Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with TDSS rootkit


  • This topic is locked This topic is locked
43 replies to this topic

#1 Pedestrian3920

Pedestrian3920

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 06 April 2010 - 07:38 PM

Issues: Google link redirect, chrome not working, etc. Whole thing started with a driveby Vista Antivirus 2010. That's all gone. Mbam took care of it. Please help! It's definitely tdss. Also: avg is not installed on this computer. Norton antivirus and MBAM scans come back clean. Thanks smile.gif

edit: while I'm waiting in line, opened up tcpview, connections ALL OVER THE PLACE. Rootrepeal showing a good 15 drivers in red with fancy chinese characters. Good lord.

DDS (Ver_10-03-17.01) - NTFSx86
Run by Nerp at 19:24:43.26 on Tue 04/06/2010
Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 1.6.0_19
Microsoft® Windows Vistaâ„¢ Home Premium 6.0.6002.2.1252.1.1033.18.3063.1815 [GMT -5:00]

SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\ATK Hotkey\ASLDRSrv.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Norton AntiVirus\Engine\17.5.0.127\ccSvcHst.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Program Files\Common Files\PC Tools\sMonitor\StartManSvc.exe
C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Windows\Explorer.EXE
C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\PC Tools\sMonitor\SSDMonitor.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\ATK Hotkey\Hcontrol.exe
C:\Program Files\ATK Hotkey\MsgTranAgt.exe
C:\Program Files\Norton AntiVirus\Engine\17.5.0.127\ccSvcHst.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\ATK Hotkey\ATKOSD.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\Raxco\PerfectDisk\PDEngine.exe
C:\Program Files\Raxco\PerfectDisk\PDAgentS1.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\ATK Hotkey\WDC.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
\\?\C:\Windows\system32\wbem\WMIADAP.EXE
C:\Users\Nerp\Downloads\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\program files\norton antivirus\engine\17.5.0.127\IPSBHO.DLL
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
mRun: [SSDMonitor] c:\program files\common files\pc tools\smonitor\SSDMonitor.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: igfxcui - igfxdev.dll
Notify: System Safety Monitor - SSMWinlogonEx.dll
AppInit_DLLs: c:\windows\system32\avgrsstx.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\nerp\appdata\roaming\mozilla\firefox\profiles\4p6h0mhk.default\
FF - prefs.js: browser.startup.homepage - hxxp://127.0.0.1:7657/index.jsp
FF - component: c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.1.0.19\ipsffplgn\components\IPSFFPl.dll
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.17\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\users\nerp\appdata\local\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\users\nerp\appdata\roaming\mozilla\plugins\npWetBed.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: browser.cache.memory.capacity - 65536
FF - user.js: browser.chrome.favicons - fales
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.interrupt.parsing - true
FF - user.js: content.max.tokenizing.time - 2250000
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 750000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 750000
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 0
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

R0 AVG Anti-Rootkit;AVG Anti-Rootkit;c:\windows\system32\drivers\avgarkt.sys [2007-1-31 5632]
R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\nav\1105000.07f\symds.sys [2010-4-4 328752]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\nav\1105000.07f\symefa.sys [2010-4-4 172592]
R1 AvgArCln;Avg Anti-Rootkit Clean Driver;c:\windows\system32\drivers\AvgArCln.sys [2010-4-6 3968]
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2010-3-31 216200]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-3-31 29512]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-3-31 242696]
R1 BHDrvx86;BHDrvx86;c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.1.0.19\definitions\bashdefs\20100324.001\BHDrvx86.sys [2010-3-24 536112]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\nav\1105000.07f\cchpx86.sys [2010-4-4 501888]
R1 IDSVix86;IDSVix86;c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.1.0.19\definitions\ipsdefs\20100402.001\IDSvix86.sys [2010-4-5 343088]
R1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\nav\1105000.07f\ironx86.sys [2010-4-4 116272]
R1 SYMTDIv;Symantec Vista Network Dispatch Driver;c:\windows\system32\drivers\nav\1105000.07f\symtdiv.sys [2010-4-4 340016]
R2 NAV;Norton AntiVirus;c:\program files\norton antivirus\engine\17.5.0.127\ccsvchst.exe [2010-4-4 126392]
R2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2007-11-6 34064]
R2 PCToolsSSDMonitorSvc;PC Tools Startup and Shutdown Monitor service;c:\program files\common files\pc tools\smonitor\StartManSvc.exe [2009-11-13 583640]
R2 UltraMonUtility;UltraMon Utility Driver;c:\program files\common files\realtime soft\ultramonmirrordrv\x32\UltraMonUtility.sys [2008-9-14 10496]
R3 ACPIVPC;Lenovo Virtual Power Controller Driver;c:\windows\system32\drivers\AcpiVpc.sys [2009-5-19 21520]
R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2007-7-22 180736]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-4-5 102448]
S2 avg9emc;AVG Free E-mail Scanner;"c:\program files\avg\avg9\avgemc.exe" --> c:\program files\avg\avg9\avgemc.exe [?]
S2 avg9wd;AVG Free WatchDog;"c:\program files\avg\avg9\avgwdsvc.exe" --> c:\program files\avg\avg9\avgwdsvc.exe [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2009-11-16 135664]
S3 BQ;BQ;c:\windows\system32\config\system~1\appdata\local\temp\bq.exe --> c:\windows\system32\config\system~1\appdata\local\temp\BQ.exe [?]
S3 CapFilt;CapFilt;c:\windows\system32\drivers\CapFilt.sys [2008-4-29 18048]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-4-29 21504]
S3 NTHMAFYI;NTHMAFYI;c:\users\nerp\appdata\local\temp\nthmafyi.exe --> c:\users\nerp\appdata\local\temp\NTHMAFYI.exe [?]
S3 OMOS;OMOS;c:\users\nerp\appdata\local\temp\omos.exe --> c:\users\nerp\appdata\local\temp\OMOS.exe [?]
S3 RORWMBHQ;RORWMBHQ;c:\users\nerp\appdata\local\temp\rorwmbhq.exe --> c:\users\nerp\appdata\local\temp\RORWMBHQ.exe [?]
S3 WBKULD;WBKULD;c:\users\nerp\appdata\local\temp\wbkuld.exe --> c:\users\nerp\appdata\local\temp\WBKULD.exe [?]
S4 safemon;System Safety Monitor 2.0 Core Engine;c:\windows\system32\drivers\safemon.sys [2006-9-19 178384]

=============== Created Last 30 ================

2010-04-06 20:50:56 3968 ----a-w- c:\windows\system32\drivers\AvgArCln.sys
2010-04-06 18:48:49 0 d-s---w- C:\ComboFix
2010-04-06 18:09:53 19944 ----a-w- C:\atapi.sys
2010-04-06 18:03:24 19944 ------w- c:\windows\system32\drivers\atapi.sys
2010-04-06 16:32:12 277784 ------w- c:\windows\system32\drivers\tskD0C7.tmp
2010-04-06 16:32:11 277784 ------w- c:\windows\system32\drivers\tsk4635.tmp
2010-04-06 16:29:44 23552 ------w- c:\windows\system32\drivers\tssecsrv.sys
2010-04-06 05:37:14 0 ----a-w- c:\windows\system32\JP
2010-04-05 03:41:27 44080 ----a-r- c:\windows\system32\drivers\SymIMV.sys
2010-04-05 00:34:25 0 d-----w- c:\programdata\Sun
2010-04-05 00:28:36 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-04-05 00:28:36 7443 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-04-05 00:28:36 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-04-05 00:28:36 0 d-----w- c:\program files\Symantec
2010-04-05 00:27:57 0 d-----w- c:\windows\system32\drivers\NAV
2010-04-05 00:27:52 0 d-----w- c:\program files\Norton AntiVirus
2010-04-05 00:27:51 0 d-----w- c:\programdata\Norton
2010-04-05 00:27:47 0 d-----w- c:\program files\NortonInstaller
2010-04-05 00:21:42 0 d-----w- c:\programdata\NortonInstaller
2010-04-04 23:53:33 0 d-sh--w- C:\$RECYCLE.BIN
2010-04-04 23:39:10 0 ----a-w- c:\windows\system32\LCR
2010-04-04 23:19:55 0 d-----w- c:\programdata\SUPERAntiSpyware.com
2010-04-04 22:34:11 169 ----a-w- c:\windows\ultra.INI
2010-04-01 21:10:18 12872 ----a-w- c:\windows\system32\bootdelete.exe
2010-04-01 18:35:42 15944 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-04-01 18:35:23 0 d-----w- c:\programdata\Hitman Pro
2010-04-01 17:24:24 0 d-----w- c:\users\nerp\appdata\roaming\TrojanHunter
2010-04-01 17:07:47 0 d-----w- c:\program files\TrojanHunter 5.3
2010-04-01 16:40:06 98816 ----a-w- c:\windows\sed.exe
2010-04-01 16:40:06 77312 ----a-w- c:\windows\MBR.exe
2010-04-01 16:40:06 261632 ----a-w- c:\windows\PEV.exe
2010-04-01 16:40:06 161792 ----a-w- c:\windows\SWREG.exe
2010-04-01 16:28:06 0 d-----w- c:\program files\Sunbelt Software
2010-04-01 06:19:02 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-01 04:40:25 0 d-----w- c:\program files\Trend Micro
2010-04-01 04:15:54 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-04-01 04:15:50 242696 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-04-01 04:15:41 216200 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-04-01 04:15:37 0 d-----w- c:\windows\system32\drivers\Avg
2010-04-01 04:10:44 0 d-----w- c:\program files\AVG
2010-04-01 03:45:14 0 d-----w- c:\programdata\Spybot - Search & Destroy
2010-04-01 03:45:14 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-04-01 03:42:43 0 d-----w- c:\program files\Safer Networking
2010-04-01 03:20:28 0 d-----w- c:\windows\pss
2010-04-01 02:55:53 834048 ----a-w- c:\windows\system32\wininet.dll
2010-04-01 02:55:45 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-04-01 02:07:02 2000 ---ha-w- c:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2010-04-01 02:07:02 2000 ---ha-w- c:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2010-04-01 00:20:41 0 d-----w- c:\programdata\Alwil Software
2010-03-31 23:51:57 0 d-----w- c:\program files\Malwarebytes' Anti-Malware(114)
2010-03-29 16:37:42 0 d-----w- c:\program files\Uplink
2010-03-29 15:37:24 0 d-----w- C:\sango
2010-03-29 15:37:12 0 d-----w- c:\program files\DOSBox-0.73
2010-03-29 02:45:09 0 d-----w- c:\program files\Teleport Pro
2010-03-28 21:49:47 0 d-----w- c:\users\nerp\.idlerc
2010-03-28 21:48:24 0 d-----w- C:\Python26
2010-03-26 16:39:39 0 d-----w- c:\users\nerp\appdata\roaming\NoNameScript
2010-03-26 16:39:34 0 d-----w- c:\program files\mIRC
2010-03-26 01:02:09 526184 ----a-w- c:\windows\system32\XceedCry.dll
2010-03-26 01:02:09 456536 ----a-w- c:\windows\system32\XCEEDZIP.DLL
2010-03-26 01:02:09 224016 ----a-w- c:\windows\system32\Tabctl32.ocx
2010-03-26 01:02:09 152848 ----a-w- c:\windows\system32\Comdlg32.ocx
2010-03-26 01:02:09 132880 ----a-w- c:\windows\system32\Msinet.ocx
2010-03-26 01:02:09 110602 ----a-w- c:\windows\system32\xcdsfx32.bin
2010-03-26 01:02:09 0 d-----w- c:\program files\Driver Magician
2010-03-25 05:42:55 0 d-----w- c:\programdata\Raxco
2010-03-25 05:42:11 0 d-----w- c:\program files\Raxco
2010-03-20 22:31:28 218 ----a-w- c:\users\nerp\.recently-used.xbel
2010-03-20 02:52:08 2145280 ----a-w- c:\windows\system32\python26.dll
2010-03-17 03:34:36 0 d-----w- c:\program files\DivX_311alpha
2010-03-12 19:31:48 2253767 ----a-w- c:\windows\system32\AdobeFnt10.lst
2010-03-11 06:34:55 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-03-11 06:34:54 411648 ----a-w- c:\windows\system32\drivers\http.sys
2010-03-11 06:34:54 30720 ----a-w- c:\windows\system32\httpapi.dll
2010-03-10 19:14:47 0 d-----w- c:\program files\WetTest
2010-03-10 04:58:21 0 d-----w- c:\users\nerp\appdata\roaming\Xilisoft Corporation
2010-03-08 04:56:45 0 d-----w- C:\games

==================== Find3M ====================

2010-04-06 15:23:57 277784 ----a-w- c:\windows\system32\drivers\iaStor.sys
2010-04-05 18:56:45 6144 ----a-w- c:\windows\system32\drivers\RDPCDD.sys
2010-04-05 14:59:53 86016 ----a-w- c:\windows\inf\infstor.dat
2010-04-05 14:59:53 51200 ----a-w- c:\windows\inf\infpub.dat
2010-04-05 14:59:52 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-04-05 00:33:22 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-03-30 05:46:30 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-30 05:45:52 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-03 21:43:02 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2010-03-02 13:41:12 237320 ----a-w- c:\windows\system32\PDBoot.exe
2010-03-01 03:43:01 171788 ---ha-w- c:\windows\system32\mlfcache.dat
2010-02-24 15:16:06 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-01-23 09:26:13 2048 ----a-w- c:\windows\system32\tzres.dll
2009-11-04 06:22:56 665600 ----a-w- c:\windows\inf\drvindex.dat
2008-04-29 13:58:03 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2006-05-03 09:06:54 163328 --sh--r- c:\windows\system32\flvDX.dll
2007-02-21 10:47:16 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 12:30:52 216064 --sh--r- c:\windows\system32\nbDX.dll

============= FINISH: 19:25:43.04 ===============

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-04-06 19:15:49
Windows 6.0.6002 Service Pack 2
Running: gmer.exe; Driver: C:\Users\Nerp\AppData\Local\Temp\pxldapow.sys


---- System - GMER 1.0.15 ----

SSDT 89E57120 ZwAlertResumeThread
SSDT 89E55118 ZwAlertThread
SSDT 89F0F9F0 ZwAllocateVirtualMemory
SSDT 87AEEA18 ZwAlpcConnectPort
SSDT 89EE2048 ZwAssignProcessToJobObject
SSDT 89F28EC0 ZwCreateMutant
SSDT 89F2C8A0 ZwCreateSymbolicLinkObject
SSDT 89F0E558 ZwCreateThread
SSDT 89EE1048 ZwDebugActiveProcess
SSDT 89F0F050 ZwDuplicateObject
SSDT 89F21DF8 ZwFreeVirtualMemory
SSDT 89EBF048 ZwImpersonateAnonymousToken
SSDT 89EB7048 ZwImpersonateThread
SSDT 87AF1E28 ZwLoadDriver
SSDT 89F21CD8 ZwMapViewOfSection
SSDT 89EC1048 ZwOpenEvent
SSDT 89F0F270 ZwOpenProcess
SSDT 89214110 ZwOpenProcessToken
SSDT 89ED60D8 ZwOpenSection
SSDT 89F0F160 ZwOpenThread
SSDT 89F2B4F0 ZwProtectVirtualMemory
SSDT 89E53120 ZwResumeThread
SSDT 8984D128 ZwSetContextThread
SSDT 89F21A80 ZwSetInformationProcess
SSDT 89EDE048 ZwSetSystemInformation
SSDT 89EC2BE0 ZwSuspendProcess
SSDT 89E51068 ZwSuspendThread
SSDT 891C9110 ZwTerminateProcess
SSDT 89852120 ZwTerminateThread
SSDT 89210068 ZwUnmapViewOfSection
SSDT 89F0F720 ZwWriteVirtualMemory
SSDT 89F2CD30 ZwCreateThreadEx

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp SYMTDIV.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\tdx \Device\Udp SYMTDIV.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\tdx \Device\RawIp SYMTDIV.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device -> \Driver\iaStor \Device\Harddisk0\DR0 8912FAC8

---- Files - GMER 1.0.15 ----

File C:\Windows\system32\drivers\iaStor.sys suspicious modification

---- EOF - GMER 1.0.15 ----

Edited by Pedestrian3920, 06 April 2010 - 11:47 PM.


BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:42 PM

Posted 10 April 2010 - 04:48 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE



Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 Pedestrian3920

Pedestrian3920
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 11 April 2010 - 08:00 PM

No problem, I was actually out of town for most of the days, sorry.
Problem hasn't been resolved. I've removed Norton antivirus and switched to McAfee enterprise in hopes of getting rid of this damn thing. Mcafee found a couple instances of W32/virut, especially on my flash drive that I keep plugged in.
TDSS symptoms also remain: google redirection, popups, etc. At one point, one of the popups opened up and started loading some java thing, I immediately pulled the plug on my internet. (the original infection two weeks ago also came down through a java driveby.)

Thanks so much for helping me, I appreciate it smile.gif

PS: Do you know why I have those avg drivers showing up in my GMER scan? I definetly uninstalled avg a long time ago. Just curious. Thanks.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Nerp at 19:26:21.67 on Sun 04/11/2010
Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 1.6.0_19
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3063.1619 [GMT -5:00]

AV: McAfee VirusScan Enterprise *On-access scanning disabled* (Updated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\ATK Hotkey\ASLDRSrv.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\mfevtps.exe
C:\Windows\system32\Dwm.exe
C:\Program Files\McAfee\Common Framework\naPrdMgr.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Program Files\Common Files\PC Tools\sMonitor\StartManSvc.exe
C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
C:\Program Files\Common Files\PC Tools\sMonitor\SSDMonitor.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\McAfee\Common Framework\UdaterUI.exe
C:\Program Files\McAfee\VirusScan Enterprise\shstat.exe
C:\Program Files\ATK Hotkey\Hcontrol.exe
C:\Program Files\ATK Hotkey\MsgTranAgt.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
C:\Program Files\McAfee\VirusScan Enterprise\mfeann.exe
C:\Program Files\ATK Hotkey\ATKOSD.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\ATK Hotkey\WDC.exe
C:\Program Files\Raxco\PerfectDisk\PDEngine.exe
C:\Program Files\Raxco\PerfectDisk\PDAgentS1.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\servicing\TrustedInstaller.exe
\\?\C:\Windows\system32\wbem\WMIADAP.EXE
C:\Users\Nerp\Downloads\dds(2).scr
C:\Program Files\Google\Update\GoogleUpdate.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan enterprise\scriptsn.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [Google Update] "c:\users\nerp\appdata\local\google\update\GoogleUpdate.exe" /c
mRun: [SSDMonitor] c:\program files\common files\pc tools\smonitor\SSDMonitor.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\udaterui.exe" /StartedFromRunKey
mRun: [ShStatEXE] "c:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: igfxcui - igfxdev.dll
Notify: System Safety Monitor - SSMWinlogonEx.dll
AppInit_DLLs: c:\windows\system32\avgrsstx.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\nerp\appdata\roaming\mozilla\firefox\profiles\4p6h0mhk.default\
FF - prefs.js: browser.startup.homepage - hxxp://127.0.0.1:7657/index.jsp
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.17\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\users\nerp\appdata\local\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\users\nerp\appdata\roaming\mozilla\plugins\npWetBed.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: browser.cache.memory.capacity - 65536
FF - user.js: browser.chrome.favicons - fales
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.interrupt.parsing - true
FF - user.js: content.max.tokenizing.time - 2250000
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 750000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 750000
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 0
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

P2 McShield;McAfee McShield;c:\program files\mcafee\virusscan enterprise\Mcshield.exe [2008-9-29 143088]
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2010-4-9 340592]
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2010-3-31 216200]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-3-31 29512]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-3-31 242696]
R2 McAfeeEngineService;McAfee Engine Service;c:\program files\mcafee\virusscan enterprise\EngineServer.exe [2008-9-29 19456]
R2 McAfeeFramework;McAfee Framework Service;c:\program files\mcafee\common framework\FrameworkService.exe [2008-3-14 103744]
R2 McTaskManager;McAfee Task Manager;c:\program files\mcafee\virusscan enterprise\VsTskMgr.exe [2008-9-29 62800]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2010-4-9 67904]
R2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2007-11-6 34064]
R2 PCToolsSSDMonitorSvc;PC Tools Startup and Shutdown Monitor service;c:\program files\common files\pc tools\smonitor\StartManSvc.exe [2009-11-13 583640]
R2 UltraMonUtility;UltraMon Utility Driver;c:\program files\common files\realtime soft\ultramonmirrordrv\x32\UltraMonUtility.sys [2008-9-14 10496]
R3 ACPIVPC;Lenovo Virtual Power Controller Driver;c:\windows\system32\drivers\AcpiVpc.sys [2009-5-19 21520]
R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2007-7-22 180736]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2010-4-9 90360]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2010-4-9 42424]
S2 avg9emc;AVG Free E-mail Scanner;"c:\program files\avg\avg9\avgemc.exe" --> c:\program files\avg\avg9\avgemc.exe [?]
S2 avg9wd;AVG Free WatchDog;"c:\program files\avg\avg9\avgwdsvc.exe" --> c:\program files\avg\avg9\avgwdsvc.exe [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2009-11-16 135664]
S3 BQ;BQ;c:\windows\system32\config\system~1\appdata\local\temp\bq.exe --> c:\windows\system32\config\system~1\appdata\local\temp\BQ.exe [?]
S3 CapFilt;CapFilt;c:\windows\system32\drivers\CapFilt.sys [2008-4-29 18048]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-4-29 21504]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2010-4-9 64432]
S3 NTHMAFYI;NTHMAFYI;c:\users\nerp\appdata\local\temp\nthmafyi.exe --> c:\users\nerp\appdata\local\temp\NTHMAFYI.exe [?]
S3 OMOS;OMOS;c:\users\nerp\appdata\local\temp\omos.exe --> c:\users\nerp\appdata\local\temp\OMOS.exe [?]
S3 RORWMBHQ;RORWMBHQ;c:\users\nerp\appdata\local\temp\rorwmbhq.exe --> c:\users\nerp\appdata\local\temp\RORWMBHQ.exe [?]
S3 WBKULD;WBKULD;c:\users\nerp\appdata\local\temp\wbkuld.exe --> c:\users\nerp\appdata\local\temp\WBKULD.exe [?]
S3 WJMZUYOWOHI;WJMZUYOWOHI;c:\users\nerp\appdata\local\temp\WJMZUYOWOHI.exe [2010-4-6 514944]
S4 safemon;System Safety Monitor 2.0 Core Engine;c:\windows\system32\drivers\safemon.sys [2006-9-19 178384]

=============== Created Last 30 ================

2010-04-10 03:30:31 90360 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2010-04-10 03:30:31 74648 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
2010-04-10 03:30:31 64432 ----a-w- c:\windows\system32\drivers\mferkdet.sys
2010-04-10 03:30:31 42424 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2010-04-10 03:30:30 67904 ----a-w- c:\windows\system32\mfevtps.exe
2010-04-10 03:30:30 62704 ----a-w- c:\windows\system32\drivers\mfetdik.sys
2010-04-10 03:30:30 340592 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2010-04-10 03:30:07 0 d-----w- c:\program files\common files\Cisco Systems
2010-04-10 03:30:06 0 d-----w- c:\programdata\McAfee
2010-04-10 03:29:57 0 d-----w- c:\program files\McAfee
2010-04-10 03:29:57 0 d-----w- c:\program files\common files\McAfee
2010-04-10 03:29:11 0 d-----w- C:\comp sci stuff
2010-04-09 00:54:06 0 d-----w- c:\program files\Simple Webcam Capture
2010-04-07 22:52:57 0 d-s---w- C:\ComboFix
2010-04-07 04:48:37 0 ----a-w- c:\windows\system32\A
2010-04-07 00:44:04 0 d-----w- c:\program files\ESET
2010-04-06 18:09:53 19944 ----a-w- C:\atapi.sys
2010-04-06 18:03:24 19944 ------w- c:\windows\system32\drivers\atapi.sys
2010-04-06 16:32:12 277784 ------w- c:\windows\system32\drivers\tskD0C7.tmp
2010-04-06 16:32:11 277784 ----a-w- c:\windows\system32\drivers\tsk4635.tmp
2010-04-06 16:29:44 23552 ------w- c:\windows\system32\drivers\tssecsrv.sys
2010-04-06 05:37:14 0 ----a-w- c:\windows\system32\JP
2010-04-05 00:34:25 0 d-----w- c:\programdata\Sun
2010-04-05 00:27:51 0 d-----w- c:\programdata\Norton
2010-04-05 00:21:42 0 d-----w- c:\programdata\NortonInstaller
2010-04-04 23:53:33 0 d-sh--w- C:\$RECYCLE.BIN
2010-04-04 23:39:10 0 ----a-w- c:\windows\system32\LCR
2010-04-04 23:19:55 0 d-----w- c:\programdata\SUPERAntiSpyware.com
2010-04-04 22:34:11 169 ----a-w- c:\windows\ultra.INI
2010-04-01 21:10:18 12872 ----a-w- c:\windows\system32\bootdelete.exe
2010-04-01 18:35:42 15944 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-04-01 18:35:23 0 d-----w- c:\programdata\Hitman Pro
2010-04-01 17:24:24 0 d-----w- c:\users\nerp\appdata\roaming\TrojanHunter
2010-04-01 17:07:47 0 d-----w- c:\program files\TrojanHunter 5.3
2010-04-01 16:40:06 98816 ----a-w- c:\windows\sed.exe
2010-04-01 16:40:06 77312 ----a-w- c:\windows\MBR.exe
2010-04-01 16:40:06 261632 ----a-w- c:\windows\PEV.exe
2010-04-01 16:40:06 161792 ----a-w- c:\windows\SWREG.exe
2010-04-01 16:28:06 0 d-----w- c:\program files\Sunbelt Software
2010-04-01 06:19:02 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-01 04:40:25 0 d-----w- c:\program files\Trend Micro
2010-04-01 04:15:54 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-04-01 04:15:50 242696 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-04-01 04:15:41 216200 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-04-01 04:15:37 0 d-----w- c:\windows\system32\drivers\Avg
2010-04-01 04:10:44 0 d-----w- c:\program files\AVG
2010-04-01 03:45:14 0 d-----w- c:\programdata\Spybot - Search & Destroy
2010-04-01 03:45:14 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-04-01 03:42:43 0 d-----w- c:\program files\Safer Networking
2010-04-01 03:20:28 0 d-----w- c:\windows\pss
2010-04-01 02:55:53 834048 ----a-w- c:\windows\system32\wininet.dll
2010-04-01 02:55:45 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-04-01 02:07:02 2000 ---ha-w- c:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2010-04-01 02:07:02 2000 ---ha-w- c:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2010-04-01 00:20:41 0 d-----w- c:\programdata\Alwil Software
2010-03-31 23:51:57 0 d-----w- c:\program files\Malwarebytes' Anti-Malware(114)
2010-03-29 16:37:42 0 d-----w- c:\program files\Uplink
2010-03-29 15:37:24 0 d-----w- C:\sango
2010-03-29 15:37:12 0 d-----w- c:\program files\DOSBox-0.73
2010-03-29 02:45:09 0 d-----w- c:\program files\Teleport Pro
2010-03-28 21:49:47 0 d-----w- c:\users\nerp\.idlerc
2010-03-28 21:48:24 0 d-----w- C:\Python26
2010-03-26 16:39:39 0 d-----w- c:\users\nerp\appdata\roaming\NoNameScript
2010-03-26 16:39:34 0 d-----w- c:\program files\mIRC
2010-03-26 01:02:09 526184 ----a-w- c:\windows\system32\XceedCry.dll
2010-03-26 01:02:09 456536 ----a-w- c:\windows\system32\XCEEDZIP.DLL
2010-03-26 01:02:09 224016 ----a-w- c:\windows\system32\Tabctl32.ocx
2010-03-26 01:02:09 152848 ----a-w- c:\windows\system32\Comdlg32.ocx
2010-03-26 01:02:09 132880 ----a-w- c:\windows\system32\Msinet.ocx
2010-03-26 01:02:09 110602 ----a-w- c:\windows\system32\xcdsfx32.bin
2010-03-26 01:02:09 0 d-----w- c:\program files\Driver Magician
2010-03-25 05:42:55 0 d-----w- c:\programdata\Raxco
2010-03-25 05:42:11 0 d-----w- c:\program files\Raxco
2010-03-20 22:31:28 218 ----a-w- c:\users\nerp\.recently-used.xbel
2010-03-20 02:52:08 2145280 ----a-w- c:\windows\system32\python26.dll
2010-03-17 03:34:36 0 d-----w- c:\program files\DivX_311alpha

==================== Find3M ====================

2010-04-10 03:25:25 86016 ----a-w- c:\windows\inf\infstor.dat
2010-04-10 03:25:25 51200 ----a-w- c:\windows\inf\infpub.dat
2010-04-10 03:25:25 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-04-06 15:23:57 277784 ----a-w- c:\windows\system32\drivers\iaStor.sys
2010-04-05 18:56:45 6144 ----a-w- c:\windows\system32\drivers\RDPCDD.sys
2010-04-05 00:33:22 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-03-30 05:46:30 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-30 05:45:52 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-03 21:43:02 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2010-03-02 13:41:12 237320 ----a-w- c:\windows\system32\PDBoot.exe
2010-03-01 03:43:01 171788 ---ha-w- c:\windows\system32\mlfcache.dat
2010-02-24 15:16:06 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-20 23:06:41 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:05:14 30720 ----a-w- c:\windows\system32\httpapi.dll
2010-02-20 20:53:34 411648 ----a-w- c:\windows\system32\drivers\http.sys
2010-01-23 09:26:13 2048 ----a-w- c:\windows\system32\tzres.dll
2009-11-04 06:22:56 665600 ----a-w- c:\windows\inf\drvindex.dat
2008-04-29 13:58:03 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2006-05-03 09:06:54 163328 --sh--r- c:\windows\system32\flvDX.dll
2007-02-21 10:47:16 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 12:30:52 216064 --sh--r- c:\windows\system32\nbDX.dll

============= FINISH: 19:26:58.25 ===============

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-04-11 19:49:53
Windows 6.0.6002 Service Pack 2
Running: v7h8ebt0.exe; Driver: C:\Users\Nerp\AppData\Local\Temp\pxldapow.sys


---- System - GMER 1.0.15 ----

Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateFile [0x8A38309A]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateProcess [0x8A382FF8]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateProcessEx [0x8A38300C]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwNotifyChangeKey [0x8A38305E]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwProtectVirtualMemory [0x8A3830AE]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwReplaceKey [0x8A383086]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwRestoreKey [0x8A383072]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetContextThread [0x8A38304A]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetInformationProcess [0x8A383036]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwTerminateProcess [0x8A382FE4]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateUserProcess [0x8A383022]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtCreateFile
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtSetInformationProcess

---- Kernel code sections - GMER 1.0.15 ----

PAGE ntkrnlpa.exe!ZwNotifyChangeKey 81DFB5B5 5 Bytes JMP 8A383062 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateUserProcess 81E05B82 5 Bytes JMP 8A383026 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwTerminateProcess 81E2CD60 5 Bytes JMP 8A382FE8 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtSetInformationProcess 81E5047A 5 Bytes JMP 8A38303A \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwProtectVirtualMemory 81E55E8D 7 Bytes JMP 8A3830B2 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtCreateFile 81E7DD59 5 Bytes JMP 8A38309E \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwRestoreKey 81E8E7B2 5 Bytes JMP 8A383076 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwReplaceKey 81E8F9B6 5 Bytes JMP 8A38308A \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcess 81ECD74B 5 Bytes JMP 8A382FFC \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcessEx 81ECD796 7 Bytes JMP 8A383010 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwSetContextThread 81ECE253 5 Bytes JMP 8A38304E \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
.rsrc C:\Windows\System32\DRIVERS\RDPCDD.sys entry point in ".rsrc" section [0x8F328014]

---- User code sections - GMER 1.0.15 ----

.text C:\Windows\system32\svchost.exe[1208] ntdll.dll!NtProtectVirtualMemory 77444D34 5 Bytes JMP 0019000A
.text C:\Windows\system32\svchost.exe[1208] ntdll.dll!NtWriteVirtualMemory 77445674 5 Bytes JMP 001A000A
.text C:\Windows\system32\svchost.exe[1208] ntdll.dll!KiUserExceptionDispatcher 77445DC8 5 Bytes JMP 0018000A
.text C:\Windows\system32\svchost.exe[1208] ole32.dll!CoCreateInstance 76529EA6 5 Bytes JMP 0124000A
.text C:\Windows\system32\svchost.exe[1208] USER32.dll!GetCursorPos 775B0B88 5 Bytes JMP 0125000A
.text C:\Program Files\Mozilla Firefox\firefox.exe[1632] ntdll.dll!NtProtectVirtualMemory 77444D34 5 Bytes JMP 007E000A
.text C:\Program Files\Mozilla Firefox\firefox.exe[1632] ntdll.dll!NtWriteVirtualMemory 77445674 5 Bytes JMP 007F000A
.text C:\Program Files\Mozilla Firefox\firefox.exe[1632] ntdll.dll!KiUserExceptionDispatcher 77445DC8 5 Bytes JMP 007D000A
.text C:\Windows\Explorer.EXE[2320] ntdll.dll!NtProtectVirtualMemory 77444D34 5 Bytes JMP 007C000A
.text C:\Windows\Explorer.EXE[2320] ntdll.dll!NtWriteVirtualMemory 77445674 5 Bytes JMP 007D000A
.text C:\Windows\Explorer.EXE[2320] ntdll.dll!KiUserExceptionDispatcher 77445DC8 5 Bytes JMP 0033000A
.text C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe[3000] ntdll.dll!NtProtectVirtualMemory 77444D34 5 Bytes JMP 0019000A
.text C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe[3000] ntdll.dll!NtWriteVirtualMemory 77445674 5 Bytes JMP 001A000A
.text C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe[3000] ntdll.dll!KiUserExceptionDispatcher 77445DC8 5 Bytes JMP 0018000A

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\tdx \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\tdx \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device -> \Driver\iaStor \Device\Harddisk0\DR0 88C37AC8

---- Files - GMER 1.0.15 ----

File C:\Windows\System32\DRIVERS\RDPCDD.sys suspicious modification
File C:\Windows\system32\drivers\iaStor.sys suspicious modification

---- EOF - GMER 1.0.15 ----



Attached Files



#4 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:42 PM

Posted 12 April 2010 - 02:47 PM

Hello, Pedestrian3920
Welcome to the Bleeping Computer Forums. My name is Thomas (Tom is fine), and I will be helping you fixing your problems.

If you do not make a reply in 5 days, we will have to close your topic.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.
  • Please set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.





Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    CODE
    :filefind
    RDPCDD*

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#5 Pedestrian3920

Pedestrian3920
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 12 April 2010 - 03:53 PM

Here is the log you requested:

SystemLook v1.0 by jpshortstuff (11.01.10)
Log created at 15:51 on 12/04/2010 by Nerp (Administrator - Elevation successful)

========== filefind ==========

Searching for "RDPCDD*"
C:\Windows\System32\drivers\RDPCDD.sys --a--- 6144 bytes [13:26 29/04/2008] [18:56 05/04/2010] 89E59BE9A564262A3FB6C4F4F1CD9899
C:\Windows\winsxs\x86_microsoft-windows-t..niportdisplaydriver_31bf3856ad364e35_6.0.6000.16386_none_d2a4621f4153e710\RDPCDD.sys --a--- 6144 bytes [09:02 02/11/2006] [09:02 02/11/2006] 794585276B5D7FCA9F3FC15543F9F0B9
C:\Windows\winsxs\x86_microsoft-windows-t..niportdisplaydriver_31bf3856ad364e35_6.0.6001.18000_none_d4db241b3e3ef7e4\RDPCDD.sys --a--- 6144 bytes [13:26 29/04/2008] [18:56 05/04/2010] 89E59BE9A564262A3FB6C4F4F1CD9899

-=End Of File=-

#6 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:42 PM

Posted 13 April 2010 - 01:19 PM

Hi,

Please open notepad, copy and paste the content of the codebox below into notepad and save it as fix.bat into your windows folder, so you will have

C:\windows\fix.bat


CODE
ren C:\Windows\System32\drivers\RDPCDD.sys C:\Windows\System32\drivers\RDPCDD.old
copy C:\Windows\winsxs\x86_microsoft-windows-t..niportdisplaydriver_31bf3856ad364e35_6.0.6000.16386_none_d2a4621f4153e710\RDPCDD.sys C:\Windows\System32\drivers


Then you must verify that you can access the Vista Recovery Environment.
To do so, restart your computer and begin tapping the F8 key to enable the Advanced Start menu.
If the option 'Repair your computer' is available, select it.

If not available, you will need to insert your Vista installation dvd and restart, then press any key when prompted to boot from the cd.
At the Install Windows screen, select Repair your computer. (image below)



Restart the computer and logon to the Recovery Environment.
Once you get to the System Recovery Options screen, first take note of the drive letter assigned to the operating system, then select Command Prompt.



Type the following bolded command at the x:\sources> prompt (or x:\windows\system32>) then hit Enter.

cd /d x:\windows <--- the red x represents your operating system drive letter, as shown in the image below


At the C:\Windows> prompt type the following command then hit Enter

fix.bat

now type exit and reboot into normal windows, post back with a fresh Gmer logfile.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#7 Pedestrian3920

Pedestrian3920
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 13 April 2010 - 04:49 PM

Couldn't get a vista install cd so I used ubuntu to move the files. Hope that's ok!
On the other hand: currently redirects/popups have stopped, google chrome works now, and I can search for the word "windows update" without it coming back blank.
Thank you so much for your help so far. Where to next? :D



GMER log:
GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-04-13 16:21:50
Windows 6.0.6002 Service Pack 2
Running: 2gzvnffk.exe; Driver: C:\Users\Nerp\AppData\Local\Temp\pxldapow.sys


---- System - GMER 1.0.15 ----

Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateProcess [0x8A388FF8]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateProcessEx [0x8A38900C]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwNotifyChangeKey [0x8A38905E]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwReplaceKey [0x8A389086]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwRestoreKey [0x8A389072]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetContextThread [0x8A38904A]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetInformationProcess [0x8A389036]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwTerminateProcess [0x8A388FE4]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateUserProcess [0x8A389022]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtSetInformationProcess

---- Kernel code sections - GMER 1.0.15 ----

PAGE ntkrnlpa.exe!ZwNotifyChangeKey 81E0F5B5 5 Bytes JMP 8A389062 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateUserProcess 81E19B82 5 Bytes JMP 8A389026 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwTerminateProcess 81E40D60 5 Bytes JMP 8A388FE8 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtSetInformationProcess 81E6447A 5 Bytes JMP 8A38903A \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwRestoreKey 81EA27B2 5 Bytes JMP 8A389076 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwReplaceKey 81EA39B6 5 Bytes JMP 8A38908A \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcess 81EE174B 5 Bytes JMP 8A388FFC \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcessEx 81EE1796 7 Bytes JMP 8A389010 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwSetContextThread 81EE2253 5 Bytes JMP 8A38904E \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\tdx \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\tdx \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update@DownloadExpirationTime 2010-04-15 17:52:17
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Download@LastSuccessTime 2010-04-13 17:25:20

---- EOF - GMER 1.0.15 ----


#8 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:42 PM

Posted 14 April 2010 - 01:22 PM

thumbup2.gif


I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the icon on your desktop.
  • Check
  • Click the button.
  • Accept any security warnings from your browser.
  • Check
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push
  • Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the button.
  • Push
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt




  1. Please download OTL from one of the following mirrors:
  2. Save it to your desktop.
  3. Double click on the icon on your desktop.
  4. Under the Custom Scan box paste this in
    netsvcs
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    nvstor32.sys
    ahcix86s.sys
    nvrd32.sys
    symmpi.sys
    adp3132.sys
    mv61xx.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\drivers\*.sys /lockedfiles
    %systemroot%\System32\config\*.sav
  5. Push the Quick Scan button.
  6. Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#9 Pedestrian3920

Pedestrian3920
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 14 April 2010 - 05:55 PM

Done.

ESETSmartInstaller@High as CAB hook log:
OnlineScanner.ocx - registred OK
ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6211
# api_version=3.0.2
# EOSSerial=116794376c65154693f37e61bb17da4e
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2010-04-14 10:46:11
# local_time=2010-04-14 05:46:11 (-0600, Central Daylight Time)
# country="United States"
# lang=1033
# osver=6.0.6002 NT Service Pack 2
# compatibility_mode=512 16777215 100 0 252608 252608 0 0
# compatibility_mode=768 16777215 100 0 268192 268192 0 0
# compatibility_mode=1024 16777215 100 0 254389 254389 0 0
# compatibility_mode=2560 16777215 100 0 0 0 0 0
# compatibility_mode=5892 16776638 100 100 257004 107878561 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=142903
# found=8
# cleaned=6
# scan_time=14138
C:\Users\Nerp\AppData\Local\Google\Chrome\User Data\Default\Cache\f_0002e7 probably unknown TSR.BOOT virus (deleted - quarantined) 00000000000000000000000000000000 C
C:\Windows\System32\drivers\RDPCDD.OLD Win32/Olmarik.XG trojan (error while cleaning) 00000000000000000000000000000000 I
C:\Windows\winsxs\x86_microsoft-windows-t..niportdisplaydriver_31bf3856ad364e35_6.0.6001.18000_none_d4db241b3e3ef7e4\RDPCDD.sys Win32/Olmarik.XG trojan (error while cleaning) 00000000000000000000000000000000 I
D:\bak\Downloads\u96\u96.exe probably a variant of Win32/Agent trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
D:\bak\simplemu\UpgradeIt.exe probably a variant of Win32/Statik application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
D:\bak\Starcraft\bnupdate.exe Win32/Virut.NBP virus (cleaned - quarantined) 00000000000000000000000000000000 C
D:\bak\Starcraft\StarCraft.exe Win32/Virut.NBP virus (cleaned - quarantined) 00000000000000000000000000000000 C
D:\bak\Starcraft\StarEdit.exe Win32/Virut.NBP virus (cleaned - quarantined) 00000000000000000000000000000000 C



OTL logfile created on: 4/14/2010 5:57:20 PM - Run 2
OTL by OldTimer - Version 3.2.1.1 Folder = C:\Users\Nerp\Desktop
Windows Vista Home Premium Edition Service Pack 2 (Version = 6.0.6002) - Type = NTWorkstation
Internet Explorer (Version = 7.0.6002.18005)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

3.00 Gb Total Physical Memory | 2.00 Gb Available Physical Memory | 55.00% Memory free
6.00 Gb Paging File | 5.00 Gb Available in Paging File | 83.00% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 29.29 Gb Total Space | 2.50 Gb Free Space | 8.53% Space Free | Partition Type: NTFS
Drive D: | 103.01 Gb Total Space | 13.19 Gb Free Space | 12.80% Space Free | Partition Type: NTFS
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: OHU
Current User Name: Nerp
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: On
Skip Microsoft Files: On
File Age = 14 Days
Output = Standard
Quick Scan

========== Processes (SafeList) ==========

PRC - [2010/04/14 17:56:35 | 000,561,664 | ---- | M] (OldTimer Tools) -- C:\Users\Nerp\Desktop\OTL.exe
PRC - [2010/04/04 18:07:07 | 000,910,296 | ---- | M] (Mozilla Corporation) -- C:\Program Files\Mozilla Firefox\firefox.exe
PRC - [2010/03/02 08:41:18 | 000,066,824 | ---- | M] (Raxco Software, Inc.) -- C:\Program Files\Raxco\PerfectDisk\PDAgentS1.exe
PRC - [2010/03/02 08:41:16 | 001,590,536 | ---- | M] (Raxco Software, Inc.) -- C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
PRC - [2010/03/02 08:41:08 | 001,500,424 | ---- | M] (Raxco Software, Inc.) -- C:\Program Files\Raxco\PerfectDisk\PDEngine.exe
PRC - [2009/10/14 16:42:38 | 000,583,640 | ---- | M] (PC Tools) -- C:\Program Files\Common Files\PC Tools\sMonitor\StartManSvc.exe
PRC - [2009/10/14 16:42:38 | 000,104,408 | ---- | M] (PC Tools) -- C:\Program Files\Common Files\PC Tools\sMonitor\SSDMonitor.exe
PRC - [2009/09/10 09:58:25 | 000,168,960 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Media Player\wmplayer.exe
PRC - [2009/04/11 01:27:36 | 002,926,592 | ---- | M] (Microsoft Corporation) -- C:\Windows\explorer.exe
PRC - [2008/11/24 23:31:12 | 000,087,904 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
PRC - [2008/11/24 23:31:08 | 000,239,968 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
PRC - [2008/09/29 08:07:00 | 000,143,088 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
PRC - [2008/09/29 08:07:00 | 000,124,240 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan Enterprise\shstat.exe
PRC - [2008/09/29 08:07:00 | 000,067,904 | ---- | M] (McAfee, Inc.) -- C:\Windows\System32\mfevtps.exe
PRC - [2008/09/29 08:07:00 | 000,062,800 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
PRC - [2008/09/29 08:07:00 | 000,026,672 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan Enterprise\mfeann.exe
PRC - [2008/09/29 08:07:00 | 000,019,456 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe
PRC - [2008/03/14 04:00:00 | 000,226,624 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\Common Framework\naPrdMgr.exe
PRC - [2008/03/14 04:00:00 | 000,136,512 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\Common Framework\UdaterUI.exe
PRC - [2008/03/14 04:00:00 | 000,103,744 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\Common Framework\FrameworkService.exe
PRC - [2008/03/14 04:00:00 | 000,091,456 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\Common Framework\McTray.exe
PRC - [2008/01/15 15:17:46 | 000,233,472 | ---- | M] (ATK0100) -- C:\Program Files\ATK Hotkey\HControl.exe
PRC - [2008/01/11 18:50:16 | 000,030,312 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe
PRC - [2007/12/11 15:13:22 | 000,151,552 | ---- | M] () -- C:\Program Files\ATK Hotkey\WDC.exe
PRC - [2007/12/04 09:57:06 | 002,486,272 | ---- | M] () -- C:\Program Files\ATK Hotkey\ATKOSD.exe
PRC - [2007/11/04 18:48:06 | 000,106,496 | ---- | M] () -- C:\Program Files\ATK Hotkey\MsgTranAgt.exe
PRC - [2007/10/02 20:53:00 | 000,094,208 | ---- | M] () -- C:\Program Files\ATK Hotkey\AsLdrSrv.exe
PRC - [2007/06/01 10:00:20 | 000,647,168 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
PRC - [2007/06/01 09:41:30 | 000,327,680 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
PRC - [2002/12/08 16:48:50 | 000,824,832 | ---- | M] (Kathleen MacMahon) -- C:\Program Files\simplemu\SimpleMU.exe


========== Modules (SafeList) ==========

MOD - [2010/04/14 17:56:35 | 000,561,664 | ---- | M] (OldTimer Tools) -- C:\Users\Nerp\Desktop\OTL.exe
MOD - [2009/04/11 01:21:38 | 001,686,016 | ---- | M] (Microsoft Corporation) -- C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.6002.18005_none_5cb72f96088b0de0\comctl32.dll


========== Win32 Services (SafeList) ==========

SRV - File not found [On_Demand | Stopped] -- -- (WJMZUYOWOHI)
SRV - File not found [On_Demand | Stopped] -- -- (WBKULD)
SRV - File not found [On_Demand | Stopped] -- -- (RORWMBHQ)
SRV - File not found [On_Demand | Stopped] -- -- (OMOS)
SRV - File not found [On_Demand | Stopped] -- -- (NTHMAFYI)
SRV - File not found [On_Demand | Stopped] -- -- (BQ)
SRV - File not found [Auto | Stopped] -- -- (avg9wd)
SRV - File not found [Auto | Stopped] -- -- (avg9emc)
SRV - [2010/03/02 08:41:16 | 001,590,536 | ---- | M] (Raxco Software, Inc.) [Auto | Running] -- C:\Program Files\Raxco\PerfectDisk\PDAgent.exe -- (PDAgent)
SRV - [2010/03/02 08:41:08 | 001,500,424 | ---- | M] (Raxco Software, Inc.) [On_Demand | Running] -- C:\Program Files\Raxco\PerfectDisk\PDEngine.exe -- (PDEngine)
SRV - [2009/10/31 21:10:05 | 000,320,760 | ---- | M] (Valve Corporation) [On_Demand | Stopped] -- C:\Program Files\Common Files\Steam\SteamService.exe -- (Steam Client Service)
SRV - [2009/10/14 16:42:38 | 000,583,640 | ---- | M] (PC Tools) [Auto | Running] -- C:\Program Files\Common Files\PC Tools\sMonitor\StartManSvc.exe -- (PCToolsSSDMonitorSvc)
SRV - [2009/09/24 20:27:04 | 000,793,088 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Windows\System32\FntCache.dll -- (FontCache)
SRV - [2009/05/27 04:27:04 | 029,262,680 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe -- (MSSQL$MSSMLBIZ) SQL Server (MSSMLBIZ)
SRV - [2008/11/24 23:31:12 | 000,087,904 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe -- (SQLWriter)
SRV - [2008/11/24 23:31:08 | 000,239,968 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe -- (SQLBrowser)
SRV - [2008/11/24 23:31:08 | 000,045,408 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Program Files\Microsoft SQL Server\90\Shared\sqladhlp90.exe -- (MSSQLServerADHelper)
SRV - [2008/09/29 08:07:00 | 000,143,088 | ---- | M] (McAfee, Inc.) [Auto | Paused] -- C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe -- (McShield)
SRV - [2008/09/29 08:07:00 | 000,067,904 | ---- | M] (McAfee, Inc.) [Unknown | Running] -- C:\Windows\System32\mfevtps.exe -- (mfevtp)
SRV - [2008/09/29 08:07:00 | 000,062,800 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe -- (McTaskManager)
SRV - [2008/09/29 08:07:00 | 000,019,456 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe -- (McAfeeEngineService)
SRV - [2008/03/14 04:00:00 | 000,103,744 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\McAfee\Common Framework\FrameworkService.exe -- (McAfeeFramework)
SRV - [2008/01/18 22:38:26 | 000,272,952 | ---- | M] (Microsoft Corporation) [Auto | Stopped] -- C:\Program Files\Windows Defender\MpSvc.dll -- (WinDefend)
SRV - [2008/01/11 18:50:16 | 000,030,312 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe -- (BcmSqlStartupSvc)
SRV - [2007/11/06 15:22:26 | 000,092,792 | ---- | M] (CACE Technologies) [On_Demand | Stopped] -- C:\Program Files\WinPcap\rpcapd.exe -- (rpcapd) Remote Packet Capture Protocol v.0 (experimental)
SRV - [2007/10/02 20:53:00 | 000,094,208 | ---- | M] () [Auto | Running] -- C:\Program Files\ATK Hotkey\AsLdrSrv.exe -- (ASLDRService)
SRV - [2007/06/01 10:00:20 | 000,647,168 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Wireless\Bin\EvtEng.exe -- (EvtEng) Intel®
SRV - [2007/06/01 09:41:30 | 000,327,680 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe -- (RegSrvc) Intel®


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = %SystemRoot%\system32\blank.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.com/

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = 216.9.6.148:8080

========== FireFox ==========

FF - prefs.js..browser.startup.homepage: "http://127.0.0.1:7657/index.jsp"
FF - prefs.js..extensions.enabledItems: anttoolbar@ant.com:2.0.1
FF - prefs.js..extensions.enabledItems: {19503e42-ca3c-4c27-b1e2-9cdb2170ee34}:1.2.1.18
FF - prefs.js..extensions.enabledItems: SQLiteManager@mrinalkant.blogspot.com:0.5.14
FF - prefs.js..extensions.enabledItems: {9c51bd27-6ed8-4000-a2bf-36cb95c0c947}:11.0.1
FF - prefs.js..extensions.enabledItems: {3f963a5b-e555-4543-90e2-c3908898db71}:9.0.0.783
FF - prefs.js..network.proxy.backup.ftp: "74.63.201.156"
FF - prefs.js..network.proxy.backup.ftp_port: 3128
FF - prefs.js..network.proxy.backup.gopher: "74.63.201.156"
FF - prefs.js..network.proxy.backup.gopher_port: 3128
FF - prefs.js..network.proxy.backup.socks: "74.63.201.156"
FF - prefs.js..network.proxy.backup.socks_port: 3128
FF - prefs.js..network.proxy.backup.ssl: "74.63.201.156"
FF - prefs.js..network.proxy.backup.ssl_port: 3128
FF - prefs.js..network.proxy.ftp: "216.9.6.148"
FF - prefs.js..network.proxy.ftp_port: 8080
FF - prefs.js..network.proxy.gopher: "216.9.6.148"
FF - prefs.js..network.proxy.gopher_port: 8080
FF - prefs.js..network.proxy.http: "216.9.6.148"
FF - prefs.js..network.proxy.http_port: 8080
FF - prefs.js..network.proxy.share_proxy_settings: true
FF - prefs.js..network.proxy.socks: "216.9.6.148"
FF - prefs.js..network.proxy.socks_port: 8080
FF - prefs.js..network.proxy.ssl: "216.9.6.148"
FF - prefs.js..network.proxy.ssl_port: 8080
FF - prefs.js..network.proxy.type: 4


FF - HKLM\software\mozilla\Firefox\Extensions\\{3f963a5b-e555-4543-90e2-c3908898db71}: C:\Program Files\AVG\AVG9\Firefox [2010/04/04 18:01:43 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.2\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2010/04/09 22:30:32 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.2\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2010/04/05 00:23:54 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.3\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2010/04/09 22:30:32 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.3\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2010/04/05 00:23:54 | 000,000,000 | ---D | M]

[2009/10/06 21:48:55 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Mozilla\Extensions
[2010/04/14 01:35:29 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions
[2010/04/05 23:44:01 | 000,000,000 | ---D | M] (FlashGot) -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}
[2009/10/06 21:53:37 | 000,000,000 | ---D | M] (Microsoft .NET Framework Assistant) -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions\{20a82645-c095-46ed-80e3-08825760534b}
[2010/04/01 13:25:46 | 000,000,000 | ---D | M] (Tamper Data) -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions\{9c51bd27-6ed8-4000-a2bf-36cb95c0c947}
[2009/11/03 11:43:10 | 000,000,000 | ---D | M] (Sothink SWF Catcher) -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions\{FCAB6FDD-5585-425b-95C1-5ED856F3FD08}
[2010/04/05 23:44:01 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions\anttoolbar@ant.com
[2009/12/26 22:53:38 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions\hidim@nuttnet.net
[2010/03/18 23:44:35 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Mozilla\Firefox\Profiles\4p6h0mhk.default\extensions\SQLiteManager@mrinalkant.blogspot.com
[2010/04/14 01:35:29 | 000,000,000 | ---D | M] -- C:\Program Files\Mozilla Firefox\extensions
[2008/09/29 08:07:00 | 000,022,576 | ---- | M] (McAfee, Inc.) -- C:\Program Files\Mozilla Firefox\components\Scriptff.dll

O1 HOSTS File: ([2010/04/01 00:13:27 | 000,000,736 | ---- | M]) - C:\Windows\System32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan Enterprise\scriptsn.dll (McAfee, Inc.)
O4 - HKLM..\Run: [McAfeeUpdaterUI] C:\Program Files\McAfee\Common Framework\udaterui.exe (McAfee, Inc.)
O4 - HKLM..\Run: [ShStatEXE] C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE (McAfee, Inc.)
O4 - HKLM..\Run: [SSDMonitor] C:\Program Files\Common Files\PC Tools\sMonitor\SSDMonitor.exe (PC Tools)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: EnableLUA = 0
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O9 - Extra Button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\Program Files\Microsoft Office\Office12\REFIEBAR.DLL (Microsoft Corporation)
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset.com/special/eos/OnlineScanner.cab (Reg Error: Key error.)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_19)
O16 - DPF: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_19)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_19)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Value error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 158.135.1.20 158.135.1.200
O18 - Protocol\Handler\ms-help {314111c7-a502-11d2-bbca-00c04f8ec294} - C:\Program Files\Common Files\microsoft shared\Help\hxds.dll (Microsoft Corporation)
O18 - Protocol\Handler\skype4com {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files\Common Files\Skype\Skype4COM.dll (Skype Technologies)
O18 - Protocol\Filter\text/xml {807563E5-5146-11D5-A672-00B0D022E945} - C:\Program Files\Common Files\microsoft shared\OFFICE12\MSOXMLMF.DLL (Microsoft Corporation)
O20 - AppInit_DLLs: (C:\Windows\System32\avgrsstx.dll) - C:\Windows\System32\avgrsstx.dll (AVG Technologies CZ, s.r.o.)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\Windows\explorer.exe (Microsoft Corporation)
O20 - Winlogon\Notify\igfxcui: DllName - igfxdev.dll - C:\Windows\System32\igfxdev.dll (Intel Corporation)
O20 - Winlogon\Notify\System Safety Monitor: DllName - SSMWinlogonEx.dll - C:\Windows\System32\SSMWinlogonEx.dll (System Safety Limited)
O24 - Desktop WallPaper: C:\Users\Nerp\Pictures\iptod.jpg
O24 - Desktop BackupWallPaper: C:\Users\Nerp\Pictures\iptod.jpg
O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - Reg Error: Key error. File not found
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2006/09/18 16:43:36 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
O33 - MountPoints2\{b2ea584a-b416-11de-a803-001fc6816aaa}\Shell - "" = AutoRun
O33 - MountPoints2\{b2ea584a-b416-11de-a803-001fc6816aaa}\Shell\AutoRun\command - "" = H:\LaunchU3.exe -- File not found
O33 - MountPoints2\H\Shell - "" = AutoRun
O33 - MountPoints2\H\Shell\AutoRun\command - "" = H:\LaunchU3.exe -- File not found
O34 - HKLM BootExecute: (PDBoot.exe) - C:\Windows\System32\PDBoot.exe (Raxco Software, Inc.)
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O34 - HKLM BootExecute: (aswBoot.exe /A:C: /L:1033 /heur:80 /pup /archives /IA:0 /KBD:2 /dir:C:\Program) - File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O37 - HKCU\...exe [@ = exefile] -- Reg Error: Key error. File not found

NetSvcs: FastUserSwitchingCompatibility - File not found
NetSvcs: Ias - C:\Windows\System32\ias [2008/04/29 08:52:19 | 000,000,000 | ---D | M]
NetSvcs: Nla - File not found
NetSvcs: Ntmssvc - File not found
NetSvcs: NWCWorkstation - File not found
NetSvcs: Nwsapagent - File not found
NetSvcs: SRService - File not found
NetSvcs: Wmi - C:\Windows\System32\wmi.dll (Microsoft Corporation)
NetSvcs: WmdmPmSp - File not found
NetSvcs: LogonHours - File not found
NetSvcs: PCAudit - File not found
NetSvcs: helpsvc - File not found
NetSvcs: uploadmgr - File not found
OTL cannot create restorepoints on Vista OSs!

========== Files/Folders - Created Within 14 Days ==========

[2010/04/14 17:56:57 | 000,561,664 | ---- | C] (OldTimer Tools) -- C:\Users\Nerp\Desktop\OTL.exe
[2010/04/12 11:25:49 | 000,000,000 | ---D | C] -- C:\Program Files\SocksCapV2
[2010/04/12 01:04:46 | 000,000,000 | ---D | C] -- C:\Users\Nerp\AppData\Local\ElevatedDiagnostics
[2010/04/12 01:01:13 | 000,000,000 | ---D | C] -- C:\Windows\System32\WindowsPowerShell
[2010/04/12 00:57:58 | 000,000,000 | ---D | C] -- C:\Program Files\Microsoft ATS
[2010/04/11 19:29:14 | 000,000,000 | ---D | C] -- C:\Users\Nerp\Desktop\dds
[2010/04/09 22:30:31 | 000,090,360 | ---- | C] (McAfee, Inc.) -- C:\Windows\System32\drivers\mfeavfk.sys
[2010/04/09 22:30:31 | 000,074,648 | ---- | C] (McAfee, Inc.) -- C:\Windows\System32\drivers\mfeapfk.sys
[2010/04/09 22:30:31 | 000,064,432 | ---- | C] (McAfee, Inc.) -- C:\Windows\System32\drivers\mferkdet.sys
[2010/04/09 22:30:31 | 000,042,424 | ---- | C] (McAfee, Inc.) -- C:\Windows\System32\drivers\mfebopk.sys
[2010/04/09 22:30:30 | 000,340,592 | ---- | C] (McAfee, Inc.) -- C:\Windows\System32\drivers\mfehidk.sys
[2010/04/09 22:30:30 | 000,067,904 | ---- | C] (McAfee, Inc.) -- C:\Windows\System32\mfevtps.exe
[2010/04/09 22:30:30 | 000,062,704 | ---- | C] (McAfee, Inc.) -- C:\Windows\System32\drivers\mfetdik.sys
[2010/04/09 22:30:07 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Cisco Systems
[2010/04/09 22:30:06 | 000,000,000 | ---D | C] -- C:\ProgramData\McAfee
[2010/04/09 22:29:57 | 000,000,000 | ---D | C] -- C:\Program Files\McAfee
[2010/04/09 22:29:57 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\McAfee
[2010/04/09 22:29:11 | 000,000,000 | ---D | C] -- C:\comp sci stuff
[2010/04/08 19:54:06 | 000,000,000 | ---D | C] -- C:\Program Files\Simple Webcam Capture
[2010/04/07 17:52:57 | 000,000,000 | --SD | C] -- C:\ComboFix
[2010/04/06 19:44:04 | 000,000,000 | ---D | C] -- C:\Program Files\ESET
[2010/04/06 13:48:25 | 000,212,480 | ---- | C] (SteelWerX) -- C:\Windows\SWXCACLS.exe
[2010/04/05 00:20:04 | 000,000,000 | ---D | C] -- C:\Users\Nerp\Desktop\goo
[2010/04/04 21:23:54 | 000,000,000 | ---D | C] -- C:\Users\Nerp\AppData\Local\CrashDumps
[2010/04/04 19:34:25 | 000,000,000 | ---D | C] -- C:\ProgramData\Sun
[2010/04/04 19:34:24 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Java
[2010/04/04 19:32:53 | 000,000,000 | ---D | C] -- C:\Users\Nerp\Desktop\hep
[2010/04/04 19:27:51 | 000,000,000 | ---D | C] -- C:\ProgramData\Norton
[2010/04/04 19:21:42 | 000,000,000 | ---D | C] -- C:\ProgramData\NortonInstaller
[2010/04/04 18:54:41 | 000,000,000 | ---D | C] -- C:\Windows\temp
[2010/04/04 18:54:41 | 000,000,000 | ---D | C] -- C:\Users\Nerp\AppData\Local\temp
[2010/04/04 18:53:33 | 000,000,000 | -HSD | C] -- C:\$RECYCLE.BIN
[2010/04/04 18:19:55 | 000,000,000 | ---D | C] -- C:\ProgramData\SUPERAntiSpyware.com
[2010/04/01 16:10:18 | 000,012,872 | ---- | C] (SurfRight B.V.) -- C:\Windows\System32\bootdelete.exe
[2010/04/01 13:35:23 | 000,000,000 | ---D | C] -- C:\ProgramData\Hitman Pro
[2010/04/01 13:23:48 | 000,000,000 | ---D | C] -- C:\Program Files\Mozilla Firefox
[2010/04/01 13:03:44 | 000,178,000 | ---- | C] (Kaspersky Lab) -- C:\Users\Nerp\Desktop\TDSSKiller.exe
[2010/04/01 12:24:24 | 000,000,000 | ---D | C] -- C:\Users\Nerp\AppData\Roaming\TrojanHunter
[2010/04/01 12:07:47 | 000,000,000 | ---D | C] -- C:\Program Files\TrojanHunter 5.3
[2010/04/01 11:40:06 | 000,161,792 | ---- | C] (SteelWerX) -- C:\Windows\SWREG.exe
[2010/04/01 11:40:06 | 000,136,704 | ---- | C] (SteelWerX) -- C:\Windows\SWSC.exe
[2010/04/01 11:40:06 | 000,031,232 | ---- | C] (NirSoft) -- C:\Windows\NIRCMD.exe
[2010/04/01 11:40:01 | 000,000,000 | ---D | C] -- C:\Qoobox
[2010/04/01 11:28:06 | 000,000,000 | ---D | C] -- C:\Program Files\Sunbelt Software
[2010/04/01 01:19:02 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2010/04/01 00:06:32 | 000,000,000 | ---D | C] -- C:\Users\Nerp\Desktop\GooredFix Backups
[2010/03/31 23:40:25 | 000,000,000 | ---D | C] -- C:\Program Files\Trend Micro
[2010/03/31 23:15:54 | 000,012,464 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\avgrsstx.dll
[2010/03/31 23:15:50 | 000,242,696 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\drivers\avgtdix.sys
[2010/03/31 23:15:41 | 000,216,200 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\drivers\avgldx86.sys
[2010/03/31 23:15:38 | 000,029,512 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\drivers\avgmfx86.sys
[2010/03/31 23:15:37 | 000,000,000 | ---D | C] -- C:\Windows\System32\drivers\Avg
[2010/03/31 23:10:44 | 000,000,000 | ---D | C] -- C:\Program Files\AVG
[2010/03/31 22:45:14 | 000,000,000 | ---D | C] -- C:\ProgramData\Spybot - Search & Destroy
[2010/03/31 22:45:14 | 000,000,000 | ---D | C] -- C:\Program Files\Spybot - Search & Destroy
[2010/03/31 22:42:43 | 000,000,000 | ---D | C] -- C:\Program Files\Safer Networking
[2010/03/31 22:20:28 | 000,000,000 | ---D | C] -- C:\Windows\pss
[2010/03/31 19:20:41 | 000,000,000 | ---D | C] -- C:\ProgramData\Alwil Software
[2010/03/31 19:20:41 | 000,000,000 | ---D | C] -- C:\Program Files\Alwil Software
[2010/03/31 18:51:57 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware(114)
[2 C:\Windows\System32\drivers\*.tmp files -> C:\Windows\System32\drivers\*.tmp -> ]

========== Files - Modified Within 14 Days ==========

[2010/04/14 17:57:31 | 007,864,320 | -HS- | M] () -- C:\Users\Nerp\ntuser.dat
[2010/04/14 17:56:35 | 000,561,664 | ---- | M] (OldTimer Tools) -- C:\Users\Nerp\Desktop\OTL.exe
[2010/04/14 17:31:07 | 000,000,904 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004UA.job
[2010/04/14 17:09:46 | 000,002,000 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
[2010/04/14 17:09:46 | 000,002,000 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
[2010/04/14 16:54:45 | 000,000,014 | ---- | M] () -- C:\Windows\popcinfo.dat
[2010/04/14 13:15:57 | 000,760,648 | ---- | M] () -- C:\Windows\System32\PerfStringBackup.INI
[2010/04/14 13:15:57 | 000,646,972 | ---- | M] () -- C:\Windows\System32\perfh009.dat
[2010/04/14 13:15:57 | 000,120,432 | ---- | M] () -- C:\Windows\System32\perfc009.dat
[2010/04/14 13:09:48 | 000,000,006 | -H-- | M] () -- C:\Windows\tasks\SA.DAT
[2010/04/14 13:09:46 | 000,067,584 | ---- | M] () -- C:\Windows\bootstat.dat
[2010/04/13 23:31:00 | 000,000,852 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004Core.job
[2010/04/13 23:08:37 | 000,524,288 | -HS- | M] () -- C:\Users\Nerp\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000001.regtrans-ms
[2010/04/13 23:08:37 | 000,065,536 | -HS- | M] () -- C:\Users\Nerp\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TM.blf
[2010/04/13 23:08:33 | 004,300,972 | -H-- | M] () -- C:\Users\Nerp\AppData\Local\IconCache.db
[2010/04/13 18:29:34 | 000,002,037 | ---- | M] () -- C:\Users\Nerp\Desktop\kin.lnk
[2010/04/13 13:49:12 | 000,027,648 | ---- | M] () -- C:\Windows\System32\umstartup.etl
[2010/04/13 13:47:19 | 000,000,243 | ---- | M] () -- C:\Windows\fix.bat
[2010/04/13 12:31:56 | 000,102,752 | ---- | M] () -- C:\Users\Nerp\AppData\Local\GDIPFONTCACHEV1.DAT
[2010/04/13 12:30:11 | 000,379,688 | ---- | M] () -- C:\Windows\System32\FNTCACHE.DAT
[2010/04/12 00:58:44 | 002,686,976 | ---- | M] () -- C:\Windows\ocsetup_install_MicrosoftWindowsPowerShell.etl
[2010/04/12 00:58:42 | 000,196,608 | ---- | M] () -- C:\Windows\ocsetup_cbs_install_MicrosoftWindowsPowerShell.perf
[2010/04/12 00:58:42 | 000,065,536 | ---- | M] () -- C:\Windows\ocsetup_cbs_install_MicrosoftWindowsPowerShell.dpx
[2010/04/09 13:47:39 | 000,013,175 | ---- | M] () -- C:\Users\Nerp\Documents\The ideologies of Liberalism.docx
[2010/04/08 19:54:07 | 000,000,920 | ---- | M] () -- C:\Users\Nerp\Desktop\Simple Webcam Capture.lnk
[2010/04/08 19:52:54 | 000,001,648 | ---- | M] () -- C:\Users\Nerp\Desktop\Yawcam.lnk
[2010/04/08 18:47:49 | 000,000,600 | ---- | M] () -- C:\Users\Nerp\AppData\Local\PUTTY.RND
[2010/04/08 18:47:18 | 000,000,600 | ---- | M] () -- C:\Users\Nerp\AppData\Roaming\winscp.rnd
[2010/04/08 15:34:53 | 000,002,301 | ---- | M] () -- C:\Users\Public\Desktop\Steam.lnk
[2010/04/08 13:25:17 | 000,000,069 | ---- | M] () -- C:\Windows\NeroDigital.ini
[2010/04/07 13:32:11 | 000,002,037 | ---- | M] () -- C:\Users\Nerp\Desktop\Google Chrome.lnk
[2010/04/06 23:48:37 | 000,000,000 | ---- | M] () -- C:\Windows\System32\A
[2010/04/06 23:35:56 | 000,245,760 | ---- | M] () -- C:\Users\Nerp\Documents\dumped.sys
[2010/04/06 13:48:17 | 000,000,537 | ---- | M] () -- C:\Users\Nerp\Desktop\ComboFix.exe - Shortcut.lnk
[2010/04/06 00:37:14 | 000,000,000 | ---- | M] () -- C:\Windows\System32\JP
[2010/04/05 13:56:45 | 000,006,144 | ---- | M] () -- C:\Windows\System32\drivers\RDPCDD.OLD
[2010/04/04 18:52:12 | 000,000,215 | ---- | M] () -- C:\Windows\system.ini
[2010/04/04 18:39:10 | 000,000,000 | ---- | M] () -- C:\Windows\System32\LCR
[2010/04/04 17:34:11 | 000,000,169 | ---- | M] () -- C:\Windows\ultra.INI
[2010/04/04 17:18:49 | 000,015,944 | ---- | M] () -- C:\Windows\System32\drivers\hitmanpro35.sys
[2010/04/04 16:53:27 | 058,534,321 | ---- | M] () -- C:\Windows\System32\drivers\Avg\incavi.avm
[2010/04/01 16:10:18 | 000,012,872 | ---- | M] (SurfRight B.V.) -- C:\Windows\System32\bootdelete.exe
[2010/04/01 13:23:54 | 000,001,724 | ---- | M] () -- C:\Users\Public\Desktop\Mozilla Firefox.lnk
[2010/04/01 12:08:07 | 000,059,392 | R--- | M] () -- C:\Windows\System32\streamhlp.dll
[2010/04/01 01:19:06 | 000,000,818 | ---- | M] () -- C:\Users\Public\Desktop\Malwarebytes' Anti-Malware.lnk
[2010/04/01 00:13:27 | 000,000,736 | ---- | M] () -- C:\Windows\System32\drivers\etc\hosts
[2010/03/31 23:15:57 | 000,012,464 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\avgrsstx.dll
[2010/03/31 23:15:54 | 000,242,696 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\drivers\avgtdix.sys
[2010/03/31 23:15:42 | 000,216,200 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\drivers\avgldx86.sys
[2010/03/31 23:15:41 | 000,029,512 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Windows\System32\drivers\avgmfx86.sys
[2010/03/31 23:15:38 | 000,113,461 | ---- | M] () -- C:\Windows\System32\drivers\Avg\iavichjw.avm
[2010/03/31 22:30:48 | 000,002,577 | ---- | M] () -- C:\Windows\System32\config.nt
[2010/03/31 22:28:23 | 000,000,878 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineCore.job.bak
[2010/03/31 21:51:00 | 000,000,882 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineUA.job.bak
[2010/03/31 21:48:01 | 000,000,904 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004UA.job.bak
[2010/03/31 21:48:01 | 000,000,852 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004Core.job.bak
[2 C:\Windows\System32\drivers\*.tmp files -> C:\Windows\System32\drivers\*.tmp -> ]

========== Files Created - No Company Name ==========

[2010/04/13 13:47:19 | 000,000,243 | ---- | C] () -- C:\Windows\fix.bat
[2010/04/12 00:58:01 | 000,196,608 | ---- | C] () -- C:\Windows\ocsetup_cbs_install_MicrosoftWindowsPowerShell.perf
[2010/04/12 00:58:01 | 000,065,536 | ---- | C] () -- C:\Windows\ocsetup_cbs_install_MicrosoftWindowsPowerShell.dpx
[2010/04/12 00:58:00 | 002,686,976 | ---- | C] () -- C:\Windows\ocsetup_install_MicrosoftWindowsPowerShell.etl
[2010/04/09 13:11:34 | 000,013,175 | ---- | C] () -- C:\Users\Nerp\Documents\The ideologies of Liberalism.docx
[2010/04/08 19:54:07 | 000,000,920 | ---- | C] () -- C:\Users\Nerp\Desktop\Simple Webcam Capture.lnk
[2010/04/08 19:52:54 | 000,001,648 | ---- | C] () -- C:\Users\Nerp\Desktop\Yawcam.lnk
[2010/04/06 23:48:37 | 000,000,000 | ---- | C] () -- C:\Windows\System32\A
[2010/04/06 23:35:55 | 000,245,760 | ---- | C] () -- C:\Users\Nerp\Documents\dumped.sys
[2010/04/06 13:48:17 | 000,000,537 | ---- | C] () -- C:\Users\Nerp\Desktop\ComboFix.exe - Shortcut.lnk
[2010/04/06 00:37:14 | 000,000,000 | ---- | C] () -- C:\Windows\System32\JP
[2010/04/04 18:39:10 | 000,000,000 | ---- | C] () -- C:\Windows\System32\LCR
[2010/04/04 17:34:11 | 000,000,169 | ---- | C] () -- C:\Windows\ultra.INI
[2010/04/01 13:35:42 | 000,015,944 | ---- | C] () -- C:\Windows\System32\drivers\hitmanpro35.sys
[2010/04/01 13:23:54 | 000,001,724 | ---- | C] () -- C:\Users\Public\Desktop\Mozilla Firefox.lnk
[2010/04/01 12:07:48 | 000,059,392 | R--- | C] () -- C:\Windows\System32\streamhlp.dll
[2010/04/01 11:40:06 | 000,261,632 | ---- | C] () -- C:\Windows\PEV.exe
[2010/04/01 11:40:06 | 000,098,816 | ---- | C] () -- C:\Windows\sed.exe
[2010/04/01 11:40:06 | 000,080,412 | ---- | C] () -- C:\Windows\grep.exe
[2010/04/01 11:40:06 | 000,077,312 | ---- | C] () -- C:\Windows\MBR.exe
[2010/04/01 11:40:06 | 000,068,096 | ---- | C] () -- C:\Windows\zip.exe
[2010/04/01 10:39:12 | 000,002,037 | ---- | C] () -- C:\Users\Nerp\Desktop\Google Chrome.lnk
[2010/04/01 01:19:06 | 000,000,818 | ---- | C] () -- C:\Users\Public\Desktop\Malwarebytes' Anti-Malware.lnk
[2010/03/31 23:26:28 | 000,000,904 | ---- | C] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004UA.job
[2010/03/31 23:26:28 | 000,000,852 | ---- | C] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004Core.job
[2010/03/31 23:15:38 | 000,113,461 | ---- | C] () -- C:\Windows\System32\drivers\Avg\iavichjw.avm
[2010/03/31 23:15:37 | 058,534,321 | ---- | C] () -- C:\Windows\System32\drivers\Avg\incavi.avm
[2010/03/31 21:43:03 | 000,000,904 | ---- | C] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004UA.job.bak
[2010/03/31 21:43:03 | 000,000,852 | ---- | C] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-3712641819-720805094-4286300247-1004Core.job.bak
[2010/03/31 21:07:02 | 000,002,000 | -H-- | C] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
[2010/03/31 21:07:02 | 000,002,000 | -H-- | C] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
[2010/03/20 17:31:28 | 000,000,218 | ---- | C] () -- C:\Users\Nerp\.recently-used.xbel
[2010/03/02 20:47:17 | 000,043,520 | ---- | C] () -- C:\Windows\System32\CmdLineExt03.dll
[2010/01/13 22:14:18 | 000,252,372 | ---- | C] () -- C:\Users\Nerp\mik.jpg
[2009/12/10 03:47:54 | 000,000,370 | ---- | C] () -- C:\Users\Nerp\Documents - Shortcut.lnk
[2009/12/09 17:33:39 | 000,010,752 | ---- | C] () -- C:\Windows\System32\BASSMOD.dll
[2009/11/13 23:58:36 | 000,399,360 | ---- | C] () -- C:\Users\Nerp\lii.jpg
[2009/11/10 18:56:44 | 000,525,745 | ---- | C] () -- C:\Users\Nerp\mmxf2a.jpg
[2009/11/10 18:23:07 | 000,000,600 | ---- | C] () -- C:\Users\Nerp\PUTTY.RND
[2009/11/08 04:04:23 | 000,504,958 | ---- | C] () -- C:\Users\Nerp\fish2.jpg
[2009/11/08 04:02:19 | 000,537,521 | ---- | C] () -- C:\Users\Nerp\fish.jpg
[2009/11/08 04:00:22 | 000,401,831 | ---- | C] () -- C:\Users\Nerp\bas.jpg
[2009/11/08 03:53:55 | 000,583,448 | ---- | C] () -- C:\Users\Nerp\pin.jpg
[2009/11/08 03:48:56 | 000,408,588 | ---- | C] () -- C:\Users\Nerp\0297.png.jpg
[2009/11/03 14:38:59 | 000,052,649 | ---- | C] () -- C:\Users\Nerp\rr.jpg
[2009/11/01 00:48:49 | 000,039,252 | ---- | C] () -- C:\Users\Nerp\erf.jpg
[2009/10/25 11:54:28 | 000,000,680 | ---- | C] () -- C:\Users\Nerp\AppData\Local\d3d9caps.dat
[2009/10/25 11:09:31 | 000,000,600 | ---- | C] () -- C:\Users\Nerp\AppData\Roaming\winscp.rnd
[2009/10/25 10:59:57 | 000,000,600 | ---- | C] () -- C:\Users\Nerp\AppData\Local\PUTTY.RND
[2009/10/11 13:39:10 | 000,027,648 | ---- | C] () -- C:\Windows\System32\AVSredirect.dll
[2009/10/11 13:10:03 | 000,000,069 | ---- | C] () -- C:\Windows\NeroDigital.ini
[2009/09/27 17:20:19 | 000,140,288 | ---- | C] () -- C:\Windows\System32\igfxtvcx.dll
[2009/09/26 05:19:09 | 000,117,248 | ---- | C] () -- C:\Windows\System32\EhStorAuthn.dll
[2009/09/25 09:22:35 | 000,081,920 | ---- | C] () -- C:\Users\Nerp\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2009/09/25 01:18:44 | 000,000,000 | -H-- | C] () -- C:\Users\Nerp\AppData\Roaming\Nerp.idx
[2009/09/25 01:15:26 | 007,864,320 | -HS- | C] () -- C:\Users\Nerp\ntuser.dat
[2009/09/25 01:15:26 | 000,524,288 | -HS- | C] () -- C:\Users\Nerp\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000002.regtrans-ms
[2009/09/25 01:15:26 | 000,524,288 | -HS- | C] () -- C:\Users\Nerp\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000001.regtrans-ms
[2009/09/25 01:15:26 | 000,262,144 | -H-- | C] () -- C:\Users\Nerp\ntuser.dat.LOG1
[2009/09/25 01:15:26 | 000,065,536 | -HS- | C] () -- C:\Users\Nerp\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TM.blf
[2009/09/25 01:15:26 | 000,000,020 | -HS- | C] () -- C:\Users\Nerp\ntuser.ini
[2009/09/25 01:15:26 | 000,000,000 | -H-- | C] () -- C:\Users\Nerp\ntuser.dat.LOG2
[2009/08/03 16:07:42 | 000,403,816 | ---- | C] () -- C:\Windows\System32\OGACheckControl.dll
[2008/04/29 09:42:15 | 001,560,576 | ---- | C] () -- C:\Windows\System32\MainOp.dll
[2008/04/29 09:42:15 | 001,327,104 | ---- | C] () -- C:\Windows\System32\ImageReog.dll
[2008/04/29 09:42:15 | 000,622,592 | ---- | C] () -- C:\Windows\System32\PicNotify.dll
[2008/04/29 09:42:15 | 000,491,520 | ---- | C] () -- C:\Windows\System32\picn.dll
[2008/04/29 09:42:15 | 000,208,896 | ---- | C] () -- C:\Windows\System32\Image.dll
[2008/04/29 09:42:15 | 000,126,976 | ---- | C] () -- C:\Windows\System32\VideoOp.dll
[2008/04/29 09:42:15 | 000,094,208 | ---- | C] () -- C:\Windows\System32\Momo.dll
[2008/04/29 09:42:15 | 000,094,208 | ---- | C] () -- C:\Windows\System32\ApBlend.dll
[2008/04/29 09:42:15 | 000,049,152 | ---- | C] () -- C:\Windows\System32\DevFilt.dll
[2008/04/29 09:07:36 | 000,016,480 | ---- | C] () -- C:\Windows\System32\rixdicon.dll
[2008/04/29 09:02:30 | 000,015,190 | ---- | C] () -- C:\Windows\M3000Twn.ini
[2008/03/28 07:34:52 | 000,910,464 | ---- | C] () -- C:\Windows\System32\igmedkrn.dll
[2008/03/28 07:34:52 | 000,204,800 | ---- | C] () -- C:\Windows\System32\igfxCoIn_v1283.dll
[2008/03/28 07:34:46 | 001,060,424 | ---- | C] () -- C:\Windows\System32\WdfCoInstaller01000.dll
[2007/11/06 15:19:28 | 000,053,299 | ---- | C] () -- C:\Windows\System32\pthreadVC.dll
[2007/06/01 09:58:40 | 000,999,424 | ---- | C] () -- C:\Windows\System32\WLIHVUI.dll
[2006/11/02 07:35:32 | 000,005,632 | ---- | C] () -- C:\Windows\System32\sysprepMCE.dll
[2006/11/02 02:40:29 | 000,013,750 | ---- | C] () -- C:\Windows\System32\pacerprf.ini

========== LOP Check ==========

[2010/04/12 16:53:26 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\.purple
[2009/11/11 00:22:23 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\DMCache
[2010/02/05 16:04:36 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\FileZilla
[2009/11/12 10:27:24 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\FlashGet
[2010/01/04 22:29:42 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\FLV Extract
[2009/11/15 11:23:47 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\FPEB
[2010/03/20 17:31:11 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\gtk-2.0
[2010/01/01 23:17:56 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\I2P
[2009/11/11 00:21:31 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\IDM
[2009/12/07 18:38:50 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\IObit
[2009/10/31 20:01:17 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\JAM Software
[2009/11/14 13:24:45 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Netscape
[2010/04/14 01:06:31 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\NoNameScript
[2009/11/14 13:24:13 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Photodex
[2009/11/25 22:19:13 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Registry Mechanic
[2009/12/20 22:12:46 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\SecondLife
[2009/10/31 14:41:21 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\SystemRequirementsLab
[2009/11/06 10:19:38 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Trillian
[2010/04/01 12:24:24 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\TrojanHunter
[2010/03/21 15:18:41 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\uTorrent
[2009/11/28 00:02:04 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Wireshark
[2010/03/09 23:58:21 | 000,000,000 | ---D | M] -- C:\Users\Nerp\AppData\Roaming\Xilisoft Corporation
[2010/04/13 23:08:43 | 000,032,590 | ---- | M] () -- C:\Windows\Tasks\SCHEDLGU.TXT

========== Purity Check ==========



========== Custom Scans ==========


< %SYSTEMDRIVE%\*.exe >


< MD5 for: AGP440.SYS >
[2008/01/18 22:42:26 | 000,056,376 | ---- | M] (Microsoft Corporation) MD5=13F9E33747E6B41A3FF305C37DB0D360 -- C:\Windows\System32\DriverStore\FileRepository\machine.inf_51b95d75\AGP440.sys
[2008/01/18 22:42:26 | 000,056,376 | ---- | M] (Microsoft Corporation) MD5=13F9E33747E6B41A3FF305C37DB0D360 -- C:\Windows\System32\DriverStore\FileRepository\machine.inf_f750e484\AGP440.sys
[2008/01/18 22:42:26 | 000,056,376 | ---- | M] (Microsoft Corporation) MD5=13F9E33747E6B41A3FF305C37DB0D360 -- C:\Windows\winsxs\x86_machine.inf_31bf3856ad364e35_6.0.6001.18000_none_ba12ed3bbeb0d97a\AGP440.sys
[2008/01/18 22:42:26 | 000,056,376 | ---- | M] (Microsoft Corporation) MD5=13F9E33747E6B41A3FF305C37DB0D360 -- C:\Windows\winsxs\x86_machine.inf_31bf3856ad364e35_6.0.6002.18005_none_bbfe6647bbd2a4c6\AGP440.sys
[2006/11/02 04:49:52 | 000,053,864 | ---- | M] (Microsoft Corporation) MD5=EF23439CDD587F64C2C1B8825CEAD7D8 -- C:\Windows\ERDNT\cache\AGP440.sys
[2006/11/02 04:49:52 | 000,053,864 | ---- | M] (Microsoft Corporation) MD5=EF23439CDD587F64C2C1B8825CEAD7D8 -- C:\Windows\System32\drivers\AGP440.sys
[2006/11/02 04:49:52 | 000,053,864 | ---- | M] (Microsoft Corporation) MD5=EF23439CDD587F64C2C1B8825CEAD7D8 -- C:\Windows\System32\DriverStore\FileRepository\machine.inf_920a2c1f\AGP440.sys

< MD5 for: ATAPI.SYS >
[2010/04/06 13:01:58 | 000,019,944 | ---- | M] (Microsoft Corporation) MD5=1F05B78AB91C9075565A9D8A4B880BC4 -- C:\atapi.sys
[2009/04/11 01:32:26 | 000,019,944 | ---- | M] (Microsoft Corporation) MD5=1F05B78AB91C9075565A9D8A4B880BC4 -- C:\Windows\ERDNT\cache\atapi.sys
[2010/04/06 13:01:58 | 000,019,944 | ---- | M] (Microsoft Corporation) MD5=1F05B78AB91C9075565A9D8A4B880BC4 -- C:\Windows\System32\drivers\atapi.sys
[2009/04/11 01:32:26 | 000,019,944 | ---- | M] (Microsoft Corporation) MD5=1F05B78AB91C9075565A9D8A4B880BC4 -- C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys
[2009/04/11 01:32:26 | 000,019,944 | ---- | M] (Microsoft Corporation) MD5=1F05B78AB91C9075565A9D8A4B880BC4 -- C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1261eab99e8\atapi.sys
[2008/01/18 22:41:32 | 000,021,560 | ---- | M] (Microsoft Corporation) MD5=2D9C903DC76A66813D350A562DE40ED9 -- C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_cc18792d\atapi.sys
[2008/01/18 22:41:32 | 000,021,560 | ---- | M] (Microsoft Corporation) MD5=2D9C903DC76A66813D350A562DE40ED9 -- C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6001.18000_none_dd38281a2189ce9c\atapi.sys
[2006/11/02 04:49:36 | 000,019,048 | ---- | M] (Microsoft Corporation) MD5=4F4FCB8B6EA06784FB6D475B7EC7300F -- C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_c6c2e699\atapi.sys

< MD5 for: CNGAUDIT.DLL >
[2006/11/02 04:46:03 | 000,011,776 | ---- | M] (Microsoft Corporation) MD5=7F15B4953378C8B5161D65C26D5FED4D -- C:\Windows\ERDNT\cache\cngaudit.dll
[2006/11/02 04:46:03 | 000,011,776 | ---- | M] (Microsoft Corporation) MD5=7F15B4953378C8B5161D65C26D5FED4D -- C:\Windows\System32\cngaudit.dll
[2006/11/02 04:46:03 | 000,011,776 | ---- | M] (Microsoft Corporation) MD5=7F15B4953378C8B5161D65C26D5FED4D -- C:\Windows\winsxs\x86_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.0.6000.16386_none_e62d292932a96ce6\cngaudit.dll

< MD5 for: IASTOR.SYS >
[2010/04/06 10:23:57 | 000,277,784 | ---- | M] (Intel Corporation) MD5=5DF93509037399B53D3ECAA8A67B6C58 -- C:\Windows\System32\drivers\iaStor.sys
[2007/04/24 23:17:35 | 000,277,784 | ---- | M] (Intel Corporation) MD5=5DF93509037399B53D3ECAA8A67B6C58 -- C:\Windows\System32\DriverStore\FileRepository\iaahci.inf_b92fa6ec\iaStor.sys

< MD5 for: IASTORV.SYS >
[2008/01/18 22:42:52 | 000,235,064 | ---- | M] (Intel Corporation) MD5=54155EA1B0DF185878E0FC9EC3AC3A14 -- C:\Windows\System32\DriverStore\FileRepository\iastorv.inf_c9df7691\iaStorV.sys
[2008/01/18 22:42:52 | 000,235,064 | ---- | M] (Intel Corporation) MD5=54155EA1B0DF185878E0FC9EC3AC3A14 -- C:\Windows\winsxs\x86_iastorv.inf_31bf3856ad364e35_6.0.6001.18000_none_af11527887c7fa8f\iaStorV.sys
[2006/11/02 04:51:25 | 000,232,040 | ---- | M] (Intel Corporation) MD5=C957BF4B5D80B46C5017BF0101E6C906 -- C:\Windows\System32\drivers\iaStorV.sys
[2006/11/02 04:51:25 | 000,232,040 | ---- | M] (Intel Corporation) MD5=C957BF4B5D80B46C5017BF0101E6C906 -- C:\Windows\System32\DriverStore\FileRepository\iastorv.inf_37cdafa4\iaStorV.sys

< MD5 for: NETLOGON.DLL >
[2006/11/02 04:46:11 | 000,559,616 | ---- | M] (Microsoft Corporation) MD5=889A2C9F2AACCD8F64EF50AC0B3D553B -- C:\Windows\winsxs\x86_microsoft-windows-security-netlogon_31bf3856ad364e35_6.0.6000.16386_none_fb80f5473b0ed783\netlogon.dll
[2009/04/11 01:28:23 | 000,592,896 | ---- | M] (Microsoft Corporation) MD5=95DAECF0FB120A7B5DA679CC54E37DDE -- C:\Windows\ERDNT\cache\netlogon.dll
[2009/04/11 01:28:23 | 000,592,896 | ---- | M] (Microsoft Corporation) MD5=95DAECF0FB120A7B5DA679CC54E37DDE -- C:\Windows\System32\netlogon.dll
[2009/04/11 01:28:23 | 000,592,896 | ---- | M] (Microsoft Corporation) MD5=95DAECF0FB120A7B5DA679CC54E37DDE -- C:\Windows\winsxs\x86_microsoft-windows-security-netlogon_31bf3856ad364e35_6.0.6002.18005_none_ffa3304f351bb3a3\netlogon.dll
[2008/01/18 22:35:38 | 000,592,384 | ---- | M] (Microsoft Corporation) MD5=A8EFC0B6E75B789F7FD3BA5025D4E37F -- C:\Windows\winsxs\x86_microsoft-windows-security-netlogon_31bf3856ad364e35_6.0.6001.18000_none_fdb7b74337f9e857\netlogon.dll

< MD5 for: NVSTOR.SYS >
[2006/11/02 04:50:13 | 000,040,040 | ---- | M] (NVIDIA Corporation) MD5=9E0BA19A28C498A6D323D065DB76DFFC -- C:\Windows\System32\drivers\nvstor.sys
[2006/11/02 04:50:13 | 000,040,040 | ---- | M] (NVIDIA Corporation) MD5=9E0BA19A28C498A6D323D065DB76DFFC -- C:\Windows\System32\DriverStore\FileRepository\nvraid.inf_733654ff\nvstor.sys
[2008/01/18 22:42:10 | 000,045,112 | ---- | M] (NVIDIA Corporation) MD5=ABED0C09758D1D97DB0042DBB2688177 -- C:\Windows\System32\DriverStore\FileRepository\nvraid.inf_31c3d71d\nvstor.sys
[2008/01/18 22:42:10 | 000,045,112 | ---- | M] (NVIDIA Corporation) MD5=ABED0C09758D1D97DB0042DBB2688177 -- C:\Windows\winsxs\x86_nvraid.inf_31bf3856ad364e35_6.0.6001.18000_none_39dac327befea467\nvstor.sys

< MD5 for: SCECLI.DLL >
[2008/01/18 22:36:20 | 000,177,152 | ---- | M] (Microsoft Corporation) MD5=28B84EB538F7E8A0FE8B9299D591E0B9 -- C:\Windows\winsxs\x86_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.0.6001.18000_none_380de25bd91b6f12\scecli.dll
[2006/11/02 04:46:12 | 000,176,640 | ---- | M] (Microsoft Corporation) MD5=80E2839D05CA5970A86D7BE2A08BFF61 -- C:\Windows\winsxs\x86_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.0.6000.16386_none_35d7205fdc305e3e\scecli.dll
[2009/04/11 01:28:24 | 000,177,152 | ---- | M] (Microsoft Corporation) MD5=8FC182167381E9915651267044105EE1 -- C:\Windows\ERDNT\cache\scecli.dll
[2009/04/11 01:28:24 | 000,177,152 | ---- | M] (Microsoft Corporation) MD5=8FC182167381E9915651267044105EE1 -- C:\Windows\System32\scecli.dll
[2009/04/11 01:28:24 | 000,177,152 | ---- | M] (Microsoft Corporation) MD5=8FC182167381E9915651267044105EE1 -- C:\Windows\winsxs\x86_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.0.6002.18005_none_39f95b67d63d3a5e\scecli.dll

< %systemroot%\*. /mp /s >

< %systemroot%\system32\*.dll /lockedfiles >
[2009/04/11 01:27:47 | 000,241,128 | ---- | M] (Microsoft Corporation) Unable to obtain MD5 -- C:\Windows\System32\rsaenh.dll
[2009/04/11 01:28:23 | 000,228,352 | ---- | M] (Microsoft Corporation) Unable to obtain MD5 -- C:\Windows\System32\SLC.dll

< %systemroot%\Tasks\*.job /lockedfiles >

< %systemroot%\system32\drivers\*.sys /lockedfiles >
[2 C:\Windows\system32\drivers\*.tmp files -> C:\Windows\system32\drivers\*.tmp -> ]

< %systemroot%\System32\config\*.sav >
[2006/11/02 05:34:05 | 000,008,192 | ---- | M] () -- C:\Windows\System32\config\COMPONENTS.SAV
[2006/11/02 05:34:05 | 000,020,480 | ---- | M] () -- C:\Windows\System32\config\DEFAULT.SAV
[2006/11/02 05:34:05 | 000,008,192 | ---- | M] () -- C:\Windows\System32\config\SECURITY.SAV
[2006/11/02 05:34:08 | 010,133,504 | ---- | M] () -- C:\Windows\System32\config\SOFTWARE.SAV
[2006/11/02 05:34:08 | 001,826,816 | ---- | M] () -- C:\Windows\System32\config\SYSTEM.SAV

========== Alternate Data Streams ==========

@Alternate Data Stream - 135 bytes -> C:\ProgramData\TEMP:D1B5B4F1
@Alternate Data Stream - 114 bytes -> C:\ProgramData\TEMP:359B3BDA
@Alternate Data Stream - 102 bytes -> C:\ProgramData\TEMP:C7DEC6B7
< End of report >

Edited by Pedestrian3920, 14 April 2010 - 06:20 PM.


#10 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:42 PM

Posted 17 April 2010 - 01:52 AM

Hi,

How is it running?

Did you set this proxy server?
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = 216.9.6.148:8080
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#11 Pedestrian3920

Pedestrian3920
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 18 April 2010 - 01:59 PM

The proxy was mine, machine seems to be running alright. TCPview is still showing a large number of outgoing connections, something about that makes me suspicious. I could just be paranoid though. Could you please look at my log and see if it looks alright? If I'm asking too much I understand.
Either way, thanks for all your help! I will definitely recommend this site to others.

are there any other scans I need to run?

#12 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:42 PM

Posted 19 April 2010 - 12:16 PM

Hi,

there are a few leftovers in the log.


Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following
    CODE
    :OTL
    SRV - File not found [On_Demand | Stopped] -- -- (WJMZUYOWOHI)
    SRV - File not found [On_Demand | Stopped] -- -- (WBKULD)
    SRV - File not found [On_Demand | Stopped] -- -- (RORWMBHQ)
    SRV - File not found [On_Demand | Stopped] -- -- (OMOS)
    SRV - File not found [On_Demand | Stopped] -- -- (NTHMAFYI)
    SRV - File not found [On_Demand | Stopped] -- -- (BQ)
    SRV - File not found [Auto | Stopped] -- -- (avg9wd)
    SRV - File not found [Auto | Stopped] -- -- (avg9emc)
    @Alternate Data Stream - 135 bytes -> C:\ProgramData\TEMP:D1B5B4F1
    @Alternate Data Stream - 114 bytes -> C:\ProgramData\TEMP:359B3BDA
    @Alternate Data Stream - 102 bytes -> C:\ProgramData\TEMP:C7DEC6B7
    :Commands
    [emptytemp]
    [emptyflash]
    [resethosts]
  • Then click the Run Fix button at the top
  • Let the program run unhindered, when done it will say "Fix Complete press ok to open the log"
  • Please post that log in your next reply. Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTL\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
================================Follow up scan=================================
  • Double click on OTL to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open one notepad window. OTL.Txt a This is saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of this file and post it with your next reply.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#13 Pedestrian3920

Pedestrian3920
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 19 April 2010 - 04:09 PM

ran the fix, and i'm pulling my hair out right now
machine wont boot
otl started running, at one point it said to reboot so that it can move files. I hit yes. machine reboots, vista starts loading, then bam, blue screen
stop error, didn't write it down. when i boot in safemode, it starts loading drivers and gets to crcdisk.sys then bluescreen again. and for some reason my ubuntu installation wont run. it says "boot error"
please please please help
I thought things were finally gonna work sad.gif


#14 Pedestrian3920

Pedestrian3920
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 20 April 2010 - 05:41 PM

ok anyway
ubuntu working again, so I could get you the log
windows still wont boot.


All processes killed

========== OTL ==========

Service WJMZUYOWOHI stopped successfully!

Service WJMZUYOWOHI deleted successfully!

Service WBKULD stopped successfully!

Service WBKULD deleted successfully!

Service RORWMBHQ stopped successfully!

Service RORWMBHQ deleted successfully!

Service OMOS stopped successfully!

Service OMOS deleted successfully!

Service NTHMAFYI stopped successfully!

Service NTHMAFYI deleted successfully!

Service BQ stopped successfully!

Service BQ deleted successfully!

Service avg9wd stopped successfully!

Service avg9wd deleted successfully!

Service avg9emc stopped successfully!

Service avg9emc deleted successfully!

ADS C:\ProgramData\TEMP:D1B5B4F1 deleted successfully.

ADS C:\ProgramData\TEMP:359B3BDA deleted successfully.

ADS C:\ProgramData\TEMP:C7DEC6B7 deleted successfully.

========== COMMANDS ==========



[EMPTYTEMP]



User: All Users



User: Default

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 33170 bytes



User: Default User

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes



User: Nerp

->Temp folder emptied: 31344119 bytes

->Temporary Internet Files folder emptied: 87091 bytes

->Java cache emptied: 249027 bytes

->FireFox cache emptied: 65762968 bytes

->Google Chrome cache emptied: 220534282 bytes

->Flash cache emptied: 11784 bytes



User: Public

->Temp folder emptied: 0 bytes



%systemdrive% .tmp files removed: 0 bytes

%systemroot% .tmp files removed: 0 bytes

%systemroot%\System32 .tmp files removed: 0 bytes

%systemroot%\System32\drivers .tmp files removed: 555568 bytes

Windows Temp folder emptied: 78306732 bytes

RecycleBin emptied: 0 bytes



Total Files Cleaned = 378.00 mb





[EMPTYFLASH]



User: All Users



User: Default



User: Default User



User: Nerp

->Flash cache emptied: 0 bytes



User: Public



Total Flash Files Cleaned = 0.00 mb



C:\Windows\System32\drivers\etc\Hosts moved successfully.

HOSTS file reset successfully



OTL by OldTimer - Version 3.2.1.3 log created on 04192010_154647


#15 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:42 PM

Posted 21 April 2010 - 02:04 PM

Please reboot, hit F8 like you did to enter safe mode, and choose

Last Known Good Configuration.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users