Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

possible Sinowal/MBR rootkit


  • This topic is locked This topic is locked
31 replies to this topic

#1 bonaro

bonaro

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 18 April 2010 - 11:20 PM

Referred from here: http://www.bleepingcomputer.com/forums/t/310252/my-bleeping-computer/ ~ OB

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit quick scan 2010-04-18 12:20:15
Windows 5.1.2600 Service Pack 3
Running: 3r05gcjm.exe; Driver: C:\DOCUME~1\Dan\LOCALS~1\Temp\kweyqaoc.sys


---- System - GMER 1.0.15 ----

Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateFile [0xA47AF35F]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwMapViewOfSection [0xA47AF3B5]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwProtectVirtualMemory [0xA47AF373]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwUnmapViewOfSection [0xA47AF3CB]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwYieldExecution [0xA47AF39F]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtCreateFile
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtMapViewOfSection

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))
AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)

Device \Driver\Tcpip \Device\Ip 8ABF1020
Device \Driver\Tcpip \Device\Ip 8A4DB830
Device \Driver\Tcpip \Device\Ip 89DDB0C0
Device \Driver\Tcpip \Device\Ip 8A53D6D8
Device \Driver\Tcpip \Device\Ip 8AA0DF10
Device \Driver\Tcpip \Device\Ip 8A6C3700
Device \Driver\Tcpip \Device\Ip 8AD87E70
Device \Driver\Tcpip \Device\Ip 8A9E9BA8
Device \Driver\Tcpip \Device\Ip 89E0B0C8

AttachedDevice \Driver\Tcpip \Device\Ip mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)

Device \Driver\Tcpip \Device\Tcp 8ABF1020
Device \Driver\Tcpip \Device\Tcp 8A4DB830
Device \Driver\Tcpip \Device\Tcp 89DDB0C0
Device \Driver\Tcpip \Device\Tcp 8A53D6D8
Device \Driver\Tcpip \Device\Tcp 8AA0DF10
Device \Driver\Tcpip \Device\Tcp 8A6C3700
Device \Driver\Tcpip \Device\Tcp 8AD87E70
Device \Driver\Tcpip \Device\Tcp 8A9E9BA8
Device \Driver\Tcpip \Device\Tcp 89E0B0C8

AttachedDevice \Driver\Tcpip \Device\Tcp mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)

Device \Driver\Tcpip \Device\Udp 8ABF1020
Device \Driver\Tcpip \Device\Udp 8A4DB830
Device \Driver\Tcpip \Device\Udp 89DDB0C0
Device \Driver\Tcpip \Device\Udp 8A53D6D8
Device \Driver\Tcpip \Device\Udp 8AA0DF10
Device \Driver\Tcpip \Device\Udp 8A6C3700
Device \Driver\Tcpip \Device\Udp 8AD87E70
Device \Driver\Tcpip \Device\Udp 8A9E9BA8
Device \Driver\Tcpip \Device\Udp 89E0B0C8

AttachedDevice \Driver\Tcpip \Device\Udp mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)

Device \Driver\Tcpip \Device\RawIp 8ABF1020
Device \Driver\Tcpip \Device\RawIp 8A4DB830
Device \Driver\Tcpip \Device\RawIp 89DDB0C0
Device \Driver\Tcpip \Device\RawIp 8A53D6D8
Device \Driver\Tcpip \Device\RawIp 8AA0DF10
Device \Driver\Tcpip \Device\RawIp 8A6C3700
Device \Driver\Tcpip \Device\RawIp 8AD87E70
Device \Driver\Tcpip \Device\RawIp 8A9E9BA8
Device \Driver\Tcpip \Device\RawIp 89E0B0C8

AttachedDevice \Driver\Tcpip \Device\RawIp mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)

Device -> \Driver\atapi \Device\Harddisk0\DR0 8AC84AC8

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

Attached Files


Edited by Orange Blossom, 19 April 2010 - 09:27 PM.


BC AdBot (Login to Remove)

 


#2 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:49 PM

Posted 23 April 2010 - 06:17 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Please refrain from running tools or applying updates other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process. Please also continue to work with me until I give you the all clear. Even if your computer appears to act better, you may still be infected.

Even if you have already provided information about your PC, we need a new log to see what has changed since you originally posted your problem.

Once we start working together, please reply back within 3 days or this thread may be closed so we can help others who are waiting.

We need to create an OTL report,
  • Please download OTL from this link.
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under the Custom Scan box paste this in:

    netsvcs
    msconfig
    activex
    drivers32
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    nvstor32
    ahcix86s.sys
    nvrd32.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT

  • Click the Quick Scan button.
  • The scan should take a few minutes.
  • Please copy and paste both logs in your reply.

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new OTL log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


In your reply, please post both OTL logs and the GMER log.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#3 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 24 April 2010 - 12:19 AM

I run Mcafee and it missed 3-4 major problems. I ran Spywware Dr Mbam SAS and webroot and removed AVE a trojan keylogger TDSS rootkit and I think I still have MAL/fakejs-p or something like that. MSIE is way slow and redirects constantly Google chrome is deal and uninstalled at this point. I have removed all unwanted progs and did disk cleanup. Scans say I have a bad atapi.sys

los attached

Attached Files



#4 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:49 PM

Posted 24 April 2010 - 06:52 AM

Hello, bonaro.

OK, you are infected with a backdoor rootkit and other malware. In your reply, please copy and paste the logs directly into your reply. It's much easier for me than if you attach them. thanks!

Backdoor Warning
One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you do decide to proceed, please continue with the fix below.
P2P Warning and Request
The log shows that you have been using so called peer-to-peer or file-sharing programmes (in your case LimeWire). These programmes allow to share files between users as the name(s) suggest. In today's world the cyber crime has come a long way and any means is used to infect personal computers to make use of their stored data or machine power for further propagation of their malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. I recommend that you uninstall this program. That is optional, however. If you decide to not uninstall, please refrain from using it until I let you know your computer is clean.










Step 1

Next, please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop as bonaroCF.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on bonaroCF.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply, along with any symptoms that are present after it runs.

etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#5 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 24 April 2010 - 11:27 PM

Hi, I have read the guide, I Have some questions then I think I will probably re-format and re-install because I want to be safe...unless you can assure me we have cleaned this thing.

About 3 months ago I was successfully phished for my email password. they spammed everyone in my address book then deleted it. I changed all my passwords to something unique and have no trouble since.

I use PayPal and I increased security 3 months ago by obtaining a Paypal keyfob that generates a number synchronized with my account. No one can get at my account without that keyfob in their hand.

Since I realized I had a virus about 2 weeks ago I have not used this computer to do any banking.

I have not used limewire in months

I do not use a password vault or other password storage method

My wife is a user on this computer and does work from home via Citrix. Her work involves very sensitive finantial information. She has not used thise computer since the virus.

Questions:
Is it possible for any harm to be transfered from this sick computer to other computers via our wireless network?
My confidence in Mcaffe is very low and I thing I will delete and run Webroot...your opinion?
Is is safe to back up my documents and settings before I reformat? I have many documents and at least 6gb of photos I dont want to lose.

-----------------

After I ran Combofix, I think the virus got mad. MSIE is very reluctant to run and opens about 10 editiond before crashing.
log attached


ComboFix 10-04-21.01 - Dan 04/24/2010 20:19:07.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2942.2214 [GMT -7:00]
Running from: c:\documents and settings\Dan\Desktop\bonaroCF.exe
AV: McAfee VirusScan Enterprise *On-access scanning disabled* (Updated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
AV: Webroot AntiVirus with Spy Sweeper *On-access scanning disabled* (Updated) {77E10C7F-2CCA-4187-9394-BDBC267AD597}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Dan\Application Data\alot
c:\documents and settings\Dan\Local Settings\Temporary Internet Files\E5k146wv.jpg
c:\documents and settings\Dan\Local Settings\Temporary Internet Files\GfcsmSyn.jpg
c:\documents and settings\Dan\Local Settings\Temporary Internet Files\Kd1lx3x5P.jpg
c:\documents and settings\Dan\Local Settings\Temporary Internet Files\yLxt6t040.jpg
c:\documents and settings\Jason\Application Data\alot
c:\documents and settings\Joy\Application Data\alot
c:\documents and settings\Joy\Application Data\alot\BrowserSearch\BrowserSearch.xml
c:\documents and settings\Joy\Application Data\alot\BrowserSearch\BrowserSearch.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_0\Button_0.xml
c:\documents and settings\Joy\Application Data\alot\Button_0\Button_0.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_1\Button_1.xml
c:\documents and settings\Joy\Application Data\alot\Button_1\Button_1.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_10\Button_10.xml
c:\documents and settings\Joy\Application Data\alot\Button_10\Button_10.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_11\Button_11.xml
c:\documents and settings\Joy\Application Data\alot\Button_11\Button_11.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_2\Button_2.xml
c:\documents and settings\Joy\Application Data\alot\Button_2\Button_2.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_3\Button_3.xml
c:\documents and settings\Joy\Application Data\alot\Button_3\Button_3.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_4\Button_4.xml
c:\documents and settings\Joy\Application Data\alot\Button_4\Button_4.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_5\Button_5.xml
c:\documents and settings\Joy\Application Data\alot\Button_5\Button_5.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_6\Button_6.xml
c:\documents and settings\Joy\Application Data\alot\Button_6\Button_6.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_7\Button_7.xml
c:\documents and settings\Joy\Application Data\alot\Button_7\Button_7.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_8\Button_8.xml
c:\documents and settings\Joy\Application Data\alot\Button_8\Button_8.xml.backup
c:\documents and settings\Joy\Application Data\alot\Button_9\Button_9.xml
c:\documents and settings\Joy\Application Data\alot\Button_9\Button_9.xml.backup
c:\documents and settings\Joy\Application Data\alot\configurator\configurator.xml
c:\documents and settings\Joy\Application Data\alot\configurator\configurator.xml.backup
c:\documents and settings\Joy\Application Data\alot\ErrorSearch\ErrorSearch.xml
c:\documents and settings\Joy\Application Data\alot\ErrorSearch\ErrorSearch.xml.backup
c:\documents and settings\Joy\Application Data\alot\postInstallLayout\postInstallLayout.xml
c:\documents and settings\Joy\Application Data\alot\postInstallLayout\postInstallLayout.xml.backup
c:\documents and settings\Joy\Application Data\alot\products\products.xml
c:\documents and settings\Joy\Application Data\alot\products\products.xml.backup
c:\documents and settings\Joy\Application Data\alot\Resources\Button_0\images\alot_icon_35x16.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_1\images\alot_search_24x16.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_2\images\default_405_alot_quo_search.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_3\images\default_406_alot_quo_quotes.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\clear.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\cloudy.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\default_281_alot_weather_widget.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\mcloud.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\nclear.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\npcloud.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\pcloud.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_4\images\rain.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_5\images\active_default_407_alot_quo_quoteoftheday.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_5\images\default_407_alot_quo_quoteoftheday.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_6\images\default_408_alot_mrkt_successories.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_6\images\default_561_default_270_alot_ref_mrkt_book.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Button_7\images\default_408_alot_mrkt_successories.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\domains.dat
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\alot_brand.png
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\spinner.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_bottom.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_btnclose0.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_btnclose1.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_btnmin0.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_btnmin1.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_caption.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_error_bg.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_error_close.bmp
c:\documents and settings\Joy\Application Data\alot\Resources\Shared\images\widget_error_icon.bmp
c:\documents and settings\Joy\Application Data\alot\TimerManager\TimerManager.xml
c:\documents and settings\Joy\Application Data\alot\TimerManager\TimerManager.xml.backup
c:\documents and settings\Joy\Application Data\alot\toolbar.xml
c:\documents and settings\Joy\Application Data\alot\ToolbarSearch\ToolbarSearch.xml
c:\documents and settings\Joy\Application Data\alot\ToolbarSearch\ToolbarSearch.xml.backup
c:\documents and settings\Joy\Application Data\alot\Updater\Updater.xml
c:\documents and settings\Joy\Application Data\alot\Updater\Updater.xml.backup
c:\documents and settings\Joy\System
c:\documents and settings\Joy\System\win_qs8.jqx
C:\install.exe
c:\program files\Fast Browser Search
c:\program files\Fast Browser Search\IE\1.bat
c:\program files\Fast Browser Search\IE\about.html
c:\program files\Fast Browser Search\IE\affid.dat
c:\program files\Fast Browser Search\IE\basis.xml
c:\program files\Fast Browser Search\IE\basis_br.xml
c:\program files\Fast Browser Search\IE\basis_de.xml
c:\program files\Fast Browser Search\IE\basis_en.xml
c:\program files\Fast Browser Search\IE\basis_es.xml
c:\program files\Fast Browser Search\IE\basis_fr.xml
c:\program files\Fast Browser Search\IE\basis_it.xml
c:\program files\Fast Browser Search\IE\basis_nr.xml
c:\program files\Fast Browser Search\IE\basis_pt.xml
c:\program files\Fast Browser Search\IE\basis_ru.xml
c:\program files\Fast Browser Search\IE\basis_tr.xml
c:\program files\Fast Browser Search\IE\BHO.dll
c:\program files\Fast Browser Search\IE\ClearRecycleBin.exe
c:\program files\Fast Browser Search\IE\error.html
c:\program files\Fast Browser Search\IE\FBSPlugin.dll
c:\program files\Fast Browser Search\IE\fbsProtection.xml
c:\program files\Fast Browser Search\IE\FbsSearchProvider.xml
c:\program files\Fast Browser Search\IE\FBStoolbar.dll
c:\program files\Fast Browser Search\IE\fbstoolbar.jar
c:\program files\Fast Browser Search\IE\fbstoolbar.manifest
c:\program files\Fast Browser Search\IE\icons.bmp
c:\program files\Fast Browser Search\IE\info.txt
c:\program files\Fast Browser Search\IE\local.xml
c:\program files\Fast Browser Search\IE\logobg.bmp
c:\program files\Fast Browser Search\IE\MTWBtoolbar.html
c:\program files\Fast Browser Search\IE\search.bmp
c:\program files\Fast Browser Search\IE\search_br.bmp
c:\program files\Fast Browser Search\IE\search_de.bmp
c:\program files\Fast Browser Search\IE\search_es.bmp
c:\program files\Fast Browser Search\IE\search_fr.bmp
c:\program files\Fast Browser Search\IE\search_it.bmp
c:\program files\Fast Browser Search\IE\search_pt.bmp
c:\program files\Fast Browser Search\IE\search_ru.bmp
c:\program files\Fast Browser Search\IE\SearchGuardPlus.ico
c:\program files\Fast Browser Search\IE\SGPU.ico
c:\program files\Fast Browser Search\IE\sgpUpdater.xml
c:\program files\Fast Browser Search\IE\tbhelper.dll
c:\program files\Fast Browser Search\IE\tbs_include_script_003175.js
c:\program files\Fast Browser Search\IE\tbs_include_script_005064.js
c:\program files\Fast Browser Search\IE\tbs_include_script_012817.js
c:\program files\Fast Browser Search\IE\Toolbar Help.htm
c:\program files\Fast Browser Search\IE\version.txt
c:\program files\Search Guard Plus
c:\program files\Search Guard Plus\fbsProtection.xml
c:\program files\Search Guard Plus\fbsSearchProvider.xml
c:\program files\Search Guard Plus\SearchGuardPlus.ico
c:\program files\Search Guard PlusU
c:\program files\Search Guard PlusU\SGPU.ico
c:\program files\Search Guard PlusU\sgpUpdater.xml
c:\program files\SGPSA
c:\program files\SGPSA\BHO.dll
c:\recycler\S-1-5-21-2429342077-3811393244-1407165003-500
c:\recycler\S-1-5-21-2832615023-4124910002-4107663327-500
c:\recycler\S-1-5-21-566903042-1816579481-1250278993-500
C:\tmp.tmp
C:\tmp2.tmp
c:\windows\system32\av.exe
c:\windows\system32\Drivers\gqkwj.sys
D:\Autorun.inf

.
((((((((((((((((((((((((( Files Created from 2010-03-25 to 2010-04-25 )))))))))))))))))))))))))))))))
.

2010-04-22 04:00 . 2010-04-22 04:00 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\WMTools Downloaded Files
2010-04-20 02:26 . 2010-04-20 02:26 -------- d-----w- c:\documents and settings\Jason\Application Data\Webroot
2010-04-18 05:12 . 2010-04-18 05:12 77312 ----a-w- C:\mbr.exe
2010-04-17 20:05 . 2010-04-17 20:05 52224 ----a-w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-04-17 20:05 . 2010-04-17 20:05 117760 ----a-w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com
2010-04-17 20:03 . 2010-04-17 20:03 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-04-17 16:21 . 2010-02-24 17:16 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-04-16 03:03 . 2010-04-16 03:03 -------- d-----w- c:\program files\Windows Defender
2010-04-16 02:48 . 2010-04-16 02:48 -------- d-----w- C:\Rooter$
2010-04-15 14:00 . 2010-04-25 02:04 12032 -c--a-w- c:\windows\system32\dllcache\amsint.sys
2010-04-15 04:01 . 2010-04-15 04:01 -------- d-----w- c:\program files\MSSOAP
2010-04-15 04:00 . 2009-11-06 22:19 1563008 ----a-w- c:\windows\WRSetup.dll
2010-04-15 04:00 . 2010-04-15 04:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Webroot
2010-04-15 04:00 . 2010-04-15 04:00 -------- d-----w- c:\program files\Webroot
2010-04-15 03:58 . 2010-04-15 03:58 164 ----a-w- c:\windows\install.dat
2010-04-15 03:30 . 2010-01-22 16:56 149456 ----a-w- c:\windows\SGDetectionTool.dll
2010-04-15 03:30 . 2010-01-22 16:55 767952 ----a-w- c:\windows\BDTSupport.dll
2010-04-15 03:30 . 2008-11-26 19:08 131 ----a-w- c:\windows\IDB.zip
2010-04-15 03:30 . 2010-01-22 16:56 165840 ----a-w- c:\windows\PCTBDRes.dll
2010-04-15 03:30 . 2010-01-22 16:56 1652688 ----a-w- c:\windows\PCTBDCore.dll
2010-04-15 03:30 . 2009-10-28 08:36 1152444 ----a-w- c:\windows\UDB.zip
2010-04-15 03:27 . 2010-02-05 16:17 233136 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2010-04-15 03:27 . 2010-03-10 18:36 217032 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2010-04-15 03:27 . 2009-11-23 20:54 88040 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2010-04-15 03:26 . 2010-02-05 16:25 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2010-04-15 03:26 . 2010-04-15 03:30 -------- d-----w- c:\program files\Common Files\PC Tools
2010-04-15 03:26 . 2010-04-15 03:26 -------- d-----w- c:\documents and settings\Dan\Application Data\PC Tools
2010-04-15 03:26 . 2010-04-15 03:26 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2010-04-14 02:54 . 2010-04-14 02:54 -------- d-----w- c:\documents and settings\Joy\Local Settings\Application Data\Threat Expert
2010-04-13 01:49 . 2010-04-13 01:49 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-04-13 01:48 . 2010-04-13 01:48 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-04-12 04:16 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Apple
2010-04-12 04:15 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Application Data\Apple Computer
2010-04-12 04:14 . 2010-04-12 04:14 -------- d-sh--w- c:\documents and settings\Josh\PrivacIE
2010-04-12 04:14 . 2010-04-12 04:14 -------- d-----w- c:\documents and settings\Josh\Application Data\Yahoo!
2010-04-12 04:14 . 2010-04-14 02:33 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Google
2010-04-12 04:13 . 2010-04-12 04:13 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Threat Expert
2010-04-12 04:06 . 2010-04-12 04:06 61440 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7ad71928-n\decora-sse.dll
2010-04-12 04:06 . 2010-04-12 04:06 503808 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\msvcp71.dll
2010-04-12 04:06 . 2010-04-12 04:06 499712 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\jmc.dll
2010-04-12 04:06 . 2010-04-12 04:06 348160 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\msvcr71.dll
2010-04-12 04:06 . 2010-04-12 04:06 12800 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7ad71928-n\decora-d3d.dll
2010-04-12 04:01 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Apple Computer
2010-04-12 03:16 . 2010-04-12 03:16 -------- d-----w- c:\program files\Trend Micro
2010-04-12 02:25 . 2010-04-17 16:16 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-04-12 02:25 . 2010-04-17 16:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-12 01:22 . 2010-04-12 01:22 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-04-12 01:21 . 2010-04-17 16:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-04-11 17:12 . 2010-04-11 17:12 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\Threat Expert
2010-04-11 17:01 . 2010-04-25 03:04 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-04-09 04:14 . 2010-04-09 04:14 503808 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\msvcp71.dll
2010-04-09 04:14 . 2010-04-09 04:14 499712 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\jmc.dll
2010-04-09 04:14 . 2010-04-09 04:14 348160 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\msvcr71.dll
2010-04-09 04:14 . 2010-04-09 04:14 61440 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-4d4062b6-n\decora-sse.dll
2010-04-09 04:14 . 2010-04-09 04:14 12800 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-4d4062b6-n\decora-d3d.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-20 02:45 . 2006-09-18 04:18 1324 ----a-w- c:\windows\system32\d3d9caps.dat
2010-04-20 02:43 . 2006-10-03 13:54 -------- d-----w- c:\documents and settings\Jason\Application Data\LimeWire
2010-04-18 19:17 . 2006-07-26 05:02 -------- d-----w- c:\program files\Spyware Doctor
2010-04-17 16:13 . 2005-11-23 17:18 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-17 16:11 . 2007-04-15 05:17 -------- d-----w- c:\program files\Lavasoft
2010-04-17 03:11 . 2009-03-22 19:12 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-16 02:11 . 2009-02-26 05:35 -------- d-----w- c:\program files\Emote
2010-04-15 14:45 . 2007-05-28 15:58 -------- d-----w- c:\program files\Beachhead 2000
2010-04-14 05:36 . 2009-02-04 04:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Google Updater
2010-04-14 05:22 . 2006-02-25 02:53 6048 ----a-w- c:\documents and settings\Joy\Application Data\wklnhst.dat
2010-04-14 05:12 . 2006-02-13 05:13 8452 ----a-w- c:\documents and settings\Dan\Application Data\wklnhst.dat
2010-04-09 04:14 . 2005-11-23 17:16 -------- d-----w- c:\program files\Common Files\Java
2010-04-09 04:13 . 2005-11-23 17:16 -------- d-----w- c:\program files\Java
2010-04-01 01:59 . 2006-03-05 04:57 7550 ----a-w- c:\documents and settings\Jason\Application Data\wklnhst.dat
2010-03-30 07:46 . 2009-03-22 19:12 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-30 07:45 . 2009-03-22 19:12 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-27 22:12 . 2006-02-14 06:02 -------- d-----w- c:\documents and settings\Dan\Application Data\Apple Computer
2010-03-27 22:12 . 2007-07-05 17:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-03-10 06:15 . 2005-01-09 23:48 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 11:28 . 2009-07-03 18:57 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-25 06:24 . 2005-01-09 23:48 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2005-01-09 23:48 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-16 14:08 . 2005-01-09 23:48 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2004-08-04 05:59 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33 . 2005-01-09 23:47 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2005-01-09 23:48 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
2007-10-28 17:19 . 2007-10-28 17:21 774144 ----a-w- c:\program files\RngInterstitial.dll
2008-12-09 17:15 . 2009-01-20 02:12 2529741 ----a-w- c:\program files\mozilla firefox\components\1280759.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\BackupIconOverlayId]
@="{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}"
[HKEY_CLASSES_ROOT\CLSID\{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}]
2009-11-06 22:14 238968 ----a-w- c:\program files\Webroot\WebrootSecurity\Backup\CtxMenu_1_0_0_10.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-09-18 7204864]
"nwiz"="nwiz.exe" [2005-09-18 1519616]
"readericon"="c:\program files\Digital Media Reader\readericon45G.exe" [2005-08-27 139264]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-03 32768]
"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2005-08-13 1121792]
"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" [2007-11-29 583048]
"ShStatEXE"="c:\program files\McAfee\VirusScan Enterprise\SHSTAT.EXE" [2006-11-30 112216]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\UdaterUI.exe" [2006-11-17 136768]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-02-03 233304]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2006-11-04 866584]
"SpySweeper"="c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe" [2009-11-06 6515784]

c:\documents and settings\Jason\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - c:\program files\LimeWire\LimeWire.exe [2009-9-30 503808]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WebrootSpySweeperService]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WRConsumerService]
@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^APC UPS Status.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\APC UPS Status.lnk
backup=c:\windows\pss\APC UPS Status.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hpoddt01.exe.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\hpoddt01.exe.lnk
backup=c:\windows\pss\hpoddt01.exe.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
2007-03-09 19:09 63712 ----a-w- c:\program files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-01-12 06:16 39792 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ehTray]
2005-08-06 04:56 64512 ----a-w- c:\windows\ehome\ehtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NBJ]
2005-06-03 00:03 1957888 ------w- c:\program files\Ahead\Nero BackItUp\NBJ.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 19:50 155648 ----a-w- c:\windows\system32\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2005-09-18 16:32 86016 ----a-w- c:\windows\system32\nvmctray.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-09-05 09:54 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Recguard]
2002-09-14 07:42 212992 ----a-w- c:\windows\SMINST\Recguard.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMan]
2005-09-26 23:07 90112 ----a-w- c:\windows\soundman.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"AOL TopSpeedMonitor"=2 (0x2)
"AOL ACS"=2 (0x2)
"Viewpoint Manager Service"=2 (0x2)
"PrismXL"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\McAfee\\Common Framework\\FrameworkService.exe"=
"c:\\Program Files\\GameSpy Arcade\\Aphex.exe"=
"c:\\Program Files\\Atari\\Deer Hunter 2005\\DH2005.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Java\\jre6\\bin\\java.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"67:UDP"= 67:UDP:DHCP Discovery Service
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [4/14/2010 8:27 PM 217032]
R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [11/6/2009 12:00 PM 29808]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2/17/2010 11:15 AM 66632]
R2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\Spyware Doctor\BDT\BDTUpdateService.exe [4/14/2010 8:30 PM 112592]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R2 WRConsumerService;Webroot Client Service;c:\program files\Webroot\WebrootSecurity\WRConsumerService.exe [4/14/2010 9:02 PM 1201640]
S2 gupdate1c9868525c78598;Google Update Service (gupdate1c9868525c78598);c:\program files\Google\Update\GoogleUpdate.exe [2/3/2009 9:57 PM 133104]
S3 FileObjInfo;STFileDriver;\??\c:\documents and settings\All Users\Application Data\Spyware Terminator\FileObjInfo.sys --> c:\documents and settings\All Users\Application Data\Spyware Terminator\FileObjInfo.sys [?]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2/17/2010 11:15 AM 12872]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [4/14/2010 8:26 PM 366840]
.
Contents of the 'Scheduled Tasks' folder

2010-03-22 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 20:34]

2006-05-18 c:\windows\Tasks\FRU Task 2003-04-10 00:56ewlett-Packard2003-04-10 00:56p psc 1200 series272A572217594EBCF1CEE215E352B92AD073FDE4139808214.job
- c:\program files\Hewlett-Packard\Digital Imaging\Bin\hpqfrucl.exe [2003-04-10 01:56]

2010-04-25 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-01-27 05:35]

2010-04-25 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-04 04:57]

2010-04-25 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-04 04:57]

2010-04-25 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-04 02:20]

2010-04-25 c:\windows\Tasks\User_Feed_Synchronization-{3881367F-E3AD-460B-B000-3731E19CF38B}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 11:31]

2010-04-25 c:\windows\Tasks\User_Feed_Synchronization-{F353CBD3-5214-4543-8F1C-53C2FBBCAEC9}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 11:31]

2010-04-20 c:\windows\Tasks\wrSpySweeper_L42BEDEDE898A42A29350D40C4C9C9ACB.job
- c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe [2010-04-15 22:20]

2010-04-20 c:\windows\Tasks\wrSpySweeper_L42BEDEDE898A42A29350D40C4C9C9ACB.job
- c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe [2010-04-15 22:20]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Settings,ProxyOverride = *.local
IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {66E79B75-F711-4A88-9C6D-10BCA64F3306} - hxxp://www.drivecam.com/videos/DriveCamEvent.dll
.
- - - - ORPHANS REMOVED - - - -

Toolbar-SITEguard - (no file)
MSConfigStartUp-AIM - c:\progra~1\AIM\aim.exe
MSConfigStartUp-Aim6 - c:\program files\Common Files\AOL\Launch\AOLLaunch.exe
MSConfigStartUp-AOLDialer - c:\program files\Common Files\AOL\ACS\AOLDial.exe
MSConfigStartUp-DW6 - c:\program files\The Weather Channel FW\Desktop\DesktopWeather.exe
MSConfigStartUp-HostManager - c:\program files\Common Files\AOL\1156035370\ee\AOLSoftware.exe
MSConfigStartUp-IPHSend - c:\program files\Common Files\AOL\IPHSend\IPHSend.exe
MSConfigStartUp-MsnMsgr - c:\program files\Windows Live\Messenger\MsnMsgr.Exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-24 20:30
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(732)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
.
Completion time: 2010-04-24 20:34:48
ComboFix-quarantined-files.txt 2010-04-25 03:34

Pre-Run: 133,902,725,120 bytes free
Post-Run: 135,507,730,432 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect

- - End Of File - - 8B8878C4DF121735FA18DC2A37C4B2C9


#6 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:49 PM

Posted 25 April 2010 - 06:44 AM

Hello, bonaro.
To answer your question about reformatting and if we can clean this, you can never guarantee a computer is safe. There could always be new malware we just haven't recognized yet. It's part of the risk of the digital age. I can only say that we can clean what we can see. The choice is up to you.

To answer your other questions:

Yes, it is possible for viruses to be transferred across networks. The rootkit usually comes with other software, in your case I think it was XP Defender or something similiar based on your Am I Infected thread. You can update your virus definitions on those computers and run a scan to be sure.

If you ask me for an antivirus recommendation, I personally use Avast! and I have heard AntiVir is another good freeware program. Both have good detection rates and don't really use much system resources with their real time scan. That being said, I know others that use Webroot and McAfee, so if you have a preference for those, they're ok to use too.

It is safe to backup documents, provided you do it safely. First, please note I said backup 'documents' and not the computer. Do not backup program files, system files or the like as those have a higher chance of being infected. Files that end in extensions such as .exe, .dll, ..com, .pif, .scr, and so on. Also, do not back up HTML files (.htm or .html). Once you copy to the external drive, plug it into a computer to scan it. Before you plug it into the clean system, hold down "SHIFT", then plug it in while holding down shift....and keep holding down Shift for about 30 seconds or so, until Windows recognizes your drive and says it's set up and ready to use. That will keep it from autorunning. Then, scan it with your onboard antivirus and perhaps Malwarebytes' Anti-Malware. That will just ensure everything is OK.

I didn't know PayPal had the token...I think I need to contact them. Thanks for mentioning that! smile.gif

Please let me know how you want to proceed. Combofix did not fix the rootkit, so we'll have to do it manually if you want to try and clean it instead of reformatting. If you want to reformat, just let me know.

Thanks!

etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#7 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 25 April 2010 - 02:09 PM

I want to try to clean first. If there is so much as a hiccup afterwards, I will reformat. I am not opposed to reformatting but it is just a huge pain.

My Mcaffe is the enterprise version provided free by my work. It is updated and it still let 3-4 bad guys inside. I want to dump it and I think I will run with Webroot since it is a paid version already. Let me know when I should dump mcaffee. I have both Mcaffee and webroot running now as well as spyware Dr (paid version)

My wifes laptop is on the wireless network but I have never been able to get file sharing to work with it. She has scanned her laptop with webroot and it is clean. Should she also get Mbam?

Go ahead and start with the manual removal instructions. If that fails I will talk to you some more about backing up files.
Thanks,




#8 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:49 PM

Posted 25 April 2010 - 02:49 PM

Hello, bonaro.

QUOTE
My Mcaffe is the enterprise version provided free by my work. It is updated and it still let 3-4 bad guys inside. I want to dump it and I think I will run with Webroot since it is a paid version already. Let me know when I should dump mcaffee. I have both Mcaffee and webroot running now as well as spyware Dr (paid version)


Running more than one antivirus at a time is really bad as they can conflict and cause system issues, slowdowns and lockups when they both try to access the same file. Go ahead and remove either one or the other from Webroot or McAfee. It is ok to have Spyware Doctor running with it. I do recommend augmenting your onboard antivirus/antimalware with an offline scan, generally about once a week with updated definitions. No antivirus is 100% so checking with a second is a good idea. The system issues only happen when they are both running real-time protection simultaneously. So, MBAM is okay to run once a week and I do recommend it.





Step 1

Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
http://www.bleepingcomputer.com/forums/t/310932/possible-sinowalmbr-rootkit/

Collect::
C:\Documents and Settings\Dan\Local Settings\Application Data\82H7x6
C:\Documents and Settings\All Users\Application Data\82H7x6
C:\WINDOWS\tasks\pneayjjg
C:\Documents and Settings\Dan\Local Settings\Application Data\kH832332nVa32
C:\Documents and Settings\All Users\Application Data\kH832332nVa32
Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000000
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000000
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000000


Save this as CFScript.txt





Refering to the picture above, drag CFScript.txt into ComboFix.exe

When finished, it shall produce a log for you. Post that log in your next reply.

**Note**

When CF finishes running, the ComboFix log will open along with a message box--do not be alarmed. With the above script, ComboFix will capture files to submit for analysis.
  • Ensure you are connected to the internet and click OK on the message box.



Step 2

Please go ahead and run GMER again as before and post the log along with the Combofix log.

etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#9 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 25 April 2010 - 10:48 PM

I uninstalled Mcaffee...just dont have any confidence in it. I now have only webroot AV with Spy and I disabled it for CF.


ComboFix 10-04-21.01 - Dan 04/25/2010 20:26:48.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2942.2326 [GMT -7:00]
Running from: c:\documents and settings\Dan\Desktop\bonaroCF.exe
Command switches used :: c:\documents and settings\Dan\Desktop\CFScript.txt
AV: Webroot AntiVirus with Spy Sweeper *On-access scanning disabled* (Updated) {77E10C7F-2CCA-4187-9394-BDBC267AD597}

file zipped: c:\documents and settings\All Users\Application Data\82H7x6
file zipped: c:\documents and settings\All Users\Application Data\kH832332nVa32
file zipped: c:\documents and settings\Dan\Local Settings\Application Data\82H7x6
file zipped: c:\documents and settings\Dan\Local Settings\Application Data\kH832332nVa32
file zipped: c:\windows\tasks\pneayjjg
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\82H7x6
c:\documents and settings\All Users\Application Data\kH832332nVa32
c:\documents and settings\Dan\Local Settings\Application Data\82H7x6
c:\documents and settings\Dan\Local Settings\Application Data\kH832332nVa32
c:\windows\tasks\pneayjjg

.
((((((((((((((((((((((((( Files Created from 2010-03-26 to 2010-04-26 )))))))))))))))))))))))))))))))
.

2010-04-22 04:00 . 2010-04-22 04:00 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\WMTools Downloaded Files
2010-04-20 02:26 . 2010-04-20 02:26 -------- d-----w- c:\documents and settings\Jason\Application Data\Webroot
2010-04-18 05:12 . 2010-04-18 05:12 77312 ----a-w- C:\mbr.exe
2010-04-17 20:05 . 2010-04-17 20:05 52224 ----a-w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-04-17 20:05 . 2010-04-17 20:05 117760 ----a-w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com
2010-04-17 20:03 . 2010-04-17 20:03 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-04-17 16:21 . 2010-02-24 17:16 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-04-16 03:03 . 2010-04-16 03:03 -------- d-----w- c:\program files\Windows Defender
2010-04-16 02:48 . 2010-04-16 02:48 -------- d-----w- C:\Rooter$
2010-04-15 14:00 . 2010-04-25 02:04 12032 -c--a-w- c:\windows\system32\dllcache\amsint.sys
2010-04-15 04:01 . 2010-04-15 04:01 -------- d-----w- c:\program files\MSSOAP
2010-04-15 04:00 . 2009-11-06 22:19 1563008 ----a-w- c:\windows\WRSetup.dll
2010-04-15 04:00 . 2010-04-15 04:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Webroot
2010-04-15 04:00 . 2010-04-15 04:00 -------- d-----w- c:\program files\Webroot
2010-04-15 03:58 . 2010-04-15 03:58 164 ----a-w- c:\windows\install.dat
2010-04-15 03:30 . 2010-01-22 16:56 149456 ----a-w- c:\windows\SGDetectionTool.dll
2010-04-15 03:30 . 2010-01-22 16:55 767952 ----a-w- c:\windows\BDTSupport.dll
2010-04-15 03:30 . 2008-11-26 19:08 131 ----a-w- c:\windows\IDB.zip
2010-04-15 03:30 . 2010-01-22 16:56 165840 ----a-w- c:\windows\PCTBDRes.dll
2010-04-15 03:30 . 2010-01-22 16:56 1652688 ----a-w- c:\windows\PCTBDCore.dll
2010-04-15 03:30 . 2009-10-28 08:36 1152444 ----a-w- c:\windows\UDB.zip
2010-04-15 03:27 . 2010-02-05 16:17 233136 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2010-04-15 03:27 . 2010-03-10 18:36 217032 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2010-04-15 03:27 . 2009-11-23 20:54 88040 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2010-04-15 03:26 . 2010-02-05 16:25 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2010-04-15 03:26 . 2010-04-15 03:30 -------- d-----w- c:\program files\Common Files\PC Tools
2010-04-15 03:26 . 2010-04-15 03:26 -------- d-----w- c:\documents and settings\Dan\Application Data\PC Tools
2010-04-15 03:26 . 2010-04-15 03:26 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2010-04-14 02:54 . 2010-04-14 02:54 -------- d-----w- c:\documents and settings\Joy\Local Settings\Application Data\Threat Expert
2010-04-13 01:49 . 2010-04-13 01:49 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-04-13 01:48 . 2010-04-13 01:48 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-04-12 04:16 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Apple
2010-04-12 04:15 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Application Data\Apple Computer
2010-04-12 04:14 . 2010-04-12 04:14 -------- d-sh--w- c:\documents and settings\Josh\PrivacIE
2010-04-12 04:14 . 2010-04-12 04:14 -------- d-----w- c:\documents and settings\Josh\Application Data\Yahoo!
2010-04-12 04:14 . 2010-04-14 02:33 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Google
2010-04-12 04:13 . 2010-04-12 04:13 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Threat Expert
2010-04-12 04:06 . 2010-04-12 04:06 61440 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7ad71928-n\decora-sse.dll
2010-04-12 04:06 . 2010-04-12 04:06 503808 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\msvcp71.dll
2010-04-12 04:06 . 2010-04-12 04:06 499712 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\jmc.dll
2010-04-12 04:06 . 2010-04-12 04:06 348160 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\msvcr71.dll
2010-04-12 04:06 . 2010-04-12 04:06 12800 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7ad71928-n\decora-d3d.dll
2010-04-12 04:01 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Apple Computer
2010-04-12 03:16 . 2010-04-12 03:16 -------- d-----w- c:\program files\Trend Micro
2010-04-12 02:25 . 2010-04-17 16:16 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-04-12 02:25 . 2010-04-17 16:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-12 01:22 . 2010-04-12 01:22 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-04-12 01:21 . 2010-04-17 16:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-04-11 17:12 . 2010-04-11 17:12 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\Threat Expert
2010-04-11 17:01 . 2010-04-26 03:17 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-04-09 04:14 . 2010-04-09 04:14 503808 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\msvcp71.dll
2010-04-09 04:14 . 2010-04-09 04:14 499712 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\jmc.dll
2010-04-09 04:14 . 2010-04-09 04:14 348160 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\msvcr71.dll
2010-04-09 04:14 . 2010-04-09 04:14 61440 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-4d4062b6-n\decora-sse.dll
2010-04-09 04:14 . 2010-04-09 04:14 12800 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-4d4062b6-n\decora-d3d.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-26 03:23 . 2005-11-23 17:22 -------- d-----w- c:\program files\McAfee
2010-04-26 03:23 . 2005-11-23 17:22 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2010-04-20 02:45 . 2006-09-18 04:18 1324 ----a-w- c:\windows\system32\d3d9caps.dat
2010-04-20 02:43 . 2006-10-03 13:54 -------- d-----w- c:\documents and settings\Jason\Application Data\LimeWire
2010-04-18 19:17 . 2006-07-26 05:02 -------- d-----w- c:\program files\Spyware Doctor
2010-04-17 16:13 . 2005-11-23 17:18 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-17 16:11 . 2007-04-15 05:17 -------- d-----w- c:\program files\Lavasoft
2010-04-17 03:11 . 2009-03-22 19:12 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-16 02:11 . 2009-02-26 05:35 -------- d-----w- c:\program files\Emote
2010-04-15 14:45 . 2007-05-28 15:58 -------- d-----w- c:\program files\Beachhead 2000
2010-04-14 05:36 . 2009-02-04 04:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Google Updater
2010-04-14 05:22 . 2006-02-25 02:53 6048 ----a-w- c:\documents and settings\Joy\Application Data\wklnhst.dat
2010-04-14 05:12 . 2006-02-13 05:13 8452 ----a-w- c:\documents and settings\Dan\Application Data\wklnhst.dat
2010-04-09 04:14 . 2005-11-23 17:16 -------- d-----w- c:\program files\Common Files\Java
2010-04-09 04:13 . 2005-11-23 17:16 -------- d-----w- c:\program files\Java
2010-04-01 01:59 . 2006-03-05 04:57 7550 ----a-w- c:\documents and settings\Jason\Application Data\wklnhst.dat
2010-03-30 07:46 . 2009-03-22 19:12 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-30 07:45 . 2009-03-22 19:12 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-27 22:12 . 2006-02-14 06:02 -------- d-----w- c:\documents and settings\Dan\Application Data\Apple Computer
2010-03-27 22:12 . 2007-07-05 17:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-03-10 06:15 . 2005-01-09 23:48 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 11:28 . 2009-07-03 18:57 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-25 06:24 . 2005-01-09 23:48 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2005-01-09 23:48 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-16 14:08 . 2005-01-09 23:48 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2004-08-04 05:59 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33 . 2005-01-09 23:47 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2005-01-09 23:48 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
2007-10-28 17:19 . 2007-10-28 17:21 774144 ----a-w- c:\program files\RngInterstitial.dll
2008-12-09 17:15 . 2009-01-20 02:12 2529741 ----a-w- c:\program files\mozilla firefox\components\1280759.dll
.

((((((((((((((((((((((((((((( SnapShot@2010-04-25_03.30.17 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-04-25 18:32 . 2010-04-25 18:32 16384 c:\windows\Temp\Perflib_Perfdata_204.dat
+ 2005-01-10 01:17 . 2010-04-25 18:32 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2005-01-10 01:17 . 2010-04-25 02:09 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2005-01-10 01:17 . 2010-04-25 18:32 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
- 2005-01-10 01:17 . 2010-04-25 02:09 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2005-01-10 01:17 . 2010-04-25 18:32 212992 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2005-01-10 01:17 . 2010-04-25 02:09 212992 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2009-06-28 18:56 . 2010-04-25 18:32 245760 c:\windows\system32\config\systemprofile\IETldCache\index.dat
- 2009-06-28 18:56 . 2010-04-25 02:09 245760 c:\windows\system32\config\systemprofile\IETldCache\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\BackupIconOverlayId]
@="{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}"
[HKEY_CLASSES_ROOT\CLSID\{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}]
2009-11-06 22:14 238968 ----a-w- c:\program files\Webroot\WebrootSecurity\Backup\CtxMenu_1_0_0_10.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-09-18 7204864]
"nwiz"="nwiz.exe" [2005-09-18 1519616]
"readericon"="c:\program files\Digital Media Reader\readericon45G.exe" [2005-08-27 139264]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-03 32768]
"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2005-08-13 1121792]
"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" [2007-11-29 583048]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-02-03 233304]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2006-11-04 866584]
"SpySweeper"="c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe" [2009-11-06 6515784]

c:\documents and settings\Jason\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - c:\program files\LimeWire\LimeWire.exe [2009-9-30 503808]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WebrootSpySweeperService]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WRConsumerService]
@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^APC UPS Status.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\APC UPS Status.lnk
backup=c:\windows\pss\APC UPS Status.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hpoddt01.exe.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\hpoddt01.exe.lnk
backup=c:\windows\pss\hpoddt01.exe.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
2007-03-09 19:09 63712 ----a-w- c:\program files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-01-12 06:16 39792 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ehTray]
2005-08-06 04:56 64512 ----a-w- c:\windows\ehome\ehtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NBJ]
2005-06-03 00:03 1957888 ------w- c:\program files\Ahead\Nero BackItUp\NBJ.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 19:50 155648 ----a-w- c:\windows\system32\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2005-09-18 16:32 86016 ----a-w- c:\windows\system32\nvmctray.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-09-05 09:54 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Recguard]
2002-09-14 07:42 212992 ----a-w- c:\windows\SMINST\Recguard.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMan]
2005-09-26 23:07 90112 ----a-w- c:\windows\soundman.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"AOL TopSpeedMonitor"=2 (0x2)
"AOL ACS"=2 (0x2)
"Viewpoint Manager Service"=2 (0x2)
"PrismXL"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\GameSpy Arcade\\Aphex.exe"=
"c:\\Program Files\\Atari\\Deer Hunter 2005\\DH2005.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Java\\jre6\\bin\\java.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"67:UDP"= 67:UDP:DHCP Discovery Service
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [4/14/2010 8:27 PM 217032]
R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [11/6/2009 12:00 PM 29808]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2/17/2010 11:15 AM 66632]
R2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\Spyware Doctor\BDT\BDTUpdateService.exe [4/14/2010 8:30 PM 112592]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R2 WRConsumerService;Webroot Client Service;c:\program files\Webroot\WebrootSecurity\WRConsumerService.exe [4/14/2010 9:02 PM 1201640]
S2 gupdate1c9868525c78598;Google Update Service (gupdate1c9868525c78598);c:\program files\Google\Update\GoogleUpdate.exe [2/3/2009 9:57 PM 133104]
S3 FileObjInfo;STFileDriver;\??\c:\documents and settings\All Users\Application Data\Spyware Terminator\FileObjInfo.sys --> c:\documents and settings\All Users\Application Data\Spyware Terminator\FileObjInfo.sys [?]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2/17/2010 11:15 AM 12872]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [4/14/2010 8:26 PM 366840]
.
Contents of the 'Scheduled Tasks' folder

2010-03-22 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 20:34]

2006-05-18 c:\windows\Tasks\FRU Task 2003-04-10 00:56ewlett-Packard2003-04-10 00:56p psc 1200 series272A572217594EBCF1CEE215E352B92AD073FDE4139808214.job
- c:\program files\Hewlett-Packard\Digital Imaging\Bin\hpqfrucl.exe [2003-04-10 01:56]

2010-04-25 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-01-27 05:35]

2010-04-26 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-04 04:57]

2010-04-26 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-04 04:57]

2010-04-25 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-04 02:20]

2010-04-26 c:\windows\Tasks\User_Feed_Synchronization-{3881367F-E3AD-460B-B000-3731E19CF38B}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 11:31]

2010-04-26 c:\windows\Tasks\User_Feed_Synchronization-{F353CBD3-5214-4543-8F1C-53C2FBBCAEC9}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 11:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Settings,ProxyOverride = *.local
IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {66E79B75-F711-4A88-9C6D-10BCA64F3306} - hxxp://www.drivecam.com/videos/DriveCamEvent.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-25 20:35
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(732)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
.
Completion time: 2010-04-25 20:38:38
ComboFix-quarantined-files.txt 2010-04-26 03:38
ComboFix2.txt 2010-04-25 03:34

Pre-Run: 135,639,412,736 bytes free
Post-Run: 135,600,050,176 bytes free

- - End Of File - - 6E6241F45B2DBDFF1E9FE320F98AFA4E
Upload was successful



=================================



GMER 1.0.15.15281 - http://www.gmer.net
Rootkit quick scan 2010-04-25 20:43:22
Windows 5.1.2600 Service Pack 3
Running: 3r05gcjm.exe; Driver: C:\DOCUME~1\Dan\LOCALS~1\Temp\kweyqaoc.sys


---- System - GMER 1.0.15 ----

Code \??\C:\DOCUME~1\Dan\LOCALS~1\Temp\catchme.sys pIofCallDriver

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))
AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys
AttachedDevice \FileSystem\Fastfat \Fat ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat mfehidk.sys

Device \Driver\Tcpip \Device\Ip 8A56B990
Device \Driver\Tcpip \Device\Ip 8A98F9C0
Device \Driver\Tcpip \Device\Ip 8AD05EA8
Device \Driver\Tcpip \Device\Ip 8AC258F8
Device \Driver\Tcpip \Device\Ip 8A2744F8
Device \Driver\Tcpip \Device\Ip 8A4A1648
Device \Driver\Tcpip \Device\Ip 8A3404F8
Device \Driver\Tcpip \Device\Ip 8A751738
Device \Driver\Tcpip \Device\Ip 89FA14B8
Device \Driver\Tcpip \Device\Ip 8A1D8698
Device \Driver\Tcpip \Device\Ip 8AA134C0

AttachedDevice \Driver\Tcpip \Device\Ip mfetdik.sys

Device \Driver\Tcpip \Device\Tcp 8A56B990
Device \Driver\Tcpip \Device\Tcp 8A98F9C0
Device \Driver\Tcpip \Device\Tcp 8AD05EA8
Device \Driver\Tcpip \Device\Tcp 8AC258F8
Device \Driver\Tcpip \Device\Tcp 8A2744F8
Device \Driver\Tcpip \Device\Tcp 8A4A1648
Device \Driver\Tcpip \Device\Tcp 8A3404F8
Device \Driver\Tcpip \Device\Tcp 8A751738
Device \Driver\Tcpip \Device\Tcp 89FA14B8
Device \Driver\Tcpip \Device\Tcp 8A1D8698
Device \Driver\Tcpip \Device\Tcp 8AA134C0

AttachedDevice \Driver\Tcpip \Device\Tcp mfetdik.sys

Device \Driver\Tcpip \Device\Udp 8A56B990
Device \Driver\Tcpip \Device\Udp 8A98F9C0
Device \Driver\Tcpip \Device\Udp 8AD05EA8
Device \Driver\Tcpip \Device\Udp 8AC258F8
Device \Driver\Tcpip \Device\Udp 8A2744F8
Device \Driver\Tcpip \Device\Udp 8A4A1648
Device \Driver\Tcpip \Device\Udp 8A3404F8
Device \Driver\Tcpip \Device\Udp 8A751738
Device \Driver\Tcpip \Device\Udp 89FA14B8
Device \Driver\Tcpip \Device\Udp 8A1D8698
Device \Driver\Tcpip \Device\Udp 8AA134C0

AttachedDevice \Driver\Tcpip \Device\Udp mfetdik.sys

Device \Driver\Tcpip \Device\RawIp 8A56B990
Device \Driver\Tcpip \Device\RawIp 8A98F9C0
Device \Driver\Tcpip \Device\RawIp 8AD05EA8
Device \Driver\Tcpip \Device\RawIp 8AC258F8
Device \Driver\Tcpip \Device\RawIp 8A2744F8
Device \Driver\Tcpip \Device\RawIp 8A4A1648
Device \Driver\Tcpip \Device\RawIp 8A3404F8
Device \Driver\Tcpip \Device\RawIp 8A751738
Device \Driver\Tcpip \Device\RawIp 89FA14B8
Device \Driver\Tcpip \Device\RawIp 8A1D8698
Device \Driver\Tcpip \Device\RawIp 8AA134C0

AttachedDevice \Driver\Tcpip \Device\RawIp mfetdik.sys

---- EOF - GMER 1.0.15 ----


#10 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 25 April 2010 - 10:50 PM

I uninstalled Mcaffee
here are logs



ComboFix 10-04-21.01 - Dan 04/25/2010 20:26:48.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2942.2326 [GMT -7:00]
Running from: c:\documents and settings\Dan\Desktop\bonaroCF.exe
Command switches used :: c:\documents and settings\Dan\Desktop\CFScript.txt
AV: Webroot AntiVirus with Spy Sweeper *On-access scanning disabled* (Updated) {77E10C7F-2CCA-4187-9394-BDBC267AD597}

file zipped: c:\documents and settings\All Users\Application Data\82H7x6
file zipped: c:\documents and settings\All Users\Application Data\kH832332nVa32
file zipped: c:\documents and settings\Dan\Local Settings\Application Data\82H7x6
file zipped: c:\documents and settings\Dan\Local Settings\Application Data\kH832332nVa32
file zipped: c:\windows\tasks\pneayjjg
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\82H7x6
c:\documents and settings\All Users\Application Data\kH832332nVa32
c:\documents and settings\Dan\Local Settings\Application Data\82H7x6
c:\documents and settings\Dan\Local Settings\Application Data\kH832332nVa32
c:\windows\tasks\pneayjjg

.
((((((((((((((((((((((((( Files Created from 2010-03-26 to 2010-04-26 )))))))))))))))))))))))))))))))
.

2010-04-22 04:00 . 2010-04-22 04:00 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\WMTools Downloaded Files
2010-04-20 02:26 . 2010-04-20 02:26 -------- d-----w- c:\documents and settings\Jason\Application Data\Webroot
2010-04-18 05:12 . 2010-04-18 05:12 77312 ----a-w- C:\mbr.exe
2010-04-17 20:05 . 2010-04-17 20:05 52224 ----a-w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-04-17 20:05 . 2010-04-17 20:05 117760 ----a-w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-04-17 20:04 . 2010-04-17 20:04 -------- d-----w- c:\documents and settings\Dan\Application Data\SUPERAntiSpyware.com
2010-04-17 20:03 . 2010-04-17 20:03 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-04-17 16:21 . 2010-02-24 17:16 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-04-16 03:03 . 2010-04-16 03:03 -------- d-----w- c:\program files\Windows Defender
2010-04-16 02:48 . 2010-04-16 02:48 -------- d-----w- C:\Rooter$
2010-04-15 14:00 . 2010-04-25 02:04 12032 -c--a-w- c:\windows\system32\dllcache\amsint.sys
2010-04-15 04:01 . 2010-04-15 04:01 -------- d-----w- c:\program files\MSSOAP
2010-04-15 04:00 . 2009-11-06 22:19 1563008 ----a-w- c:\windows\WRSetup.dll
2010-04-15 04:00 . 2010-04-15 04:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Webroot
2010-04-15 04:00 . 2010-04-15 04:00 -------- d-----w- c:\program files\Webroot
2010-04-15 03:58 . 2010-04-15 03:58 164 ----a-w- c:\windows\install.dat
2010-04-15 03:30 . 2010-01-22 16:56 149456 ----a-w- c:\windows\SGDetectionTool.dll
2010-04-15 03:30 . 2010-01-22 16:55 767952 ----a-w- c:\windows\BDTSupport.dll
2010-04-15 03:30 . 2008-11-26 19:08 131 ----a-w- c:\windows\IDB.zip
2010-04-15 03:30 . 2010-01-22 16:56 165840 ----a-w- c:\windows\PCTBDRes.dll
2010-04-15 03:30 . 2010-01-22 16:56 1652688 ----a-w- c:\windows\PCTBDCore.dll
2010-04-15 03:30 . 2009-10-28 08:36 1152444 ----a-w- c:\windows\UDB.zip
2010-04-15 03:27 . 2010-02-05 16:17 233136 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2010-04-15 03:27 . 2010-03-10 18:36 217032 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2010-04-15 03:27 . 2009-11-23 20:54 88040 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2010-04-15 03:26 . 2010-02-05 16:25 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2010-04-15 03:26 . 2010-04-15 03:30 -------- d-----w- c:\program files\Common Files\PC Tools
2010-04-15 03:26 . 2010-04-15 03:26 -------- d-----w- c:\documents and settings\Dan\Application Data\PC Tools
2010-04-15 03:26 . 2010-04-15 03:26 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2010-04-14 02:54 . 2010-04-14 02:54 -------- d-----w- c:\documents and settings\Joy\Local Settings\Application Data\Threat Expert
2010-04-13 01:49 . 2010-04-13 01:49 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-04-13 01:48 . 2010-04-13 01:48 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-04-12 04:16 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Apple
2010-04-12 04:15 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Application Data\Apple Computer
2010-04-12 04:14 . 2010-04-12 04:14 -------- d-sh--w- c:\documents and settings\Josh\PrivacIE
2010-04-12 04:14 . 2010-04-12 04:14 -------- d-----w- c:\documents and settings\Josh\Application Data\Yahoo!
2010-04-12 04:14 . 2010-04-14 02:33 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Google
2010-04-12 04:13 . 2010-04-12 04:13 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Threat Expert
2010-04-12 04:06 . 2010-04-12 04:06 61440 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7ad71928-n\decora-sse.dll
2010-04-12 04:06 . 2010-04-12 04:06 503808 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\msvcp71.dll
2010-04-12 04:06 . 2010-04-12 04:06 499712 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\jmc.dll
2010-04-12 04:06 . 2010-04-12 04:06 348160 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-7b2a95b3-n\msvcr71.dll
2010-04-12 04:06 . 2010-04-12 04:06 12800 ----a-w- c:\documents and settings\Josh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7ad71928-n\decora-d3d.dll
2010-04-12 04:01 . 2010-04-12 04:16 -------- d-----w- c:\documents and settings\Josh\Local Settings\Application Data\Apple Computer
2010-04-12 03:16 . 2010-04-12 03:16 -------- d-----w- c:\program files\Trend Micro
2010-04-12 02:25 . 2010-04-17 16:16 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-04-12 02:25 . 2010-04-17 16:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-12 01:22 . 2010-04-12 01:22 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-04-12 01:21 . 2010-04-17 16:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-04-11 17:12 . 2010-04-11 17:12 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\Threat Expert
2010-04-11 17:01 . 2010-04-26 03:17 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-04-09 04:14 . 2010-04-09 04:14 503808 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\msvcp71.dll
2010-04-09 04:14 . 2010-04-09 04:14 499712 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\jmc.dll
2010-04-09 04:14 . 2010-04-09 04:14 348160 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5f3fc2f4-n\msvcr71.dll
2010-04-09 04:14 . 2010-04-09 04:14 61440 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-4d4062b6-n\decora-sse.dll
2010-04-09 04:14 . 2010-04-09 04:14 12800 ----a-w- c:\documents and settings\Dan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-4d4062b6-n\decora-d3d.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-26 03:23 . 2005-11-23 17:22 -------- d-----w- c:\program files\McAfee
2010-04-26 03:23 . 2005-11-23 17:22 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2010-04-20 02:45 . 2006-09-18 04:18 1324 ----a-w- c:\windows\system32\d3d9caps.dat
2010-04-20 02:43 . 2006-10-03 13:54 -------- d-----w- c:\documents and settings\Jason\Application Data\LimeWire
2010-04-18 19:17 . 2006-07-26 05:02 -------- d-----w- c:\program files\Spyware Doctor
2010-04-17 16:13 . 2005-11-23 17:18 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-17 16:11 . 2007-04-15 05:17 -------- d-----w- c:\program files\Lavasoft
2010-04-17 03:11 . 2009-03-22 19:12 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-16 02:11 . 2009-02-26 05:35 -------- d-----w- c:\program files\Emote
2010-04-15 14:45 . 2007-05-28 15:58 -------- d-----w- c:\program files\Beachhead 2000
2010-04-14 05:36 . 2009-02-04 04:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Google Updater
2010-04-14 05:22 . 2006-02-25 02:53 6048 ----a-w- c:\documents and settings\Joy\Application Data\wklnhst.dat
2010-04-14 05:12 . 2006-02-13 05:13 8452 ----a-w- c:\documents and settings\Dan\Application Data\wklnhst.dat
2010-04-09 04:14 . 2005-11-23 17:16 -------- d-----w- c:\program files\Common Files\Java
2010-04-09 04:13 . 2005-11-23 17:16 -------- d-----w- c:\program files\Java
2010-04-01 01:59 . 2006-03-05 04:57 7550 ----a-w- c:\documents and settings\Jason\Application Data\wklnhst.dat
2010-03-30 07:46 . 2009-03-22 19:12 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-30 07:45 . 2009-03-22 19:12 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-27 22:12 . 2006-02-14 06:02 -------- d-----w- c:\documents and settings\Dan\Application Data\Apple Computer
2010-03-27 22:12 . 2007-07-05 17:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-03-10 06:15 . 2005-01-09 23:48 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 11:28 . 2009-07-03 18:57 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-25 06:24 . 2005-01-09 23:48 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2005-01-09 23:48 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-16 14:08 . 2005-01-09 23:48 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2004-08-04 05:59 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33 . 2005-01-09 23:47 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2005-01-09 23:48 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
2007-10-28 17:19 . 2007-10-28 17:21 774144 ----a-w- c:\program files\RngInterstitial.dll
2008-12-09 17:15 . 2009-01-20 02:12 2529741 ----a-w- c:\program files\mozilla firefox\components\1280759.dll
.

((((((((((((((((((((((((((((( SnapShot@2010-04-25_03.30.17 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-04-25 18:32 . 2010-04-25 18:32 16384 c:\windows\Temp\Perflib_Perfdata_204.dat
+ 2005-01-10 01:17 . 2010-04-25 18:32 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2005-01-10 01:17 . 2010-04-25 02:09 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2005-01-10 01:17 . 2010-04-25 18:32 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
- 2005-01-10 01:17 . 2010-04-25 02:09 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2005-01-10 01:17 . 2010-04-25 18:32 212992 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2005-01-10 01:17 . 2010-04-25 02:09 212992 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2009-06-28 18:56 . 2010-04-25 18:32 245760 c:\windows\system32\config\systemprofile\IETldCache\index.dat
- 2009-06-28 18:56 . 2010-04-25 02:09 245760 c:\windows\system32\config\systemprofile\IETldCache\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\BackupIconOverlayId]
@="{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}"
[HKEY_CLASSES_ROOT\CLSID\{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}]
2009-11-06 22:14 238968 ----a-w- c:\program files\Webroot\WebrootSecurity\Backup\CtxMenu_1_0_0_10.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-09-18 7204864]
"nwiz"="nwiz.exe" [2005-09-18 1519616]
"readericon"="c:\program files\Digital Media Reader\readericon45G.exe" [2005-08-27 139264]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-03 32768]
"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2005-08-13 1121792]
"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" [2007-11-29 583048]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-02-03 233304]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2006-11-04 866584]
"SpySweeper"="c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe" [2009-11-06 6515784]

c:\documents and settings\Jason\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - c:\program files\LimeWire\LimeWire.exe [2009-9-30 503808]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WebrootSpySweeperService]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WRConsumerService]
@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^APC UPS Status.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\APC UPS Status.lnk
backup=c:\windows\pss\APC UPS Status.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hpoddt01.exe.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\hpoddt01.exe.lnk
backup=c:\windows\pss\hpoddt01.exe.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
2007-03-09 19:09 63712 ----a-w- c:\program files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-01-12 06:16 39792 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ehTray]
2005-08-06 04:56 64512 ----a-w- c:\windows\ehome\ehtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NBJ]
2005-06-03 00:03 1957888 ------w- c:\program files\Ahead\Nero BackItUp\NBJ.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 19:50 155648 ----a-w- c:\windows\system32\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2005-09-18 16:32 86016 ----a-w- c:\windows\system32\nvmctray.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-09-05 09:54 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Recguard]
2002-09-14 07:42 212992 ----a-w- c:\windows\SMINST\Recguard.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMan]
2005-09-26 23:07 90112 ----a-w- c:\windows\soundman.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"AOL TopSpeedMonitor"=2 (0x2)
"AOL ACS"=2 (0x2)
"Viewpoint Manager Service"=2 (0x2)
"PrismXL"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\GameSpy Arcade\\Aphex.exe"=
"c:\\Program Files\\Atari\\Deer Hunter 2005\\DH2005.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Java\\jre6\\bin\\java.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"67:UDP"= 67:UDP:DHCP Discovery Service
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [4/14/2010 8:27 PM 217032]
R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [11/6/2009 12:00 PM 29808]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2/17/2010 11:15 AM 66632]
R2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\Spyware Doctor\BDT\BDTUpdateService.exe [4/14/2010 8:30 PM 112592]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R2 WRConsumerService;Webroot Client Service;c:\program files\Webroot\WebrootSecurity\WRConsumerService.exe [4/14/2010 9:02 PM 1201640]
S2 gupdate1c9868525c78598;Google Update Service (gupdate1c9868525c78598);c:\program files\Google\Update\GoogleUpdate.exe [2/3/2009 9:57 PM 133104]
S3 FileObjInfo;STFileDriver;\??\c:\documents and settings\All Users\Application Data\Spyware Terminator\FileObjInfo.sys --> c:\documents and settings\All Users\Application Data\Spyware Terminator\FileObjInfo.sys [?]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2/17/2010 11:15 AM 12872]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [4/14/2010 8:26 PM 366840]
.
Contents of the 'Scheduled Tasks' folder

2010-03-22 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 20:34]

2006-05-18 c:\windows\Tasks\FRU Task 2003-04-10 00:56ewlett-Packard2003-04-10 00:56p psc 1200 series272A572217594EBCF1CEE215E352B92AD073FDE4139808214.job
- c:\program files\Hewlett-Packard\Digital Imaging\Bin\hpqfrucl.exe [2003-04-10 01:56]

2010-04-25 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-01-27 05:35]

2010-04-26 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-04 04:57]

2010-04-26 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-04 04:57]

2010-04-25 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-04 02:20]

2010-04-26 c:\windows\Tasks\User_Feed_Synchronization-{3881367F-E3AD-460B-B000-3731E19CF38B}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 11:31]

2010-04-26 c:\windows\Tasks\User_Feed_Synchronization-{F353CBD3-5214-4543-8F1C-53C2FBBCAEC9}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 11:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Settings,ProxyOverride = *.local
IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {66E79B75-F711-4A88-9C6D-10BCA64F3306} - hxxp://www.drivecam.com/videos/DriveCamEvent.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-25 20:35
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(732)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
.
Completion time: 2010-04-25 20:38:38
ComboFix-quarantined-files.txt 2010-04-26 03:38
ComboFix2.txt 2010-04-25 03:34

Pre-Run: 135,639,412,736 bytes free
Post-Run: 135,600,050,176 bytes free

- - End Of File - - 6E6241F45B2DBDFF1E9FE320F98AFA4E
Upload was successful







GMER 1.0.15.15281 - http://www.gmer.net
Rootkit quick scan 2010-04-25 20:43:22
Windows 5.1.2600 Service Pack 3
Running: 3r05gcjm.exe; Driver: C:\DOCUME~1\Dan\LOCALS~1\Temp\kweyqaoc.sys


---- System - GMER 1.0.15 ----

Code \??\C:\DOCUME~1\Dan\LOCALS~1\Temp\catchme.sys pIofCallDriver

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))
AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys
AttachedDevice \FileSystem\Fastfat \Fat ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat mfehidk.sys

Device \Driver\Tcpip \Device\Ip 8A56B990
Device \Driver\Tcpip \Device\Ip 8A98F9C0
Device \Driver\Tcpip \Device\Ip 8AD05EA8
Device \Driver\Tcpip \Device\Ip 8AC258F8
Device \Driver\Tcpip \Device\Ip 8A2744F8
Device \Driver\Tcpip \Device\Ip 8A4A1648
Device \Driver\Tcpip \Device\Ip 8A3404F8
Device \Driver\Tcpip \Device\Ip 8A751738
Device \Driver\Tcpip \Device\Ip 89FA14B8
Device \Driver\Tcpip \Device\Ip 8A1D8698
Device \Driver\Tcpip \Device\Ip 8AA134C0

AttachedDevice \Driver\Tcpip \Device\Ip mfetdik.sys

Device \Driver\Tcpip \Device\Tcp 8A56B990
Device \Driver\Tcpip \Device\Tcp 8A98F9C0
Device \Driver\Tcpip \Device\Tcp 8AD05EA8
Device \Driver\Tcpip \Device\Tcp 8AC258F8
Device \Driver\Tcpip \Device\Tcp 8A2744F8
Device \Driver\Tcpip \Device\Tcp 8A4A1648
Device \Driver\Tcpip \Device\Tcp 8A3404F8
Device \Driver\Tcpip \Device\Tcp 8A751738
Device \Driver\Tcpip \Device\Tcp 89FA14B8
Device \Driver\Tcpip \Device\Tcp 8A1D8698
Device \Driver\Tcpip \Device\Tcp 8AA134C0

AttachedDevice \Driver\Tcpip \Device\Tcp mfetdik.sys

Device \Driver\Tcpip \Device\Udp 8A56B990
Device \Driver\Tcpip \Device\Udp 8A98F9C0
Device \Driver\Tcpip \Device\Udp 8AD05EA8
Device \Driver\Tcpip \Device\Udp 8AC258F8
Device \Driver\Tcpip \Device\Udp 8A2744F8
Device \Driver\Tcpip \Device\Udp 8A4A1648
Device \Driver\Tcpip \Device\Udp 8A3404F8
Device \Driver\Tcpip \Device\Udp 8A751738
Device \Driver\Tcpip \Device\Udp 89FA14B8
Device \Driver\Tcpip \Device\Udp 8A1D8698
Device \Driver\Tcpip \Device\Udp 8AA134C0

AttachedDevice \Driver\Tcpip \Device\Udp mfetdik.sys

Device \Driver\Tcpip \Device\RawIp 8A56B990
Device \Driver\Tcpip \Device\RawIp 8A98F9C0
Device \Driver\Tcpip \Device\RawIp 8AD05EA8
Device \Driver\Tcpip \Device\RawIp 8AC258F8
Device \Driver\Tcpip \Device\RawIp 8A2744F8
Device \Driver\Tcpip \Device\RawIp 8A4A1648
Device \Driver\Tcpip \Device\RawIp 8A3404F8
Device \Driver\Tcpip \Device\RawIp 8A751738
Device \Driver\Tcpip \Device\RawIp 89FA14B8
Device \Driver\Tcpip \Device\RawIp 8A1D8698
Device \Driver\Tcpip \Device\RawIp 8AA134C0

AttachedDevice \Driver\Tcpip \Device\RawIp mfetdik.sys

---- EOF - GMER 1.0.15 ----


#11 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:49 PM

Posted 26 April 2010 - 06:26 AM

Hello, bonaro.

OK, looking better. Let's take care of a few more things and run another antivirus scan for a second opinion. How is it running?



Step 1

Next, we need to update Java.
Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 20 and save it to your desktop.
  • Scroll down to where it says "JDK 6 Update 20 (JDK or JRE)...allows end-users to run Java applications".
  • Click the "Download JRE" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) or Java™ in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u20-windows-i586-p.exe to install the newest version.



Step 2

Please pull anything out of hte recycle bin that you want to save. Part of this fix will empty temp files, and that does include the recycle bin.

We need run an OTL Script
  1. Please download OTL from one of the following mirrors if you do not still have it.
  2. Save it to your desktop.
  3. Double click on the icon on your desktop.
  4. Paste the following code under the Custom Scans/Fixes box at the bottom. Do not include the word "Code".
    CODE
    :OTL
    O2 - BHO: (ALOT Toolbar) - {5AA2BA46-9913-4dc7-9620-69AB0FA17AE7} - C:\Program Files\alot\bin\alot.dll File not found
    O2 - BHO: (no name) - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - No CLSID value found.
    O3 - HKLM\..\Toolbar: (ALOT Toolbar) - {5AA2BA46-9913-4dc7-9620-69AB0FA17AE7} - C:\Program Files\alot\bin\alot.dll File not found
    O3 - HKLM\..\Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - SITEguard - No CLSID value found.
    O3 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\..\Toolbar\ShellBrowser: (no name) - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No CLSID value found.
    O3 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\..\Toolbar\WebBrowser: (no name) - {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No CLSID value found.
    O9 - Extra Button: MUSICMATCH MX Web Player - {d81ca86b-ef63-42af-bee3-4502d9a03c2d} -  File not found
    SRV - File not found [Disabled | Stopped] --  -- (AOL TopSpeedMonitor)
    SRV - File not found [Disabled | Stopped] --  -- (AOL ACS)
    @Alternate Data Stream - 197 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2
    @Alternate Data Stream - 109 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:A8ADE5D8
    :Commands
    [EmptyTemp]
  5. Click the Run Fix button at the top.
  6. let the program run unhindered and reboot when it is done.
  7. You will get a log when it is done, please post that in your reply.
  8. Please then create a new OTL report....
  9. Click the "Scan All Users" checkbox.
  10. Push the button.
  11. A report will open, copy and paste it in a reply here.

etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#12 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 27 April 2010 - 12:04 AM

Ok, I ran a Webroot scan last nite and it found several ulglies, It seemed to quarentine them but had trouble with others. I the removed Java and updated as instructed then ran OTL as instructed.
MSIE will now work fairly well but is still slow. I can open it reliably from a link on the desktop but when I try to open it using the "internet explorer" link I get the warning that it needs to close. It does not seem to redirect so we are making progress.
I will run another AV scan tonight as well as MBAM, let me know if you want to see those logs.

The logs I have posted are webroot (before Java and OTL) then the two OTL logs you requested

===================

Webroot:
4/26/2010 8:33:58 PM: Removal process completed. Elapsed time 00:01:06
4/26/2010 8:33:55 PM: Quarantining All Traces: tribalfusion cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: tacoda cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: dealtime cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: serving-sys cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: ru4 cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: questionmarket cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: overture cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: realmedia cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: monstermarketplace cookie
4/26/2010 8:33:55 PM: Quarantining All Traces: redsheriff cookies
4/26/2010 8:33:54 PM: Quarantining All Traces: humanclick cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: specificclick.com cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: bs.serving-sys cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: atwola cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: pointroll cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: yieldmanager cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: 7search cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: 247realmedia cookie
4/26/2010 8:33:54 PM: Quarantining All Traces: Troj/JavaDL-M
4/26/2010 8:33:52 PM: Quarantining All Traces: Troj/JavaDL-L
4/26/2010 8:33:35 PM: Quarantining All Traces: Mal/WebStart-A
4/26/2010 8:33:35 PM: Quarantining All Traces: Troj/Agent-NBP
4/26/2010 8:32:52 PM: Quarantining All Traces: Troj/Clsldr-AE
4/26/2010 8:32:52 PM: Removal process initiated
4/26/2010 3:02:17 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1448\A0133935.exe]
4/26/2010 3:02:16 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1448\A0133933.pif]
4/26/2010 3:02:16 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1448\A0133933.pif]
4/26/2010 3:02:16 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1448\A0133928.exe]
4/26/2010 3:02:09 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1448\A0133817.exe]
4/26/2010 12:13:44 AM: Traces Found: 42
4/26/2010 12:13:44 AM: Full Sweep has completed. Elapsed time 01:41:54
4/26/2010 12:13:43 AM: File Sweep Complete, Elapsed Time: 01:37:57
4/26/2010 12:12:55 AM: Warning: Failed to add dependency MD5. This function must have a fully qualified path name:scres.dll
4/26/2010 12:12:55 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\VS\SHARED\AGENTCFG.CAB]
4/26/2010 12:12:55 AM: Warning: Failed to add dependency MD5. This function must have a fully qualified path name:scres.dll
4/26/2010 12:12:55 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\MSK\SHARED\AGENTCFG.CAB]
4/26/2010 12:12:54 AM: Warning: Failed to add dependency MD5. This function must have a fully qualified path name:scres.dll
4/26/2010 12:12:54 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\MPF\SHARED\AGENTCFG.CAB]
4/26/2010 12:08:19 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\VS\VSOINS.UI]
4/26/2010 12:08:12 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\VS\AGENTINS.UI]
4/26/2010 12:08:10 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\MSK\MSKINS.UI]
4/26/2010 12:08:09 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\MSK\AGENTINS.UI]
4/26/2010 12:08:07 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\MPF\MPFINS.UI]
4/26/2010 12:08:06 AM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [D:\I386\Apps\App30921\MPF\AGENTINS.UI]
4/25/2010 11:54:28 PM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\Program Files\Valve\Steam\SteamApps\miller003\counter-strike source\cstrike\cache\r_tele1.wav.bz20000]
4/25/2010 11:43:48 PM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\Program Files\Valve\Steam\SteamApps\miller003\day of defeat source\dod\cache\dod_highlander.bsp.bz20000]
4/25/2010 11:42:47 PM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\Program Files\Valve\Steam\SteamApps\miller069\counter-strike source\cstrike\cache\de_glacier.bsp.bz20000]
4/25/2010 11:40:18 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Documents and Settings\Dan\Desktop\rkill.pif]
4/25/2010 11:32:02 PM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [C:\Documents and Settings\Joy\My Documents\Book1.xls]
4/25/2010 11:25:18 PM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\Temp\rw2_021_w02_enu\rw2_021_w02_enu.exe]
4/25/2010 11:21:05 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Backup\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1\A0000062.exe]
4/25/2010 11:11:31 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Backup\Program Files\AWS\WeatherBug\MiniBugTransporter.dll]
4/25/2010 11:04:11 PM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [C:\Backup\WINDOWS\MCBIN\AV\RT\MGAVRTCL.UI]
4/25/2010 11:01:59 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Backup\HP\bin\KillIt.exe]
4/25/2010 10:47:51 PM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\Documents and Settings\Joy\Local Settings\Application Data\Apple\Apple Software Update\Safari.msi]
4/25/2010 10:46:46 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\15\42590bcf-7cbdcdc1 (ID = 0)
4/25/2010 10:46:46 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\15\42590bcf-7cbdcdc1 (ID = 0)
4/25/2010 10:46:46 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\15\42590bcf-7cbdcdc1 (ID = 0)
4/25/2010 10:45:42 PM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\Program Files\Disney\Disney Online\PiratesOnline\_phase_5.mf.v1.36.bz2]
4/25/2010 10:43:13 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Documents and Settings\Dan\Desktop\bonaroCF.exe]
4/25/2010 10:43:01 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\WINDOWS\NIRCMD.exe]
4/25/2010 10:42:52 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\41\49e2ba29-5fa835d7 (ID = 0)
4/25/2010 10:42:52 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\41\49e2ba29-5fa835d7 (ID = 0)
4/25/2010 10:42:52 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\41\49e2ba29-5fa835d7 (ID = 0)
4/25/2010 10:41:52 PM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [C:\Documents and Settings\Dan\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 04-17-2010 - 15-15-38.SBU]
4/25/2010 10:41:40 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\28\2e5825dc-513eb948 (ID = 0)
4/25/2010 10:41:40 PM: Found Troj/JavaDL-M: Troj/JavaDL-M
4/25/2010 10:41:40 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\28\2e5825dc-513eb948 (ID = 0)
4/25/2010 10:41:40 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\28\2e5825dc-513eb948 (ID = 0)
4/25/2010 10:41:40 PM: Found Troj/JavaDL-L: Troj/JavaDL-L
4/25/2010 10:41:37 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\22\647a8416-53285115 (ID = 0)
4/25/2010 10:41:37 PM: Found Mal/WebStart-A: Mal/WebStart-A
4/25/2010 10:41:37 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\22\647a8416-53285115 (ID = 0)
4/25/2010 10:41:37 PM: Found Troj/Agent-NBP: Troj/Agent-NBP
4/25/2010 10:39:45 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\16\3114110-62134184 (ID = 0)
4/25/2010 10:39:45 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\16\3114110-62134184 (ID = 0)
4/25/2010 10:39:39 PM: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\16\3114110-62134184 (ID = 0)
4/25/2010 10:39:38 PM: Found Troj/Clsldr-AE: Troj/Clsldr-AE
4/25/2010 10:35:45 PM: Starting File Sweep
4/25/2010 10:35:44 PM: Cookie Sweep Complete, Elapsed Time: 00:00:01
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@www.monstermarketplace[2].txt (ID = 3007)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@tribalfusion[1].txt (ID = 3589)
4/25/2010 10:35:44 PM: Found Spy Cookie: tribalfusion cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@tacoda[1].txt (ID = 6444)
4/25/2010 10:35:44 PM: Found Spy Cookie: tacoda cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@stat.dealtime[1].txt (ID = 2506)
4/25/2010 10:35:44 PM: Found Spy Cookie: dealtime cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@specificclick[1].txt (ID = 3399)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@serving-sys[2].txt (ID = 3343)
4/25/2010 10:35:44 PM: Found Spy Cookie: serving-sys cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@ru4[1].txt (ID = 3270)
4/25/2010 10:35:44 PM: Found Spy Cookie: ru4 cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@realmedia[1].txt (ID = 3235)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@questionmarket[2].txt (ID = 3217)
4/25/2010 10:35:44 PM: Found Spy Cookie: questionmarket cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@pointroll[1].txt (ID = 3147)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@overture[1].txt (ID = 3105)
4/25/2010 10:35:44 PM: Found Spy Cookie: overture cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@oasn04.247realmedia[1].txt (ID = 1954)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@network.realmedia[1].txt (ID = 3236)
4/25/2010 10:35:44 PM: Found Spy Cookie: realmedia cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@monstermarketplace[3].txt (ID = 3006)
4/25/2010 10:35:44 PM: Found Spy Cookie: monstermarketplace cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@imrworldwide[2].txt (ID = 2845)
4/25/2010 10:35:44 PM: Found Spy Cookie: redsheriff cookies
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@hc2.humanclick[3].txt (ID = 2810)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@hc2.humanclick[2].txt (ID = 2810)
4/25/2010 10:35:44 PM: Found Spy Cookie: humanclick cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@content.yieldmanager[3].txt (ID = 3750)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@content.yieldmanager[2].txt (ID = 3750)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@content.yieldmanager[1].txt (ID = 3750)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@cdn4.specificclick[2].txt (ID = 3400)
4/25/2010 10:35:44 PM: Found Spy Cookie: specificclick.com cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@bs.serving-sys[2].txt (ID = 2330)
4/25/2010 10:35:44 PM: Found Spy Cookie: bs.serving-sys cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@at.atwola[1].txt (ID = 2256)
4/25/2010 10:35:44 PM: Found Spy Cookie: atwola cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@ads.pointroll[1].txt (ID = 3148)
4/25/2010 10:35:44 PM: Found Spy Cookie: pointroll cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@ad.yieldmanager[2].txt (ID = 3751)
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@ad.yieldmanager[1].txt (ID = 3751)
4/25/2010 10:35:44 PM: Found Spy Cookie: yieldmanager cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@7search[1].txt (ID = 2011)
4/25/2010 10:35:44 PM: Found Spy Cookie: 7search cookie
4/25/2010 10:35:44 PM: c:\documents and settings\dan\cookies\dan@247realmedia[2].txt (ID = 1953)
4/25/2010 10:35:44 PM: Found Spy Cookie: 247realmedia cookie
4/25/2010 10:35:43 PM: Starting Cookie Sweep
4/25/2010 10:35:39 PM: Registry Sweep Complete, Elapsed Time:00:00:25
4/25/2010 10:35:13 PM: Starting Registry Sweep
4/25/2010 10:35:12 PM: Memory Sweep Complete, Elapsed Time: 00:03:17
4/25/2010 10:31:55 PM: Starting Memory Sweep
4/25/2010 10:31:49 PM: Start Full Sweep
4/25/2010 10:31:49 PM: Sweep initiated using definitions version 1685
4/25/2010 9:01:44 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/25/2010 9:01:44 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/25/2010 9:01:40 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/25/2010 9:01:08 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/25/2010 18:44:26 (GMT)
4/25/2010 9:00:29 PM: License Check Status (0): Success
4/25/2010 9:00:04 PM: Webroot Software 6.1.0.145 started
4/25/2010 9:00:04 PM: | Start of Session, Sunday, April 25, 2010 |
***************
4/25/2010 8:24:53 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\32788R22FWJFW\NircmdB.exe]
4/25/2010 8:24:39 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\32788R22FWJFW\n.pif]
4/25/2010 8:24:37 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\32788R22FWJFW\NirCmdC.cfxxe]
4/25/2010 8:24:37 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\32788R22FWJFW\NirCmd.cfxxe]
4/25/2010 8:24:33 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\32788R22FWJFW\iexplore.exe]
4/25/2010 12:50:35 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1446\A0133564.exe]
4/25/2010 12:50:35 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1446\A0133562.pif]
4/25/2010 12:50:35 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1446\A0133562.pif]
4/25/2010 12:50:35 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP1446\A0133557.exe]
4/25/2010 12:50:26 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/25/2010 12:50:25 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/25/2010 12:50:24 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/25/2010 12:50:23 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/25/2010 12:35:28 PM: Your virus definitions have been updated.
4/25/2010 12:35:28 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/24/2010 08:49:28 (GMT)
4/25/2010 12:35:28 PM: Your definitions are up to date.
4/25/2010 12:35:25 PM: License Check Status (0): Success
4/25/2010 12:35:22 PM: Automated check for program update in progress.
4/25/2010 11:59:17 AM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Documents and Settings\Dan\Desktop\rkill.pif]
4/25/2010 11:35:52 AM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/25/2010 11:35:52 AM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/25/2010 11:35:47 AM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/25/2010 11:35:16 AM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/24/2010 08:49:28 (GMT)
4/25/2010 11:34:42 AM: License Check Status (0): Success
4/25/2010 11:33:34 AM: Webroot Software 6.1.0.145 started
4/25/2010 11:33:34 AM: | Start of Session, Sunday, April 25, 2010 |
***************
4/24/2010 9:09:28 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/24/2010 9:09:28 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/24/2010 9:09:21 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/24/2010 9:08:48 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/24/2010 08:49:28 (GMT)
4/24/2010 9:07:56 PM: License Check Status (0): Success
4/24/2010 9:06:35 PM: Webroot Software 6.1.0.145 started
4/24/2010 9:06:35 PM: | Start of Session, Saturday, April 24, 2010 |
***************
4/24/2010 9:02:20 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Documents and Settings\Dan\Desktop\rkill.pif]
4/24/2010 8:46:31 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/24/2010 8:46:31 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/24/2010 8:46:11 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/24/2010 8:45:33 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/24/2010 08:49:28 (GMT)
4/24/2010 8:43:30 PM: License Check Status (0): Success
4/24/2010 8:42:15 PM: Webroot Software 6.1.0.145 started
4/24/2010 8:42:15 PM: | Start of Session, Saturday, April 24, 2010 |
***************
4/24/2010 7:52:32 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\documents and settings\dan\desktop\rkill.pif]
4/24/2010 7:34:51 PM: Warning: AntiVirus engine for IFO returned [File Encrypted] on [C:\documents and settings\joy\my documents\book1.xls]
4/24/2010 7:14:53 PM: ApplicationMinimized - EXIT
4/24/2010 7:14:53 PM: ApplicationMinimized - ENTER
4/24/2010 7:14:51 PM: C:\DOCUME~1\ALLUSE~1\APPLIC~1\Webroot\BugReports\spysweeper.exe.000001.xml
4/24/2010 7:14:51 PM: Review and send the error report: C:\DOCUME~1\ALLUSE~1\APPLIC~1\Webroot\BugReports\SpySweeper.exe.000001.dmp
4/24/2010 7:13:18 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/24/2010 7:13:18 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/24/2010 7:12:59 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/24/2010 7:12:23 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/24/2010 08:49:28 (GMT)
4/24/2010 7:11:59 PM: License Check Status (0): Success
4/24/2010 7:10:29 PM: Webroot Software 6.1.0.145 started
4/24/2010 7:10:29 PM: | Start of Session, Saturday, April 24, 2010 |
***************
4/24/2010 7:08:45 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:08:41 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:08:38 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:08:35 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:08:32 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:08:32 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:08:28 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied

4/24/2010 7:04:25 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:04:25 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:04:21 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:04:18 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:04:14 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/24/2010 7:03:52 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\DOCUMENTS AND SETTINGS\DAN\DESKTOP\RKILL.PIF]
4/24/2010 6:49:46 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/24/2010 6:45:05 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/24/2010 6:45:05 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/24/2010 6:44:59 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/24/2010 6:43:52 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/24/2010 08:49:28 (GMT)
4/24/2010 6:42:26 PM: License Check Status (0): Success
4/24/2010 6:40:27 PM: Webroot Software 6.1.0.145 started
4/24/2010 6:40:27 PM: | Start of Session, Saturday, April 24, 2010 |
***************
4/23/2010 10:18:31 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Documents and Settings\Dan\Desktop\rkill.pif]
4/23/2010 10:18:11 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 10:13:13 PM: The Internet Communication shield has blocked access to: 873HGF7XX60.COM
4/23/2010 10:11:55 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/23/2010 10:11:55 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/23/2010 10:11:44 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/23/2010 10:11:13 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/24/2010 08:49:28 (GMT)
4/23/2010 10:10:40 PM: License Check Status (0): Success
4/23/2010 10:10:01 PM: Webroot Software 6.1.0.145 started
4/23/2010 10:10:01 PM: | Start of Session, Friday, April 23, 2010 |
***************
4/23/2010 9:46:31 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 9:20:25 PM: The Internet Communication shield has blocked access to: 873HGF7XX60.COM
4/23/2010 9:19:27 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 9:18:59 PM: Warning: AntiVirus engine for IFO returned [WL] on [C:\Documents and Settings\Dan\Desktop\rkill.pif]
4/23/2010 8:56:28 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 8:35:24 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 8:19:57 PM: Your virus definitions have been updated.
4/23/2010 8:19:57 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/22/2010 08:08:24 (GMT)
4/23/2010 8:19:57 PM: Your security definitions have been updated.
4/23/2010 8:19:28 PM: License Check Status (0): Success
4/23/2010 8:19:26 PM: Automated check for program update in progress.
4/23/2010 8:19:21 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 7:48:22 PM: ApplicationMinimized - EXIT
4/23/2010 7:48:22 PM: ApplicationMinimized - ENTER
4/23/2010 7:43:17 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 7:32:09 PM: ApplicationMinimized - EXIT
4/23/2010 7:32:09 PM: ApplicationMinimized - ENTER
4/23/2010 7:25:15 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/23/2010 7:21:08 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/23/2010 7:21:08 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/23/2010 7:21:00 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/23/2010 7:20:00 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/22/2010 08:08:24 (GMT)
4/23/2010 7:18:03 PM: License Check Status (0): Success
4/23/2010 7:15:54 PM: Webroot Software 6.1.0.145 started
4/23/2010 7:15:54 PM: | Start of Session, Friday, April 23, 2010 |
***************
4/22/2010 9:28:51 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:28:47 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:28:46 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:28:44 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied

4/22/2010 9:24:04 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:24:00 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:23:59 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:23:58 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:23:50 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/22/2010 9:18:52 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/22/2010 8:47:50 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/22/2010 8:28:48 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/22/2010 7:54:59 PM: ApplicationMinimized - EXIT
4/22/2010 7:54:59 PM: ApplicationMinimized - ENTER
4/22/2010 7:46:43 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/22/2010 7:29:41 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/22/2010 7:25:01 PM: ApplicationMinimized - EXIT
4/22/2010 7:25:01 PM: ApplicationMinimized - ENTER
4/22/2010 7:24:44 PM: The Internet Communication shield has blocked access to: 873HGF7XX60.COM
4/22/2010 7:24:37 PM: Informational: ShieldEmail: Start monitoring port 25 for mail activities
4/22/2010 7:24:37 PM: Informational: ShieldEmail: Start monitoring port 110 for mail activities
4/22/2010 7:24:31 PM: Warning: Unable to secure run key from ambiguous path exploit for HKU\S-1-5-21-521435792-1954746072-57995570-1008\Software\Microsoft\Windows\CurrentVersion\Run\AIM. Parse Failure
4/22/2010 7:23:58 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/22/2010 08:08:24 (GMT)
4/22/2010 7:22:52 PM: License Check Status (0): Success
4/22/2010 7:21:25 PM: Webroot Software 6.1.0.145 started
4/22/2010 7:21:25 PM: | Start of Session, Thursday, April 22, 2010 |
***************
4/21/2010 9:50:37 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:37 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:34 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:30 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:27 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:23 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:20 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:17 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:14 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:10 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:07 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:04 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:01 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:50:00 PM: Your virus definitions have been updated.
4/21/2010 9:49:59 PM: Informational: Loaded AntiVirus Engine: 3.6.0; SDK Version: 4.52E; Virus Definitions: 04/21/2010 08:41:22 (GMT)
4/21/2010 9:49:58 PM: Your security definitions have been updated.
4/21/2010 9:49:58 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:54 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:51 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:44 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:40 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:37 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:34 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:30 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:29 PM: License Check Status (0): Success
4/21/2010 9:49:27 PM: Automated check for program update in progress.
4/21/2010 9:49:26 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:49:23 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied

4/21/2010 9:34:43 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:34:39 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:34:36 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:34:34 PM: The Internet Communication shield has blocked access to: MFDCLK001.ORG
4/21/2010 9:34:33 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:34:30 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied
4/21/2010 9:34:27 PM: File System Shield: found: Virus: Mal/TDSSRt-A, version -- File system Read/Write denied

*** Session Log display limited to the first 1000 lines ***





=================








All processes killed
========== OTL ==========
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5AA2BA46-9913-4dc7-9620-69AB0FA17AE7}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5AA2BA46-9913-4dc7-9620-69AB0FA17AE7}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{0BF43445-2F28-4351-9252-17FE6E806AA0} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0BF43445-2F28-4351-9252-17FE6E806AA0}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{5AA2BA46-9913-4dc7-9620-69AB0FA17AE7} not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5AA2BA46-9913-4dc7-9620-69AB0FA17AE7}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\SITEguard not found.
Registry value HKEY_USERS\S-1-5-21-521435792-1954746072-57995570-1007\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6}\ not found.
Registry value HKEY_USERS\S-1-5-21-521435792-1954746072-57995570-1007\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{d81ca86b-ef63-42af-bee3-4502d9a03c2d}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d81ca86b-ef63-42af-bee3-4502d9a03c2d}\ deleted successfully.
Service AOL TopSpeedMonitor stopped successfully!
Service AOL TopSpeedMonitor deleted successfully!
Service AOL ACS stopped successfully!
Service AOL ACS deleted successfully!
ADS C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2 deleted successfully.
ADS C:\Documents and Settings\All Users\Application Data\TEMP:A8ADE5D8 deleted successfully.
========== COMMANDS ==========

[EMPTYTEMP]

User: Administrator
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: All Users

User: Dan
->Temp folder emptied: 425405 bytes
->Temporary Internet Files folder emptied: 15782905 bytes
->Java cache emptied: 60205762 bytes
->Flash cache emptied: 148463 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes
->Flash cache emptied: 41 bytes

User: Guest
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes
->Flash cache emptied: 405 bytes

User: HelpAssistant
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes
->Flash cache emptied: 41 bytes

User: Jason
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes
->Java cache emptied: 52742703 bytes
->Flash cache emptied: 103270 bytes

User: Josh
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes
->Java cache emptied: 0 bytes
->Flash cache emptied: 672 bytes

User: Joy
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 6189182 bytes
->Java cache emptied: 59464767 bytes
->Flash cache emptied: 274020 bytes

User: LocalService
->Temp folder emptied: 65748 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 6554 bytes

User: NetworkService
->Temp folder emptied: 2072 bytes
->Temporary Internet Files folder emptied: 360582 bytes
->Java cache emptied: 49458 bytes
->Flash cache emptied: 14077 bytes

User: Owner
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: test
->Temp folder emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 20741 bytes
%systemroot%\System32 .tmp files removed: 11333137 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 654769 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 8802938 bytes
RecycleBin emptied: 5024 bytes

Total Files Cleaned = 207.00 mb


OTL by OldTimer - Version 3.2.2.0 log created on 04262010_213437

Files\Folders moved on Reboot...
C:\Documents and Settings\Dan\Local Settings\Temp\Google Toolbar\GoogleToolbarWelcome.log moved successfully.
File\Folder C:\Documents and Settings\Dan\Local Settings\Temp\Perflib_Perfdata_378.dat not found!
C:\Documents and Settings\Dan\Local Settings\Temp\~DF98DC.tmp moved successfully.
C:\Documents and Settings\Dan\Local Settings\Temporary Internet Files\Content.IE5\RB79H6VD\iframe[1].htm moved successfully.
C:\Documents and Settings\Dan\Local Settings\Temporary Internet Files\Content.IE5\84SVXQVJ\topic310932[1].htm moved successfully.
C:\Documents and Settings\Dan\Local Settings\Temporary Internet Files\AntiPhishing\2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2.dat moved successfully.
C:\Documents and Settings\Dan\Local Settings\Temporary Internet Files\SuggestedSites.dat moved successfully.

Registry entries deleted on Reboot...






========================================








OTL logfile created on: 4/26/2010 9:44:50 PM - Run 2
OTL by OldTimer - Version 3.2.2.0 Folder = C:\Documents and Settings\Dan\Desktop
Windows XP Media Center Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

3.00 Gb Total Physical Memory | 2.00 Gb Available Physical Memory | 73.00% Memory free
6.00 Gb Paging File | 5.00 Gb Available in Paging File | 88.00% Paging File free
Paging file location(s): C:\pagefile.sys 0 0 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 228.49 Gb Total Space | 126.84 Gb Free Space | 55.51% Space Free | Partition Type: NTFS
Drive D: | 4.38 Gb Total Space | 1.39 Gb Free Space | 31.63% Space Free | Partition Type: FAT32
Drive E: | 607.05 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS
Drive F: | 3.72 Gb Total Space | 0.00 Gb Free Space | 0.00% Space Free | Partition Type: UDF
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: YOUR-CCD0E6383E
Current User Name: Dan
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Standard

========== Processes (SafeList) ==========

PRC - [2010/04/23 21:07:28 | 000,562,176 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Dan\Desktop\OTL.exe
PRC - [2010/04/14 21:02:39 | 001,201,640 | ---- | M] (Webroot Software, Inc. ) -- C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe
PRC - [2010/01/22 09:56:24 | 000,112,592 | ---- | M] (Threat Expert Ltd.) -- C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
PRC - [2009/11/06 15:20:10 | 006,515,784 | ---- | M] (Webroot Software, Inc.) -- C:\Program Files\Webroot\WebrootSecurity\SpySweeperUI.exe
PRC - [2009/11/06 12:00:22 | 004,048,240 | ---- | M] (Webroot Software, Inc. (www.webroot.com)) -- C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe
PRC - [2009/05/19 11:36:18 | 000,240,512 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
PRC - [2008/10/07 08:23:46 | 000,111,856 | ---- | M] (Yahoo! Inc) -- C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
PRC - [2008/04/13 17:12:19 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2006/11/03 19:20:12 | 000,866,584 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Defender\MSASCui.exe
PRC - [2006/11/03 19:19:58 | 000,013,592 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Defender\MsMpEng.exe
PRC - [2006/03/30 10:15:44 | 000,096,341 | ---- | M] (Canon Inc.) -- C:\Program Files\Canon\CAL\CALMAIN.exe
PRC - [2005/12/12 15:02:24 | 000,176,193 | ---- | M] (American Power Conversion Corporation) -- C:\Program Files\APC\APC PowerChute Personal Edition\mainserv.exe
PRC - [2005/08/27 06:09:28 | 000,139,264 | ---- | M] (Alcor Micro, Corp.) -- C:\Program Files\Digital Media Reader\readericon45G.exe


========== Modules (SafeList) ==========

MOD - [2010/04/23 21:07:28 | 000,562,176 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Dan\Desktop\OTL.exe


========== Win32 Services (SafeList) ==========

SRV - [2010/04/14 21:02:39 | 001,201,640 | ---- | M] (Webroot Software, Inc. ) [Auto | Running] -- C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe -- (WRConsumerService)
SRV - [2010/03/15 12:50:36 | 001,142,224 | ---- | M] (PC Tools) [On_Demand | Stopped] -- C:\Program Files\Spyware Doctor\pctsSvc.exe -- (sdCoreService)
SRV - [2010/03/11 12:09:22 | 000,366,840 | ---- | M] (PC Tools) [On_Demand | Stopped] -- C:\Program Files\Spyware Doctor\pctsAuxs.exe -- (sdAuxService)
SRV - [2010/01/22 09:56:24 | 000,112,592 | ---- | M] (Threat Expert Ltd.) [Auto | Running] -- C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe -- (Browser Defender Update Service)
SRV - [2009/11/06 12:00:22 | 004,048,240 | ---- | M] (Webroot Software, Inc. (www.webroot.com)) [Auto | Running] -- C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe -- (WebrootSpySweeperService)
SRV - [2009/05/19 11:36:18 | 000,240,512 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe -- (SeaPort)
SRV - [2007/10/25 15:27:54 | 000,266,240 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Windows Live\installer\WLSetupSvc.exe -- (WLSetupSvc)
SRV - [2006/11/03 19:19:58 | 000,013,592 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Windows Defender\MsMpEng.exe -- (WinDefend)
SRV - [2006/03/30 10:15:44 | 000,096,341 | ---- | M] (Canon Inc.) [Auto | Running] -- C:\Program Files\Canon\CAL\CALMAIN.exe -- (CCALib8)
SRV - [2005/12/12 15:02:24 | 000,176,193 | ---- | M] (American Power Conversion Corporation) [Auto | Running] -- C:\Program Files\APC\APC PowerChute Personal Edition\mainserv.exe -- (APC UPS Service)
SRV - [2005/11/23 10:16:44 | 000,172,032 | ---- | M] (New Boundary Technologies, Inc.) [Disabled | Stopped] -- C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS -- (PrismXL)
SRV - [2003/03/09 22:31:02 | 000,065,795 | ---- | M] (HP) [On_Demand | Stopped] -- C:\WINDOWS\system32\HPZipm12.exe -- (Pml Driver HPZ12)


========== Driver Services (SafeList) ==========

DRV - [2010/03/10 11:36:36 | 000,217,032 | ---- | M] (PC Tools) [Kernel | Boot | Running] -- C:\WINDOWS\system32\drivers\PCTCore.sys -- (PCTCore)
DRV - [2010/02/17 11:25:50 | 000,012,872 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys -- (SASDIFSV)
DRV - [2010/02/17 11:15:58 | 000,066,632 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
DRV - [2010/02/17 11:15:58 | 000,012,872 | R--- | M] ( SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | On_Demand | Stopped] -- C:\Program Files\SUPERAntiSpyware\SASENUM.SYS -- (SASENUM)
DRV - [2009/11/06 12:00:36 | 000,176,752 | ---- | M] (Webroot Software, Inc. (www.webroot.com)) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\ssidrv.sys -- (ssidrv)
DRV - [2009/11/06 12:00:36 | 000,023,152 | ---- | M] (Webroot Software, Inc. (www.webroot.com)) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\sshrmd.sys -- (sshrmd)
DRV - [2009/11/06 12:00:34 | 000,029,808 | ---- | M] (Webroot Software, Inc. (www.webroot.com)) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\ssfs0bbc.sys -- (ssfs0bbc)
DRV - [2008/04/13 11:46:22 | 000,015,232 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\mpe.sys -- (MPE)
DRV - [2008/04/13 11:45:34 | 000,046,592 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\irbus.sys -- (IrBus)
DRV - [2008/04/13 11:36:39 | 000,043,008 | ---- | M] (Advanced Micro Devices, Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\amdagp.sys -- (amdagp)
DRV - [2008/04/13 11:36:39 | 000,040,960 | ---- | M] (Silicon Integrated Systems Corporation) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\sisagp.sys -- (sisagp)
DRV - [2008/04/13 11:36:38 | 000,020,352 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\hidbatt.sys -- (HidBatt)
DRV - [2007/12/31 11:33:10 | 000,048,640 | ---- | M] (Prolific Technology Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\ser2pl.sys -- (Ser2pl)
DRV - [2005/11/23 10:19:46 | 000,008,552 | ---- | M] (Windows ® 2000 DDK provider) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\asctrm.sys -- (ASCTRM)
DRV - [2005/11/09 04:39:00 | 000,205,568 | ---- | M] (ATI Technologies Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\atinavrr.sys -- (ATIAVPCI)
DRV - [2005/09/26 16:07:00 | 003,644,800 | ---- | M] (Realtek Semiconductor Corp.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\alcxwdm.sys -- (ALCXWDM) Service for Realtek AC97 Audio (WDM)
DRV - [2005/09/18 09:32:00 | 003,493,984 | ---- | M] (NVIDIA Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\nv4_mini.sys -- (nv)
DRV - [2005/07/29 18:11:04 | 000,012,928 | ---- | M] (NVIDIA Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\nvnetbus.sys -- (nvnetbus)
DRV - [2005/07/29 18:11:02 | 000,034,048 | ---- | M] (NVIDIA Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\NVENETFD.sys -- (NVENETFD)
DRV - [2004/11/10 18:30:18 | 000,024,832 | ---- | M] (Roxio) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\cdralw2k.sys -- (Cdralw2k)
DRV - [2004/11/10 18:27:34 | 000,044,288 | ---- | M] (Roxio) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\cdr4_xp.sys -- (Cdr4_xp)
DRV - [2004/06/17 15:56:22 | 000,220,032 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSFHWBS2.sys -- (HSFHWBS2)
DRV - [2004/06/17 15:55:38 | 000,685,056 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSF_CNXT.sys -- (winachsf)
DRV - [2004/06/17 15:55:04 | 001,041,536 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSF_DP.sys -- (HSF_DP)
DRV - [2003/01/10 13:13:04 | 000,033,588 | R--- | M] (America Online, Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\wanatw4.sys -- (wanatw) WAN Miniport (ATW)
DRV - [2001/08/17 22:07:44 | 000,019,072 | ---- | M] (Adaptec, Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\sparrow.sys -- (Sparrow)
DRV - [2001/08/17 22:07:42 | 000,030,688 | ---- | M] (LSI Logic) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\sym_u3.sys -- (sym_u3)
DRV - [2001/08/17 22:07:40 | 000,028,384 | ---- | M] (LSI Logic) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\sym_hi.sys -- (sym_hi)
DRV - [2001/08/17 22:07:36 | 000,032,640 | ---- | M] (LSI Logic) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\symc8xx.sys -- (symc8xx)
DRV - [2001/08/17 22:07:34 | 000,016,256 | ---- | M] (Symbios Logic Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\symc810.sys -- (symc810)
DRV - [2001/08/17 21:52:22 | 000,036,736 | ---- | M] (Promise Technology, Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\ultra.sys -- (ultra)
DRV - [2001/08/17 21:52:20 | 000,045,312 | ---- | M] (QLogic Corporation) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\ql12160.sys -- (ql12160)
DRV - [2001/08/17 21:52:20 | 000,040,320 | ---- | M] (QLogic Corporation) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\ql1080.sys -- (ql1080)
DRV - [2001/08/17 21:52:18 | 000,049,024 | ---- | M] (QLogic Corporation) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\ql1280.sys -- (ql1280)
DRV - [2001/08/17 21:52:16 | 000,179,584 | ---- | M] (Mylex Corporation) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\dac2w2k.sys -- (dac2w2k)
DRV - [2001/08/17 21:52:12 | 000,017,280 | ---- | M] (American Megatrends Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\mraid35x.sys -- (mraid35x)
DRV - [2001/08/17 21:52:00 | 000,026,496 | ---- | M] (Advanced System Products, Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\asc.sys -- (asc)
DRV - [2001/08/17 21:51:58 | 000,014,848 | ---- | M] (Advanced System Products, Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\asc3550.sys -- (asc3550)
DRV - [2001/08/17 21:51:56 | 000,005,248 | ---- | M] (Acer Laboratories Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\aliide.sys -- (AliIde)
DRV - [2001/08/17 21:51:54 | 000,006,656 | ---- | M] (CMD Technology, Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\cmdide.sys -- (CmdIde)
DRV - [2001/08/17 13:49:32 | 000,019,968 | ---- | M] (Macronix International Co., Ltd. ) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\mxnic.sys -- (mxnic)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Secondary Start Pages = http://news.yahoo.com [binary data]
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.google.com/ie


IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultName = Google
IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultURL = http://www.google.com/search?q={searchTerm...tf8&oe=utf8
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultName = Google
IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultURL = http://www.google.com/search?q={searchTerm...tf8&oe=utf8
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0



IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Secondary_Page_URL = www.bing.com [binary data]
IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Internet Explorer\Main,SearchDefaultBranded = 1
IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultName = Google
IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultURL = http://www.google.com/search?q={searchTerm...tf8&oe=utf8
IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\..\URLSearchHook: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-521435792-1954746072-57995570-1007\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local


[2009/10/20 16:47:19 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Dan\Application Data\Mozilla\Extensions
[2009/10/20 16:47:19 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Dan\Application Data\Mozilla\Extensions\mozswing@mozswing.org
[2008/12/09 10:15:22 | 002,529,741 | ---- | M] () -- C:\Program Files\Mozilla Firefox\components\1280759.dll

O1 HOSTS File: ([2010/04/14 21:13:35 | 000,385,900 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\HOSTS
O1 - Hosts: 127.0.0.1 localhost
O1 - Hosts: 127.0.0.1 www.007guard.com
O1 - Hosts: 127.0.0.1 007guard.com
O1 - Hosts: 127.0.0.1 008i.com
O1 - Hosts: 127.0.0.1 www.008k.com
O1 - Hosts: 127.0.0.1 008k.com
O1 - Hosts: 127.0.0.1 www.00hq.com
O1 - Hosts: 127.0.0.1 00hq.com
O1 - Hosts: 127.0.0.1 010402.com
O1 - Hosts: 127.0.0.1 www.032439.com
O1 - Hosts: 127.0.0.1 032439.com
O1 - Hosts: 127.0.0.1 www.0scan.com
O1 - Hosts: 127.0.0.1 0scan.com
O1 - Hosts: 127.0.0.1 1000gratisproben.com
O1 - Hosts: 127.0.0.1 www.1000gratisproben.com
O1 - Hosts: 127.0.0.1 1001namen.com
O1 - Hosts: 127.0.0.1 www.1001namen.com
O1 - Hosts: 127.0.0.1 100888290cs.com
O1 - Hosts: 127.0.0.1 www.100888290cs.com
O1 - Hosts: 127.0.0.1 www.100sexlinks.com
O1 - Hosts: 127.0.0.1 100sexlinks.com
O1 - Hosts: 127.0.0.1 10sek.com
O1 - Hosts: 127.0.0.1 www.10sek.com
O1 - Hosts: 127.0.0.1 www.1-2005-search.com
O1 - Hosts: 127.0.0.1 1-2005-search.com
O1 - Hosts: 13312 more lines...
O2 - BHO: (&Yahoo! Toolbar Helper) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O2 - BHO: (PC Tools Browser Guard BHO) - {2A0F3D1B-0909-4FF4-B272-609CCE6054E7} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O2 - BHO: (Search Helper) - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll (Microsoft Corporation)
O2 - BHO: (Google Toolbar Helper) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O2 - BHO: (Google Toolbar Notifier BHO) - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll (Google Inc.)
O2 - BHO: (MSN Toolbar Helper) - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.1125.0\msneshellx.dll (Microsoft Corp.)
O2 - BHO: (Fast Browser Search Toolbar Helper) - {FCBCCB87-9224-4B8D-B117-F56D924BEB18} - C:\Program Files\Fast Browser Search\IE\FBStoolbar.dll File not found
O3 - HKLM\..\Toolbar: (Fast Browser Search Toolbar) - {1BB22D38-A411-4B13-A746-C2A4F4EC7344} - C:\Program Files\Fast Browser Search\IE\FBStoolbar.dll File not found
O3 - HKLM\..\Toolbar: (MSN Toolbar) - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.1125.0\msneshellx.dll (Microsoft Corp.)
O3 - HKLM\..\Toolbar: (Google Toolbar) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O3 - HKLM\..\Toolbar: (PC Tools Browser Guard) - {472734EA-242A-422B-ADF8-83D1E48CC825} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O3 - HKLM\..\Toolbar: (Yahoo! Toolbar) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O3 - HKU\.DEFAULT\..\Toolbar\WebBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O3 - HKU\S-1-5-18\..\Toolbar\WebBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O3 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\..\Toolbar\WebBrowser: (Fast Browser Search Toolbar) - {1BB22D38-A411-4B13-A746-C2A4F4EC7344} - C:\Program Files\Fast Browser Search\IE\FBStoolbar.dll File not found
O3 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\..\Toolbar\WebBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O3 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\..\Toolbar\WebBrowser: (PC Tools Browser Guard) - {472734EA-242A-422B-ADF8-83D1E48CC825} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O3 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\..\Toolbar\WebBrowser: (Yahoo! Toolbar) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O4 - HKLM..\Run: [Microsoft Default Manager] C:\Program Files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe (Microsoft Corp.)
O4 - HKLM..\Run: [MSKDetectorExe] C:\Program Files\McAfee\SpamKiller\MSKDetct.exe (McAfee, Inc.)
O4 - HKLM..\Run: [NvCplDaemon] C:\WINDOWS\System32\NvCpl.DLL (NVIDIA Corporation)
O4 - HKLM..\Run: [nwiz] C:\WINDOWS\System32\nwiz.exe ()
O4 - HKLM..\Run: [readericon] C:\Program Files\Digital Media Reader\readericon45G.exe (Alcor Micro, Corp.)
O4 - HKLM..\Run: [SpySweeper] C:\Program Files\Webroot\WebrootSecurity\SpySweeperUI.exe (Webroot Software, Inc.)
O4 - HKLM..\Run: [Windows Defender] C:\Program Files\Windows Defender\MSASCui.exe (Microsoft Corporation)
O4 - HKU\S-1-5-21-521435792-1954746072-57995570-1007..\Run: [Search Protection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe (Yahoo! Inc)
O4 - HKU\S-1-5-21-521435792-1954746072-57995570-1007..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe (Yahoo! Inc)
O4 - Startup: C:\Documents and Settings\Jason\Start Menu\Programs\Startup\LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe (Lime Wire, LLC)
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\control panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\restrictions present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: InstallVisualStyle = C:\WINDOWS\Resources\Themes\Royale\Royale.msstyles (Microsoft)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: InstallTheme = C:\WINDOWS\Resources\Themes\Royale.theme ()
O7 - HKU\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\control panel present
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: CDRAutoRun = 0
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-18\Software\Policies\Microsoft\Internet Explorer\control panel present
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: CDRAutoRun = 0
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-19\Software\Policies\Microsoft\Internet Explorer\control panel present
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\Software\Policies\Microsoft\Internet Explorer\control panel present
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\Software\Policies\Microsoft\Internet Explorer\control panel present
O7 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-21-521435792-1954746072-57995570-1007\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O8 - Extra context menu item: Google Sidewiki... - C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll (Google Inc.)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000004 [] - C:\Program Files\Bonjour\mdnsNSP.dll (Apple Inc.)
O16 - DPF: {01012101-5E80-11D8-9E86-0007E96C65AE} http://www.comcastsupport.com/OneClickFix/tgctlsr.cab (SupportSoft Script Runner Class)
O16 - DPF: {0BCADE60-1E93-11D8-ABDA-0004759647B3} http://www.bxwa.com/fastbid/fastbidx1.cab (FastBid1 Class)
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} http://upload.facebook.com/controls/2008.1...toUploader5.cab (Facebook Photo Uploader 5 Control)
O16 - DPF: {11260943-421B-11D0-8EAC-0000C07D88CF} http://www.ipix.com/viewers/ipixx.cab (iPIX ActiveX Control)
O16 - DPF: {32322460-3E7D-11D7-ABD8-0001029A9BA6} http://www.bxwa.com/fastbid/fastbidx2.cab (FastBid2 Class)
O16 - DPF: {3BB1D69B-A780-4BE1-876E-F3D488877135} http://download.microsoft.com/download/3/B...tualEarth3D.cab (SentinelProxy Class)
O16 - DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} http://office.microsoft.com/officeupdate/content/opuc3.cab (Office Update Installation Engine)
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} http://photo.walgreens.com/WalgreensActivia.cab (Snapfish Activia)
O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} http://tools.ebayimg.com/eps/wl/activex/eB...l_v1-0-3-48.cab (EPUImageControl Class)
O16 - DPF: {66E79B75-F711-4A88-9C6D-10BCA64F3306} http://www.drivecam.com/videos/DriveCamEvent.dll (DriveCamPlayer Class)
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} https://webdl.symantec.com/activex/symdlmgr.cab (Symantec Download Manager)
O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} http://upload.facebook.com/controls/2009.0...oUploader55.cab (Facebook Photo Uploader 5 Control)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20)
O16 - DPF: {917623D1-D8E5-11D2-BE8B-00104B06BDE3} http://www.opentopia.com/support/activex/AxisCamControl.cab (CamImage Class)
O16 - DPF: {9600F64D-755F-11D4-A47F-0001023E6D5A} http://web1.shutterfly.com/downloads/Uploader.cab (Shutterfly Picture Upload Plugin)
O16 - DPF: {9A57B18E-2F5D-11D5-8997-00104BD12D94} http://support.gateway.com/support/serialharvest/gwCID.CAB (compid Class)
O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} http://download.yahoo.com/dl/mail/ymmapi.cab (YahooYMailTo Class)
O16 - DPF: {A9F8D9EC-3D0A-4A60-BD82-FBD64BAD370D} http://h20264.www2.hp.com/ediags/dd/instal...nosticsxp2k.cab (DDRevision Class)
O16 - DPF: {C1FDEE68-98D5-4F42-A4DD-D0BECF5077EB} http://tools.ebayimg.com/eps/wl/activex/eB...l_v1-0-27-0.cab (EPUImageControl Class)
O16 - DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} http://office.microsoft.com/officeupdate/content/opuc4.cab (Office Update Installation Engine)
O16 - DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20)
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} http://www.adobe.com/products/acrobat/nos/gp.cab (get_atlcom Class)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload.macromedia.com/pub/shock...ash/swflash.cab (Shockwave Flash Object)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll (SUPERAntiSpyware.com)
O24 - Desktop WallPaper: C:\Documents and Settings\Dan\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O24 - Desktop BackupWallPaper: C:\Documents and Settings\Dan\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O28 - HKLM ShellExecuteHooks: {091EB208-39DD-417D-A5DD-7E2C2D8FB9CB} - C:\Program Files\Windows Defender\MpShHook.dll (Microsoft Corporation)
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O30 - LSA: Security Packages - (EM) - File not found
O30 - LSA: Security Packages - (ecurity Packages settings...) - File not found
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2005/01/09 18:13:09 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O32 - AutoRun File - [2005/04/20 15:50:57 | 000,000,051 | R--- | M] () - E:\autorun.inf -- [ CDFS ]
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = ComFile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2010/04/26 21:34:37 | 000,000,000 | ---D | C] -- C:\_OTL
[2010/04/26 21:30:42 | 000,411,368 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\deployJava1.dll
[2010/04/26 21:30:42 | 000,073,728 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javacpl.cpl
[2010/04/26 21:30:41 | 000,153,376 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaws.exe
[2010/04/26 21:30:41 | 000,145,184 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaw.exe
[2010/04/26 21:30:41 | 000,145,184 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\java.exe
[2010/04/26 21:01:03 | 000,000,000 | -HSD | C] -- C:\RECYCLER
[2010/04/24 20:07:20 | 000,000,000 | RHSD | C] -- C:\cmdcons
[2010/04/24 20:05:07 | 000,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2010/04/24 20:05:07 | 000,161,792 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2010/04/24 20:05:07 | 000,136,704 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2010/04/24 20:05:07 | 000,031,232 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2010/04/24 20:04:52 | 000,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2010/04/24 20:02:01 | 000,000,000 | ---D | C] -- C:\Qoobox
[2010/04/23 21:07:13 | 000,562,176 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\Dan\Desktop\OTL.exe
[2010/04/21 21:00:56 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Dan\Local Settings\Application Data\WMTools Downloaded Files
[2010/04/17 13:04:38 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2010/04/17 13:04:12 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Dan\Application Data\SUPERAntiSpyware.com
[2010/04/17 13:04:12 | 000,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2010/04/17 13:03:33 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Wise Installation Wizard
[2010/04/17 09:21:54 | 000,181,632 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\MpSigStub.exe
[2010/04/16 20:10:13 | 005,918,776 | ---- | C] (Malwarebytes Corporation ) -- C:\Documents and Settings\Dan\Desktop\mbam-setup.exe
[2010/04/15 20:03:10 | 000,000,000 | ---D | C] -- C:\Program Files\Windows Defender
[2010/04/15 19:48:52 | 000,000,000 | ---D | C] -- C:\Rooter$
[2010/04/15 07:00:42 | 000,012,032 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\amsint.sys
[2010/04/14 21:01:13 | 000,000,000 | ---D | C] -- C:\Program Files\MSSOAP
[2010/04/14 21:00:41 | 001,563,008 | ---- | C] (Webroot Software, Inc.) -- C:\WINDOWS\WRSetup.dll
[2010/04/14 21:00:40 | 000,000,000 | ---D | C] -- C:\Program Files\Webroot
[2010/04/14 21:00:40 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Webroot
[2010/04/14 20:30:06 | 000,149,456 | ---- | C] (PC Tools) -- C:\WINDOWS\SGDetectionTool.dll
[2010/04/14 20:30:05 | 001,652,688 | ---- | C] (Threat Expert Ltd.) -- C:\WINDOWS\PCTBDCore.dll
[2010/04/14 20:30:05 | 000,165,840 | ---- | C] (Threat Expert Ltd.) -- C:\WINDOWS\PCTBDRes.dll
[2010/04/14 20:27:16 | 000,233,136 | ---- | C] (PC Tools) -- C:\WINDOWS\System32\drivers\pctgntdi.sys
[2010/04/14 20:27:07 | 000,217,032 | ---- | C] (PC Tools) -- C:\WINDOWS\System32\drivers\PCTCore.sys
[2010/04/14 20:27:07 | 000,088,040 | ---- | C] (PC Tools) -- C:\WINDOWS\System32\drivers\PCTAppEvent.sys
[2010/04/14 20:26:58 | 000,070,408 | ---- | C] (PC Tools) -- C:\WINDOWS\System32\drivers\pctplsg.sys
[2010/04/14 20:26:46 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\PC Tools
[2010/04/14 20:26:45 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Dan\Application Data\PC Tools
[2010/04/14 20:26:45 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\PC Tools
[2010/04/11 20:16:17 | 000,000,000 | ---D | C] -- C:\Program Files\Trend Micro
[2010/04/11 19:25:43 | 000,000,000 | ---D | C] -- C:\Program Files\Spybot - Search & Destroy
[2010/04/11 19:25:43 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
[2010/04/11 18:22:52 | 000,095,024 | ---- | C] (Sunbelt Software) -- C:\WINDOWS\System32\drivers\SBREDrv.sys
[2010/04/11 18:21:33 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Lavasoft
[2010/04/11 10:12:12 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Dan\Local Settings\Application Data\Threat Expert
[2010/04/11 10:03:24 | 001,640,400 | ---- | C] (Threat Expert Ltd.) -- C:\WINDOWS\PCTBDCore.dll.old
[2010/04/11 10:01:33 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\TEMP
[2010/04/10 02:11:02 | 000,000,000 | ---D | C] -- C:\Documents and Settings\LocalService\Application Data\Macromedia
[2010/04/08 21:14:09 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Sun
[2010/04/07 22:16:02 | 000,000,000 | ---D | C] -- C:\Documents and Settings\NetworkService\Application Data\Sun
[2010/04/07 21:25:58 | 000,000,000 | ---D | C] -- C:\Documents and Settings\NetworkService\Application Data\Macromedia
[2010/04/07 21:25:58 | 000,000,000 | ---D | C] -- C:\Documents and Settings\NetworkService\Application Data\Adobe

========== Files - Modified Within 30 Days ==========

[2010/04/26 21:47:00 | 000,000,418 | -H-- | M] () -- C:\WINDOWS\tasks\User_Feed_Synchronization-{3881367F-E3AD-460B-B000-3731E19CF38B}.job
[2010/04/26 21:43:06 | 000,000,330 | -H-- | M] () -- C:\WINDOWS\tasks\MP Scheduled Scan.job
[2010/04/26 21:40:48 | 000,030,881 | ---- | M] () -- C:\WINDOWS\System32\nvapps.xml
[2010/04/26 21:40:37 | 000,001,170 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2010/04/26 21:40:18 | 000,000,868 | ---- | M] () -- C:\WINDOWS\tasks\Google Software Updater.job
[2010/04/26 21:40:05 | 000,000,882 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job
[2010/04/26 21:40:01 | 000,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2010/04/26 21:39:56 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2010/04/26 21:39:55 | 3085,488,128 | -HS- | M] () -- C:\hiberfil.sys
[2010/04/26 21:38:55 | 009,961,472 | ---- | M] () -- C:\Documents and Settings\Dan\ntuser.dat
[2010/04/26 21:38:55 | 000,000,278 | -HS- | M] () -- C:\Documents and Settings\Dan\ntuser.ini
[2010/04/26 21:37:08 | 000,000,418 | -H-- | M] () -- C:\WINDOWS\tasks\User_Feed_Synchronization-{F353CBD3-5214-4543-8F1C-53C2FBBCAEC9}.job
[2010/04/26 21:30:22 | 000,153,376 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaws.exe
[2010/04/26 21:30:22 | 000,145,184 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaw.exe
[2010/04/26 21:30:22 | 000,145,184 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\java.exe
[2010/04/26 21:30:22 | 000,073,728 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javacpl.cpl
[2010/04/26 21:30:21 | 000,411,368 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\deployJava1.dll
[2010/04/26 21:05:00 | 000,000,886 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job
[2010/04/26 08:36:01 | 000,000,284 | ---- | M] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2010/04/25 20:35:27 | 000,000,227 | ---- | M] () -- C:\WINDOWS\system.ini
[2010/04/25 11:49:20 | 000,000,180 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\craigslist.url
[2010/04/24 20:07:26 | 000,000,279 | RHS- | M] () -- C:\boot.ini
[2010/04/24 20:00:42 | 003,923,062 | R--- | M] () -- C:\Documents and Settings\Dan\Desktop\bonaroCF.exe
[2010/04/24 19:04:28 | 000,012,032 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\amsint.sys
[2010/04/23 21:07:28 | 000,562,176 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Dan\Desktop\OTL.exe
[2010/04/22 20:19:21 | 000,000,211 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\possible Sinowal-MBR rootkit.url
[2010/04/22 19:57:37 | 000,000,223 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\Flash Earth ...satellite and aerial imagery of the Earth in Flash.url
[2010/04/21 20:57:44 | 000,000,116 | ---- | M] () -- C:\WINDOWS\NeroDigital.ini
[2010/04/21 20:55:06 | 000,082,944 | ---- | M] () -- C:\Documents and Settings\Dan\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2010/04/20 22:17:09 | 000,000,217 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\Yahoo! Mail.url
[2010/04/19 20:52:12 | 000,000,187 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\Gold Screw 2 MVI_3010.flv video by Bonaro - Photobucket.url
[2010/04/19 20:47:26 | 000,000,174 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\Image hosting, free photo sharing & video sharing at Photobucket.url
[2010/04/19 19:45:41 | 000,001,324 | ---- | M] () -- C:\WINDOWS\System32\d3d9caps.dat
[2010/04/19 19:43:12 | 000,000,525 | ---- | M] () -- C:\hpfr3420.xml
[2010/04/18 20:51:09 | 000,525,824 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\dds.scr
[2010/04/18 20:50:07 | 000,000,000 | ---- | M] () -- C:\Documents and Settings\Dan\defogger_reenable
[2010/04/18 20:47:26 | 000,050,477 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\Defogger.exe
[2010/04/18 12:45:45 | 000,000,211 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\My Bleeping Computer.url
[2010/04/18 12:15:09 | 000,293,376 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\3r05gcjm.exe
[2010/04/17 22:12:10 | 000,077,312 | ---- | M] () -- C:\mbr.exe
[2010/04/17 13:04:25 | 000,000,780 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\SUPERAntiSpyware Free Edition.lnk
[2010/04/17 04:11:24 | 000,001,915 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Google Earth.lnk
[2010/04/16 20:11:43 | 000,000,696 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes' Anti-Malware.lnk
[2010/04/16 20:10:17 | 005,918,776 | ---- | M] (Malwarebytes Corporation ) -- C:\Documents and Settings\Dan\Desktop\mbam-setup.exe
[2010/04/16 19:46:27 | 000,363,520 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\rkill.pif
[2010/04/15 20:57:44 | 000,001,374 | ---- | M] () -- C:\WINDOWS\imsins.BAK
[2010/04/14 21:13:35 | 000,385,900 | ---- | M] () -- C:\WINDOWS\System32\drivers\etc\HOSTS
[2010/04/14 21:01:56 | 000,001,669 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Webroot AntiVirus.lnk
[2010/04/14 20:58:15 | 000,000,164 | ---- | M] () -- C:\WINDOWS\install.dat
[2010/04/14 20:27:04 | 000,001,637 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Spyware Doctor.lnk
[2010/04/13 22:12:24 | 000,008,452 | ---- | M] () -- C:\Documents and Settings\Dan\Application Data\wklnhst.dat
[2010/04/13 19:26:42 | 000,000,007 | ---- | M] () -- C:\WINDOWS\System32\Class15
[2010/04/13 19:26:42 | 000,000,005 | ---- | M] () -- C:\WINDOWS\System32\Band4
[2010/04/11 20:16:18 | 000,001,734 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\HijackThis.lnk
[2010/04/11 18:22:50 | 000,095,024 | ---- | M] (Sunbelt Software) -- C:\WINDOWS\System32\drivers\SBREDrv.sys
[2010/04/05 21:07:12 | 000,000,107 | ---- | M] () -- C:\Documents and Settings\Dan\Desktop\photobucket.url
[2010/04/02 22:43:54 | 000,013,824 | ---- | M] () -- C:\Documents and Settings\Dan\My Documents\Trip expenses.xls
[2010/03/30 00:46:30 | 000,038,224 | ---- | M] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbamswissarmy.sys
[2010/03/30 00:45:52 | 000,020,824 | ---- | M] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2010/03/28 13:13:57 | 000,030,720 | ---- | M] () -- C:\Documents and Settings\Dan\My Documents\Dans Medications.xls

========== Files Created - No Company Name ==========

[2010/04/24 20:07:26 | 000,000,209 | ---- | C] () -- C:\Boot.bak
[2010/04/24 20:07:23 | 000,260,272 | ---- | C] () -- C:\cmldr
[2010/04/24 20:05:07 | 000,261,632 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2010/04/24 20:05:07 | 000,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2010/04/24 20:05:07 | 000,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2010/04/24 20:05:07 | 000,077,312 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2010/04/24 20:05:07 | 000,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2010/04/24 20:00:24 | 003,923,062 | R--- | C] () -- C:\Documents and Settings\Dan\Desktop\bonaroCF.exe
[2010/04/19 20:52:12 | 000,000,187 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\Gold Screw 2 MVI_3010.flv video by Bonaro - Photobucket.url
[2010/04/18 21:23:44 | 000,000,211 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\possible Sinowal-MBR rootkit.url
[2010/04/18 20:50:55 | 000,525,824 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\dds.scr
[2010/04/18 20:50:07 | 000,000,000 | ---- | C] () -- C:\Documents and Settings\Dan\defogger_reenable
[2010/04/18 20:47:25 | 000,050,477 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\Defogger.exe
[2010/04/18 12:49:18 | 000,000,180 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\craigslist.url
[2010/04/18 12:49:05 | 000,000,217 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\Yahoo! Mail.url
[2010/04/18 12:43:27 | 000,000,211 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\My Bleeping Computer.url
[2010/04/18 12:15:03 | 000,293,376 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\3r05gcjm.exe
[2010/04/17 22:12:08 | 000,077,312 | ---- | C] () -- C:\mbr.exe
[2010/04/17 16:03:18 | 3085,488,128 | -HS- | C] () -- C:\hiberfil.sys
[2010/04/17 13:04:25 | 000,000,780 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\SUPERAntiSpyware Free Edition.lnk
[2010/04/17 04:11:24 | 000,001,915 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Google Earth.lnk
[2010/04/16 19:45:58 | 000,363,520 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\rkill.pif
[2010/04/15 20:06:26 | 000,000,330 | -H-- | C] () -- C:\WINDOWS\tasks\MP Scheduled Scan.job
[2010/04/14 21:01:56 | 000,001,669 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Webroot AntiVirus.lnk
[2010/04/14 20:58:09 | 000,000,164 | ---- | C] () -- C:\WINDOWS\install.dat
[2010/04/14 20:30:06 | 000,767,952 | ---- | C] () -- C:\WINDOWS\BDTSupport.dll
[2010/04/14 20:30:06 | 000,000,882 | ---- | C] () -- C:\WINDOWS\RegSDImport.xml
[2010/04/14 20:30:06 | 000,000,879 | ---- | C] () -- C:\WINDOWS\RegISSImport.xml
[2010/04/14 20:30:06 | 000,000,131 | ---- | C] () -- C:\WINDOWS\IDB.zip
[2010/04/14 20:30:05 | 001,152,444 | ---- | C] () -- C:\WINDOWS\UDB.zip
[2010/04/14 20:27:16 | 000,007,387 | ---- | C] () -- C:\WINDOWS\System32\drivers\pctgntdi.cat
[2010/04/14 20:27:08 | 000,007,383 | ---- | C] () -- C:\WINDOWS\System32\drivers\pctcore.cat
[2010/04/14 20:27:07 | 000,007,412 | ---- | C] () -- C:\WINDOWS\System32\drivers\PCTAppEvent.cat
[2010/04/14 20:27:04 | 000,001,637 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Spyware Doctor.lnk
[2010/04/14 20:26:58 | 000,007,383 | ---- | C] () -- C:\WINDOWS\System32\drivers\pctplsg.cat
[2010/04/13 19:26:42 | 000,000,007 | ---- | C] () -- C:\WINDOWS\System32\Class15
[2010/04/13 19:26:42 | 000,000,005 | ---- | C] () -- C:\WINDOWS\System32\Band4
[2010/04/11 20:16:18 | 000,001,734 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\HijackThis.lnk
[2010/04/11 10:03:24 | 000,767,952 | ---- | C] () -- C:\WINDOWS\BDTSupport.dll.old
[2010/04/05 21:07:12 | 000,000,174 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\Image hosting, free photo sharing & video sharing at Photobucket.url
[2010/04/05 21:07:12 | 000,000,107 | ---- | C] () -- C:\Documents and Settings\Dan\Desktop\photobucket.url
[2010/01/28 22:32:47 | 000,000,517 | ---- | C] () -- C:\WINDOWS\yukon.ini
[2009/11/06 12:00:28 | 000,031,088 | ---- | C] () -- C:\WINDOWS\System32\wrLZMA.dll
[2008/04/18 22:05:13 | 000,000,123 | ---- | C] () -- C:\WINDOWS\Winchat.ini
[2007/06/30 12:24:20 | 000,056,832 | ---- | C] () -- C:\WINDOWS\System32\iyvu9_32.dll
[2007/01/14 16:48:47 | 000,044,544 | ---- | C] () -- C:\WINDOWS\System32\GIF89.DLL
[2007/01/14 16:45:12 | 000,000,228 | ---- | C] () -- C:\WINDOWS\Sierra.ini
[2006/11/12 22:20:21 | 000,000,037 | ---- | C] () -- C:\WINDOWS\ipixActivex.ini
[2006/08/11 21:43:10 | 000,196,608 | ---- | C] () -- C:\WINDOWS\System32\nvapi(3).dll
[2006/08/11 21:43:10 | 000,196,608 | ---- | C] () -- C:\WINDOWS\System32\nvapi(2).dll
[2006/05/30 15:13:41 | 000,684,032 | ---- | C] () -- C:\WINDOWS\libeay32.dll
[2006/05/30 15:13:41 | 000,155,648 | ---- | C] () -- C:\WINDOWS\ssleay32.dll
[2006/05/14 21:53:00 | 000,000,169 | ---- | C] () -- C:\WINDOWS\RtlRack.ini
[2006/02/17 22:04:27 | 000,000,109 | ---- | C] () -- C:\WINDOWS\webica.ini
[2006/02/13 16:41:24 | 000,000,024 | ---- | C] () -- C:\WINDOWS\atid.ini
[2006/02/12 22:11:04 | 000,000,010 | ---- | C] () -- C:\WINDOWS\msoffice.ini
[2006/02/12 18:02:54 | 000,000,116 | ---- | C] () -- C:\WINDOWS\NeroDigital.ini
[2005/11/23 10:18:20 | 000,000,164 | ---- | C] () -- C:\WINDOWS\avrack.ini
[2005/11/23 10:18:16 | 000,156,672 | ---- | C] () -- C:\WINDOWS\System32\RtlCPAPI.dll
[2005/11/23 10:15:39 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2005/11/23 10:01:11 | 001,662,976 | ---- | C] () -- C:\WINDOWS\System32\nvwdmcpl.dll
[2005/11/23 10:01:11 | 001,019,904 | ---- | C] () -- C:\WINDOWS\System32\nvwimg.dll
[2005/11/23 10:01:10 | 000,466,944 | ---- | C] () -- C:\WINDOWS\System32\nvshell.dll
[2005/11/23 10:01:09 | 001,466,368 | ---- | C] () -- C:\WINDOWS\System32\nview.dll
[2005/11/23 10:01:09 | 000,573,440 | ---- | C] () -- C:\WINDOWS\System32\nvhwvid.dll
[2005/11/23 10:01:09 | 000,286,720 | ---- | C] () -- C:\WINDOWS\System32\nvnt4cpl.dll
[2005/11/23 10:01:06 | 000,046,080 | ---- | C] () -- C:\WINDOWS\System32\nvapi.dll
[2005/08/05 22:01:54 | 000,235,008 | ---- | C] () -- C:\WINDOWS\System32\psisdecd.dll
[2005/01/12 10:38:00 | 000,000,061 | ---- | C] () -- C:\WINDOWS\smscfg.ini
[2005/01/09 16:49:16 | 000,001,220 | ---- | C] () -- C:\WINDOWS\System32\oeminfo.ini
[2005/01/09 16:49:16 | 000,000,468 | ---- | C] () -- C:\WINDOWS\System32\emver.ini
[2003/03/09 22:31:04 | 000,561,152 | ---- | C] () -- C:\WINDOWS\System32\hpotscl.dll
[2003/01/07 16:05:08 | 000,002,695 | ---- | C] () -- C:\WINDOWS\System32\OUTLPERF.INI

========== Alternate Data Streams ==========

@Alternate Data Stream - 197 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2
@Alternate Data Stream - 109 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:A8ADE5D8
< End of report >


#13 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 27 April 2010 - 02:58 PM

update - I tried to run a Spyware Dr scan last night. The quick scan shows only a couple low risk cookies. I tried the full scan which takes nearly 2 hours. It kept hanging up at about 30% progress. I disabled webroot and disconnected from the internet because it seemed to hang when it went out for updates. Spy Dr. still gets stuck but not before it finds at least 4 badguys. It displays an Application family_keylogger, Trojan.generic and 2 Backdoor.rbot. It hung up when it tried to scan :
c:\documents and setting\Dan\application data\Limewire\browser\xurlrunner\chrome\classic.jar
I didn't want to try re-running the scan in safe mode until I talked to you.

No more redirects but MSIE is very unstable and slow

#14 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:49 PM

Posted 27 April 2010 - 06:47 PM

Hello, bonaro.

OK, let's try ESET. Much of what was found appeared to be poisoned Java from websearching, but let's double-check. Your GMER logs were clean, The webroot found some things but we cleaned them after the time stamp. So, let's get a second opinion.

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#15 bonaro

bonaro
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:01:49 PM

Posted 28 April 2010 - 08:50 AM

I ran the ESET and it found and removed 5 things including 2 trojan variants. When I clicked on "export log" the computer froze up and I had to do a hard boot to get out. Obviously I lost the log.
This is the same thing that happens when I run my Spy Dr scan except it locks before removal.
I started another ESET scan before I left for work this morning, will post results if any this evening.
MSIe is still the same...now what?

Edited by bonaro, 28 April 2010 - 10:24 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users