Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with trojan.vundo and virtumonde.prx


  • This topic is locked This topic is locked
11 replies to this topic

#1 phynix

phynix

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:01:52 PM

Posted 24 August 2010 - 07:36 PM

Posting this on behalf of a friend. As I am typing this, there is a delay from the time I type to my letters being shown on the monitor. It takes forever for it to boot up, load an application.

System very slow for past few weeks. Scanned with MBAM, Spybot s&d, avg 9.0, disk cleanup done and Superantispyware scan done.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Family at 11:01:24.13 on Tue 08/24/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.446.49 [GMT -6:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\AVG\AVG9\avgchsvx.exe
C:\Program Files\AVG\AVG9\avgrsx.exe
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\WINDOWS\Explorer.EXE
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\AVG\AVG9\avgemc.exe
C:\Program Files\AVG\AVG9\avgnsx.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\PROGRA~1\AVG\AVG9\avgtray.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Common Files\Java\Java Update\jucheck.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Family\Desktop\dds.scr

============== Pseudo HJT Report ===============

uSearch Page = ${URL_SEARCHPAGE}
uStart Page = hxxp://www.facebook.com/
mSearch Page = ${URL_SEARCHPAGE}
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: LimeWire Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: LimeWire Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil10h_ActiveX.exe -update activex
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [AVG9_TRAY] c:\progra~1\avg\avg9\avgtray.exe
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
StartupFolder: c:\documents and settings\family\start menu\programs\startup\PowerReg Scheduler.exe
IE: &Search
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {F4430FE8-2638-42e5-B849-800749B94EED} - c:\program files\partygaming.net\partypokernet\RunPF.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1232731582984
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1262649493546
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} - hxxp://gfx1.hotmail.com/mail/w4/pr01/photouploadcontrol/MSNPUpld.cab
TCP: {8E11E535-1B35-4F8D-9926-1416FFE6137E} = 8.8.8.8
TCP: {C2B0B779-4600-469B-9F02-E45C096E4557} = 8.8.8.8
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll
Notify: avgrsstarter - avgrsstx.dll
AppInit_DLLs: c:\windows\system32\d3dx9_2532.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Authentication Packages = msv1_0 iifdda.dll

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2010-7-9 216400]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-7-9 29584]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-7-9 243024]
R2 avg9emc;AVG Free E-mail Scanner;c:\program files\avg\avg9\avgemc.exe [2010-7-9 921952]
R2 avg9wd;AVG Free WatchDog;c:\program files\avg\avg9\avgwdsvc.exe [2010-7-9 308136]
R2 Iprip;RIP Listener;c:\windows\system32\svchost.exe -k netsvcs [2001-8-23 14336]
R2 npf;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2008-6-1 34064]
R3 TuneConvertAudio;TuneConvertAudio;c:\windows\system32\drivers\TuneConvertAudio.sys [2010-1-4 23096]
S3 GSService;GSService;c:\windows\system32\GSService.exe [2010-1-4 335872]
S3 ip_fw;ipfw kernel-mode driver;\??\c:\windows\system32\drivers\ip_fw.sys --> c:\windows\system32\drivers\ip_fw.sys [?]
S3 SMServer;SMServer;c:\windows\system32\snmvtsvc.exe [2010-1-4 249856]

=============== Created Last 30 ================

2010-08-24 16:48:05 0 d-----w- c:\windows\system32\NtmsData

==================== Find3M ====================

2010-07-09 14:15:02 12536 ----a-w- c:\windows\system32\avgrsstx.dll
2010-07-09 14:14:57 243024 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-07-09 14:14:26 216400 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-04-14 05:32:35 203776 --sh--w- c:\windows\system32\unrar.exe
2009-04-21 02:11:00 32768 -csha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009042020090421\index.dat

============= FINISH: 11:05:00.41 ===============




Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4294

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

8/23/2010 6:51:28 PM
mbam-log-2010-08-23 (18-51-28).txt

Scan type: Quick scan
Objects scanned: 136359
Time elapsed: 33 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qopmnlsys (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxyyvssys (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxyyvssys (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/24/2010 at 05:56 PM

Application Version : 4.41.1000

Core Rules Database Version : 5400
Trace Rules Database Version: 3212

Scan type : Quick Scan
Total Scan Time : 00:45:23

Memory items scanned : 465
Memory threats detected : 0
Registry items scanned : 1515
Registry threats detected : 19
File items scanned : 4617
File threats detected : 171

Adware.Tracking Cookie
C:\Documents and Settings\Family\Cookies\family@adultfriendfinder[1].txt
C:\Documents and Settings\Family\Cookies\family@atdmt[1].txt
C:\Documents and Settings\Family\Cookies\family@theclassicporn[1].txt
C:\Documents and Settings\Family\Cookies\family@serving-sys[2].txt
C:\Documents and Settings\Family\Cookies\family@lucidmedia[2].txt
C:\Documents and Settings\Family\Cookies\family@content.yieldmanager[3].txt
C:\Documents and Settings\Family\Cookies\family@chitika[1].txt
C:\Documents and Settings\Family\Cookies\family@revsci[1].txt
C:\Documents and Settings\Family\Cookies\family@bs.serving-sys[2].txt
C:\Documents and Settings\Family\Cookies\family@avgtechnologies.112.2o7[1].txt
C:\Documents and Settings\Family\Cookies\family@trafficmp[1].txt
C:\Documents and Settings\Family\Cookies\family@www.qsstats[2].txt
C:\Documents and Settings\Family\Cookies\family@peertracking[2].txt
C:\Documents and Settings\Family\Cookies\family@doubleclick[1].txt
C:\Documents and Settings\Family\Cookies\family@pornayo[2].txt
C:\Documents and Settings\Family\Cookies\family@questionmarket[2].txt
C:\Documents and Settings\Family\Cookies\family@click2go[1].txt
C:\Documents and Settings\Family\Cookies\family@naiadsystems[1].txt
C:\Documents and Settings\Family\Cookies\family@eharmony.112.2o7[1].txt
C:\Documents and Settings\Family\Cookies\family@ads.crakmedia[2].txt
C:\Documents and Settings\Family\Cookies\family@ads.whaleads[2].txt
C:\Documents and Settings\Family\Cookies\family@ads.intergi[1].txt
C:\Documents and Settings\Family\Cookies\family@ad.slutload[1].txt
C:\Documents and Settings\Family\Cookies\family@server.cpmstar[2].txt
C:\Documents and Settings\Family\Cookies\family@ads.ipc[2].txt
C:\Documents and Settings\Family\Cookies\family@media6degrees[2].txt
C:\Documents and Settings\Family\Cookies\family@adxpansion[1].txt
C:\Documents and Settings\Family\Cookies\family@lfstmedia[1].txt
C:\Documents and Settings\Family\Cookies\family@invitemedia[2].txt
C:\Documents and Settings\Family\Cookies\family@kontera[2].txt
C:\Documents and Settings\Family\Cookies\family@audit.median[1].txt
C:\Documents and Settings\Family\Cookies\family@ads.watchmygf[1].txt
C:\Documents and Settings\Family\Cookies\family@apmebf[2].txt
C:\Documents and Settings\Family\Cookies\family@www.googleadservices[1].txt
C:\Documents and Settings\Family\Cookies\family@content.yieldmanager[1].txt
C:\Documents and Settings\Family\Cookies\family@tribalfusion[1].txt
C:\Documents and Settings\Family\Cookies\family@adserver.adtechus[1].txt
C:\Documents and Settings\Family\Cookies\family@ad.yieldmanager[1].txt
C:\Documents and Settings\Family\Cookies\family@roiservice[1].txt
C:\Documents and Settings\Family\Cookies\family@richmedia.yahoo[1].txt
C:\Documents and Settings\Family\Cookies\family@advertising[1].txt
C:\Documents and Settings\Family\Cookies\family@mediaplex[2].txt
C:\Documents and Settings\Family\Cookies\family@videoegg.adbureau[1].txt
C:\Documents and Settings\Family\Cookies\family@tracking.admarketplace[1].txt
C:\Documents and Settings\Family\Cookies\family@bannerbobber[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@media.adrevolver[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.pointroll[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@questionmarket[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@karasxxx[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tribalfusion[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@msnportal.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adrevolver[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@windowsmedia[2].txt
149.memecounter.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
2mdn.net [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
cdn4.specificclick.net [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
content.oddcast.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
core.insightexpressai.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
googleads.g.doubleclick.net [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
interclick.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
m1.2mdn.net [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
macromedia.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
media-att.pictela.net [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
media.mtvnservices.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
media.scanscout.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
media01.kyte.tv [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
media1.break.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
msnbcmedia.msn.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
msntest.serving-sys.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
naiadsystems.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
objects.tremormedia.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
secure-us.imrworldwide.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
serving-sys.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
static.2mdn.net [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
tools.latinteencash.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
video.redorbit.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
vidii.hardsextube.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
vitamine.networldmedia.net [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
www.freeporn.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
www.freshteen.biz [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
www.naiadsystems.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
www.pornhub.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
wwwstatic.megaporn.com [ C:\Documents and Settings\Family\Application Data\Macromedia\Flash Player\#SharedObjects\L9QLUGTS ]
cdn4.specificclick.net [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PSW94YBH ]
media.heavy.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PSW94YBH ]
media.scanscout.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PSW94YBH ]
media1.break.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PSW94YBH ]
objects.tremormedia.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PSW94YBH ]
secure-us.imrworldwide.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PSW94YBH ]
vitamine.networldmedia.net [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PSW94YBH ]
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@247realmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adx.bidsystem[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@xml.trafficengine[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@atdmt[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@atdmt[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.bighealthtree[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@revenue[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@bizzclick[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[5].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[10].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[11].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[7].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[6].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[5].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[9].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[8].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[7].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz10.91462.blueseek[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@videoegg.adbureau[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@videoegg.adbureau[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@videoegg.adbureau[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.financialcontent[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adcentriconline[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@trafficengine[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.networldmedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.networldmedia[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.networldmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.networldmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@server.iad.liveperson[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pubmatic[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pubmatic[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[5].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.undertone[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz4.91462.blueseek[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@questionmarket[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz4.91462.blueseek[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz3.91462.blueseek[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz2.91462.blueseek[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz2.91462.blueseek[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@networldmedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@networldmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@networldmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz9.91462.blueseek[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@xml.titusmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@atlas.entrepreneur[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz10.91462.blueseek[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@entrepreneur.122.2o7[1].txt

Trojan.Agent/Gen
HKU\S-1-5-21-1390067357-562591055-725345543-1004\Software\Videohost

Adware.MyWebSearch/FunWebProducts
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#DeviceDesc

Trojan.Agent/Gen-SSHNAS
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#DeviceDesc


BC AdBot (Login to Remove)

 


#2 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,114 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:52 PM

Posted 30 August 2010 - 10:23 AM

Hello ,
And welcome.gif to the Bleeping Computer Malware Removal Forum
. My name is Elise and I'll be glad to help you with your computer problems.


I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.
  • The cleaning process is not instant. Logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
-----------------------------------------------------------

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

If you have already posted a log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the Quick Scan button.
  • Two reports will open, copy and paste them in a reply here:
    • OTListIt.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

Please download Rootkit Unhooker and save it to your Desktop
  • Double-click on RKUnhookerLE to run it
  • Click the Report tab, then click Scan
  • Check Drivers, Stealth and uncheck the rest
  • Click OK
  • Wait until it's finished and then go to File > Save Report
  • Save the report to your Desktop
Copy the entire contents of the report and paste it in a reply here.

Note - you may get this warning it is ok, just ignore: "Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


-------------------------------------------------------------
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem

If you still need help, please include the following in your next reply
  • A detailed description of your problems
  • A new OTL log (don't forget extra.txt)
  • RKU log

Thanks and again sorry for the delay.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#3 phynix

phynix
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:01:52 PM

Posted 30 August 2010 - 04:19 PM

It takes forever to type a word.
Resident shield alert keeps popping up. many threat detections

OTL logfile created on: 8/30/2010 2:01:14 PM - Run 1
OTL by OldTimer - Version 3.2.11.0 Folder = C:\Documents and Settings\Family\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

446.00 Mb Total Physical Memory | 104.00 Mb Available Physical Memory | 23.00% Memory free
1.00 Gb Paging File | 0.00 Gb Available in Paging File | 18.00% Paging File free
Paging file location(s): C:\pagefile.sys 0 0 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 37.27 Gb Total Space | 15.87 Gb Free Space | 42.57% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: MATT-QWB9WR24IN
Current User Name: Family
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: On
Skip Microsoft Files: On
File Age = 90 Days
Output = Standard
Quick Scan

========== Processes (SafeList) ==========

PRC - [2010/08/30 13:59:58 | 000,574,976 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Family\Desktop\OTL.exe
PRC - [2010/08/28 13:09:08 | 000,184,832 | ---- | M] () -- C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Cbt.exe
PRC - [2010/08/28 13:08:56 | 000,182,784 | ---- | M] () -- C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Cbs.exe
PRC - [2010/07/21 08:48:24 | 000,921,952 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgemc.exe
PRC - [2010/07/09 08:12:22 | 001,101,152 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgchsvx.exe
PRC - [2010/07/09 08:12:21 | 000,620,896 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgnsx.exe
PRC - [2010/07/09 08:12:16 | 000,515,424 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgrsx.exe
PRC - [2010/07/09 08:12:08 | 000,723,296 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgcsrvx.exe
PRC - [2010/07/09 08:11:27 | 002,065,760 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgtray.exe
PRC - [2010/07/09 08:10:08 | 000,308,136 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgwdsvc.exe
PRC - [2010/06/10 21:03:08 | 000,144,176 | ---- | M] (Apple Inc.) -- C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
PRC - [2010/01/11 15:21:52 | 000,490,216 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Common Files\Java\Java Update\jucheck.exe
PRC - [2008/04/13 18:12:19 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2001/08/23 06:00:00 | 000,019,456 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\system32\tcpsvcs.exe


========== Modules (SafeList) ==========

MOD - [2010/08/30 13:59:58 | 000,574,976 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Family\Desktop\OTL.exe
MOD - [2008/04/13 18:10:20 | 000,110,592 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\system32\msscript.ocx


========== Win32 Services (SafeList) ==========

SRV - File not found [Disabled | Stopped] -- C:\WINDOWS\System32\hidserv.dll -- (HidServ)
SRV - [2010/07/21 08:48:24 | 000,921,952 | ---- | M] (AVG Technologies CZ, s.r.o.) [Auto | Running] -- C:\Program Files\AVG\AVG9\avgemc.exe -- (avg9emc)
SRV - [2010/07/09 08:10:08 | 000,308,136 | ---- | M] (AVG Technologies CZ, s.r.o.) [Auto | Running] -- C:\Program Files\AVG\AVG9\avgwdsvc.exe -- (avg9wd)
SRV - [2010/06/10 21:03:08 | 000,144,176 | ---- | M] (Apple Inc.) [Auto | Running] -- C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe -- (Apple Mobile Device)
SRV - [2009/11/19 14:37:22 | 000,335,872 | ---- | M] () [On_Demand | Stopped] -- C:\WINDOWS\System32\GSService.exe -- (GSService)
SRV - [2009/11/19 14:15:42 | 000,249,856 | ---- | M] (SMServer) [On_Demand | Stopped] -- C:\WINDOWS\System32\snmvtsvc.exe -- (SMServer)
SRV - [2008/04/13 18:11:55 | 000,035,328 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\WINDOWS\system32\iprip.dll -- (Iprip)
SRV - [2001/08/23 06:00:00 | 000,019,456 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\WINDOWS\system32\tcpsvcs.exe -- (SimpTcp)


========== Driver Services (SafeList) ==========

DRV - File not found [Kernel | On_Demand | Stopped] -- C:\WINDOWS\System32\DRIVERS\ip_fw.sys -- (ip_fw)
DRV - [2010/07/09 08:14:57 | 000,243,024 | ---- | M] (AVG Technologies CZ, s.r.o.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\avgtdix.sys -- (AvgTdiX)
DRV - [2010/07/09 08:14:26 | 000,216,400 | ---- | M] (AVG Technologies CZ, s.r.o.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\avgldx86.sys -- (AvgLdx86)
DRV - [2010/07/09 08:14:24 | 000,029,584 | ---- | M] (AVG Technologies CZ, s.r.o.) [File_System | System | Running] -- C:\WINDOWS\system32\drivers\avgmfx86.sys -- (AvgMfx86)
DRV - [2010/05/10 12:41:30 | 000,067,656 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
DRV - [2010/02/17 12:25:48 | 000,012,872 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys -- (SASDIFSV)
DRV - [2009/11/19 17:15:26 | 000,023,096 | ---- | M] (Windows ® Codename Longhorn DDK provider) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\TuneConvertAudio.sys -- (TuneConvertAudio)
DRV - [2008/06/01 01:13:10 | 000,034,064 | ---- | M] (CACE Technologies) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\npf.sys -- (npf)
DRV - [2008/04/13 12:45:29 | 000,010,624 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\gameenum.sys -- (gameenum)
DRV - [2008/04/13 12:45:12 | 000,060,032 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\USBAUDIO.sys -- (usbaudio) USB Audio Driver (WDM)
DRV - [2007/05/09 21:51:34 | 000,041,888 | ---- | M] (Logitech Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\LVUSBSta.sys -- (LVUSBSta)
DRV - [2007/05/09 21:47:00 | 001,276,832 | ---- | M] (Logitech Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\LV302V32.SYS -- (PID_PEPI) Logitech QuickCam IM(PID_PEPI)
DRV - [2001/08/17 12:19:34 | 000,040,704 | ---- | M] (Creative Technology Ltd.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\es1371mp.sys -- (es1371) Creative AudioPCI (ES1371,ES1373) (WDM)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = ${URL_SEARCHPAGE}


IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 32 2D 76 00 F0 01 13 47 9B D4 C2 BA D9 52 14 FA [binary data]
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 32 2D 76 00 F0 01 13 47 9B D4 C2 BA D9 52 14 FA [binary data]
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 32 2D 76 00 F0 01 13 47 9B D4 C2 BA D9 52 14 FA [binary data]
IE - HKU\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 32 2D 76 00 F0 01 13 47 9B D4 C2 BA D9 52 14 FA [binary data]
IE - HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = ${URL_SEARCHPAGE}
IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.facebook.com/
IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/
IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 8E 6D FD DC E7 D0 C9 01 [binary data]
IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 32 2D 76 00 F0 01 13 47 9B D4 C2 BA D9 52 14 FA [binary data]
IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-1390067357-562591055-725345543-1004\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local


[2010/01/27 21:31:58 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\Mozilla\Extensions
[2010/01/27 21:31:58 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\Mozilla\Extensions\mozswing@mozswing.org
[2010/07/08 17:10:31 | 000,000,000 | ---D | M] -- C:\Program Files\Mozilla Firefox\extensions

O1 HOSTS File: ([2010/08/28 14:58:06 | 000,000,734 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (brumavybpgrm Object) - {2C14D50A-135E-4B2E-A494-DE24E46E3968} - C:\WINDOWS\$NtUninstallMTF1011$\mmx.dll ()
O2 - BHO: (AVG Safe Search) - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (AVG Technologies CZ, s.r.o.)
O2 - BHO: (Spybot-S&D IE Protection) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O2 - BHO: (LimeWire Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask.com)
O3 - HKLM\..\Toolbar: (LimeWire Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask.com)
O3 - HKU\.DEFAULT\..\Toolbar\WebBrowser: (LimeWire Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask.com)
O3 - HKU\S-1-5-18\..\Toolbar\WebBrowser: (LimeWire Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask.com)
O3 - HKU\S-1-5-21-1390067357-562591055-725345543-1004\..\Toolbar\WebBrowser: (no name) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No CLSID value found.
O3 - HKU\S-1-5-21-1390067357-562591055-725345543-1004\..\Toolbar\WebBrowser: (LimeWire Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask.com)
O4 - HKLM..\Run: [AVG9_TRAY] C:\Program Files\AVG\AVG9\avgtray.exe (AVG Technologies CZ, s.r.o.)
O4 - HKLM..\Run: [bipro] C:\WINDOWS\$NtUninstallMTF1011$\mmduch.DLL ()
O4 - HKLM..\Run: [MChk] C:\WINDOWS\system32\R1890.exe ()
O4 - HKLM..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe (Ahead Software Gmbh)
O4 - HKLM..\Run: [sta] C:\WINDOWS\System32\E1890.dll ()
O4 - HKU\.DEFAULT..\Run: [OTGV1DNWQQ] C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Cbs.exe ()
O4 - HKU\.DEFAULT..\Run: [XBV6RD5SZF] C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Cbt.exe ()
O4 - HKU\S-1-5-18..\Run: [OTGV1DNWQQ] C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Cbs.exe ()
O4 - HKU\S-1-5-18..\Run: [XBV6RD5SZF] C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Cbt.exe ()
O4 - Startup: C:\Documents and Settings\Family\Start Menu\Programs\Startup\PowerReg Scheduler.exe ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run: 2nvtu0 = C:\DOCUME~1\Family\LOCALS~1\Temp\ui15cr.exe ()
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: CDRAutoRun = 0
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: CDRAutoRun = 0
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O9 - Extra 'Tools' menuitem : Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O9 - Extra Button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe File not found
O9 - Extra 'Tools' menuitem : PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe File not found
O10 - NameSpace_Catalog5\Catalog_Entries\000000000004 [] - C:\Program Files\Bonjour\mdnsNSP.dll (Apple Inc.)
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} http://download.macromedia.com/pub/shockwa...director/sw.cab (Shockwave ActiveX Control)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://www.update.microsoft.com/windowsupd...b?1232731582984 (WUWebControl Class)
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} http://www.update.microsoft.com/microsoftu...b?1262649493546 (MUWebControl Class)
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset.com/special/eos/OnlineScanner.cab (OnlineScanner Control)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_18)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flash...r/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_18)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_18)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab (Shockwave Flash Object)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
O16 - DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} http://gfx1.hotmail.com/mail/w4/pr01/photo...ol/MSNPUpld.cab (Windows Live Hotmail Photo Upload Tool)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.0.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 93.188.162.233,93.188.161.233
O18 - Protocol\Handler\linkscanner {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll (AVG Technologies CZ, s.r.o.)
O20 - AppInit_DLLs: (C:\WINDOWS\System32\d3dx9_2532.dll) - C:\WINDOWS\System32\d3dx9_2532.dll File not found
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (SUPERAntiSpyware.com)
O20 - Winlogon\Notify\avgrsstarter: DllName - avgrsstx.dll - C:\WINDOWS\System32\avgrsstx.dll (AVG Technologies CZ, s.r.o.)
O24 - Desktop Components:0 () - http://static.ak.fbcdn.net/rsrc.php/z12E0/hash/8q2anwu7.gif
O24 - Desktop Components:1 (My Current Home Page) - About:Home
O24 - Desktop WallPaper: C:\Documents and Settings\Family\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O24 - Desktop BackupWallPaper: C:\Documents and Settings\Family\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O30 - LSA: Authentication Packages - (iifdda.dll) - File not found
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2009/01/22 20:47:54 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 90 Days ==========

[2010/08/30 13:59:57 | 000,574,976 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\Family\Desktop\OTL.exe
[2010/08/28 14:47:48 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Family\Application Data\Street-Ads
[2010/08/28 13:07:04 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Family\Application Data\2395C68D165074EDF524710CD75673AF
[2010/08/25 21:17:27 | 000,000,000 | ---D | C] -- C:\Backup
[2010/08/24 17:04:35 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Family\Application Data\SUPERAntiSpyware.com
[2010/08/24 17:04:35 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2010/08/24 17:03:38 | 000,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2010/08/24 10:48:05 | 000,000,000 | ---D | C] -- C:\WINDOWS\System32\NtmsData
[2010/07/12 12:42:59 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
[2010/07/09 10:01:44 | 000,000,000 | -H-D | C] -- C:\$AVG
[2010/07/09 08:14:57 | 000,012,536 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\avgrsstx.dll
[2010/07/09 08:14:49 | 000,243,024 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgtdix.sys
[2010/07/09 08:14:25 | 000,216,400 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgldx86.sys
[2010/07/09 08:14:18 | 000,029,584 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgmfx86.sys
[2010/07/09 08:14:03 | 000,000,000 | ---D | C] -- C:\WINDOWS\System32\drivers\Avg
[2010/07/09 08:05:42 | 000,000,000 | ---D | C] -- C:\Program Files\AVG
[2010/07/09 08:04:35 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\avg9
[2010/07/08 18:48:00 | 000,000,000 | ---D | C] -- C:\Program Files\Spybot - Search & Destroy
[2010/07/08 18:48:00 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
[2010/07/08 18:46:46 | 000,000,000 | ---D | C] -- C:\Program Files\ESET
[2010/07/08 15:49:04 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Family\Application Data\Malwarebytes
[2010/07/08 15:48:41 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Malwarebytes
[2010/07/08 15:48:40 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[9 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\Documents and Settings\Family\Desktop\*.tmp files -> C:\Documents and Settings\Family\Desktop\*.tmp -> ]
[1 C:\Documents and Settings\Family\*.tmp files -> C:\Documents and Settings\Family\*.tmp -> ]

========== Files - Modified Within 90 Days ==========

[2010/08/30 14:14:00 | 000,000,428 | -H-- | M] () -- C:\WINDOWS\tasks\User_Feed_Synchronization-{20B958C0-57E5-40A4-9C11-2B4DD5821D18}.job
[2010/08/30 14:01:04 | 000,000,236 | ---- | M] () -- C:\WINDOWS\tasks\Scheduled Update for Ask Toolbar.job
[2010/08/30 13:59:58 | 000,574,976 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Family\Desktop\OTL.exe
[2010/08/30 13:54:00 | 000,000,320 | -H-- | M] () -- C:\WINDOWS\tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job
[2010/08/30 13:32:00 | 000,000,320 | -H-- | M] () -- C:\WINDOWS\tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
[2010/08/30 12:14:36 | 000,000,664 | ---- | M] () -- C:\WINDOWS\System32\d3d9caps.dat
[2010/08/30 08:26:55 | 064,087,930 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\incavi.avm
[2010/08/29 18:05:56 | 000,002,206 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2010/08/29 18:03:16 | 000,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2010/08/29 18:03:10 | 000,000,304 | -HS- | M] () -- C:\WINDOWS\tasks\szyqmd.job
[2010/08/29 18:02:42 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2010/08/29 18:00:20 | 003,670,016 | -H-- | M] () -- C:\Documents and Settings\Family\ntuser.dat
[2010/08/29 18:00:20 | 000,000,178 | -HS- | M] () -- C:\Documents and Settings\Family\ntuser.ini
[2010/08/29 17:59:57 | 001,577,058 | -H-- | M] () -- C:\Documents and Settings\Family\Local Settings\Application Data\IconCache.db
[2010/08/28 13:10:01 | 000,079,360 | RHS- | M] () -- C:\WINDOWS\System32\locale3.dll
[2010/08/24 23:25:09 | 000,000,284 | ---- | M] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2010/08/24 21:18:16 | 000,002,137 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\iTunes.lnk
[2010/07/15 22:19:46 | 000,246,784 | ---- | M] () -- C:\WINDOWS\System32\A1890.dll
[2010/07/15 22:19:32 | 000,294,912 | ---- | M] () -- C:\WINDOWS\System32\E1890.dll
[2010/07/13 18:43:22 | 000,040,581 | ---- | M] () -- C:\WINDOWS\System32\R1890.exe
[2010/07/12 18:38:13 | 000,000,116 | ---- | M] () -- C:\WINDOWS\NeroDigital.ini
[2010/07/09 08:15:04 | 000,001,507 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\AVG Free 9.0.lnk
[2010/07/09 08:15:02 | 000,012,536 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\avgrsstx.dll
[2010/07/09 08:14:57 | 000,243,024 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgtdix.sys
[2010/07/09 08:14:26 | 000,216,400 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgldx86.sys
[2010/07/09 08:14:24 | 000,029,584 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgmfx86.sys
[2010/07/09 08:14:18 | 000,113,461 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\iavichjw.avm
[2010/07/08 18:48:15 | 000,000,951 | ---- | M] () -- C:\Documents and Settings\Family\Application Data\Microsoft\Internet Explorer\Quick Launch\Spybot - Search & Destroy.lnk
[2010/07/08 17:35:20 | 000,004,038 | -HS- | M] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879P.manifest
[2010/07/08 15:44:51 | 000,000,232 | ---- | M] () -- C:\WINDOWS\System32\1429eb05
[2010/07/08 15:34:45 | 000,000,051 | -HS- | M] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879C.manifest
[2010/07/08 15:34:34 | 000,000,367 | -HS- | M] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879O.manifest
[2010/07/08 15:34:34 | 000,000,011 | -HS- | M] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879S.manifest
[2010/06/17 21:54:46 | 000,355,086 | ---- | M] () -- C:\WINDOWS\System32\PerfStringBackup.INI
[2010/06/17 21:54:46 | 000,311,604 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2010/06/17 21:54:46 | 000,039,992 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[9 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\Documents and Settings\Family\Desktop\*.tmp files -> C:\Documents and Settings\Family\Desktop\*.tmp -> ]
[1 C:\Documents and Settings\Family\*.tmp files -> C:\Documents and Settings\Family\*.tmp -> ]

========== Files Created - No Company Name ==========

[2010/08/28 13:10:14 | 000,000,320 | -H-- | C] () -- C:\WINDOWS\tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
[2010/08/28 13:10:05 | 000,000,304 | -HS- | C] () -- C:\WINDOWS\tasks\szyqmd.job
[2010/08/28 13:10:01 | 000,079,360 | RHS- | C] () -- C:\WINDOWS\System32\locale3.dll
[2010/08/28 13:09:49 | 000,000,320 | -H-- | C] () -- C:\WINDOWS\tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job
[2010/07/15 22:19:46 | 000,246,784 | ---- | C] () -- C:\WINDOWS\System32\A1890.dll
[2010/07/15 22:19:32 | 000,294,912 | ---- | C] () -- C:\WINDOWS\System32\E1890.dll
[2010/07/13 18:43:22 | 000,040,581 | ---- | C] () -- C:\WINDOWS\System32\R1890.exe
[2010/07/12 12:45:45 | 000,002,137 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\iTunes.lnk
[2010/07/12 12:37:23 | 000,000,284 | ---- | C] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2010/07/09 08:15:04 | 000,001,507 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\AVG Free 9.0.lnk
[2010/07/09 08:14:17 | 000,113,461 | ---- | C] () -- C:\WINDOWS\System32\drivers\Avg\iavichjw.avm
[2010/07/09 08:14:03 | 064,087,930 | ---- | C] () -- C:\WINDOWS\System32\drivers\Avg\incavi.avm
[2010/07/08 18:48:15 | 000,000,951 | ---- | C] () -- C:\Documents and Settings\Family\Application Data\Microsoft\Internet Explorer\Quick Launch\Spybot - Search & Destroy.lnk
[2010/04/13 23:32:14 | 000,004,038 | -HS- | C] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879P.manifest
[2010/04/13 23:32:14 | 000,000,367 | -HS- | C] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879O.manifest
[2010/04/13 23:32:14 | 000,000,051 | -HS- | C] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879C.manifest
[2010/04/13 23:32:14 | 000,000,011 | -HS- | C] () -- C:\Documents and Settings\Family\Application Data\02000000b524c434879S.manifest
[2010/02/10 18:55:39 | 000,000,038 | ---- | C] () -- C:\Documents and Settings\Family\Application Data\msnpromo.txt
[2009/11/30 16:54:51 | 000,000,426 | ---- | C] () -- C:\WINDOWS\hegames.ini
[2009/11/08 12:19:29 | 000,043,008 | ---- | C] () -- C:\Documents and Settings\Family\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2009/08/10 16:42:21 | 000,354,816 | ---- | C] () -- C:\WINDOWS\System32\psisdecd.dll
[2009/06/09 21:18:16 | 000,000,294 | ---- | C] () -- C:\WINDOWS\System32\MRT.INI
[2009/06/08 16:57:27 | 000,076,407 | ---- | C] () -- C:\Documents and Settings\Family\Application Data\Smiley.ico
[2009/06/02 12:33:08 | 000,000,116 | ---- | C] () -- C:\WINDOWS\NeroDigital.ini
[2009/01/23 11:09:49 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2008/06/01 01:13:10 | 000,053,299 | ---- | C] () -- C:\WINDOWS\System32\pthreadVC.dll
[2007/05/09 20:35:54 | 000,057,126 | ---- | C] () -- C:\WINDOWS\System32\lvcoinst.ini

========== LOP Check ==========

[2009/12/04 21:18:18 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\113C9
[2009/12/23 15:01:21 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\15167
[2009/09/13 19:59:38 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\2638A
[2009/08/10 16:48:41 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Age of Empires 3
[2010/08/03 15:54:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\avg9
[2010/02/08 16:18:10 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Azureus
[2009/12/18 17:43:11 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Napster
[2009/03/29 19:59:00 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\{00D89592-F643-4D8D-8F0F-AFAE0F14D4C3}
[2010/07/12 12:45:01 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
[2009/12/24 19:49:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
[2010/08/28 13:07:10 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\2395C68D165074EDF524710CD75673AF
[2009/12/17 21:22:45 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\alot
[2010/04/27 00:47:00 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\Azureus
[2010/02/22 21:04:45 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\Facebook
[2010/01/19 17:00:44 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\GetRightToGo
[2010/03/15 16:31:58 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\MSNInstaller
[2010/08/28 14:47:48 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\Street-Ads
[2009/08/10 17:03:02 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Family\Application Data\uTorrent
[2009/11/19 23:07:15 | 000,000,382 | ---- | M] () -- C:\WINDOWS\Tasks\NSSstub.job
[2010/08/30 14:01:04 | 000,000,236 | ---- | M] () -- C:\WINDOWS\Tasks\Scheduled Update for Ask Toolbar.job
[2010/08/29 18:03:10 | 000,000,304 | -HS- | M] () -- C:\WINDOWS\Tasks\szyqmd.job
[2010/08/30 14:14:00 | 000,000,428 | -H-- | M] () -- C:\WINDOWS\Tasks\User_Feed_Synchronization-{20B958C0-57E5-40A4-9C11-2B4DD5821D18}.job
[2010/08/30 13:32:00 | 000,000,320 | -H-- | M] () -- C:\WINDOWS\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
[2010/08/30 13:54:00 | 000,000,320 | -H-- | M] () -- C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

========== Purity Check ==========


< End of report >

OTL Extras logfile created on: 8/30/2010 2:01:14 PM - Run 1
OTL by OldTimer - Version 3.2.11.0 Folder = C:\Documents and Settings\Family\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

446.00 Mb Total Physical Memory | 104.00 Mb Available Physical Memory | 23.00% Memory free
1.00 Gb Paging File | 0.00 Gb Available in Paging File | 18.00% Paging File free
Paging file location(s): C:\pagefile.sys 0 0 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 37.27 Gb Total Space | 15.87 Gb Free Space | 42.57% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: MATT-QWB9WR24IN
Current User Name: Family
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: On
Skip Microsoft Files: On
File Age = 90 Days
Output = Standard
Quick Scan

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
htmlfile [edit] -- Reg Error: Key error.
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"AntiVirusDisableNotify" = 0
"FirewallDisableNotify" = 0
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"C:\WINDOWS\explorer.exe" = C:\WINDOWS\explorer.exe:*:Enabled:Windows Shell -- (Microsoft Corporation)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\Program Files\iMesh Applications\iMesh\iMesh.exe" = C:\Program Files\iMesh Applications\iMesh\iMesh.exe:*:Enabled:iMesh -- File not found
"C:\Program Files\World of Warcraft\WoW-3.2.0-enUS-downloader.exe" = C:\Program Files\World of Warcraft\WoW-3.2.0-enUS-downloader.exe:*:Enabled:Blizzard Downloader -- File not found
"C:\Program Files\World of Warcraft\Launcher.exe" = C:\Program Files\World of Warcraft\Launcher.exe:*:Enabled:Blizzard Launcher -- File not found
"C:\Program Files\World of Warcraft\Repair.exe" = C:\Program Files\World of Warcraft\Repair.exe:*:Enabled:Blizzard Repair Utility -- File not found
"C:\Program Files\LimeWire\LimeWire.exe" = C:\Program Files\LimeWire\LimeWire.exe:*:Enabled:LimeWire -- File not found
"C:\Program Files\Vuze\Azureus.exe" = C:\Program Files\Vuze\Azureus.exe:*:Enabled:Azureus / Vuze -- File not found


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"$NtUninstallMTF1011$" = Street-Ads Browser Enhancer
"{0CB9668D-F979-4F31-B8B8-67FE90F929F8}" = Bonjour
"{0DFB3DE8-65B9-44FF-AA0A-3BECC5A2BFD1}" = Adobe Flash Player 10 Plugin
"{26A24AE4-039D-4CA4-87B4-2F83216016FF}" = Java™ 6 Update 18
"{350C97B0-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{4A03706F-666A-4037-7777-5F2748764D10}" = Java Auto Updater
"{770657D0-A123-3C07-8E44-1C83EC895118}" = Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
"{7AB3A249-FB81-416B-917A-A2A10E74C503}" = iTunes
"{837b34e3-7c30-493c-8f6a-2b0f04e2912c}" = Microsoft Visual C++ 2005 Redistributable
"{85991ED2-010C-4930-96FA-52F43C2CE98A}" = Apple Mobile Device Support
"{86D4B82A-ABED-442A-BE86-96357B70F4FE}" = Ask Toolbar
"{A49F249F-0C91-497F-86DF-B2585E8E76B7}" = Microsoft Visual C++ 2005 Redistributable
"{B2D328BE-45AD-4D92-96F9-2151490A203E}" = Apple Application Support
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy
"{C41300B9-185D-475E-BFEC-39EF732F19B1}" = Apple Software Update
"{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}" = SUPERAntiSpyware
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe Shockwave Player" = Adobe Shockwave Player 11.5
"AVG9Uninstall" = AVG Free 9.0
"ESET Online Scanner" = ESET Online Scanner v3
"FLVCodec" = PlayFLV
"ie8" = Windows Internet Explorer 8
"iMesh MediaBar" = MediaBar 2.0
"MSCompPackV1" = Microsoft Compression Client Pack 1.0 for Windows XP
"MSNINST" = MSN
"Nero - Burning Rom!UninstallKey" = Nero 6 Ultra Edition
"TuneConvert_is1" = TuneConvert 7.2.4
"Windows Media Format Runtime" = Windows Media Format 11 runtime
"Windows Media Player" = Windows Media Player 11
"Windows XP Service Pack" = Windows XP Service Pack 3
"winpcap-nmap" = winpcap-nmap 4.02
"WMFDist11" = Windows Media Format 11 runtime
"wmp11" = Windows Media Player 11
"Wudf01000" = Microsoft User-Mode Driver Framework Feature Pack 1.0

========== HKEY_USERS Uninstall List ==========

[HKEY_USERS\S-1-5-21-1390067357-562591055-725345543-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"Facebook Plug-In" = Facebook Plug-In

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 8/28/2010 4:35:38 PM | Computer Name = MATT-QWB9WR24IN | Source = Application Hang | ID = 1002
Description = Hanging application avgtray.exe, version 9.0.0.832, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 8/28/2010 4:35:38 PM | Computer Name = MATT-QWB9WR24IN | Source = Application Hang | ID = 1002
Description = Hanging application avgtray.exe, version 9.0.0.832, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 8/28/2010 4:35:38 PM | Computer Name = MATT-QWB9WR24IN | Source = Application Hang | ID = 1002
Description = Hanging application avgtray.exe, version 9.0.0.832, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 8/28/2010 4:35:46 PM | Computer Name = MATT-QWB9WR24IN | Source = Application Hang | ID = 1002
Description = Hanging application avgtray.exe, version 9.0.0.832, hang module hungapp,
version 0.0.0.0, hang address 0x00000000.

Error - 8/30/2010 4:46:51 AM | Computer Name = MATT-QWB9WR24IN | Source = crypt32 | ID = 131077
Description = Failed auto update retrieval of third-party root certificate from:
<http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/8782C6C304353BCFD29692D2593E7D44D934FF11.crt>
with error: A connection with the server could not be established

Error - 8/30/2010 4:46:51 AM | Computer Name = MATT-QWB9WR24IN | Source = crypt32 | ID = 131077
Description = Failed auto update retrieval of third-party root certificate from:
<http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/8782C6C304353BCFD29692D2593E7D44D934FF11.crt>
with error: This network connection does not exist.

Error - 8/30/2010 4:48:37 AM | Computer Name = MATT-QWB9WR24IN | Source = crypt32 | ID = 131077
Description = Failed auto update retrieval of third-party root certificate from:
<http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/8782C6C304353BCFD29692D2593E7D44D934FF11.crt>
with error: A connection with the server could not be established

Error - 8/30/2010 4:48:37 AM | Computer Name = MATT-QWB9WR24IN | Source = crypt32 | ID = 131077
Description = Failed auto update retrieval of third-party root certificate from:
<http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/8782C6C304353BCFD29692D2593E7D44D934FF11.crt>
with error: This network connection does not exist.

Error - 8/30/2010 4:51:22 AM | Computer Name = MATT-QWB9WR24IN | Source = crypt32 | ID = 131077
Description = Failed auto update retrieval of third-party root certificate from:
<http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/8782C6C304353BCFD29692D2593E7D44D934FF11.crt>
with error: A connection with the server could not be established

Error - 8/30/2010 4:51:22 AM | Computer Name = MATT-QWB9WR24IN | Source = crypt32 | ID = 131077
Description = Failed auto update retrieval of third-party root certificate from:
<http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/8782C6C304353BCFD29692D2593E7D44D934FF11.crt>
with error: This network connection does not exist.

[ System Events ]
Error - 6/24/2010 5:17:14 PM | Computer Name = MATT-QWB9WR24IN | Source = Service Control Manager | ID = 7023
Description = The Windows Firewall/Internet Connection Sharing (ICS) service terminated
with the following error: %%2

Error - 6/24/2010 5:17:17 PM | Computer Name = MATT-QWB9WR24IN | Source = Ftdisk | ID = 262189
Description = The system could not sucessfully load the crash dump driver.

Error - 6/24/2010 5:17:17 PM | Computer Name = MATT-QWB9WR24IN | Source = Ftdisk | ID = 262193
Description = Configuring the Page file for crash dump failed. Make sure there is
a page file on the boot partition and that is large enough to contain all physical
memory.

Error - 6/24/2010 6:16:14 PM | Computer Name = MATT-QWB9WR24IN | Source = Ftdisk | ID = 262189
Description = The system could not sucessfully load the crash dump driver.

Error - 6/24/2010 6:16:14 PM | Computer Name = MATT-QWB9WR24IN | Source = Ftdisk | ID = 262193
Description = Configuring the Page file for crash dump failed. Make sure there is
a page file on the boot partition and that is large enough to contain all physical
memory.

Error - 6/24/2010 6:16:20 PM | Computer Name = MATT-QWB9WR24IN | Source = Service Control Manager | ID = 7023
Description = The Windows Firewall/Internet Connection Sharing (ICS) service terminated
with the following error: %%2

Error - 6/25/2010 1:07:49 PM | Computer Name = MATT-QWB9WR24IN | Source = Service Control Manager | ID = 7023
Description = The Windows Firewall/Internet Connection Sharing (ICS) service terminated
with the following error: %%2

Error - 6/25/2010 8:28:07 PM | Computer Name = MATT-QWB9WR24IN | Source = Ftdisk | ID = 262189
Description = The system could not sucessfully load the crash dump driver.

Error - 6/25/2010 8:28:07 PM | Computer Name = MATT-QWB9WR24IN | Source = Ftdisk | ID = 262193
Description = Configuring the Page file for crash dump failed. Make sure there is
a page file on the boot partition and that is large enough to contain all physical
memory.

Error - 6/25/2010 8:28:15 PM | Computer Name = MATT-QWB9WR24IN | Source = Service Control Manager | ID = 7023
Description = The Windows Firewall/Internet Connection Sharing (ICS) service terminated
with the following error: %%2


< End of report >

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0x804D7000 C:\WINDOWS\system32\ntoskrnl.exe 2189952 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2189952 bytes
0x804D7000 RAW 2189952 bytes
0x804D7000 WMIxWDM 2189952 bytes
0xBF800000 Win32k 1851392 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1851392 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF73BA000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xF68A5000 C:\WINDOWS\System32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xF6F7B000 C:\WINDOWS\System32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xF6E6B000 C:\WINDOWS\System32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xF5C4E000 C:\WINDOWS\System32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xF54D7000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF6DF7000 C:\WINDOWS\System32\Drivers\avgtdix.sys 237568 bytes (AVG Technologies CZ, s.r.o., AVG Network connection watcher)
0xF6871000 C:\WINDOWS\System32\Drivers\avgldx86.sys 212992 bytes (AVG Technologies CZ, s.r.o., AVG AVI Loader Driver)
0xF6FD9000 C:\WINDOWS\System32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xF7511000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xF5EDD000 C:\WINDOWS\System32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF738D000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xF6915000 C:\WINDOWS\System32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF6984000 C:\WINDOWS\System32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF74BB000 dmio.sys 155648 bytes (Microsoft Corp., Veritas Software, NT Disk Manager I/O Driver)
0xF60FD000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 147456 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xF726D000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF7226000 C:\WINDOWS\System32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF724A000 C:\WINDOWS\system32\drivers\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xF6962000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xF6940000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0x806EE000 ACPI_HAL 131840 bytes
0x806EE000 C:\WINDOWS\system32\hal.dll 131840 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF7483000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF74E1000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF7373000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF74A3000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xF745A000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF71EA000 C:\WINDOWS\System32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xF5FF8000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF7212000 C:\WINDOWS\System32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xF6EF7000 C:\WINDOWS\System32\drivers\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xF6EC4000 C:\WINDOWS\System32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xF7447000 WudfPf.sys 77824 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Platform Driver)
0xBF9C4000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF7471000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xF7500000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF7139000 C:\WINDOWS\System32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xF71BA000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF77C0000 C:\WINDOWS\System32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF75E0000 C:\WINDOWS\System32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)
0xF77A0000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF77D0000 C:\WINDOWS\System32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xF60ED000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF7700000 C:\WINDOWS\System32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF75A0000 C:\WINDOWS\System32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF75F0000 C:\WINDOWS\System32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF7680000 C:\WINDOWS\System32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF7580000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF76A0000 C:\WINDOWS\System32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF7630000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF77B0000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF7570000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF7690000 C:\WINDOWS\System32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF75B0000 uagp35.sys 45056 bytes (Microsoft Corporation, MS AGPv3.5 Filter)
0xF7790000 C:\WINDOWS\system32\drivers\es1371mp.sys 40960 bytes (Creative Technology Ltd., ENSONIQ AudioPCI 97 WDM Audio Miniport)
0xF7560000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF76E0000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF65E9000 C:\WINDOWS\System32\DRIVERS\secdrv.sys 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0xF76D0000 C:\WINDOWS\System32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF7610000 C:\WINDOWS\system32\drivers\TuneConvertAudio.sys 40960 bytes (Windows ® Codename Longhorn DDK provider, Support Device)
0xF7590000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF7600000 C:\WINDOWS\System32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF76B0000 C:\WINDOWS\System32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF7620000 C:\WINDOWS\System32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xF4189000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xF7770000 C:\WINDOWS\System32\DRIVERS\processr.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xF7730000 C:\WINDOWS\System32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF78C0000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF7860000 C:\WINDOWS\System32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xF7858000 C:\WINDOWS\System32\DRIVERS\fetnd5.sys 28672 bytes (VIA Technologies, Inc. , NDIS 5.0 miniport driver)
0xF7908000 C:\WINDOWS\System32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF7958000 C:\WINDOWS\system32\drivers\npf.sys 28672 bytes (CACE Technologies, npf.sys (NT5/6 x86) Kernel Driver)
0xF77E0000 C:\WINDOWS\System32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF7918000 C:\WINDOWS\System32\Drivers\avgmfx86.sys 24576 bytes (AVG Technologies CZ, s.r.o., AVG Resident Shield Minifilter Driver)
0xF7848000 C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter)
0xF7868000 C:\WINDOWS\System32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF7898000 C:\WINDOWS\System32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF7910000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xF7850000 C:\WINDOWS\System32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xF78B0000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF78A0000 C:\WINDOWS\System32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0xF78B8000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF77E8000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF7888000 C:\WINDOWS\System32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7890000 C:\WINDOWS\System32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF7880000 C:\WINDOWS\System32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF78F0000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF7A3C000 C:\WINDOWS\System32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xF6471000 C:\WINDOWS\System32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF7A1C000 C:\WINDOWS\System32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)
0xF7970000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF6F6F000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xBFF50000 C:\WINDOWS\System32\framebuf.dll 12288 bytes (Microsoft Corporation, Framebuffer Display Driver)
0xF72B5000 C:\WINDOWS\System32\DRIVERS\gameenum.sys 12288 bytes (Microsoft Corporation, Game Port Enumerator)
0xF7A08000 C:\WINDOWS\System32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xF7A0C000 C:\WINDOWS\System32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF7A20000 C:\WINDOWS\System32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xF72A1000 C:\WINDOWS\System32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xF7AC0000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF7A66000 dmload.sys 8192 bytes (Microsoft Corp., Veritas Software., NT Disk Manager Startup Driver)
0xF7ABE000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7A60000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7AC2000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7A70000 C:\WINDOWS\System32\Drivers\ParVdm.SYS 8192 bytes (Microsoft Corporation, VDM Parallel Driver)
0xF7AC4000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7AAA000 C:\WINDOWS\System32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7AB4000 C:\WINDOWS\System32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF7A64000 viaide.sys 8192 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0xF7A62000 C:\WINDOWS\System32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7BF0000 C:\WINDOWS\System32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7C92000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7C76000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
!!!!!!!!!!!Hidden driver: 0x8408DCE2 ?_empty_? 798 bytes
0x8408DEE4 unknown_irp_handler 284 bytes
!!!!!!!!!!!Hidden driver: 0x83F54230 ?_empty_? 0 bytes
==============================================
>Stealth
==============================================
0xF74A3000 WARNING: suspicious driver modification [atapi.sys::0x8408DCE2]
0xF6E6B000 WARNING: Virus alike driver modification [tcpip.sys], 364544 bytes


#4 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,114 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:52 PM

Posted 31 August 2010 - 04:48 AM

Hi, you have a nasty rookit on board here.

BACKDOOR WARNING
------------------------------
One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.


COMBOFIX
---------------
Please download ComboFix from one of these locations:
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe and follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, or if you are running Vista, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#5 phynix

phynix
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:01:52 PM

Posted 01 September 2010 - 03:31 PM

ComboFix 10-09-01.02 - Family 09/01/2010 12:33:04.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.446.133 [GMT -6:00]
Running from: c:\documents and settings\Family\Desktop\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Family\Application Data\02000000b524c434879C.manifest
c:\documents and settings\Family\Application Data\02000000b524c434879O.manifest
c:\documents and settings\Family\Application Data\02000000b524c434879P.manifest
c:\documents and settings\Family\Application Data\02000000b524c434879S.manifest
c:\documents and settings\Family\Application Data\alot
c:\documents and settings\Family\Application Data\alot\BrowserSearch\BrowserSearch.xml
c:\documents and settings\Family\Application Data\alot\BrowserSearch\BrowserSearch.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_0\Button_0.xml
c:\documents and settings\Family\Application Data\alot\Button_0\Button_0.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_1\Button_1.xml
c:\documents and settings\Family\Application Data\alot\Button_1\Button_1.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_10\Button_10.xml
c:\documents and settings\Family\Application Data\alot\Button_10\Button_10.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_2\Button_2.xml
c:\documents and settings\Family\Application Data\alot\Button_2\Button_2.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_3\Button_3.xml
c:\documents and settings\Family\Application Data\alot\Button_3\Button_3.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_4\Button_4.xml
c:\documents and settings\Family\Application Data\alot\Button_4\Button_4.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_5\Button_5.xml
c:\documents and settings\Family\Application Data\alot\Button_5\Button_5.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_6\Button_6.xml
c:\documents and settings\Family\Application Data\alot\Button_6\Button_6.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_7\Button_7.xml
c:\documents and settings\Family\Application Data\alot\Button_7\Button_7.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_8\Button_8.xml
c:\documents and settings\Family\Application Data\alot\Button_8\Button_8.xml.backup
c:\documents and settings\Family\Application Data\alot\Button_9\Button_9.xml
c:\documents and settings\Family\Application Data\alot\Button_9\Button_9.xml.backup
c:\documents and settings\Family\Application Data\alot\configurator\configurator.xml
c:\documents and settings\Family\Application Data\alot\configurator\configurator.xml.backup
c:\documents and settings\Family\Application Data\alot\contextMenu\contextMenu.xml
c:\documents and settings\Family\Application Data\alot\contextMenu\contextMenu.xml.backup
c:\documents and settings\Family\Application Data\alot\ErrorSearch\ErrorSearch.xml
c:\documents and settings\Family\Application Data\alot\ErrorSearch\ErrorSearch.xml.backup
c:\documents and settings\Family\Application Data\alot\postInstallLayout\postInstallLayout.xml
c:\documents and settings\Family\Application Data\alot\postInstallLayout\postInstallLayout.xml.backup
c:\documents and settings\Family\Application Data\alot\products\products.xml
c:\documents and settings\Family\Application Data\alot\products\products.xml.backup
c:\documents and settings\Family\Application Data\alot\Resources\BrowserSearch\alot_search_defend.html
c:\documents and settings\Family\Application Data\alot\Resources\BrowserSearch\images\favicon.ico
c:\documents and settings\Family\Application Data\alot\Resources\Button_0\images\alot_logo_button.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_0\images\alot_logo_button.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_image_search.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_image_search.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_news_search.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_news_search.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_search_button.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_search_button.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_shop_search.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_shop_search.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_videos_search.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_videos_search.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_web_search.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_1\images\alot_web_search.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_10\images\default_1795_default_1795_alot_configure.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_10\images\default_1795_default_1795_alot_configure.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_2\images\default_1033_alot_music_search.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_2\images\default_1033_alot_music_search.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_3\images\2682_icon.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_3\images\2682_icon.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_4\images\default_1365_music_news.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_4\images\default_1365_music_news.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_5\images\default_2097_music_videos.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_5\images\default_2097_music_videos.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_6\images\default_1363_alot_widget_radio.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_6\images\default_1363_alot_widget_radio.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_7\images\2670_icon.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_7\images\2670_icon.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_8\images\default_2343_offers.thumbplay.com_button.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Button_8\images\default_2343_offers.thumbplay.com_button.png
c:\documents and settings\Family\Application Data\alot\Resources\Button_9\images\2824_icon.png
c:\documents and settings\Family\Application Data\alot\Resources\contextMenu\images\alot_icon.bmp
c:\documents and settings\Family\Application Data\alot\Resources\contextMenu\images\alot_icon.png
c:\documents and settings\Family\Application Data\alot\Resources\contextMenu\images\alot_logo_button.bmp
c:\documents and settings\Family\Application Data\alot\Resources\contextMenu\images\alot_logo_button.png
c:\documents and settings\Family\Application Data\alot\Resources\Shared\domains.dat
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\alot_brand.png
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\alot_configure.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\alot_configure.png
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\alot_splitter.png
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\discover.png
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\intro_popup.png
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\spinner.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\widget_bottom.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\widget_btnclose0.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\widget_btnclose1.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\widget_caption.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\widget_error_bg.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\widget_error_close.bmp
c:\documents and settings\Family\Application Data\alot\Resources\Shared\images\widget_error_icon.bmp
c:\documents and settings\Family\Application Data\alot\SiteMetrics\SiteMetrics.xml
c:\documents and settings\Family\Application Data\alot\SiteMetrics\SiteMetrics.xml.backup
c:\documents and settings\Family\Application Data\alot\Tem1.tmp
c:\documents and settings\Family\Application Data\alot\Tem11.tmp
c:\documents and settings\Family\Application Data\alot\Tem3.tmp
c:\documents and settings\Family\Application Data\alot\Tem4.tmp
c:\documents and settings\Family\Application Data\alot\TimerManager\TimerManager.xml
c:\documents and settings\Family\Application Data\alot\TimerManager\TimerManager.xml.backup
c:\documents and settings\Family\Application Data\alot\toolbar.xml
c:\documents and settings\Family\Application Data\alot\toolbar.xml.backup
c:\documents and settings\Family\Application Data\alot\toolbarContextMenu\toolbarContextMenu.xml
c:\documents and settings\Family\Application Data\alot\toolbarContextMenu\toolbarContextMenu.xml.backup
c:\documents and settings\Family\Application Data\alot\ToolbarSearch\ToolbarSearch.xml
c:\documents and settings\Family\Application Data\alot\Updater\Updater.xml
c:\documents and settings\Family\Application Data\alot\Updater\Updater.xml.backup
c:\documents and settings\Family\Application Data\Sky-Banners
c:\documents and settings\Family\Application Data\Sky-Banners\skb\log.xml
c:\documents and settings\Family\Application Data\Street-Ads
c:\documents and settings\Family\Recent\Thumbs.db
c:\windows\$NtUninstallMTF1011$
c:\windows\$NtUninstallMTF1011$\apUninstall.exe
c:\windows\$NtUninstallMTF1011$\mmduch.dll
c:\windows\$NtUninstallMTF1011$\mmx.dll
c:\windows\system32\1989905253
c:\windows\system32\A1890.dll
c:\windows\system32\config\systemprofile\Application Data\Street-Ads
c:\windows\system32\E1890.dll
c:\windows\system32\unrar.exe
c:\windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

Infected copy of c:\windows\system32\drivers\tcpip.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
Infected copy of c:\windows\system32\winlogon.exe was found and disinfected
Restored copy from - c:\windows\ServicePackFiles\i386\winlogon.exe

Infected copy of c:\windows\explorer.exe was found and disinfected
Restored copy from - c:\windows\ServicePackFiles\i386\explorer.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_IPFW
-------\Legacy_IP_FW
-------\Service_ip_fw


((((((((((((((((((((((((( Files Created from 2010-08-01 to 2010-09-01 )))))))))))))))))))))))))))))))
.

2010-09-01 17:53 . 2010-09-01 17:55 -------- d-----r- C:\32788R22FWJFW
2010-09-01 17:38 . 2010-09-01 17:38 -------- d-----w- c:\documents and settings\Family\Application Data\Bitrix Security
2010-09-01 07:04 . 2010-09-01 07:04 -------- d-----w- c:\documents and settings\LocalService\Application Data\Bitrix Security
2010-09-01 06:45 . 2001-08-18 04:36 8704 -c--a-w- c:\windows\system32\dllcache\kbdjpn.dll
2010-09-01 06:45 . 2001-08-18 04:36 8704 ----a-w- c:\windows\system32\kbdjpn.dll
2010-09-01 06:45 . 2001-08-18 04:36 8192 -c--a-w- c:\windows\system32\dllcache\kbdkor.dll
2010-09-01 06:45 . 2001-08-18 04:36 8192 ----a-w- c:\windows\system32\kbdkor.dll
2010-09-01 06:45 . 2001-08-17 20:55 6144 -c--a-w- c:\windows\system32\dllcache\kbd101c.dll
2010-09-01 06:45 . 2001-08-17 20:55 6144 ----a-w- c:\windows\system32\kbd101c.dll
2010-09-01 06:45 . 2001-08-17 20:55 5632 -c--a-w- c:\windows\system32\dllcache\kbd103.dll
2010-09-01 06:45 . 2001-08-17 20:55 5632 ----a-w- c:\windows\system32\kbd103.dll
2010-09-01 06:45 . 2001-08-17 20:55 6144 -c--a-w- c:\windows\system32\dllcache\kbd101b.dll
2010-09-01 06:45 . 2001-08-17 20:55 6144 ----a-w- c:\windows\system32\kbd101b.dll
2010-09-01 06:45 . 2008-04-14 00:09 6144 -c--a-w- c:\windows\system32\dllcache\kbd106.dll
2010-09-01 06:45 . 2008-04-14 00:09 6144 ----a-w- c:\windows\system32\kbd106.dll
2010-08-28 19:25 . 2010-08-28 19:25 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2010-08-28 19:16 . 2010-08-28 19:16 -------- d-sh--w- c:\windows\system32\config\systemprofile\IETldCache
2010-08-28 19:10 . 2010-08-28 19:10 79360 --sha-r- c:\windows\system32\locale3.dll
2010-08-28 19:07 . 2010-09-01 18:08 -------- d-----w- c:\documents and settings\Family\Application Data\2395C68D165074EDF524710CD75673AF
2010-08-26 03:17 . 2010-08-26 03:27 -------- d-----w- C:\Backup
2010-08-24 23:04 . 2010-08-24 23:04 -------- d-----w- c:\documents and settings\Family\Application Data\SUPERAntiSpyware.com
2010-08-24 23:04 . 2010-08-24 23:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-08-24 23:03 . 2010-08-24 23:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-08-24 16:48 . 2010-08-26 15:51 -------- d-----w- c:\windows\system32\NtmsData

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-01 18:31 . 2010-07-09 14:04 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2010-09-01 17:11 . 2010-07-09 00:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-09-01 14:15 . 2009-01-31 04:52 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-08-30 00:02 . 2010-07-08 21:48 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-08-24 00:11 . 2009-03-30 01:57 -------- d-----w- c:\program files\QuickTime
2010-08-24 00:07 . 2010-02-24 00:11 -------- d-----w- c:\program files\LimeWire
2010-07-12 18:45 . 2010-07-12 18:42 -------- d-----w- c:\documents and settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-07-12 18:45 . 2009-03-30 01:58 -------- d-----w- c:\program files\iTunes
2010-07-12 18:43 . 2009-03-30 01:58 -------- d-----w- c:\program files\iPod
2010-07-12 18:39 . 2009-03-30 01:56 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-07-12 18:37 . 2009-03-30 01:56 -------- d-----w- c:\program files\Apple Software Update
2010-07-12 18:35 . 2009-03-30 01:57 -------- d-----w- c:\program files\Bonjour
2010-07-12 18:34 . 2009-03-30 01:55 -------- d-----w- c:\program files\Common Files\Apple
2010-07-09 14:15 . 2010-07-09 14:14 12536 ------w- c:\windows\system32\avgrsstx.dll
2010-07-09 14:14 . 2010-07-09 14:14 243024 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-07-09 14:14 . 2010-07-09 14:14 216400 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-07-09 14:14 . 2010-07-09 14:14 29584 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2010-07-09 14:05 . 2010-07-09 14:05 -------- d-----w- c:\program files\AVG
2010-07-09 01:02 . 2010-07-09 00:48 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-07-09 00:46 . 2010-07-09 00:46 -------- d-----w- c:\program files\ESET
2010-07-08 21:49 . 2010-07-08 21:49 -------- d-----w- c:\documents and settings\Family\Application Data\Malwarebytes
2010-07-08 21:48 . 2010-07-08 21:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2010-02-04 22:50 1197448 ------w- c:\program files\Ask.com\GenericAskToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-11 246504]
"AVG9_TRAY"="c:\progra~1\AVG\AVG9\avgtray.exe" [2010-07-09 2065760]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-06-15 141624]

c:\documents and settings\Family\Start Menu\Programs\Startup\
PowerReg Scheduler.exe [2010-2-19 256000]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ------w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2010-07-09 14:15 12536 ------w- c:\windows\system32\avgrsstx.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [7/9/2010 8:14 AM 216400]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [7/9/2010 8:14 AM 243024]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 12:25 PM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 12:41 PM 67656]
R2 avg9emc;AVG Free E-mail Scanner;c:\program files\AVG\AVG9\avgemc.exe [7/9/2010 8:10 AM 921952]
R2 avg9wd;AVG Free WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [7/9/2010 8:10 AM 308136]
R2 Iprip;RIP Listener;c:\windows\System32\svchost.exe -k netsvcs [8/23/2001 6:00 AM 14336]
R2 npf;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [6/1/2008 1:13 AM 34064]
R3 TuneConvertAudio;TuneConvertAudio;c:\windows\system32\drivers\TuneConvertAudio.sys [1/4/2010 7:29 PM 23096]
S3 GSService;GSService;c:\windows\system32\GSService.exe [1/4/2010 7:29 PM 335872]
S3 SMServer;SMServer;c:\windows\system32\snmvtsvc.exe [1/4/2010 7:29 PM 249856]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{7194F3DC-CDAA-48B0-88FE-ECAF1762438D}]
2010-09-01 07:04 48128 ----a-w- c:\documents and settings\LocalService\Application Data\Bitrix Security\elnbauqx6.dll
.
Contents of the 'Scheduled Tasks' folder

2010-09-01 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 17:50]

2009-11-20 c:\windows\Tasks\NSSstub.job
- c:\windows\system32\Adobe\Shockwave 11\nssstub.exe [2009-07-23 05:07]

2010-09-01 c:\windows\Tasks\Scheduled Update for Ask Toolbar.job
- c:\program files\Ask.com\UpdateTask.exe [2010-02-04 22:50]

2010-09-01 c:\windows\Tasks\User_Feed_Synchronization-{20B958C0-57E5-40A4-9C11-2B4DD5821D18}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 10:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.facebook.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
TCP: {8E11E535-1B35-4F8D-9926-1416FFE6137E} = 8.8.8.8
.
- - - - ORPHANS REMOVED - - - -

BHO-{9CDADA2A-2387-4D14-814A-85D8C8D122F3} - c:\windows\$NtUninstallMTF1011$\mmx.dll
HKLM-Run-bipro - c:\windows\$NtUninstallMTF1011$\mmduch.dll
HKLM-Run-sta - E1890.dll
AddRemove-$NtUninstallMTF1011$ - c:\windows\$NtUninstallMTF1011$\apUninstall.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-01 13:04
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(648)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(2180)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\AVG\AVG9\avgchsvx.exe
c:\program files\AVG\AVG9\avgrsx.exe
c:\program files\AVG\AVG9\avgcsrvx.exe
c:\windows\system32\rundll32.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\System32\tcpsvcs.exe
c:\program files\AVG\AVG9\avgnsx.exe
c:\program files\AVG\AVG9\avgcsrvx.exe
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Common Files\Java\Java Update\jucheck.exe
.
**************************************************************************
.
Completion time: 2010-09-01 13:17:27 - machine was rebooted
ComboFix-quarantined-files.txt 2010-09-01 19:17

Pre-Run: 16,766,746,624 bytes free
Post-Run: 18,498,469,888 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

- - End Of File - - 89FDFE49DB852B9DE21E039E065F3F76

What internet security software programs do you recommend? zone alarm?

#6 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,114 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:52 PM

Posted 02 September 2010 - 01:50 AM

Hi, that took care of quite some issues! How are things running now?

UPDATE JAVA
------------------
Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "JDK 6 Update 21 (JDK or JRE)".
  • Click the "Download JRE" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u21-windows-i586.exe to install the newest version.
  • If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
-- Starting with Java 6u10, the uninstaller incorporated in each new release uses Enhanced Auto update to automatically remove the previous version when updating to a later update release. It will not remove older versions, so they will need to be removed manually.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.



MALWAREBYTES ANTIMALWARE
-------------------------------------------
Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Full Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#7 phynix

phynix
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:01:52 PM

Posted 02 September 2010 - 12:04 PM

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4531

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/2/2010 10:57:04 AM
mbam-log-2010-09-02 (10-57-04).txt

Scan type: Full scan (A:\|C:\|D:\|E:\|)
Objects scanned: 165077
Time elapsed: 1 hour(s), 22 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 7
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\AppID\{84c3c236-f588-4c93-84f4-147b2abbe67b} (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{38061edc-40bb-4618-a8da-e56353347e6d} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{7b6a2552-e65b-4a9e-add4-c45577ffd8fd} (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adgj.aghlp (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adgj.aghlp.1 (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Family\Desktop\WINDOWS_XP_KEYGEN_VALIDATION_PACK\WINDOWS XP KEYGEN+VALIDATION PACK\keyfinder.exe (Application.FindKey) -> Quarantined and deleted successfully.
C:\Documents and Settings\Family\Desktop\WINDOWS_XP_KEYGEN_VALIDATION_PACK\WINDOWS XP KEYGEN+VALIDATION PACK\wga-fix.exe (Hacktool.WGAFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Family\Desktop\WINDOWS_XP_KEYGEN_VALIDATION_PACK\WINDOWS XP KEYGEN+VALIDATION PACK\Windows XP Keygen.exe (Malware.Tool) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\$NtUninstallMTF1011$\mmduch.dll.vir (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\$NtUninstallMTF1011$\mmx.dll.vir (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\A1890.dll.vir (Adware.BHO) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\E1890.dll.vir (Adware.BHO) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\winlogon.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{6FE7551F-D9EA-488E-95ED-45AE9E4BD5CF}\RP3\A0003350.exe (Trojan.Adware) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{6FE7551F-D9EA-488E-95ED-45AE9E4BD5CF}\RP3\A0003352.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Windows Server\admin.txt (Malware.Trace) -> Quarantined and deleted successfully.


#8 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,114 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:52 PM

Posted 02 September 2010 - 01:27 PM

QUOTE
Files Infected:
C:\Documents and Settings\Family\Desktop\WINDOWS_XP_KEYGEN_VALIDATION_PACK\WINDOWS XP KEYGEN+VALIDATION PACK\keyfinder.exe (Application.FindKey) -> Quarantined and deleted successfully.
C:\Documents and Settings\Family\Desktop\WINDOWS_XP_KEYGEN_VALIDATION_PACK\WINDOWS XP KEYGEN+VALIDATION PACK\wga-fix.exe (Hacktool.WGAFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Family\Desktop\WINDOWS_XP_KEYGEN_VALIDATION_PACK\WINDOWS XP KEYGEN+VALIDATION PACK\Windows XP Keygen.exe (Malware.Tool) -> Quarantined and deleted successfully.
I think by now you may have realized that the use of such crack is not only illegal, but is also very likely to infect your computer. If you don't want to purchase a copy of windows, know that there are free OS's, like Ubuntu for example that also are not prone to infections.
If you continue using cracks/keygens/otherwise illegal software, you can be sure you will get infected again!

I understand you are helping out a friend, so this is maybe not your own computer, in that case, it would be a good idea to transmit this information! smile.gif

ESET ONLINE SCANNER
----------------------------
I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    Note - when ESET doesn't find any threats, no report will be created.
  12. Push the button.
  13. Push

Edited by elise025, 02 September 2010 - 01:29 PM.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#9 phynix

phynix
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:01:52 PM

Posted 02 September 2010 - 06:49 PM

Thank you for the heads up re: xp
PC was not to be used until system was completely clean. I will pass it on.
Questions: Can ubuntu be replaced as the os on this emachine and if so, are there any disadvantages to doing this? Is Avira a good internet security program you would recommend?

C:\Documents and Settings\Family\Local Settings\Temporary Internet Files\Content.IE5\X3S5EKFY\ca[1].htm HTML/ScrInject.B.Gen virus deleted - quarantined
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\3\4e84bf83-7ebd0baa multiple threats deleted - quarantined
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\44\34db286c-3ca94bef multiple threats deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\explorer.exe.vir Win32/Bamital.DX trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\$NtUninstallMTF1011$\apUninstall.exe.vir Win32/Adware.Lifze.O application deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\tcpip.sys.vir Win32/Olmarik.ZC trojan cleaned - quarantined
C:\WINDOWS\system32\hlp.dat Win32/Bamital.DZ trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\spool\prtprocs\w32x86\K5yWS.dll a variant of Win32/Kryptik.GMH trojan cleaned by deleting - quarantined


#10 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,114 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:52 PM

Posted 03 September 2010 - 03:17 AM

Hi, Avira is a good antivirus application, however, keep in mind that you should only have one antivirus installed at a time!

As for Ubuntu, its not Windows, so there are differences. A great way to test it out is Wubi. This will install the selected OS and give you the option to boot in it, however it does not create separate partitions and so on and can be uninstalled from within windows (add/remove programs). This way you can easily try it out. More information can be found here

ALL CLEAN
--------------
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it clean smile.gif

Please do the following to remove the remaining programs from your PC:
  • Delete the tools used during the disinfection:
    • Click start > run and type combofix /uninstall, press enter. This will remove Combofix from your computer.
    • Delete DDS, GMER (this is a random named file) and OTL.
Please read these advices, in order to prevent reinfecting your PC:
  1. Install and update the following programs regularly:
    • an outbound firewall
      A comprehensive tutorial and a list of possible firewalls can be found here.
    • an AntiVirus Software
      It is imperative that you update your AntiVirus Software on regular basis.If you do not update your AntiVirus Software then it will not be able to catch the latest threats.
    • an Anti-Spyware program
      Malware Byte's Anti Malware is an excellent Anti-Spyware scanner. It's scan times are usually under ten minutes, and has excellent detection and removal rates.
      SUPERAntiSpyware is another good scanner with high detection and removal rates.
      Both programs are free for non commercial home use but provide a resident and do not nag if you purchase the paid versions.
    • Spyware Blaster
      A tutorial for Spywareblaster can be found here. If you wish, the commercial version provides automatic updating.
    • MVPs hosts file
      A tutorial for MVPs hosts file can be found here. If you would like automatic updates you might want to take a look at HostMan host file manager. For more information on thehosts file, and what it can do for you,please consult the Tutorial on the Hosts file
  2. Keep Windows (and your other Microsoft software) up to date!
    I cannot stress how important this is enough. Often holes are found in Internet Explorer or Windows itself that require patching. Sometimes these holes will allow an attacker unrestricted access to your computer.
    Therefore, please, visit the Microsoft Update Website and follow the on screen instructions to setup Microsoft Update. Also follow the instructions to update your system. Please REBOOT and repeat this process until there are no more updates to install!!
  3. Keep your other software up to date as well
    Software does not need to be made by Microsoft to be insecure. You can use the Secunia Online Software occasionally to help you check for out of date software on yourmachine.
  4. Stay up to date!
    The MOST IMPORTANT part of any security setup is keeping the software up to date. Malware writers release new variants every single day. If your software updates don't keep up, then the malware will always be one step ahead. Not a good thing.
Some more links you might find of interest:

Please reply to this topic if you have read the above information. If your computer is working fine, this topic will be closed afterwards.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#11 phynix

phynix
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:01:52 PM

Posted 03 September 2010 - 07:00 AM

Thank you for your help and your time

#12 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,114 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:52 PM

Posted 03 September 2010 - 08:24 AM

You're welcome. smile.gif

I will now close this topic. If you need it reopened, please send me a PM.

Everyone else, please start a new topic.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users