----a-w- c:\programdata\Lavasoft\Ad-Aware\Update\threatwork.exe
2010-02-25 18:55 . 2010-02-25 18:55 566608 ----a-w- c:\programdata\Lavasoft\Ad-Aware\Update\sbap.dll
2010-02-25 18:55 . 2010-02-25 18:55 15880 ----a-w- c:\programdata\Lavasoft\Ad-Aware\Update\lsdelete.exe
2010-02-25 18:55 . 2010-02-25 18:55 211064 ----a-w- c:\programdata\Lavasoft\Ad-Aware\Update\lavamessage.dll
2010-02-25 18:53 . 2010-02-25 18:53 -------- dc-h--w- c:\programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-02-25 18:53 . 2010-02-04 15:53 2954656 -c--a-w- c:\programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
2010-02-25 18:53 . 2010-02-25 18:53 -------- d-----w- c:\program files\Lavasoft
2010-02-25 05:51 . 2010-02-25 05:51 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-02-25 05:48 . 2010-02-25 18:53 -------- d-----w- c:\programdata\Lavasoft
2010-02-25 01:19 . 2010-02-25 01:19 388096 ----a-r- c:\users\Kevin\AppData\Roaming\Microsoft\Installer\{0761C9A8-8F3A-4216-B4A7-B7AFBF24A24A}\HiJackThis.exe
2010-02-25 01:19 . 2010-02-25 01:19 -------- d-----w- C:\hijackthis
2010-02-25 00:21 . 2010-02-25 00:21 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2010-02-25 00:20 . 2010-02-25 18:52 -------- d-----w- c:\users\Kevin\AppData\Roaming\SUPERAntiSpyware.com
2010-02-24 23:24 . 2010-02-24 23:24 -------- d-----w- c:\users\Kevin\AppData\Roaming\Malwarebytes
2010-02-24 23:24 . 2010-01-07 23:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-24 23:24 . 2010-02-24 23:24 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-02-24 23:24 . 2010-02-24 23:24 -------- d-----w- c:\programdata\Malwarebytes
2010-02-24 23:24 . 2010-01-07 23:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-24 14:36 . 2009-12-13 09:30 641536 ----a-w- c:\windows\system32\CPFilters.dll
2010-02-24 14:36 . 2009-12-13 09:29 417792 ----a-w- c:\windows\system32\msdri.dll
2010-02-24 14:36 . 2009-12-13 09:30 465408 ----a-w- c:\windows\system32\psisdecd.dll
2010-02-24 14:36 . 2010-02-02 07:45 2048 ----a-w- c:\windows\system32\tzres.dll
2010-02-20 04:34 . 2010-02-20 04:34 -------- d-----w- c:\users\Kevin\AppData\Local\ElevatedDiagnostics
2010-02-20 01:41 . 2010-02-20 02:11 -------- d-----w- c:\program files\Mass Effect 2
2010-02-19 23:39 . 2010-02-25 05:55 -------- d-----w- c:\program files\Any DVD Cloner Platinum
2010-02-16 17:58 . 2009-02-25 01:42 116736 ----a-w- c:\windows\system32\drivers\mcdbus.sys
2010-02-16 17:58 . 2010-02-16 17:59 -------- d-----w- c:\program files\MagicDisc
2010-02-16 17:26 . 2010-02-25 00:42 -------- d-----w- c:\program files\Search Toolbar
2010-02-13 03:41 . 2010-02-13 03:41 -------- d-----w- c:\program files\iPod
2010-02-13 03:41 . 2010-02-13 03:41 -------- d-----w- c:\program files\iTunes
2010-02-13 03:39 . 2010-02-13 03:40 -------- d-----w- c:\program files\QuickTime
2010-02-13 03:38 . 2010-02-13 03:38 72488 ----a-w- c:\programdata\Apple Computer\Installer Cache\iTunes 9.0.3.15\SetupAdmin.exe
2010-02-11 22:16 . 2010-02-11 22:16 -------- d-----w- c:\program files\Coupons
2010-02-08 21:19 . 2010-02-08 21:19 108824 ----a-w- c:\users\Kevin\AppData\Local\GDIPFONTCACHEV1.DAT
2010-02-08 19:39 . 2009-10-07 08:48 539160 ----a-w- c:\windows\system32\LVUI2RC.dll
2010-02-08 19:39 . 2009-10-07 08:48 539160 ----a-w- c:\windows\system32\LVUI2.dll
2010-02-08 19:39 . 2009-10-07 08:43 416280 ----a-w- c:\windows\system32\LVCodec2.dll
2010-02-08 19:39 . 2009-04-30 23:01 265496 ----a-w- c:\windows\system32\drivers\lvrs.sys
2010-02-08 19:39 . 2009-04-30 22:57 199192 ----a-w- c:\windows\system32\lvci1201278.dll
2010-02-08 19:39 . 2009-04-30 22:55 13976 ----a-w- c:\windows\system32\drivers\lv302af.sys
2010-02-08 19:39 . 2009-04-30 22:39 34068 ----a-w- c:\windows\system32\Repository.reg
2010-02-06 16:54 . 2010-02-06 16:54 -------- d-----w- c:\program files\Logitech Touch Mouse Server
2010-02-04 18:45 . 2010-02-04 18:45 -------- d-----w- c:\programdata\Symantec
2010-02-04 01:08 . 2010-02-04 01:08 26600 ----a-r- c:\windows\system32\drivers\GEARAspiWDM.sys
2010-02-04 01:08 . 2010-02-04 01:08 107368 ----a-r- c:\windows\system32\GEARAspi.dll
2010-02-04 01:08 . 2010-02-28 20:45 -------- d-----w- c:\programdata\Norton
2010-02-04 01:07 . 2010-02-04 01:07 -------- d-----w- c:\programdata\NortonInstaller

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-28 22:16 . 2009-11-02 07:10 -------- d-----w- c:\programdata\NVIDIA
2010-02-28 20:44 . 2009-10-29 23:25 -------- d-----w- c:\users\Kevin\AppData\Roaming\BitTorrent
2010-02-26 01:34 . 2009-12-25 23:01 -------- d-----w- c:\program files\Mozilla Thunderbird
2010-02-25 18:52 . 2009-12-19 21:05 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-02-24 16:16 . 2009-10-29 22:12 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-20 01:50 . 2009-12-21 21:57 -------- d-----w- c:\program files\Common Files\BioWare
2010-02-13 03:41 . 2009-10-30 02:17 -------- d-----w- c:\program files\Common Files\Apple
2010-02-11 01:03 . 2009-10-29 22:55 -------- d-----w- c:\programdata\Microsoft Help
2010-02-08 20:20 . 2009-11-22 00:29 -------- d-----w- c:\program files\Logitech
2010-02-08 19:42 . 2009-12-12 16:35 -------- d-----w- c:\program files\Common Files\logishrd
2010-02-08 19:39 . 2009-11-22 00:29 -------- d-----w- c:\programdata\LogiShrd
2010-02-08 19:19 . 2009-11-22 06:19 -------- d-----w- c:\users\Kevin\AppData\Roaming\Logitech
2010-02-04 01:06 . 2009-10-29 21:51 -------- d-----w- c:\programdata\McAfee
2010-02-01 22:27 . 2009-12-21 22:10 -------- d-----w- c:\programdata\Media Center Programs
2010-01-29 17:55 . 2009-10-30 06:28 737072 ----a-w- c:\programdata\Microsoft\eHome\Packages\SportsV2\SportsTemplateCore\Microsoft.MediaCenter.Sports.UI.dll
2010-01-24 17:37 . 2009-11-21 19:10 -------- d-----w- c:\program files\Common Files\Adobe
2010-01-24 03:42 . 2010-01-24 03:42 -------- d-----w- c:\programdata\Solidshield
2010-01-24 03:00 . 2010-01-24 03:00 -------- d-----w- c:\program files\Ubisoft
2010-01-24 03:00 . 2009-11-22 00:29 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-01-20 19:52 . 2009-10-30 03:54 -------- d-----w- c:\program files\Microsoft Silverlight
2010-01-18 23:29 . 2010-02-10 19:03 85504 ----a-w- c:\windows\system32\secproc_ssp_isv.dll
2010-01-18 23:29 . 2010-02-10 19:03 85504 ----a-w- c:\windows\system32\secproc_ssp.dll
2010-01-18 23:29 . 2010-02-10 19:03 365568 ----a-w- c:\windows\system32\secproc_isv.dll
2010-01-18 23:29 . 2010-02-10 19:03 369152 ----a-w- c:\windows\system32\secproc.dll
2010-01-18 23:28 . 2010-02-10 19:03 324608 ----a-w- c:\windows\system32\RMActivate_isv.exe
2010-01-18 23:28 . 2010-02-10 19:03 277504 ----a-w- c:\windows\system32\RMActivate_ssp_isv.exe
2010-01-18 23:28 . 2010-02-10 19:03 320512 ----a-w- c:\windows\system32\RMActivate.exe
2010-01-18 23:28 . 2010-02-10 19:03 280064 ----a-w- c:\windows\system32\RMActivate_ssp.exe
2010-01-18 01:35 . 2009-11-22 00:29 -------- d-----w- c:\program files\Common Files\Logitech
2010-01-18 01:34 . 2010-01-18 01:34 10134 ----a-r- c:\users\Kevin\AppData\Roaming\Microsoft\Installer\{3101CB58-3482-4D21-AF1A-7057FC935355}\ARPPRODUCTICON.exe
2010-01-11 04:37 . 2010-01-11 03:39 -------- d-----w- c:\users\Kevin\AppData\Roaming\dvdcss
2010-01-09 19:54 . 2010-01-09 19:54 98304 ----a-w- c:\programdata\Microsoft\Windows Defender\LocalCopy\{AF85C3BA-A4D7-50F5-D8B9-B265AACF9962}-nssdbm3.dll
2010-01-09 19:54 . 2010-01-09 19:54 249856 ----a-w- c:\programdata\Microsoft\Windows Defender\LocalCopy\{7B2AFF66-7547-3261-9CA9-C815865C889D}-freebl3.dll
2010-01-08 03:18 . 2010-02-10 19:03 221184 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-01-08 03:17 . 2010-02-10 19:03 123392 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2009-12-25 17:35 . 2009-10-30 06:27 546624 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
2009-12-23 00:42 . 2009-12-23 00:42 737072 ----a-w- c:\programdata\Microsoft\eHome\Packages\SportsV2\SportsTemplateCore-2\Microsoft.MediaCenter.Sports.UI.dll
2009-12-23 00:41 . 2009-12-23 00:41 3605256 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCEClientUX\UpdateableMarkup-2\markup.dll
2009-12-23 00:41 . 2009-11-07 21:10 546624 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight-2\SpotlightResources.dll
2009-12-19 09:02 . 2010-01-22 22:35 977920 ----a-w- c:\windows\system32\wininet.dll
2009-12-19 09:02 . 2010-02-10 19:03 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2009-12-19 09:02 . 2010-02-10 19:03 1328640 ----a-w- c:\windows\system32\quartz.dll
2009-12-19 09:02 . 2010-02-10 19:03 22016 ----a-w- c:\windows\system32\msyuv.dll
2009-12-19 09:02 . 2010-02-10 19:03 31744 ----a-w- c:\windows\system32\msvidc32.dll
2009-12-19 09:02 . 2010-02-10 19:03 13312 ----a-w- c:\windows\system32\msrle32.dll
2009-12-19 09:02 . 2010-02-10 19:03 84480 ----a-w- c:\windows\system32\mciavi32.dll
2009-12-19 09:02 . 2010-02-10 19:03 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2009-12-19 09:02 . 2010-02-10 19:03 91648 ----a-w- c:\windows\system32\avifil32.dll
2009-12-12 16:51 . 2009-12-12 16:51 56 ---ha-w- c:\programdata\ezsidmv.dat
2009-12-08 11:40 . 2010-02-10 19:03 3955288 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-12-08 11:40 . 2010-02-10 19:03 3899464 ----a-w- c:\windows\system32\ntoskrnl.exe
2009-12-08 11:32 . 2010-02-10 19:03 292864 ----a-w- c:\windows\system32\apphelp.dll
2009-12-08 08:05 . 2010-02-10 19:03 310784 ----a-w- c:\windows\system32\drivers\srv.sys
2009-12-08 08:05 . 2010-02-10 19:03 113664 ----a-w- c:\windows\system32\drivers\srvnet.sys
2009-12-04 21:57 . 2009-12-04 21:57 47633 ----a-w- c:\windows\system32\wuwuninst.exe
2009-12-02 22:23 . 2009-12-02 22:23 42368 ----a-w- c:\windows\system32\drivers\MpNWMon.sys
2009-12-02 22:23 . 2009-12-02 22:23 149040 ----a-w- c:\windows\system32\drivers\MpFilter.sys
2009-06-10 21:26 . 2009-07-14 02:04 9633792 --sha-r- c:\windows\Fonts\StaticCache.dat
2009-07-14 01:14 . 2009-07-13 23:42 396800 --sha-w- c:\windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_f12e83abb108c86c\WinMail.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{0C8413C1-FAD1-446C-8584-BE50576F863E}"= "c:\program files\Search Toolbar\tbcore3.dll" [2010-01-27 2771120]

[HKEY_CLASSES_ROOT\clsid\{0c8413c1-fad1-446c-8584-be50576f863e}]
[HKEY_CLASSES_ROOT\TBSB05974.TBSB05974.3]
[HKEY_CLASSES_ROOT\TypeLib\{EC4085F2-8DB3-45a6-AD0B-CA289F3C5D7E}]
[HKEY_CLASSES_ROOT\TBSB05974.TBSB05974]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{0C8413C1-FAD1-446C-8584-BE50576F863E}"= "c:\program files\Search Toolbar\tbcore3.dll" [2010-01-27 2771120]

[HKEY_CLASSES_ROOT\clsid\{0c8413c1-fad1-446c-8584-be50576f863e}]
[HKEY_CLASSES_ROOT\TBSB05974.TBSB05974.3]
[HKEY_CLASSES_ROOT\TypeLib\{EC4085F2-8DB3-45a6-AD0B-CA289F3C5D7E}]
[HKEY_CLASSES_ROOT\TBSB05974.TBSB05974]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-07-14 1173504]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"fssui"="c:\program files\Windows Live\Family Safety\fsui.exe" [2009-08-06 647520]
"BDRegion"="c:\program files\Cyberlink\Shared Files\brs.exe" [2009-09-04 75048]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2009-04-17 87336]
"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2009-04-17 62760]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2009-06-17 55824]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-12-22 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-12-11 948672]
"LogitechQuickCamRibbon"="c:\program files\Logitech\Logitech WebCam Software\LWS.exe" [2009-10-14 2793304]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-01-23 141608]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2009-08-13 177440]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2010-01-07 1394000]
"MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-02-21 1093208]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Logitech SetPoint.lnk - c:\program files\Logitech\SetPoint\SetPoint.exe [2009-11-21 813584]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2009-07-20 19:28 72208 ----a-w- c:\program files\Common Files\Logitech\Bluetooth\LBTWLgn.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Security Packages REG_MULTI_SZ kerberos msv1_0 schannel wdigest tspkg pku2u livessp

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"

R0 Lbd;Lbd;c:\windows\System32\drivers\Lbd.sys [2/25/2010 11:55 AM 64288]
R2 fssfltr;fssfltr;c:\windows\System32\drivers\fssfltr.sys [11/1/2009 12:41 PM 54632]
R2 fsssvc;Windows Live Family Safety Service;c:\program files\Windows Live\Family Safety\fsssvc.exe [8/5/2009 10:48 PM 704864]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2/4/2010 8:52 AM 1229232]
R2 MLPTDR_Q;MLPTDR_Q;c:\windows\System32\MLPTDR_Q.SYS [11/19/2004 10:13 AM 18848]
R2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe [11/20/2009 7:17 PM 240232]
R2 WebUpdate4;Web Update Wizard Service V4;c:\windows\System32\WebUpdateSvc4.exe [9/15/2008 2:57 AM 262360]
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\System32\drivers\Rt86win7.sys [3/1/2009 11:05 PM 139776]
S3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\System32\drivers\ASPI32.SYS [1/10/2010 8:37 PM 84832]
S3 DAUpdaterSvc;Dragon Age: Origins - Content Updater;c:\program files\Dragon Age\bin_ship\daupdatersvc.service.exe [12/21/2009 3:05 PM 25832]
S3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\System32\drivers\MpNWMon.sys [12/2/2009 3:23 PM 42368]
S3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\System32\Wat\WatAdminSvc.exe [2/27/2010 2:39 PM 1343400]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
getPlusHelper REG_MULTI_SZ getPlusHelper
.
Contents of the 'Scheduled Tasks' folder

2010-02-28 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-02-04 18:54]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://bing.zugo.com/?cfg=2-80-0-nuaP
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~1\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\users\Kevin\AppData\Roaming\Mozilla\Firefox\Profiles\aunqz0fs.default\
FF - plugin: c:\program files\Microsoft\Office Live\npOLW.dll
FF - plugin: c:\program files\NVIDIA Corporation\3D Vision\npnv3dv.dll
FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);
.
- - - - ORPHANS REMOVED - - - -

SafeBoot-mcmscsvc
SafeBoot-MCODS



[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\{95808DC4-FA4A-4C74-92FE-5B863F82066B}]
"ImagePath"="\??\c:\program files\CyberLink\PowerDVD\000.fcl"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'Explorer.exe'(7244)
c:\program files\Logitech\SetPoint\GameHook.dll
c:\program files\Logitech\SetPoint\lgscroll.dll
c:\users\Kevin\AppData\Local\Temp\catchme.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\nvvsvc.exe
c:\program files\Microsoft Security Essentials\MsMpEng.exe
c:\windows\system32\nvvsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
c:\windows\system32\wbem\unsecapp.exe
c:\windows\system32\taskhost.exe
c:\windows\system32\conhost.exe
c:\program files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
c:\program files\Common Files\Logishrd\LQCVFX\COCIManager.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\program files\Lavasoft\Ad-Aware\AAWTray.exe
c:\windows\system32\DllHost.exe
c:\windows\system32\sppsvc.exe
.
**************************************************************************
.
Completion time: 2010-02-28 15:20:13 - machine was rebooted
ComboFix-quarantined-files.txt 2010-02-28 22:20

Pre-Run: 161,954,422,784 bytes free
Post-Run: 161,942,626,304 bytes free

- - End Of File - - 6D54C5DB3B8128A6E6ACF3C00066EDDA


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:18 AM

Posted 28 February 2010 - 07:44 PM

Looks good now. smile.gif


Next, we should check for remnants and infected files with ESET

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push


Thanks
Posted Image
m0le is a proud member of UNITE

#12 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 01 March 2010 - 11:48 AM

it didn't come back with a log. It didn't find anything so maybe thats why. So It looks clean

Edited by meltdown, 01 March 2010 - 01:33 PM.


#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:18 AM

Posted 01 March 2010 - 01:45 PM

That's exactly right...

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Please download ATF Cleaner by Atribune.
    Double-click ATF-Cleaner.exe to run the program.
    Under Main "Select Files to Delete" choose: Select All.
    Click the Empty Selected button.
If you use Firefox browser
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

If you are using Firefox and this has caused page loading problems then please clear your private data. To do this go
to the Tools menu, select Clear Private Data, and then check Cache. Click Clear Private Data Now.

This could also be Clear Recent History or similar

Then close Firefox and then reopen it.


Old versions of Java are big doors to malware. JavaRa removes them and updates your version to the most current.

Please download JavaRa to your desktop and unzip it to its own folder
  • Run JavaRa.exe, pick the language of your choice and click Select. Then click Remove Older Versions.
  • Accept any prompts.
  • Open JavaRa.exe again and select Search For Updates.
  • Select Update Using Sun Java's Website then click Search and click on the Open Webpage button. Download and install the latest Java Runtime Environment (JRE) version for your computer.

    Please make sure you turn on the Java Automatic Update Feature

    Then you will not have to remember to update it when Java introduces a new version.
    Java is updated very frequently, and the old versions are malware magnets.

    Note: This feature is available only on Windows XP, 2003, 2000 (SP2 or higher) and set by default for these operating systems.

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it meltdown, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#14 meltdown

meltdown
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:11:18 PM

Posted 01 March 2010 - 08:52 PM

it all came out clean... but now i notice another issue. My printer is not printing. If I have windows diagnose it, it says its working fine... but nothing prints. If I try to print it does nothing and the print job is stuck in the print Q. If I restart the computer the printer will print out what was in the Q. I have no idea what the issue is. It seems like something is blocking it until I restart it. Any suggestions?


p.s. I have discovered that if i restart the print spooler in my services it will print... but only that job.

Edited by meltdown, 01 March 2010 - 11:17 PM.


#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:18 AM

Posted 02 March 2010 - 07:46 AM

I can't help with printer questions but the last person I sent over to the External Hardware forum on Bleeping Computer got their problem sorted out pretty quickly.

Good luck thumbup2.gif


Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users