Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Koob face virus and rootkits


  • This topic is locked This topic is locked
19 replies to this topic

#1 linvr

linvr

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 20 May 2010 - 08:36 PM

got the koobface virus used malwarebytes, superantispyware and avg but, couldn't get rid of it all have more svchost.exe than i originally had and my startupbar keeps changing along with losing my sound sometimes. apparently i have root kits so i thought i'd try here. heres the logs thanks for the help in advance.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Christy Marie at 9:00:26.17 on Mon 05/17/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.446.89 [GMT -4:00]

FW: eTrust EZ Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\acs.exe
svchost.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\svchost.exe -k imgsvc
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\fxssvc.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Tvs\TvsTray.exe
C:\Program Files\ltmoh\Ltmoh.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\WINDOWS\system32\TPSMain.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\toshiba\ivp\ism\pinger.exe
C:\Program Files\AOL\Active Security Monitor\ASMonitor.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe
C:\Program Files\Verizon\McciTrayApp.exe
C:\Program Files\Verizon\VSP\VerizonServicepoint.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\Documents and Settings\Christy Marie\Desktop\dds.scr
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\system32\TPSBattM.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.toshibadirect.com/dpdstart
uSearch Bar = hxxp://www.toshiba.com/search
mSearchAssistant = hxxp://www.google.com/ie
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - No File
BHO: {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - No File
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Verizon Broadband Toolbar: {a057a204-bacc-4d26-8398-26fadcf27386} - c:\progra~1\verizo~1\VERIZO~1.DLL
BHO: CPrintEnhancer Object: {ae84a6aa-a333-4b92-b276-c11e2212e4fe} - c:\program files\hp\smart web printing\SmartWebPrinting.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Verizon Broadband Toolbar: {a057a204-bacc-4d26-8398-26fadcf27386} - c:\progra~1\verizo~1\VERIZO~1.DLL
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\toscdspd.exe
uRun: [swg] c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Google Update] "c:\documents and settings\rennie\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [Steam] "c:\program files\steam\Steam.exe" -silent
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [THotkey] c:\program files\toshiba\toshiba applet\thotkey.exe
mRun: [NDSTray.exe] NDSTray.exe
mRun: [Tvs] c:\program files\toshiba\tvs\TvsTray.exe
mRun: [LtMoh] c:\program files\ltmoh\Ltmoh.exe
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [TFncKy] TFncKy.exe
mRun: [TPSMain] TPSMain.exe
mRun: [PadTouch] c:\program files\toshiba\touch and launch\PadExe.exe
mRun: [SmoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe
mRun: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
mRun: [ASM] "c:\program files\aol\active security monitor\ASMonitor.exe" HIDEMAIN
mRun: [CFSServ.exe] CFSServ.exe -NoClient
mRun: [Verizon_McciTrayApp] "c:\program files\verizon\McciTrayApp.exe"
mRun: [VerizonServicepoint.exe] "c:\program files\verizon\vsp\VerizonServicepoint.exe" /AUTORUN
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Zone Labs Client] "c:\program files\ca\etrust ez armor\etrust ez firewall\ca.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [VSOCheckTask] "c:\progra~1\mcafee.com\vso\mcmnhdlr.exe" /checktask
mRun: [VirusScan Online] c:\progra~1\mcafee.com\vso\mcvsshld.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [NapsterShell] c:\program files\napster\napster.exe /systray
mRun: [MCUpdateExe] c:\progra~1\mcafee.com\agent\mcupdate.exe
mRun: [MCAgentExe] c:\progra~1\mcafee.com\agent\mcagent.exe
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [HostManager] c:\program files\common files\aol\1131163763\ee\AOLSoftware.exe
mRun: [AOLDialer] c:\program files\common files\aol\acs\AOLDial.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\ramasst.lnk - c:\windows\system32\RAMASST.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - Ati2evxx.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
Hosts: 127.0.0.1 www.spywareinfo.com

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\christ~1\applic~1\mozilla\firefox\profiles\9xfi1jjw.default\
FF - plugin: c:\documents and settings\rennie\application data\move networks\plugins\npqmp071500000347.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\

============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\SASDIFSV.SYS [2009-12-16 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-12-16 66632]
R1 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2009-6-3 271792]
R2 vsmon;TrueVector Internet Monitor;c:\windows\system32\zonelabs\vsmon.exe -service --> c:\windows\system32\zonelabs\vsmon.exe -service [?]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-12-16 12872]

=============== Created Last 30 ================

2010-05-17 08:20:16 3982240 ----a-w- c:\windows\system32\Flash10d.ocx
2010-05-17 08:20:15 0 d-----w- c:\program files\StreamTransport
2010-05-17 03:54:58 0 d-----w- c:\program files\Steam
2010-05-05 20:08:01 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
2010-05-05 20:05:16 153088 -c----w- c:\windows\system32\dllcache\triedit.dll
2010-05-05 20:02:21 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe
2010-04-26 10:35:43 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
2010-04-26 10:35:43 21504 ----a-w- c:\windows\system32\hidserv.dll
2010-04-26 10:35:35 14592 -c--a-w- c:\windows\system32\dllcache\kbdhid.sys
2010-04-26 10:35:35 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys

==================== Find3M ====================

2010-05-07 20:39:54 156672 ----a-w- c:\windows\system32\rmc_fixasf.exe
2010-05-07 20:39:53 237568 ----a-w- c:\windows\system32\rmc_rtspdl.dll
2010-05-07 20:39:24 323584 ----a-w- c:\windows\system32\AUDIOGENIE2.DLL
2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-25 06:24:37 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-17 13:10:28 2189952 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25:04 2066816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-01-02 10:15:49 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009010220090103\index.dat


heres the gmer log


GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-05-17 17:25:57
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\CHRIST~1\LOCALS~1\Temp\fwldqpog.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\System32\vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.) ZwDeleteKey [0xF24645D0]
SSDT \SystemRoot\System32\vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.) ZwDeleteValueKey [0xF2464530]
SSDT \SystemRoot\System32\vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.) ZwLoadKey [0xF2464650]
SSDT \SystemRoot\System32\vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.) ZwOpenProcess [0xF2463F60]
SSDT \SystemRoot\System32\vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.) ZwReplaceKey [0xF2464700]
SSDT \SystemRoot\System32\vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.) ZwRestoreKey [0xF2464780]
SSDT \SystemRoot\System32\vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.) ZwSetValueKey [0xF2464480]

---- Devices - GMER 1.0.15 ----

Device \Driver\Tcpip \Device\Ip vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.)

AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)

Device \Driver\Tcpip \Device\Tcp vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.)
Device \Driver\Tcpip \Device\Udp vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.)
Device \Driver\Tcpip \Device\RawIp vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.)
Device \Driver\Tcpip \Device\IPMULTICAST vsdatant.sys (TrueVector Device Driver/Zone Labs Inc.)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL@
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@NoChange 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS@

---- EOF - GMER 1.0.15 ----

============= FINISH: 9:03:44.70 ===============

BC AdBot (Login to Remove)

 


#2 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 22 May 2010 - 06:06 PM

Hello linvr smile.gif Welcome to the BC HijackThis Log and Analysis forum. I will be assisting you in cleaning up your system.


I ask that you refrain from running tools other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.



In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond the your topic and facilitate the cleaning of your machine.


Please keep in mind that we have a large backlog of users just like yourself waiting to be helped so try to be as timely as possible in your replies. Since we do this on a part-time voluntary basis we are limited on how many logs we can respond to and keep open due to time restraints. If you have to be away or can't answer for some other reason just let me know. Thank you for your understanding.



After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.




Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Instruction can be found HERE
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.




Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:





Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.







Note: Please post the log in the reply window and do not make it an attachment. Do this with all subsequent replies unless I ask otherwise.







Thanks,



thewall





If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#3 linvr

linvr
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 23 May 2010 - 04:43 AM

thank you so much for the help heres the combo fix log.


ComboFix 10-05-22.01 - Christy Marie 05/23/2010 5:06.2.1 - x86 NETWORK
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.446.251 [GMT -4:00]
Running from: c:\documents and settings\Christy Marie\Desktop\ComboFix.exe
FW: eTrust EZ Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\documents and settings\Rennie\GoToAssistDownloadHelper.exe
c:\program files\Common

.
((((((((((((((((((((((((( Files Created from 2010-04-23 to 2010-05-23 )))))))))))))))))))))))))))))))
.

2010-05-22 00:57 . 2010-05-22 02:02 -------- d-----w- c:\documents and settings\Christy Marie\nvram
2010-05-22 00:54 . 2010-05-22 02:02 -------- d-----w- c:\documents and settings\Christy Marie\cfg
2010-05-17 08:20 . 2010-05-17 08:20 -------- d-----w- c:\program files\StreamTransport
2010-05-17 03:54 . 2010-05-23 04:13 -------- d-----w- c:\program files\Steam
2010-05-05 20:08 . 2009-11-21 15:51 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
2010-05-05 20:05 . 2009-06-21 21:44 153088 -c----w- c:\windows\system32\dllcache\triedit.dll
2010-05-05 20:02 . 2009-10-23 15:28 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe
2010-04-26 10:35 . 2008-04-13 23:11 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
2010-04-26 10:35 . 2008-04-13 23:11 21504 ----a-w- c:\windows\system32\hidserv.dll
2010-04-26 10:35 . 2008-04-13 17:39 14592 -c--a-w- c:\windows\system32\dllcache\kbdhid.sys
2010-04-26 10:35 . 2008-04-13 17:39 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-23 04:29 . 2009-08-21 18:47 156672 ----a-w- c:\windows\system32\rmc_fixasf.exe
2010-05-23 04:29 . 2009-08-21 18:47 237568 ----a-w- c:\windows\system32\rmc_rtspdl.dll
2010-05-23 04:28 . 2009-08-21 18:44 323584 ----a-w- c:\windows\system32\AUDIOGENIE2.DLL
2010-05-23 03:22 . 2010-05-23 04:10 55296 ----a-w- c:\windows\Internet Logs\xDB9E.tmp
2010-05-23 03:22 . 2010-05-23 04:09 2956800 ----a-w- c:\windows\Internet Logs\xDB9D.tmp
2010-05-22 10:45 . 2010-05-22 10:50 36864 ----a-w- c:\windows\Internet Logs\xDB9C.tmp
2010-05-22 09:47 . 2010-02-27 11:53 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-22 09:46 . 2010-05-22 10:50 2945024 ----a-w- c:\windows\Internet Logs\xDB9B.tmp
2010-05-22 07:06 . 2008-07-22 20:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-05-22 04:10 . 2010-05-22 04:12 15360 ----a-w- c:\windows\Internet Logs\xDB9A.tmp
2010-05-22 04:09 . 2010-05-22 04:12 2904064 ----a-w- c:\windows\Internet Logs\xDB99.tmp
2010-05-22 04:08 . 2010-05-22 04:09 49152 ----a-w- c:\windows\Internet Logs\xDB98.tmp
2010-05-22 04:08 . 2010-05-22 04:09 2948096 ----a-w- c:\windows\Internet Logs\xDB97.tmp
2010-05-21 08:46 . 2010-05-21 09:58 2921984 ----a-w- c:\windows\Internet Logs\xDB94.tmp
2010-05-21 08:46 . 2010-05-21 09:58 43008 ----a-w- c:\windows\Internet Logs\xDB96.tmp
2010-05-20 09:39 . 2010-05-21 00:56 2936320 ----a-w- c:\windows\Internet Logs\xDB93.tmp
2010-05-20 09:39 . 2010-05-21 00:56 38912 ----a-w- c:\windows\Internet Logs\xDB95.tmp
2010-05-20 08:57 . 2010-05-20 09:34 2932736 ----a-w- c:\windows\Internet Logs\xDB91.tmp
2010-05-20 08:57 . 2010-05-20 09:35 69120 ----a-w- c:\windows\Internet Logs\xDB92.tmp
2010-05-18 09:59 . 2010-05-18 10:02 15360 ----a-w- c:\windows\Internet Logs\xDB90.tmp
2010-05-18 09:57 . 2010-05-18 10:02 2904064 ----a-w- c:\windows\Internet Logs\xDB8F.tmp
2010-05-18 09:11 . 2010-05-18 09:57 51712 ----a-w- c:\windows\Internet Logs\xDB8E.tmp
2010-05-18 09:10 . 2010-05-18 09:57 2928128 ----a-w- c:\windows\Internet Logs\xDB8D.tmp
2010-05-17 09:56 . 2010-05-17 11:14 77312 ----a-w- c:\windows\Internet Logs\xDB8C.tmp
2010-05-17 08:31 . 2010-05-17 11:14 2903552 ----a-w- c:\windows\Internet Logs\xDB8B.tmp
2010-05-17 08:26 . 2010-02-27 11:55 117760 ----a-w- c:\documents and settings\Christy Marie\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-05-14 20:33 . 2010-05-17 03:33 15360 ----a-w- c:\windows\Internet Logs\xDB8A.tmp
2010-05-14 20:33 . 2010-05-17 03:33 2833920 ----a-w- c:\windows\Internet Logs\xDB89.tmp
2010-05-14 20:27 . 2010-05-14 20:32 13312 ----a-w- c:\windows\Internet Logs\xDB88.tmp
2010-05-14 20:27 . 2010-05-14 20:32 2833920 ----a-w- c:\windows\Internet Logs\xDB87.tmp
2010-05-14 08:35 . 2010-05-14 20:27 28160 ----a-w- c:\windows\Internet Logs\xDB86.tmp
2010-05-14 08:35 . 2010-05-14 20:27 2833920 ----a-w- c:\windows\Internet Logs\xDB85.tmp
2010-05-07 20:34 . 2009-09-08 20:26 73768 ----a-w- c:\documents and settings\Christy Marie\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-05-07 19:47 . 2010-05-07 20:02 2854400 ----a-w- c:\windows\Internet Logs\xDB83.tmp
2010-05-07 19:39 . 2010-05-07 20:02 28160 ----a-w- c:\windows\Internet Logs\xDB84.tmp
2010-05-07 18:45 . 2005-12-01 18:33 -------- d-----w- c:\program files\Microsoft Works
2010-05-06 19:25 . 2010-05-06 19:31 27136 ----a-w- c:\windows\Internet Logs\xDB82.tmp
2010-05-06 19:13 . 2010-05-06 19:31 2883584 ----a-w- c:\windows\Internet Logs\xDB81.tmp
2010-05-05 18:50 . 2009-09-08 20:36 -------- d-----w- c:\documents and settings\Christy Marie\Application Data\VERIZON_BROAD
2010-05-05 18:29 . 2010-05-05 18:34 13312 ----a-w- c:\windows\Internet Logs\xDB80.tmp
2010-05-05 18:29 . 2010-05-05 18:34 2786304 ----a-w- c:\windows\Internet Logs\xDB7F.tmp
2010-05-05 18:24 . 2010-05-05 18:29 15360 ----a-w- c:\windows\Internet Logs\xDB7E.tmp
2010-05-05 18:24 . 2010-05-05 18:29 2786304 ----a-w- c:\windows\Internet Logs\xDB7D.tmp
2010-05-04 09:01 . 2010-05-05 18:23 13312 ----a-w- c:\windows\Internet Logs\xDB7C.tmp
2010-05-04 09:01 . 2010-05-05 18:23 2786304 ----a-w- c:\windows\Internet Logs\xDB7B.tmp
2010-05-04 08:58 . 2010-05-04 09:01 15360 ----a-w- c:\windows\Internet Logs\xDB7A.tmp
2010-05-04 08:57 . 2010-05-04 09:01 2786304 ----a-w- c:\windows\Internet Logs\xDB79.tmp
2010-05-04 08:53 . 2010-05-04 08:57 49664 ----a-w- c:\windows\Internet Logs\xDB78.tmp
2010-05-04 08:53 . 2010-05-04 08:57 2841600 ----a-w- c:\windows\Internet Logs\xDB77.tmp
2010-04-29 19:39 . 2010-02-27 11:53 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 19:39 . 2010-02-27 11:53 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-17 07:30 . 2010-04-17 09:01 9216 ----a-w- c:\windows\Internet Logs\xDB76.tmp
2010-04-15 20:58 . 2010-04-17 07:30 15872 ----a-w- c:\windows\Internet Logs\xDB74.tmp
2010-04-15 20:58 . 2010-04-17 07:30 2788352 ----a-w- c:\windows\Internet Logs\xDB73.tmp
2010-04-15 20:56 . 2010-04-15 20:58 15360 ----a-w- c:\windows\Internet Logs\xDB72.tmp
2010-04-15 20:51 . 2010-04-15 20:55 15360 ----a-w- c:\windows\Internet Logs\xDB70.tmp
2010-04-15 20:42 . 2010-04-15 20:50 15360 ----a-w- c:\windows\Internet Logs\xDB6E.tmp
2010-04-15 20:42 . 2010-04-15 20:50 2786304 ----a-w- c:\windows\Internet Logs\xDB6D.tmp
2010-04-15 15:59 . 2010-04-17 09:01 2786304 ----a-w- c:\windows\Internet Logs\xDB75.tmp
2010-04-15 15:59 . 2010-04-15 20:57 2786304 ----a-w- c:\windows\Internet Logs\xDB71.tmp
2010-04-15 15:59 . 2010-04-15 20:55 2786304 ----a-w- c:\windows\Internet Logs\xDB6F.tmp
2010-04-15 15:44 . 2010-04-15 15:58 22016 ----a-w- c:\windows\Internet Logs\xDB6C.tmp
2010-04-15 15:43 . 2010-04-15 15:58 2784256 ----a-w- c:\windows\Internet Logs\xDB6B.tmp
2010-04-09 09:27 . 2010-04-09 09:30 2776576 ----a-w- c:\windows\Internet Logs\xDB69.tmp
2010-04-09 09:27 . 2010-04-09 09:30 201728 ----a-w- c:\windows\Internet Logs\xDB6A.tmp
2010-04-08 22:25 . 2010-04-08 22:25 -------- d-----w- c:\documents and settings\Christy Marie\Application Data\HP
2010-04-04 00:16 . 2010-04-04 00:43 1837568 ----a-w- c:\windows\Internet Logs\xDB67.tmp
2010-04-04 00:15 . 2010-04-04 00:43 64000 ----a-w- c:\windows\Internet Logs\xDB68.tmp
2010-04-03 21:48 . 2010-04-03 22:09 56832 ----a-w- c:\windows\Internet Logs\xDB66.tmp
2010-04-03 02:35 . 2010-04-03 22:09 1795584 ----a-w- c:\windows\Internet Logs\xDB65.tmp
2010-03-31 09:37 . 2010-04-03 00:08 13312 ----a-w- c:\windows\Internet Logs\xDB64.tmp
2010-03-31 09:37 . 2010-04-03 00:08 1790464 ----a-w- c:\windows\Internet Logs\xDB63.tmp
2010-03-31 09:32 . 2010-03-31 09:37 14848 ----a-w- c:\windows\Internet Logs\xDB62.tmp
2010-03-31 09:31 . 2010-03-31 09:37 1790464 ----a-w- c:\windows\Internet Logs\xDB61.tmp
2010-03-31 09:27 . 2010-03-31 09:31 1790464 ----a-w- c:\windows\Internet Logs\xDB5F.tmp
2010-03-31 09:27 . 2010-03-31 09:31 3003392 ----a-w- c:\windows\Internet Logs\xDB60.tmp
2010-03-31 09:27 . 2010-03-31 09:27 485649 ----a-w- c:\windows\Internet Logs\tvDebug.zip
2010-03-28 22:06 . 2010-03-28 22:13 15872 ----a-w- c:\windows\Internet Logs\xDB5E.tmp
2010-03-28 22:06 . 2010-03-28 22:13 1771008 ----a-w- c:\windows\Internet Logs\xDB5D.tmp
2010-03-28 03:43 . 2010-03-28 23:05 16384 ----a-w- c:\windows\Internet Logs\xDB5C.tmp
2010-03-28 03:42 . 2010-03-28 23:05 1769984 ----a-w- c:\windows\Internet Logs\xDB5B.tmp
2010-03-28 02:39 . 2010-03-28 03:41 35328 ----a-w- c:\windows\Internet Logs\xDB5A.tmp
2010-03-28 02:38 . 2010-03-28 03:41 1769984 ----a-w- c:\windows\Internet Logs\xDB59.tmp
2010-03-11 12:01 . 2010-03-12 11:51 90624 ----a-w- c:\windows\Internet Logs\xDB58.tmp
2010-03-11 12:01 . 2010-03-12 11:51 1766912 ----a-w- c:\windows\Internet Logs\xDB57.tmp
2010-03-10 06:15 . 2005-11-05 00:53 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-06 23:32 . 2006-03-18 18:27 73768 ----a-w- c:\documents and settings\CHRISTY\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-03-04 23:24 . 2010-03-06 22:33 13312 ----a-w- c:\windows\Internet Logs\xDB56.tmp
2010-03-04 23:24 . 2010-03-06 22:33 1763328 ----a-w- c:\windows\Internet Logs\xDB55.tmp
2010-03-04 23:18 . 2010-03-04 23:24 16896 ----a-w- c:\windows\Internet Logs\xDB54.tmp
2010-03-04 23:18 . 2010-03-04 23:24 1763840 ----a-w- c:\windows\Internet Logs\xDB53.tmp
2010-03-04 23:12 . 2010-03-04 23:17 15360 ----a-w- c:\windows\Internet Logs\xDB52.tmp
2010-03-04 23:12 . 2010-03-04 23:17 1763840 ----a-w- c:\windows\Internet Logs\xDB51.tmp
2010-03-04 22:33 . 2010-03-04 23:11 1763840 ----a-w- c:\windows\Internet Logs\xDB50.tmp
2010-03-02 11:53 . 2010-03-04 22:33 32256 ----a-w- c:\windows\Internet Logs\xDB4F.tmp
2010-03-02 11:53 . 2010-03-04 22:33 1766400 ----a-w- c:\windows\Internet Logs\xDB4E.tmp
2010-03-01 03:48 . 2010-03-02 11:38 16384 ----a-w- c:\windows\Internet Logs\xDB4D.tmp
2010-03-01 03:47 . 2010-03-02 11:38 1763328 ----a-w- c:\windows\Internet Logs\xDB4C.tmp
2010-03-01 03:22 . 2010-03-01 03:47 1814528 ----a-w- c:\windows\Internet Logs\xDB4A.tmp
2010-03-01 03:22 . 2010-03-01 03:47 2830336 ----a-w- c:\windows\Internet Logs\xDB4B.tmp
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\toscdspd.exe" [2004-12-30 65536]
"Google Update"="c:\documents and settings\Rennie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-05-22 133104]
"Steam"="c:\program files\Steam\Steam.exe" [2010-05-17 1238352]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CFSServ.exe"="CFSServ.exe -NoClient" [X]
"RTHDCPL"="RTHDCPL.EXE" [2005-11-10 15473664]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-06 344064]
"SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-10-14 98394]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-10-14 688218]
"THotkey"="c:\program files\Toshiba\Toshiba Applet\thotkey.exe" [2005-11-25 352256]
"NDSTray.exe"="NDSTray.exe" [BU]
"Tvs"="c:\program files\Toshiba\Tvs\TvsTray.exe" [2005-11-10 73728]
"LtMoh"="c:\program files\ltmoh\Ltmoh.exe" [2005-05-19 188416]
"AGRSMMSG"="AGRSMMSG.exe" [2005-10-15 88203]
"TFncKy"="TFncKy.exe" [BU]
"TPSMain"="TPSMain.exe" [2005-06-01 282624]
"PadTouch"="c:\program files\TOSHIBA\Touch and Launch\PadExe.exe" [2005-07-15 1077322]
"SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2005-04-27 122880]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2005-03-18 151552]
"ASM"="c:\program files\AOL\Active Security Monitor\ASMonitor.exe" [2006-11-07 2500096]
"Verizon_McciTrayApp"="c:\program files\Verizon\McciTrayApp.exe" [2009-01-30 1553920]
"VerizonServicepoint.exe"="c:\program files\Verizon\VSP\VerizonServicepoint.exe" [2008-09-17 2065648]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-01-06 290088]
"Zone Labs Client"="c:\program files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe" [2004-10-12 722192]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-06 136600]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-01-05 413696]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-12-11 49152]
"HostManager"="c:\program files\Common Files\AOL\1131163763\ee\AOLSoftware.exe" [2006-09-26 50736]
"AOLDialer"="c:\program files\Common Files\AOL\ACS\AOLDial.exe" [2006-10-23 71216]

c:\documents and settings\CHRISTY\Start Menu\Programs\Startup\
DING!.lnk - c:\program files\Southwest Airlines\Ding\Ding.exe [2006-6-22 462848]
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2008-3-25 214360]
RAMASST.lnk - c:\windows\system32\RAMASST.exe [2005-11-4 155648]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"=
"c:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= c:\\TOSHIBA\\IVP\\ISM\\pinger.exe
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"c:\\Program Files\\America Online 9.0\\waol.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1131163763\\EE\\AOLServiceHost.exe"=
"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"c:\\Program Files\\Common Files\\AOL\\1131163763\\EE\\aolsoftware.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\TOSHIBA\\ConfigFree\\CFXFER.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Documents and Settings\\Rennie\\Local Settings\\Application Data\\Google\\Chrome\\Application\\chrome.exe"=
"c:\\Program Files\\Steam\\Steam.exe"=

S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [12/16/2009 5:26 PM 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/16/2009 5:26 PM 66632]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [12/16/2009 5:27 PM 12872]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2009-06-30 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2010-05-22 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2867716161-701086288-2161129601-1008Core.job
- c:\documents and settings\Rennie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-05-22 23:24]

2010-05-23 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2867716161-701086288-2161129601-1008UA.job
- c:\documents and settings\Rennie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-05-22 23:24]

2006-03-18 c:\windows\Tasks\Registration reminder 2.job
- c:\windows\system32\OOBE\oobebaln.exe [2005-11-05 00:12]

2006-03-18 c:\windows\Tasks\Registration reminder 3.job
- c:\windows\system32\OOBE\oobebaln.exe [2005-11-05 00:12]

2010-05-23 c:\windows\Tasks\User_Feed_Synchronization-{C0C6FD7C-7D56-4F24-96B5-527492FAB07E}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.toshibadirect.com/dpdstart
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Christy Marie\Application Data\Mozilla\Firefox\Profiles\9xfi1jjw.default\
FF - plugin: c:\documents and settings\Rennie\Application Data\Move Networks\plugins\npqmp071500000347.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)
HKCU-Run-swg - c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
HKCU-Run-SpybotSD TeaTimer - c:\program files\Spybot - Search & Destroy\TeaTimer.exe
HKLM-Run-VSOCheckTask - c:\progra~1\McAfee.com\VSO\mcmnhdlr.exe
HKLM-Run-VirusScan Online - c:\progra~1\mcafee.com\vso\mcvsshld.exe
HKLM-Run-NapsterShell - c:\program files\Napster\napster.exe
HKLM-Run-MCUpdateExe - c:\progra~1\mcafee.com\agent\mcupdate.exe
HKLM-Run-MCAgentExe - c:\progra~1\mcafee.com\agent\mcagent.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-23 05:15
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
@DACL=(02 0000)
"Installed"="1"
@=""

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
@DACL=(02 0000)
"Installed"="1"
"NoChange"="1"
@=""

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
@DACL=(02 0000)
"Installed"="1"
@=""
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(832)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-05-23 05:19:06
ComboFix-quarantined-files.txt 2010-05-23 09:19

Pre-Run: 46,954,643,456 bytes free
Post-Run: 47,701,372,928 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - 54F3419AB60DD01A67BD2FE71C49FEBC


#4 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 23 May 2010 - 11:41 AM

You're welcome!!


Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".


Make sure there are no Firefox windows open when running ATF.








I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push









If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#5 linvr

linvr
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 26 May 2010 - 12:01 AM

ok sorry it took me so long to reply back. the ESet Online scan came up with zero threats so theres no log to post. i'm able to use internet exlorer again but, whenever i start up the pc and go into my account theres a svchost.exe file that starts using up alot of memory and it continues to eat up memory unless i open up windows task manager and close it down. again thanks alot for the help I really appreciate it.

#6 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 26 May 2010 - 07:08 AM

When you say a lot of your memory how much is the task manager showing this as using?
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#7 linvr

linvr
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 26 May 2010 - 12:56 PM

QUOTE(thewall @ May 26 2010, 08:08 AM) View Post
When you say a lot of your memory how much is the task manager showing this as using?




it starts at around about 70,000 and its gotten to about 130,000 before so its alot of memory. It also makes the computer go slow until i kill the process. I have no idea why this one svchost.exe file is using up so much memory.

#8 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 26 May 2010 - 03:40 PM

Let's see if we can figure it out. First thing we need to do is download Process Explorer and then open and run it. Under the tree at the left you will need to expand the System Idle Process and then continue to expand the tree until you get to services.exe. After that you should see a listing with your svchost.exe entries showing. You can mouse over each one and it will show you what services are attached to any particular one. What would probably be the easiest way would be write down the PID of each one you see and then restart the computer and go back in and see what new one is showing up and that should be the one you stopped. Mouse over that one and see if you can determine what services are attached to it. If you can do it a easier way please feel free to but the main thing is for us to try and narrow down the service which is using so much CPU.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#9 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 30 May 2010 - 01:49 PM

Are you still with me?
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#10 linvr

linvr
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 30 May 2010 - 05:49 PM

yes i'm still with you. i solved the mystery of the svchost.exe process it apparently was a windows update that wasn't getting through. on top of that last night I caught that rogue anti virus thing thats infecting peoples pc's. i know thats got a root kit attached to it because I got a similar form of the virus before on my other pc and just ended up having to reformat it. Its my own fault though I kept putting off updating my java and paid for it. From what i've seen it attacks a vulnerability in older versions of java. Thanks for being so patient with me.

#11 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 30 May 2010 - 06:57 PM

So am I understand correctly you believe you have picked up a new infection? If that is correct go ahead and run ComboFix once more.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#12 linvr

linvr
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 03 June 2010 - 04:39 AM

heres the new combo fix log

ComboFix 10-05-24.07 - Administrator 05/30/2010 17:14:22.8.1 - x86 NETWORK
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.446.274 [GMT -4:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
FW: eTrust EZ Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\TEMP\Application Data\02000000e857dbb7922C.manifest
c:\documents and settings\TEMP\Application Data\02000000e857dbb7922O.manifest
c:\documents and settings\TEMP\Application Data\02000000e857dbb7922P.manifest
c:\documents and settings\TEMP\Application Data\02000000e857dbb7922S.manifest
c:\documents and settings\TEMP\Application Data\6F1ABA2876D281C8198344467F74DD54
c:\documents and settings\TEMP\Application Data\6F1ABA2876D281C8198344467F74DD54\enemies-names.txt
c:\documents and settings\TEMP\Application Data\6F1ABA2876D281C8198344467F74DD54\hookdll.dll
c:\documents and settings\TEMP\Application Data\SystemProc

Infected copy of c:\windows\system32\drivers\redbook.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-04-28 to 2010-05-30 )))))))))))))))))))))))))))))))
.

2010-05-30 10:46 . 2010-05-30 10:46 -------- d-----w- c:\documents and settings\TEMP\Local Settings\Application Data\Help
2010-05-30 03:37 . 2010-05-30 03:37 -------- d-----w- c:\documents and settings\TEMP\Application Data\Street-Ads
2010-05-30 03:37 . 2010-05-30 03:37 -------- d-----w- c:\documents and settings\TEMP\Application Data\Sky-Banners
2010-05-30 03:36 . 2010-05-30 03:36 50981 ----a-w- c:\windows\system32\noquijdujlvsous.exe
2010-05-30 03:36 . 2010-05-30 03:36 -------- d-----w- c:\program files\$NtUninstallWTF1012$
2010-05-29 09:01 . 2010-05-29 09:01 -------- d-sh--w- c:\documents and settings\TEMP\PrivacIE
2010-05-26 22:02 . 2010-05-26 22:02 -------- d-----w- c:\documents and settings\TEMP\Local Settings\Application Data\Mozilla
2010-05-26 22:00 . 2010-05-29 09:01 -------- d-----w- c:\documents and settings\TEMP\Application Data\VERIZON_BROAD
2010-05-26 21:55 . 2010-05-26 21:55 -------- d-----w- c:\documents and settings\TEMP\Local Settings\Application Data\Apple Computer
2010-05-26 21:55 . 2010-05-26 21:55 -------- d-----w- c:\documents and settings\TEMP\Local Settings\Application Data\AOL
2010-05-26 21:54 . 2010-05-26 21:54 -------- d-----w- c:\documents and settings\TEMP\Application Data\Verizon
2010-05-26 21:50 . 2010-05-29 09:01 -------- d-----w- c:\documents and settings\TEMP
2010-05-26 06:40 . 2010-05-26 06:40 -------- d-----w- c:\program files\StreamTransport
2010-05-24 16:31 . 2010-05-24 16:31 40633 ----a-w- c:\windows\system32\rnflqzns.exe
2010-05-23 20:58 . 2010-05-23 20:58 -------- d-----w- c:\program files\ESET
2010-05-22 00:57 . 2010-05-22 02:02 -------- d-----w- c:\documents and settings\Christy Marie\nvram
2010-05-22 00:54 . 2010-05-22 02:02 -------- d-----w- c:\documents and settings\Christy Marie\cfg
2010-05-17 03:54 . 2010-05-28 09:42 -------- d-----w- c:\program files\Steam
2010-05-05 20:08 . 2009-11-21 15:51 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
2010-05-05 20:05 . 2009-06-21 21:44 153088 -c----w- c:\windows\system32\dllcache\triedit.dll
2010-05-05 20:02 . 2009-10-23 15:28 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-30 10:41 . 2010-05-30 10:44 3145728 ----a-w- c:\windows\Internet Logs\xDBB4.tmp
2010-05-30 10:41 . 2010-05-30 10:44 224768 ----a-w- c:\windows\Internet Logs\xDBB7.tmp
2010-05-30 05:32 . 2010-02-27 11:54 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-05-29 08:48 . 2009-08-21 18:47 156672 ----a-w- c:\windows\system32\rmc_fixasf.exe
2010-05-29 08:48 . 2009-08-21 18:47 237568 ----a-w- c:\windows\system32\rmc_rtspdl.dll
2010-05-29 08:43 . 2009-08-21 18:44 323584 ----a-w- c:\windows\system32\AUDIOGENIE2.DLL
2010-05-29 08:41 . 2010-05-29 08:43 3215872 ----a-w- c:\windows\Internet Logs\xDBB2.tmp
2010-05-29 08:41 . 2010-05-29 08:43 52736 ----a-w- c:\windows\Internet Logs\xDBB3.tmp
2010-05-26 22:02 . 2010-05-26 23:12 23040 ----a-w- c:\windows\Internet Logs\xDBB5.tmp
2010-05-26 22:02 . 2010-05-26 23:12 3038720 ----a-w- c:\windows\Internet Logs\xDBB0.tmp
2010-05-26 21:51 . 2010-05-26 21:52 3030528 ----a-w- c:\windows\Internet Logs\xDBAD.tmp
2010-05-26 21:51 . 2010-05-26 21:52 20992 ----a-w- c:\windows\Internet Logs\xDBB1.tmp
2010-05-26 21:49 . 2006-03-18 18:27 73768 ----a-w- c:\documents and settings\CHRISTY\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-05-26 21:43 . 2010-05-26 21:46 26624 ----a-w- c:\windows\Internet Logs\xDBAF.tmp
2010-05-26 21:43 . 2010-05-26 21:46 3018240 ----a-w- c:\windows\Internet Logs\xDBAC.tmp
2010-05-26 21:29 . 2010-05-26 21:32 102912 ----a-w- c:\windows\Internet Logs\xDBAB.tmp
2010-05-26 21:02 . 2010-05-26 21:31 2998272 ----a-w- c:\windows\Internet Logs\xDBA9.tmp
2010-05-25 13:57 . 2010-05-25 22:26 15872 ----a-w- c:\windows\Internet Logs\xDBAE.tmp
2010-05-25 13:57 . 2010-05-25 22:25 2980864 ----a-w- c:\windows\Internet Logs\xDBA8.tmp
2010-05-25 12:04 . 2010-05-25 12:22 19456 ----a-w- c:\windows\Internet Logs\xDBAA.tmp
2010-05-25 12:04 . 2010-05-25 12:22 2972160 ----a-w- c:\windows\Internet Logs\xDBA7.tmp
2010-05-24 08:36 . 2010-05-25 05:16 2962944 ----a-w- c:\windows\Internet Logs\xDBA3.tmp
2010-05-24 08:36 . 2010-05-25 05:17 25600 ----a-w- c:\windows\Internet Logs\xDBA6.tmp
2010-05-24 00:38 . 2010-05-24 07:07 3055104 ----a-w- c:\windows\Internet Logs\xDBA2.tmp
2010-05-24 00:36 . 2010-05-24 07:07 25088 ----a-w- c:\windows\Internet Logs\xDBA5.tmp
2010-05-23 19:56 . 2010-05-23 20:12 2975744 ----a-w- c:\windows\Internet Logs\xDBA1.tmp
2010-05-23 19:55 . 2010-05-23 20:12 105984 ----a-w- c:\windows\Internet Logs\xDBA4.tmp
2010-05-23 08:35 . 2010-05-23 09:25 2959360 ----a-w- c:\windows\Internet Logs\xDB9F.tmp
2010-05-23 08:35 . 2010-05-23 09:26 26624 ----a-w- c:\windows\Internet Logs\xDBA0.tmp
2010-05-23 03:22 . 2010-05-23 04:10 55296 ----a-w- c:\windows\Internet Logs\xDB9E.tmp
2010-05-23 03:22 . 2010-05-23 04:09 2956800 ----a-w- c:\windows\Internet Logs\xDB9D.tmp
2010-05-22 10:45 . 2010-05-22 10:50 36864 ----a-w- c:\windows\Internet Logs\xDB9C.tmp
2010-05-22 09:47 . 2010-02-27 11:53 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-22 09:46 . 2010-05-22 10:50 2945024 ----a-w- c:\windows\Internet Logs\xDB9B.tmp
2010-05-22 07:06 . 2008-07-22 20:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-05-22 04:10 . 2010-05-22 04:12 15360 ----a-w- c:\windows\Internet Logs\xDB9A.tmp
2010-05-22 04:09 . 2010-05-22 04:12 2904064 ----a-w- c:\windows\Internet Logs\xDB99.tmp
2010-05-22 04:08 . 2010-05-22 04:09 49152 ----a-w- c:\windows\Internet Logs\xDB98.tmp
2010-05-22 04:08 . 2010-05-22 04:09 2948096 ----a-w- c:\windows\Internet Logs\xDB97.tmp
2010-05-21 08:46 . 2010-05-21 09:58 2921984 ----a-w- c:\windows\Internet Logs\xDB94.tmp
2010-05-21 08:46 . 2010-05-21 09:58 43008 ----a-w- c:\windows\Internet Logs\xDB96.tmp
2010-05-20 09:39 . 2010-05-21 00:56 2936320 ----a-w- c:\windows\Internet Logs\xDB93.tmp
2010-05-20 09:39 . 2010-05-21 00:56 38912 ----a-w- c:\windows\Internet Logs\xDB95.tmp
2010-05-20 08:57 . 2010-05-20 09:34 2932736 ----a-w- c:\windows\Internet Logs\xDB91.tmp
2010-05-20 08:57 . 2010-05-20 09:35 69120 ----a-w- c:\windows\Internet Logs\xDB92.tmp
2010-05-18 09:59 . 2010-05-18 10:02 15360 ----a-w- c:\windows\Internet Logs\xDB90.tmp
2010-05-18 09:57 . 2010-05-18 10:02 2904064 ----a-w- c:\windows\Internet Logs\xDB8F.tmp
2010-05-18 09:11 . 2010-05-18 09:57 51712 ----a-w- c:\windows\Internet Logs\xDB8E.tmp
2010-05-18 09:10 . 2010-05-18 09:57 2928128 ----a-w- c:\windows\Internet Logs\xDB8D.tmp
2010-05-17 09:56 . 2010-05-17 11:14 77312 ----a-w- c:\windows\Internet Logs\xDB8C.tmp
2010-05-17 08:31 . 2010-05-17 11:14 2903552 ----a-w- c:\windows\Internet Logs\xDB8B.tmp
2010-05-14 20:33 . 2010-05-17 03:33 15360 ----a-w- c:\windows\Internet Logs\xDB8A.tmp
2010-05-14 20:33 . 2010-05-17 03:33 2833920 ----a-w- c:\windows\Internet Logs\xDB89.tmp
2010-05-14 20:27 . 2010-05-14 20:32 13312 ----a-w- c:\windows\Internet Logs\xDB88.tmp
2010-05-14 20:27 . 2010-05-14 20:32 2833920 ----a-w- c:\windows\Internet Logs\xDB87.tmp
2010-05-14 08:35 . 2010-05-14 20:27 28160 ----a-w- c:\windows\Internet Logs\xDB86.tmp
2010-05-14 08:35 . 2010-05-14 20:27 2833920 ----a-w- c:\windows\Internet Logs\xDB85.tmp
2010-05-07 19:47 . 2010-05-07 20:02 2854400 ----a-w- c:\windows\Internet Logs\xDB83.tmp
2010-05-07 19:39 . 2010-05-07 20:02 28160 ----a-w- c:\windows\Internet Logs\xDB84.tmp
2010-05-07 18:45 . 2005-12-01 18:33 -------- d-----w- c:\program files\Microsoft Works
2010-05-06 19:25 . 2010-05-06 19:31 27136 ----a-w- c:\windows\Internet Logs\xDB82.tmp
2010-05-06 19:13 . 2010-05-06 19:31 2883584 ----a-w- c:\windows\Internet Logs\xDB81.tmp
2010-05-05 18:29 . 2010-05-05 18:34 13312 ----a-w- c:\windows\Internet Logs\xDB80.tmp
2010-05-05 18:29 . 2010-05-05 18:34 2786304 ----a-w- c:\windows\Internet Logs\xDB7F.tmp
2010-05-05 18:24 . 2010-05-05 18:29 15360 ----a-w- c:\windows\Internet Logs\xDB7E.tmp
2010-05-05 18:24 . 2010-05-05 18:29 2786304 ----a-w- c:\windows\Internet Logs\xDB7D.tmp
2010-05-04 09:01 . 2010-05-05 18:23 13312 ----a-w- c:\windows\Internet Logs\xDB7C.tmp
2010-05-04 09:01 . 2010-05-05 18:23 2786304 ----a-w- c:\windows\Internet Logs\xDB7B.tmp
2010-05-04 08:58 . 2010-05-04 09:01 15360 ----a-w- c:\windows\Internet Logs\xDB7A.tmp
2010-05-04 08:57 . 2010-05-04 09:01 2786304 ----a-w- c:\windows\Internet Logs\xDB79.tmp
2010-05-04 08:53 . 2010-05-04 08:57 49664 ----a-w- c:\windows\Internet Logs\xDB78.tmp
2010-05-04 08:53 . 2010-05-04 08:57 2841600 ----a-w- c:\windows\Internet Logs\xDB77.tmp
2010-04-29 19:39 . 2010-02-27 11:53 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 19:39 . 2010-02-27 11:53 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-17 07:30 . 2010-04-17 09:01 9216 ----a-w- c:\windows\Internet Logs\xDB76.tmp
2010-04-15 20:58 . 2010-04-17 07:30 15872 ----a-w- c:\windows\Internet Logs\xDB74.tmp
2010-04-15 20:58 . 2010-04-17 07:30 2788352 ----a-w- c:\windows\Internet Logs\xDB73.tmp
2010-04-15 20:56 . 2010-04-15 20:58 15360 ----a-w- c:\windows\Internet Logs\xDB72.tmp
2010-04-15 20:51 . 2010-04-15 20:55 15360 ----a-w- c:\windows\Internet Logs\xDB70.tmp
2010-04-15 20:42 . 2010-04-15 20:50 15360 ----a-w- c:\windows\Internet Logs\xDB6E.tmp
2010-04-15 20:42 . 2010-04-15 20:50 2786304 ----a-w- c:\windows\Internet Logs\xDB6D.tmp
2010-04-15 15:59 . 2010-04-17 09:01 2786304 ----a-w- c:\windows\Internet Logs\xDB75.tmp
2010-04-15 15:59 . 2010-04-15 20:57 2786304 ----a-w- c:\windows\Internet Logs\xDB71.tmp
2010-04-15 15:59 . 2010-04-15 20:55 2786304 ----a-w- c:\windows\Internet Logs\xDB6F.tmp
2010-04-15 15:44 . 2010-04-15 15:58 22016 ----a-w- c:\windows\Internet Logs\xDB6C.tmp
2010-04-15 15:43 . 2010-04-15 15:58 2784256 ----a-w- c:\windows\Internet Logs\xDB6B.tmp
2010-04-09 09:27 . 2010-04-09 09:30 2776576 ----a-w- c:\windows\Internet Logs\xDB69.tmp
2010-04-09 09:27 . 2010-04-09 09:30 201728 ----a-w- c:\windows\Internet Logs\xDB6A.tmp
2010-04-04 00:16 . 2010-04-04 00:43 1837568 ----a-w- c:\windows\Internet Logs\xDB67.tmp
2010-04-04 00:15 . 2010-04-04 00:43 64000 ----a-w- c:\windows\Internet Logs\xDB68.tmp
2010-04-03 21:48 . 2010-04-03 22:09 56832 ----a-w- c:\windows\Internet Logs\xDB66.tmp
2010-04-03 02:35 . 2010-04-03 22:09 1795584 ----a-w- c:\windows\Internet Logs\xDB65.tmp
2010-03-31 09:37 . 2010-04-03 00:08 13312 ----a-w- c:\windows\Internet Logs\xDB64.tmp
2010-03-31 09:37 . 2010-04-03 00:08 1790464 ----a-w- c:\windows\Internet Logs\xDB63.tmp
2010-03-31 09:32 . 2010-03-31 09:37 14848 ----a-w- c:\windows\Internet Logs\xDB62.tmp
2010-03-31 09:31 . 2010-03-31 09:37 1790464 ----a-w- c:\windows\Internet Logs\xDB61.tmp
2010-03-31 09:27 . 2010-03-31 09:31 1790464 ----a-w- c:\windows\Internet Logs\xDB5F.tmp
2010-03-31 09:27 . 2010-03-31 09:31 3003392 ----a-w- c:\windows\Internet Logs\xDB60.tmp
2010-03-31 09:27 . 2010-03-31 09:27 485649 ----a-w- c:\windows\Internet Logs\tvDebug.zip
2010-03-28 22:06 . 2010-03-28 22:13 15872 ----a-w- c:\windows\Internet Logs\xDB5E.tmp
.

((((((((((((((((((((((((((((( SnapShot@2010-05-23_09.15.30 )))))))))))))))))))))))))))))))))))))))))
.
+ 2007-01-29 08:58 . 2010-04-21 13:28 46080 c:\windows\system32\tzchange.exe
- 2007-01-29 08:58 . 2010-01-23 08:11 46080 c:\windows\system32\tzchange.exe
+ 2009-08-20 09:02 . 2009-08-20 09:02 5204992 c:\windows\Installer\4c98cbe.msp
+ 2010-01-27 21:53 . 2010-01-27 21:53 6820864 c:\windows\Installer\4c98cb9.msp
+ 2009-08-20 09:02 . 2009-08-20 09:02 5204992 c:\windows\Installer\47b3c.msp
+ 2010-01-27 21:53 . 2010-01-27 21:53 6820864 c:\windows\Installer\47b37.msp
+ 2009-08-20 09:02 . 2009-08-20 09:02 5204992 c:\windows\Installer\45f48.msp
+ 2010-01-27 21:53 . 2010-01-27 21:53 6820864 c:\windows\Installer\45f43.msp
+ 2009-08-20 09:02 . 2009-08-20 09:02 5204992 c:\windows\Installer\3520137.msp
+ 2010-01-27 21:53 . 2010-01-27 21:53 6820864 c:\windows\Installer\3520132.msp
+ 2009-08-20 09:02 . 2009-08-20 09:02 5204992 c:\windows\Installer\2cdb125.msp
+ 2010-01-27 21:53 . 2010-01-27 21:53 6820864 c:\windows\Installer\2cdb120.msp
+ 2010-01-27 21:53 . 2010-01-27 21:53 6820864 c:\windows\Installer\161ac0.msp
+ 2007-04-20 05:30 . 2010-04-30 15:51 32058312 c:\windows\system32\MRT.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\toscdspd.exe" [2004-12-30 65536]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\NPSWF32_FlashUtil.exe" [2009-02-03 240544]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CFSServ.exe"="CFSServ.exe -NoClient" [X]
"RTHDCPL"="RTHDCPL.EXE" [2005-11-10 15473664]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-06 344064]
"SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-10-14 98394]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-10-14 688218]
"THotkey"="c:\program files\Toshiba\Toshiba Applet\thotkey.exe" [2005-11-25 352256]
"NDSTray.exe"="NDSTray.exe" [BU]
"Tvs"="c:\program files\Toshiba\Tvs\TvsTray.exe" [2005-11-10 73728]
"LtMoh"="c:\program files\ltmoh\Ltmoh.exe" [2005-05-19 188416]
"AGRSMMSG"="AGRSMMSG.exe" [2005-10-15 88203]
"TFncKy"="TFncKy.exe" [BU]
"TPSMain"="TPSMain.exe" [2005-06-01 282624]
"PadTouch"="c:\program files\TOSHIBA\Touch and Launch\PadExe.exe" [2005-07-15 1077322]
"SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2005-04-27 122880]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2005-03-18 151552]
"Verizon_McciTrayApp"="c:\program files\Verizon\McciTrayApp.exe" [2009-01-30 1553920]
"VerizonServicepoint.exe"="c:\program files\Verizon\VSP\VerizonServicepoint.exe" [2008-09-17 2065648]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-01-06 290088]
"Zone Labs Client"="c:\program files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe" [2004-10-12 722192]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-06 136600]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-01-05 413696]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-12-11 49152]
"HostManager"="c:\program files\Common Files\AOL\1131163763\ee\AOLSoftware.exe" [2006-09-26 50736]
"AOLDialer"="c:\program files\Common Files\AOL\ACS\AOLDial.exe" [2006-10-23 71216]
"MChk"="c:\windows\system32\rnflqzns.exe" [2010-05-24 40633]

c:\documents and settings\CHRISTY\Start Menu\Programs\Startup\
DING!.lnk - c:\program files\Southwest Airlines\Ding\Ding.exe [2006-6-22 462848]
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2008-3-25 214360]
RAMASST.lnk - c:\windows\system32\RAMASST.exe [2005-11-4 155648]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"=
"c:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= c:\\TOSHIBA\\IVP\\ISM\\pinger.exe
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"c:\\Program Files\\America Online 9.0\\waol.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1131163763\\EE\\AOLServiceHost.exe"=
"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"c:\\Program Files\\Common Files\\AOL\\1131163763\\EE\\aolsoftware.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\TOSHIBA\\ConfigFree\\CFXFER.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Documents and Settings\\Rennie\\Local Settings\\Application Data\\Google\\Chrome\\Application\\chrome.exe"=
"c:\\Program Files\\Steam\\Steam.exe"=

S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [12/16/2009 5:26 PM 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/16/2009 5:26 PM 66632]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2/27/2010 7:53 AM 38224]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [12/16/2009 5:27 PM 12872]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2009-06-30 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2010-05-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2867716161-701086288-2161129601-1008Core.job
- c:\documents and settings\Rennie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-05-22 23:24]

2010-05-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2867716161-701086288-2161129601-1008UA.job
- c:\documents and settings\Rennie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-05-22 23:24]

2006-03-18 c:\windows\Tasks\Registration reminder 2.job
- c:\windows\system32\OOBE\oobebaln.exe [2005-11-05 00:12]

2006-03-18 c:\windows\Tasks\Registration reminder 3.job
- c:\windows\system32\OOBE\oobebaln.exe [2005-11-05 00:12]

2010-05-30 c:\windows\Tasks\User_Feed_Synchronization-{C0C6FD7C-7D56-4F24-96B5-527492FAB07E}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.toshibadirect.com/dpdstart
IE: &Google Search - c:\program files\Google\GoogleToolbar1.dll/cmsearch.html
IE: Backward Links - c:\program files\Google\GoogleToolbar1.dll/cmbacklinks.html
IE: Cached Snapshot of Page - c:\program files\Google\GoogleToolbar1.dll/cmcache.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Similar Pages - c:\program files\Google\GoogleToolbar1.dll/cmsimilar.html
IE: Translate into English - c:\program files\Google\GoogleToolbar1.dll/cmtrans.html
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\iypc0e54.default\
FF - plugin: c:\documents and settings\Rennie\Application Data\Move Networks\plugins\npqmp071500000347.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-skb - gdtckraf.dll
HKLM-Run-qvtsturfnxwpbwndo - c:\windows\system32\vsjizkwrjbcyn.dll
HKLM-Explorer_Run-RTHDBPL - c:\documents and settings\TEMP\Application Data\SystemProc\lsass.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-30 17:22
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
RTHDBPL = c:\documents and settings\TEMP\Application Data\SystemProc\lsass.exe??????6?????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-2867716161-701086288-2161129601-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,6e,75,a2,a8,f3,70,61,44,ab,2c,c4,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,6e,75,a2,a8,f3,70,61,44,ab,2c,c4,\

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
@DACL=(02 0000)
"Installed"="1"
@=""

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
@DACL=(02 0000)
"Installed"="1"
"NoChange"="1"
@=""

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
@DACL=(02 0000)
"Installed"="1"
@=""
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(828)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-05-30 17:32:37
ComboFix-quarantined-files.txt 2010-05-30 21:32
ComboFix2.txt 2010-05-30 14:33

Pre-Run: 41,366,437,888 bytes free
Post-Run: 41,293,189,120 bytes free

- - End Of File - - AA411DD78803D4D01A7ED2E8B61BA240


#13 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 03 June 2010 - 07:46 AM

I don't see an antivirus on your machine and you need to have one installed and running. You can choose one from the list below:

For a free anti-virus please follow one of these links:


AVG

Avira

Avast(Mouse over Free Software in the upper right corner)

Panda Cloud

Microsoft Security Essentials complete with installation videos







It's important to run this online scan to search for any remnants. It can take some time, so please be patient and allow it to run it's full course:



Please perform a scan with Kaspersky Online Virus Scanner.
-- Requires free Java Runtime Environment (JRE) to be installed before scanning for malware as ActiveX is no longer being used.
-- This scan will not remove any detected file threats but it will show where they are located so they can be cleaned with other tools.
  • Vista users need to right-click the IE or FF Start Menu or Quick Launch Bar icons and Run As Administrator from the context menu.
  • Read the "Advantages - Requirements and Limitations" then press the ... button.
  • You will be prompted to install an application from Kaspersky. Click the Run button. It will start downloading and installing the scanner and virus definitions.
  • When the downloads have finished, you should see 'Database is updated. Ready to scan'. Click on the ... button.
  • Make sure these boxes are checked. By default, they should be. If not, please check them and click on the ... button afterwards:
    • Detect malicious programs of the following categories:
      Viruses, Worms, Trojan Horses, Rootkits
      Spyware, Adware, Dialers and other potentially dangerous programs
    • Scan compound files (doesn't apply to the File scan area):
      Archives
      Mail databases
  • Click on My Computer under the Scan section. OK any warnings from your protection programs.
  • The scan will take a while so be patient and do NOT use the computer while the scan is running. Keep all other programs and windows closed.
  • Once the scan is complete (the 'status' will show complete), click on View Scan Report and any infected objects will be shown.
  • Click on Save Report As... and change the Files of type to Text file (.txt)
  • Name the file KAVScan_ddmmyy (day, month, year) before clicking on the Save button and save it to your Desktop.
  • Copy and paste (Ctrl+C) the saved scan results from that file in your next reply.
-- Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.



If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#14 linvr

linvr
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 04 June 2010 - 04:44 AM


heres the log



--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Thursday, June 3, 2010
Operating system: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Thursday, June 03, 2010 20:07:03
Records in database: 4197620
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
C:\
D:\

Scan statistics:
Objects scanned: 91119
Threats found: 3
Infected objects found: 3
Suspicious objects found: 0
Scan duration: 04:41:49


File name / Threat / Threats count
C:\Program Files\MP3 Player Utilities 4.00\DelDrv.exe Infected: not-a-virus:RiskTool.Win32.Deleter.e 1
C:\Qoobox\Quarantine\C\Documents and Settings\TEMP\Application Data\6F1ABA2876D281C8198344467F74DD54\hookdll.dll.vir Infected: Trojan.Win32.FraudPack.apxl 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\redbook.sys.vir Infected: Rootkit.Win32.TDSS.ap 1

Selected area has been scanned.



#15 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:01:26 PM

Posted 04 June 2010 - 01:10 PM

There is not anything in the log to be concerned about. Those Qoobox entries will be gone when we uninstall ComboFix. When you first posted your DDS log there should have been another log called Attach.txt generated at the same time. If you don't have that log please run DDS once again and post both logs it produces. Don't worry about making either of them an attachment just post them in the reply window.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users