Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Concerned about key-logging software, etc.


  • This topic is locked This topic is locked
14 replies to this topic

#1 Ant S

Ant S

  • Members
  • 63 posts
  • OFFLINE
  •  
  • Local time:02:58 PM

Posted 22 January 2011 - 02:31 AM

Hi,

I've recently discovered that my eBay account has been hacked. Purchases have been made and paid for via my PayPal account.

Nobody else had my passwords. The delivery address for the goods purchased was not very far from mine, which led me to think that the passwords may have been obtained from a public-access PC I'd used. That said, I'm still a bit worried that my PC could be harbouring key-logging or similar spyware. If someone could advise me of the best way to scan my PC for this type of malware, I'd be very grateful.

I'm running Microsoft Windows XP Home Edition SP3 and use Windows firewall and Microsoft Security Essentials. DDS and GMER logs to follow. (I also have logs for TCPView, Malwarebytes Antimalware, MBRCheck and TDSSKiller if they would be helpful.)

Ant :)


DDS and GMER logs

DDS (Ver_10-12-12.02) - FAT32x86
Run by Ant at 12:47:48.65 on 25/01/2011
Internet Explorer: 6.0.2900.5512
Microsoft Windows XP Home Edition 5.1.2600.3.1252.44.1033.18.495.170 [GMT 0:00]

AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
SVCHOST.EXE
c:\Program Files\Microsoft Security Essentials\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
SVCHOST.EXE
SVCHOST.EXE
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
SVCHOST.EXE
C:\Program Files\3 Mobile Broadband\3Connect\BecHelperService.exe
C:\WINDOWS\system32\00THotkey.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\Microsoft Security Essentials\msseces.exe
C:\Program Files\Consumer Input\dca-ua.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Windows Live\Toolbar\wltuser.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Documents and Settings\Ant\Desktop\Antimalware\dds.scr
c:\Program Files\Microsoft Security Essentials\MpCmdRun.exe

============== Pseudo HJT Report ===============

uSearch Page =
uStart Page = about:blank
uSearch Bar =
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
mSearchAssistant =
uURLSearchHooks: H - No File
BHO: AutorunsDisabled - No File
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: DCA BHO: {b49699fc-1665-4414-a1cb-c4a2a4a13eec} - c:\program files\consumer input\dca-bho.dll
BHO: Windows Live Toolbar Helper: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - c:\program files\windows live\toolbar\wltcore.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} - c:\program files\windows live\toolbar\wltcore.dll
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [Consumer Input Update] c:\program files\consumer input\dca-ua.exe
mRun: [00THotkey] c:\windows\system32\00THotkey.exe
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [Tpwrtray] TPWRTRAY.EXE
mRun: [TFncKy] TFncKy.exe /Type 10
mRun: [TosHKCW.exe] c:\program files\toshiba\wireless hotkey\TosHKCW.exe
mRun: [MSSE] "c:\program files\microsoft security essentials\msseces.exe" -hide -runkey
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: c:\docume~1\ant\startm~1\programs\startup\bookso~1.lnk - c:\book\BOOKSU.EXE
StartupFolder: c:\docume~1\ant\startm~1\programs\startup\autoru~1\secuni~1.lnk - c:\program files\secunia\psi\psi.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
IE: &Google Search - c:\program files\google\GoogleToolbar1.dll/cmsearch.html
IE: &Translate English Word - c:\program files\google\GoogleToolbar1.dll/cmwordtrans.html
IE: Backward Links - c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
IE: Cached Snapshot of Page - c:\program files\google\GoogleToolbar1.dll/cmcache.html
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
IE: Similar Pages - c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
IE: Translate Page into English - c:\program files\google\GoogleToolbar1.dll/cmtrans.html
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
Trusted Zone: ebay.co.uk
Trusted Zone: google.co.uk
Trusted Zone: google.com
Trusted Zone: hotmail.com
Trusted Zone: live.com
Trusted Zone: microsoft.com
Trusted Zone: msn.com
Trusted Zone: optimusid.com
Trusted Zone: passport.com
Trusted Zone: researchnow.co.uk
Trusted Zone: three.co.uk
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {0000000A-0000-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/E/1/F/E1F6B9B3-49AA-42BB-9115-D9FB57768CC2/wmavax.CAB
DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
DPF: {33564D57-0000-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB
DPF: {41564D57-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/0/A/9/0A9F8B32-9F8C-4D74-A130-E4CAB36EB01F/wmvadvd.cab
DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} - hxxp://download.bitdefender.com/resources/scanner/sources/en/scan8/oscan8.cab
DPF: {73ECB3AA-4717-450C-A2AB-D00DAD9EE203} - hxxp://h20270.www2.hp.com/ediags/gmn2/install/HPProductDetection2.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab

============= SERVICES / DRIVERS ===============

R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2010-3-25 151216]
R1 MpKsl3056818f;MpKsl3056818f;c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{9de63d7b-3a82-4642-a915-740239854804}\MpKsl3056818f.sys [2011-1-25 28752]
R1 MpKslf8329943;MpKslf8329943;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1838a6b3-2a92-45c9-8ccf-3a0047378e0e}\mpkslf8329943.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1838a6b3-2a92-45c9-8ccf-3a0047378e0e}\MpKslf8329943.sys [?]
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [2010-5-1 54752]
R3 tridxp;tridxp;c:\windows\system32\drivers\tridxpm.sys [2001-12-6 221824]
S0 nielprt;Nielsen Patch Service;c:\windows\system32\drivers\nielprt.sys --> c:\windows\system32\drivers\nielprt.sys [?]
S3 HPUATA;HP CD Writer Plus Controller Driver;c:\windows\system32\drivers\HPUATA.sys [2001-9-24 75776]
S3 massfilter;ZTE Mass Storage Filter Driver;c:\windows\system32\drivers\massfilter.sys [2009-9-7 7680]
S3 NielGfx;Nielsen USB GFX;c:\windows\system32\drivers\nielgfx.sys --> c:\windows\system32\drivers\nielgfx.sys [?]

=============== File Associations ===============

txtfile=c:\windows\system32\NOTEPAD.EXE "%1"

=============== Created Last 30 ================

2011-01-25 12:46:19 28752 ----a-w- c:\docume~1\alluse~1\applic~1\microsoft\microsoft antimalware\definition updates\{9de63d7b-3a82-4642-a915-740239854804}\MpKsl3056818f.sys
2011-01-25 12:40:44 5890896 ----a-w- c:\docume~1\alluse~1\applic~1\microsoft\microsoft antimalware\definition updates\{9de63d7b-3a82-4642-a915-740239854804}\mpengine.dll
2011-01-21 22:47:05 -------- d-----w- c:\program files\Consumer Input
2011-01-21 21:27:37 40960 ------w- c:\windows\system32\dllcache\ndproxy.sys
2011-01-21 21:11:07 83249512 ----a-w- c:\program files\common files\windows live\.cache\wlc55.tmp
2011-01-21 21:03:18 45568 ------w- c:\windows\system32\dllcache\wab.exe
2011-01-21 00:05:10 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-01-21 00:05:10 -------- d-----w- c:\windows\system32\wbem\Repository
2011-01-12 20:33:55 38224 ------w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-01-12 20:33:29 20952 ------w- c:\windows\system32\drivers\mbam.sys
2011-01-12 20:33:22 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-01-04 23:02:29 1112288 ------w- c:\windows\system32\WdfCoInstaller01007.dll

==================== Find3M ====================

2010-11-18 18:12:44 81920 ----a-w- c:\windows\system32\isign32.dll
2010-11-09 14:52:36 249856 ----a-w- c:\windows\system32\odbc32.dll
2010-11-05 05:05:36 81920 ------w- c:\windows\system32\ieencode.dll
2010-11-05 05:05:36 667136 ----a-w- c:\windows\system32\wininet.dll
2010-11-05 05:05:36 61952 ----a-w- c:\windows\system32\tdc.ocx
2010-11-03 12:59:08 369664 ------w- c:\windows\system32\html.iec
2010-10-28 13:13:22 290048 ----a-w- c:\windows\system32\atmfd.dll

============= FINISH: 12:50:01.97 ===============

EDIT: Posts merged ~BP

Attached Files


Edited by Budapest, 25 January 2011 - 05:18 PM.


BC AdBot (Login to Remove)

 


#2 Casey_boy

Casey_boy

    Bleeping physicist


  • Malware Response Team
  • 7,765 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:58 PM

Posted 27 January 2011 - 10:25 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Please take note:

  • If you have since resolved the original problem you were having, we would appreciate you letting us know.
  • If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
  • If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
  • If you have already posted a DDS log, please do so again, as your situation may have changed.
  • Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Thanks and again sorry for the delay.

If I have been helping you and I do not reply within 48hours, feel free to send me a PM.


* My Website * Am I Infected? * Malware Removal Help * If you'd like to say thanks *


#3 Ant S

Ant S
  • Topic Starter

  • Members
  • 63 posts
  • OFFLINE
  •  
  • Local time:02:58 PM

Posted 28 January 2011 - 02:57 PM

Thanks for picking up my thread, Bleeping physicist.

No, I don't have a Windows XP installation CD/DVD. My operating system is OEM.

The new logs are attached.

Attached Files


Edited by Ant S, 28 January 2011 - 03:04 PM.


#4 Casey_boy

Casey_boy

    Bleeping physicist


  • Malware Response Team
  • 7,765 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:58 PM

Posted 30 January 2011 - 10:03 AM

Hi,

My name is Casey and I will be helping you with your malware problems.

As you may have noticed, I am currently in training which means that all of my responses will first be verified by a malware removal coach. As such, there may be a little delay in my responses to you. On the plus side, there will be two sets of eyes looking over your logs.

Whilst I research the problems in your logs, it is very important that you do not make any changes to this PC. Specifically, do not run any further malware removal tools or try to remove anything yourself.

You may wish to "Watch Topic" so that you are immediately informed of any replies I make. I also ask that you reply to my posts within 5 days else your topic will be closed as stale.

Throughout the removal process, if you have any questions then you should ask them. If you are unsure of my instructions or something does not go as planned - then please tell me. Conversely, it is also important that you answer any questions I have and that you keep me updated on the state of the PC.

Regards,

Casey

If I have been helping you and I do not reply within 48hours, feel free to send me a PM.


* My Website * Am I Infected? * Malware Removal Help * If you'd like to say thanks *


#5 Casey_boy

Casey_boy

    Bleeping physicist


  • Malware Response Team
  • 7,765 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:58 PM

Posted 30 January 2011 - 01:50 PM

Hi,

I also have logs for TCPView, Malwarebytes Antimalware, MBRCheck and TDSSKiller if they would be helpful.


Yes they would :thumbup2: please attach them to your reply.

:step1: We need to create an OTL Report
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

:step2: Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can downlaod, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".

:step3: Do you happen to know what this file is:
c:\book\BOOKSU.EXE

If not,

Please visit the online Jotti Virus Scanner Posted Image<--link
  • Browse to the following filepath:

    c:\book\BOOKSU.EXE

  • Click on the Posted Image button.
    The scanner will check the file with various AV companies.
  • Copy and paste the results box into a reply to this thread.

Casey

If I have been helping you and I do not reply within 48hours, feel free to send me a PM.


* My Website * Am I Infected? * Malware Removal Help * If you'd like to say thanks *


#6 Ant S

Ant S
  • Topic Starter

  • Members
  • 63 posts
  • OFFLINE
  •  
  • Local time:02:58 PM

Posted 30 January 2011 - 06:24 PM

Thanks, Casey. It's good to be receiving your help!

Yes, c:\book\BOOKSU.EXE is one of my own Visual Basic application. Well spotted.


OTL report (OTL.Txt)

OTL logfile created on: 30/01/2011 21:54:44 - Run 1
OTL by OldTimer - Version 3.2.20.6 Folder = C:\Documents and Settings\Ant\Desktop\Antimalware
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 6.0.2900.5512)
Locale: 00000809 | Country: United Kingdom | Language: ENG | Date Format: dd/MM/yyyy

495.00 Mb Total Physical Memory | 213.00 Mb Available Physical Memory | 43.00% Memory free
915.00 Mb Paging File | 608.00 Mb Available in Paging File | 66.00% Paging File free
Paging file location(s): C:\pagefile.sys 500 1104 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 9.35 Gb Total Space | 0.26 Gb Free Space | 2.80% Space Free | Partition Type: FAT32
Drive D: | 125.78 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS
Drive G: | 21.97 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS

Computer Name: SATELLITE1800 | User Name: Ant | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2011/01/30 21:50:40 | 000,602,624 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Ant\Desktop\Antimalware\OTL.exe
PRC - [2010/11/30 13:20:36 | 000,997,408 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Security Client\msseces.exe
PRC - [2010/11/11 12:26:40 | 000,011,736 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
PRC - [2010/05/14 14:44:26 | 000,179,896 | ---- | M] (Compete, Inc.) -- C:\Program Files\Consumer Input\dca-ua.exe
PRC - [2010/01/28 13:47:44 | 001,737,464 | ---- | M] () -- C:\Program Files\3 Mobile Broadband\3Connect\BecHelperService.exe
PRC - [2008/04/14 05:42:20 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2001/11/21 10:16:48 | 000,098,304 | ---- | M] (TOSHIBA Corp.) -- C:\WINDOWS\system32\00THotkey.exe
PRC - [2001/11/20 15:03:14 | 000,188,416 | ---- | M] (TOSHIBA Corporation) -- C:\WINDOWS\system32\TPWRTRAY.EXE
PRC - [2001/09/26 10:14:48 | 000,102,400 | ---- | M] (Toshiba Corporation) -- C:\Program Files\Toshiba\Toshiba Controls\TFncKy.exe
PRC - [2001/07/25 21:45:02 | 000,045,056 | ---- | M] (TOSHIBA CORPORATION) -- C:\Program Files\Toshiba\Wireless Hotkey\TosHKCW.exe


========== Modules (SafeList) ==========

MOD - [2011/01/30 21:50:40 | 000,602,624 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Ant\Desktop\Antimalware\OTL.exe
MOD - [2010/08/23 17:12:02 | 001,054,208 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
MOD - [2000/07/31 14:52:18 | 000,049,152 | R--- | M] (Alps Electric Co., Ltd.) -- C:\Program Files\Apoint2K\EzAuto.dll


========== Win32 Services (SafeList) ==========

SRV - File not found [Disabled | Stopped] -- -- (HidServ)
SRV - File not found [On_Demand | Stopped] -- -- (AppMgmt)
SRV - [2010/11/11 12:26:40 | 000,011,736 | ---- | M] (Microsoft Corporation) [Auto | Running] -- c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe -- (MsMpSvc)
SRV - [2010/04/28 07:44:02 | 000,704,872 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Windows Live\Family Safety\fsssvc.exe -- (fsssvc)
SRV - [2010/01/28 13:47:44 | 001,737,464 | ---- | M] () [Auto | Running] -- C:\Program Files\3 Mobile Broadband\3Connect\BecHelperService.exe -- (BecHelperService)
SRV - [2009/05/19 11:36:18 | 000,240,512 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe -- (SeaPort)


========== Driver Services (SafeList) ==========

DRV - [2011/01/30 19:23:58 | 000,028,752 | ---- | M] (Microsoft Corporation) [Kernel | System | Running] -- c:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{972A63B9-39CB-476B-93A5-D20E0E756B3B}\MpKsla24d55bc.sys -- (MpKsla24d55bc)
DRV - [2010/01/28 13:35:24 | 000,010,240 | ---- | M] () [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\mdvrmng.sys -- (mdvrmng)
DRV - [2009/09/07 15:55:58 | 000,105,088 | ---- | M] (ZTE Incorporated) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\ZTEusbser6k.sys -- (ZTEusbser6k)
DRV - [2009/09/07 15:55:58 | 000,105,088 | ---- | M] (ZTE Incorporated) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\ZTEusbnmea.sys -- (ZTEusbnmea)
DRV - [2009/09/07 15:55:58 | 000,105,088 | ---- | M] (ZTE Incorporated) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\ZTEusbmdm6k.sys -- (ZTEusbmdm6k)
DRV - [2009/09/07 15:55:58 | 000,007,680 | ---- | M] (ZTE Incorporated) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\massfilter.sys -- (massfilter)
DRV - [2009/08/05 22:48:42 | 000,054,752 | ---- | M] (Microsoft Corporation) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\fssfltr_tdi.sys -- (fssfltr)
DRV - [2004/08/03 22:32:22 | 000,231,552 | ---- | M] (Acer Laboratories Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\ac97ali.sys -- (ALiADWDM)
DRV - [2004/08/03 22:31:28 | 000,154,624 | ---- | M] (Lucent Technologies) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\wlluc48.sys -- (wlluc48)
DRV - [2001/09/26 21:34:00 | 000,799,816 | ---- | M] (LT) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\LTSM.sys -- (TOSHIBASoftModem)
DRV - [2001/09/26 19:42:44 | 000,221,824 | ---- | M] (Trident Microsystems Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\tridxpm.sys -- (tridxp)
DRV - [2001/09/24 04:36:28 | 000,075,776 | ---- | M] (SCM Microsystems Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\HPUATA.sys -- (HPUATA)
DRV - [2001/09/11 10:54:32 | 000,038,425 | R--- | M] (SMC) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\smcirda.sys -- (SMCIRDA)
DRV - [2001/08/18 14:00:00 | 000,005,248 | ---- | M] (Acer Laboratories Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\System32\DRIVERS\aliide.sys -- (AliIde)
DRV - [2001/08/17 23:23:58 | 000,005,264 | ---- | M] (Toshiba Corporation) [Kernel | Boot | Running] -- C:\WINDOWS\System32\DRIVERS\TVALD.SYS -- (TVALD)
DRV - [2001/08/08 18:54:40 | 000,049,585 | R--- | M] (Alps Electric Co., Ltd.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\Apfiltr.sys -- (ApfiltrService)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = %SystemRoot%\system32\blank.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant =


IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page =
IE - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = about:blank
IE - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..\URLSearchHook: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - Reg Error: Key error. File not found
IE - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

FF - HKLM\software\mozilla\Thunderbird\Extensions\\eplgTb@eset.com: C:\Program Files\ESET\ESET NOD32 Antivirus\Mozilla Thunderbird


O1 HOSTS File: ([2010/10/21 00:42:04 | 000,000,027 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - No CLSID value found.
O2 - BHO: (Adobe PDF Reader Link Helper) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (Adobe Systems Incorporated)
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
O2 - BHO: (Search Helper) - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll (Microsoft Corporation)
O2 - BHO: (Google Toolbar Helper) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O2 - BHO: (DCA BHO) - {B49699FC-1665-4414-A1CB-C4A2A4A13EEC} - C:\Program Files\Consumer Input\dca-bho.dll (Compete, Inc.)
O2 - BHO: (Windows Live Toolbar Helper) - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll (Microsoft Corporation)
O2 - BHO: (no name) - AutorunsDisabled - No CLSID value found.
O3 - HKLM\..\Toolbar: (&Windows Live Toolbar) - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll (Microsoft Corporation)
O3 - HKLM\..\Toolbar: (&Google) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O3 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..\Toolbar\ShellBrowser: (&Google) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - c:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O3 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..\Toolbar\WebBrowser: (&Windows Live Toolbar) - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll (Microsoft Corporation)
O3 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..\Toolbar\WebBrowser: (&Google) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - c:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O4 - HKLM..\Run: [00THotkey] C:\WINDOWS\system32\00THotkey.exe (TOSHIBA Corp.)
O4 - HKLM..\Run: [KernelFaultCheck] File not found
O4 - HKLM..\Run: [MSC] c:\Program Files\Microsoft Security Client\msseces.exe (Microsoft Corporation)
O4 - HKLM..\Run: [TFncKy] File not found
O4 - HKLM..\Run: [TosHKCW.exe] C:\Program Files\Toshiba\Wireless Hotkey\TosHKCW.exe (TOSHIBA CORPORATION)
O4 - HKLM..\Run: [Tpwrtray] C:\WINDOWS\System32\TPWRTRAY.EXE (TOSHIBA Corporation)
O4 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005..\Run: [Consumer Input Update] C:\Program Files\Consumer Input\dca-ua.exe (Compete, Inc.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe (Adobe Systems Incorporated)
O4 - Startup: C:\Documents and Settings\Ant\Start Menu\Programs\Startup\Books on Loan.lnk = C:\BOOK\BOOKSU.EXE ()
O4 - Startup: C:\Documents and Settings\Ant\Start Menu\Programs\Startup\AutorunsDisabled [2010/11/16 11:40:08 | 000,000,000 | -H-D | M]
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoCDBurning = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O7 - HKU\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-18\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-19\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O8 - Extra context menu item: &Google Search - C:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O8 - Extra context menu item: &Translate English Word - C:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O8 - Extra context menu item: Backward Links - C:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O8 - Extra context menu item: Cached Snapshot of Page - C:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O8 - Extra context menu item: Similar Pages - C:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O8 - Extra context menu item: Translate Page into English - C:\Program Files\Google\GoogleToolbar1.dll (Google Inc.)
O9 - Extra Button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll (Microsoft Corporation)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: ebay.co.uk ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: google.co.uk ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: google.com ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: hotmail.com ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: live.com ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: microsoft.com ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: msn.com ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: optimusid.com ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: passport.com ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: researchnow.co.uk ([]* in Trusted sites)
O15 - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..Trusted Domains: three.co.uk ([]* in Trusted sites)
O16 - DPF: {0000000A-0000-0010-8000-00AA00389B71} http://download.microsoft.com/download/E/1/F/E1F6B9B3-49AA-42BB-9115-D9FB57768CC2/wmavax.CAB (Reg Error: Key error.)
O16 - DPF: {31435657-9980-0010-8000-00AA00389B71} http://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab (Reg Error: Key error.)
O16 - DPF: {33564D57-0000-0010-8000-00AA00389B71} http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB (Reg Error: Key error.)
O16 - DPF: {41564D57-9980-0010-8000-00AA00389B71} http://download.microsoft.com/download/0/A/9/0A9F8B32-9F8C-4D74-A130-E4CAB36EB01F/wmvadvd.cab (Reg Error: Key error.)
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} http://download.bitdefender.com/resources/scanner/sources/en/scan8/oscan8.cab (Reg Error: Key error.)
O16 - DPF: {73ECB3AA-4717-450C-A2AB-D00DAD9EE203} http://h20270.www2.hp.com/ediags/gmn2/install/HPProductDetection2.cab (GMNRev Class)
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset.com/special/eos/OnlineScanner.cab (OnlineScanner Control)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
O16 - DPF: Microsoft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab (Reg Error: Key error.)
O18 - Protocol\Handler\wlmailhtml {03C514A3-1EFB-4856-9F99-10D7BE1653C0} - C:\Program Files\Windows Live\Mail\mailcomm.dll (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O24 - Desktop WallPaper: C:\Documents and Settings\Ant\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O24 - Desktop BackupWallPaper: C:\Documents and Settings\Ant\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2001/12/05 15:51:40 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ FAT32 ]
O32 - AutoRun File - [2009/11/25 14:45:52 | 000,000,510 | R--- | M] () - G:\AUTORUN.DAT -- [ CDFS ]
O32 - AutoRun File - [2008/02/18 13:48:26 | 000,027,750 | R--- | M] () - G:\AUTORUN.ICO -- [ CDFS ]
O32 - AutoRun File - [2008/09/24 16:09:06 | 000,000,054 | R--- | M] () - G:\AUTORUN.INF -- [ CDFS ]
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = ComFile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2011/01/26 10:47:55 | 000,000,000 | ---D | C] -- C:\Program Files\Microsoft Security Client
[2011/01/26 04:05:31 | 000,000,000 | ---D | C] -- C:\WINDOWS\System32\XPSViewer
[2011/01/26 04:04:45 | 000,000,000 | ---D | C] -- C:\Program Files\MSBuild
[2011/01/26 04:03:38 | 000,000,000 | ---D | C] -- C:\Program Files\Reference Assemblies
[2011/01/26 03:58:33 | 000,117,760 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\prntvpt.dll
[2011/01/26 03:58:32 | 000,089,088 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\filterpipelineprintproc.dll
[2011/01/26 03:58:31 | 000,597,504 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\printfilterpipelinesvc.exe
[2011/01/26 03:58:30 | 000,575,488 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\xpsshhdr.dll
[2011/01/26 03:58:26 | 001,676,288 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\xpssvcs.dll
[2011/01/26 03:58:26 | 001,676,288 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\xpssvcs.dll
[2011/01/25 22:24:19 | 000,000,000 | ---D | C] -- C:\Program Files\ESET
[2011/01/21 22:47:05 | 000,000,000 | ---D | C] -- C:\Program Files\Consumer Input
[2011/01/21 21:27:37 | 000,040,960 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\ndproxy.sys
[2011/01/21 21:03:18 | 000,045,568 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wab.exe
[2011/01/14 09:47:30 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Ant\Desktop\Fraud
[2011/01/12 23:58:34 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Ant\Desktop\Antimalware
[2011/01/12 20:33:55 | 000,038,224 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbamswissarmy.sys
[2011/01/12 20:33:29 | 000,020,952 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2011/01/12 20:33:22 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2011/01/04 23:02:29 | 001,112,288 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\WdfCoInstaller01007.dll

========== Files - Modified Within 30 Days ==========

[2011/01/30 22:00:10 | 000,000,390 | -H-- | M] () -- C:\WINDOWS\tasks\MpIdleTask.job
[2011/01/30 19:28:56 | 000,000,424 | -H-- | M] () -- C:\WINDOWS\tasks\MP Scheduled Scan.job
[2011/01/30 19:21:42 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2011/01/30 16:54:30 | 000,001,821 | ---- | M] () -- C:\WINDOWS\WINWORD6.INI
[2011/01/28 14:51:48 | 000,001,158 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2011/01/26 22:16:10 | 000,054,077 | ---- | M] () -- C:\Documents and Settings\Ant\Desktop\s46.htm
[2011/01/26 22:15:46 | 000,051,617 | ---- | M] () -- C:\Documents and Settings\Ant\Desktop\s45.htm
[2011/01/26 16:42:00 | 000,000,754 | ---- | M] () -- C:\WINDOWS\WORDPAD.INI
[2011/01/26 10:58:04 | 000,001,945 | ---- | M] () -- C:\WINDOWS\epplauncher.mif
[2011/01/26 10:36:20 | 000,432,670 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2011/01/26 10:36:20 | 000,067,626 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2011/01/26 05:03:26 | 000,214,472 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2011/01/25 12:11:26 | 000,000,000 | ---- | M] () -- C:\Documents and Settings\Ant\Desktop\Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help.htm
[2011/01/24 15:01:20 | 000,070,144 | ---- | M] () -- C:\Documents and Settings\Ant\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2011/01/23 02:44:14 | 000,000,255 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\Document.rtf
[2011/01/22 22:30:50 | 000,004,629 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\images4.jpg
[2011/01/22 21:28:00 | 000,002,485 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\images2.jpg
[2011/01/22 21:27:54 | 000,002,565 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\images.jpg
[2011/01/22 07:44:22 | 000,000,186 | ---- | M] () -- C:\Documents and Settings\Ant\Desktop\Concerned about key-logging software, etc..url
[2011/01/21 18:07:10 | 000,001,692 | ---- | M] () -- C:\WINDOWS\EXCEL5.INI
[2011/01/21 16:16:52 | 000,887,101 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\Argos - www_argos_co_uk (1).mht
[2011/01/21 16:15:06 | 000,406,618 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\BBC - BBC Radio 3 Programmes - Late Junction, Wednesday - Fiona Talkington (2).mht
[2011/01/21 16:13:58 | 000,406,618 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\BBC - BBC Radio 3 Programmes - Late Junction, Wednesday - Fiona Talkington (1).mht
[2011/01/20 20:38:26 | 000,026,893 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\Hard Drive Data Corruption.htm
[2011/01/20 16:35:18 | 000,000,056 | ---- | M] () -- C:\WINDOWS\System32\52.gam
[2011/01/20 16:35:10 | 000,000,056 | ---- | M] () -- C:\WINDOWS\System32\60.gam
[2011/01/18 16:51:04 | 000,045,577 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\BBC - Food - Recipes Chicken and leek pie.htm
[2011/01/18 09:00:38 | 000,385,097 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\orange-consumer-codes-of-practice(v1.7).pdf
[2011/01/18 08:44:44 | 000,001,620 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\MS Word document preparation.rtf
[2011/01/17 13:14:20 | 000,000,056 | ---- | M] () -- C:\WINDOWS\System32\64.gam
[2011/01/17 13:14:12 | 000,000,056 | ---- | M] () -- C:\WINDOWS\System32\50.gam
[2011/01/13 21:06:06 | 000,001,130 | ---- | M] () -- C:\Documents and Settings\Ant\Local Settings\Application Data\FASTWiz.html
[2011/01/07 16:13:12 | 000,009,708 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\Orange UK big top up.htm
[2011/01/05 00:29:48 | 000,010,752 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\GEN.XLS
[2011/01/04 23:03:28 | 000,000,000 | -H-- | M] () -- C:\WINDOWS\System32\drivers\Msft_Kernel_nielprt_01007.Wdf
[2011/01/04 16:19:20 | 000,053,760 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\TODO2.XLS
[2011/01/02 13:24:46 | 000,561,560 | ---- | M] () -- C:\Documents and Settings\Ant\My Documents\Comparison.mht

========== Files Created - No Company Name ==========

[2011/01/26 22:16:09 | 000,054,077 | ---- | C] () -- C:\Documents and Settings\Ant\Desktop\s46.htm
[2011/01/26 22:15:45 | 000,051,617 | ---- | C] () -- C:\Documents and Settings\Ant\Desktop\s45.htm
[2011/01/26 10:56:12 | 000,000,424 | -H-- | C] () -- C:\WINDOWS\tasks\MP Scheduled Scan.job
[2011/01/26 10:54:24 | 000,000,390 | -H-- | C] () -- C:\WINDOWS\tasks\MpIdleTask.job
[2011/01/25 20:16:43 | 000,001,945 | ---- | C] () -- C:\WINDOWS\epplauncher.mif
[2011/01/25 12:11:24 | 000,000,000 | ---- | C] () -- C:\Documents and Settings\Ant\Desktop\Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help.htm
[2011/01/23 02:44:13 | 000,000,255 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\Document.rtf
[2011/01/22 22:30:48 | 000,004,629 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\images4.jpg
[2011/01/22 21:29:02 | 000,002,485 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\images2.jpg
[2011/01/22 21:28:39 | 000,002,565 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\images.jpg
[2011/01/21 16:16:50 | 000,887,101 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\Argos - www_argos_co_uk (1).mht
[2011/01/21 16:15:03 | 000,406,618 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\BBC - BBC Radio 3 Programmes - Late Junction, Wednesday - Fiona Talkington (2).mht
[2011/01/21 16:13:55 | 000,406,618 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\BBC - BBC Radio 3 Programmes - Late Junction, Wednesday - Fiona Talkington (1).mht
[2011/01/20 20:38:23 | 000,026,893 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\Hard Drive Data Corruption.htm
[2011/01/20 16:35:08 | 000,000,056 | ---- | C] () -- C:\WINDOWS\System32\60.gam
[2011/01/20 00:15:49 | 000,000,186 | ---- | C] () -- C:\Documents and Settings\Ant\Desktop\Concerned about key-logging software, etc..url
[2011/01/18 16:51:01 | 000,045,577 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\BBC - Food - Recipes Chicken and leek pie.htm
[2011/01/18 09:00:36 | 000,385,097 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\orange-consumer-codes-of-practice(v1.7).pdf
[2011/01/17 13:14:19 | 000,000,056 | ---- | C] () -- C:\WINDOWS\System32\64.gam
[2011/01/17 13:14:10 | 000,000,056 | ---- | C] () -- C:\WINDOWS\System32\50.gam
[2011/01/07 16:13:10 | 000,009,708 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\Orange UK big top up.htm
[2011/01/04 23:03:26 | 000,000,000 | -H-- | C] () -- C:\WINDOWS\System32\drivers\Msft_Kernel_nielprt_01007.Wdf
[2011/01/02 13:24:39 | 000,561,560 | ---- | C] () -- C:\Documents and Settings\Ant\My Documents\Comparison.mht
[2010/10/23 11:42:38 | 000,000,067 | ---- | C] () -- C:\WINDOWS\PPTVIEW.INI
[2010/10/22 13:44:04 | 000,001,130 | ---- | C] () -- C:\Documents and Settings\Ant\Local Settings\Application Data\FASTWiz.html
[2010/10/22 13:39:42 | 000,160,718 | ---- | C] () -- C:\Documents and Settings\Ant\Local Settings\Application Data\FASTWiz.log
[2010/10/10 19:10:00 | 000,000,161 | ---- | C] () -- C:\WINDOWS\msffile.ini
[2010/09/06 19:40:50 | 000,000,124 | ---- | C] () -- C:\WINDOWS\fileman.ini
[2010/06/05 15:32:52 | 000,000,031 | ---- | C] () -- C:\WINDOWS\VBA.INI
[2010/06/05 14:39:53 | 000,000,009 | ---- | C] () -- C:\WINDOWS\WINHLP32.INI
[2010/05/06 17:52:30 | 000,000,261 | ---- | C] () -- C:\WINDOWS\MAXLINK.INI
[2010/05/03 11:28:27 | 000,004,263 | -HS- | C] () -- C:\WINDOWS\windllreg1c.sys
[2010/04/29 11:49:37 | 000,000,754 | ---- | C] () -- C:\WINDOWS\WORDPAD.INI
[2010/04/13 22:33:45 | 000,010,240 | ---- | C] () -- C:\WINDOWS\System32\drivers\mdvrmng.sys
[2010/03/30 12:00:31 | 000,000,150 | ---- | C] () -- C:\WINDOWS\CALCONV.INI
[2010/03/24 07:32:17 | 000,003,634 | ---- | C] () -- C:\WINDOWS\SETUPWIZ.INI
[2010/03/19 02:38:38 | 000,070,144 | ---- | C] () -- C:\Documents and Settings\Ant\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2010/03/17 14:53:14 | 000,001,821 | ---- | C] () -- C:\WINDOWS\WINWORD6.INI
[2010/03/17 14:51:43 | 000,002,746 | ---- | C] () -- C:\WINDOWS\ARTGALRY.INI
[2010/03/17 14:43:26 | 000,000,124 | ---- | C] () -- C:\WINDOWS\GRAPH5.INI
[2010/03/17 14:42:56 | 000,001,768 | ---- | C] () -- C:\WINDOWS\POWERPNT.INI
[2010/03/17 14:40:41 | 000,000,412 | ---- | C] () -- C:\WINDOWS\WINHELP.INI
[2010/03/17 14:40:36 | 000,001,692 | ---- | C] () -- C:\WINDOWS\EXCEL5.INI
[2010/03/17 14:23:16 | 000,000,280 | ---- | C] () -- C:\WINDOWS\TTEMBED.INI
[2010/03/17 14:23:01 | 000,000,535 | ---- | C] () -- C:\WINDOWS\MSTXTCNV.INI
[2010/03/17 14:22:48 | 000,002,041 | ---- | C] () -- C:\WINDOWS\MSFNTMAP.INI
[2009/07/13 10:35:56 | 000,466,944 | ---- | C] () -- C:\WINDOWS\System32\RemoveDevice.dll
[2009/07/13 10:35:56 | 000,466,944 | ---- | C] () -- C:\WINDOWS\RemoveDevice.dll
[2009/01/05 15:44:10 | 000,000,453 | ---- | C] () -- C:\WINDOWS\bdoscandellang.ini
[2001/12/06 14:33:19 | 000,000,061 | ---- | C] () -- C:\WINDOWS\smscfg.ini
[2001/12/06 14:25:10 | 000,004,577 | ---- | C] () -- C:\WINDOWS\Tcds.ini
[2001/12/06 13:25:29 | 000,121,905 | ---- | C] () -- C:\WINDOWS\System32\csellang.ini
[2001/12/06 13:25:29 | 000,045,056 | ---- | C] () -- C:\WINDOWS\System32\csellang.dll
[2001/12/06 13:25:29 | 000,008,831 | ---- | C] () -- C:\WINDOWS\System32\tosmreg.ini
[2001/12/06 13:25:29 | 000,006,793 | ---- | C] () -- C:\WINDOWS\System32\cseltbl.ini
[2001/12/06 11:42:29 | 000,061,440 | ---- | C] () -- C:\WINDOWS\System32\TVCtrl.dll
[2001/12/06 11:42:27 | 000,061,440 | ---- | C] () -- C:\WINDOWS\System32\GenCtrl.dll
[2001/12/06 11:42:27 | 000,057,344 | ---- | C] () -- C:\WINDOWS\System32\LCDCtrl.dll
[2001/12/06 11:42:27 | 000,053,248 | ---- | C] () -- C:\WINDOWS\System32\Multview.dll
[2001/12/06 11:42:27 | 000,045,056 | ---- | C] () -- C:\WINDOWS\System32\CRTCtrl.dll
[2001/12/06 11:42:25 | 000,090,112 | ---- | C] () -- C:\WINDOWS\System32\ColorCtr.dll
[2001/12/05 16:01:57 | 000,000,780 | ---- | C] () -- C:\WINDOWS\orun32.ini
[2001/12/05 15:40:16 | 000,004,349 | ---- | C] () -- C:\WINDOWS\ODBCINST.INI
[2001/11/30 17:13:46 | 000,000,000 | ---- | C] () -- C:\WINDOWS\System32\px.ini
[2001/08/31 15:33:58 | 000,425,984 | ---- | C] () -- C:\WINDOWS\System32\VxDMDcDlg.dll
[1996/11/14 00:00:00 | 000,012,288 | ---- | C] () -- C:\WINDOWS\System32\HLINKPRX.DLL
[1980/01/01 00:00:00 | 000,000,083 | ---- | C] () -- C:\WINDOWS\System32\OEMINFO.INI
[1980/01/01 00:00:00 | 000,000,082 | ---- | C] () -- C:\WINDOWS\CLOCK.INI

< End of report >


OTL report (Extras.Txt)

OTL Extras logfile created on: 30/01/2011 21:54:44 - Run 1
OTL by OldTimer - Version 3.2.20.6 Folder = C:\Documents and Settings\Ant\Desktop\Antimalware
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 6.0.2900.5512)
Locale: 00000809 | Country: United Kingdom | Language: ENG | Date Format: dd/MM/yyyy

495.00 Mb Total Physical Memory | 213.00 Mb Available Physical Memory | 43.00% Memory free
915.00 Mb Paging File | 608.00 Mb Available in Paging File | 66.00% Paging File free
Paging file location(s): C:\pagefile.sys 500 1104 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 9.35 Gb Total Space | 0.26 Gb Free Space | 2.80% Space Free | Partition Type: FAT32
Drive D: | 125.78 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS
Drive G: | 21.97 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS

Computer Name: SATELLITE1800 | User Name: Ant | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*
.url [@ = InternetShortcut] -- rundll32.exe shdocvw.dll,OpenURL %l

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*
exefile [open] -- "%1" %*
htmlfile [edit] -- Reg Error: Key error.
InternetShortcut [open] -- rundll32.exe shdocvw.dll,OpenURL %l
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [cmd] -- cmd.exe /k "cd %L" (Microsoft Corporation)
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"AntiVirusDisableNotify" = 0
"FirewallDisableNotify" = 0
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

========== System Restore Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sr]
"Start" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SrService]
"Start" = 2

========== Firewall Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile]

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"DoNotAllowExceptions" = 0
"EnableFirewall" = 1

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe" = C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe:*:Enabled:Windows Live Sync -- (Microsoft Corporation)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\WINDOWS\System32\mmc.exe" = C:\WINDOWS\System32\mmc.exe:*:Enabled:Microsoft Management Console -- (Microsoft Corporation)
"C:\WINDOWS\System32\usmt\migwiz.exe" = C:\WINDOWS\System32\usmt\migwiz.exe:*:Enabled:Files and Settings Transfer Wizard -- (Microsoft Corporation)
"C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe" = C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe:*:Enabled:Windows Live Sync -- (Microsoft Corporation)


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C}" = Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
"{0C7D85B0-8569-11D4-91EA-00003914300F}" = Network Device Switch
"{178832DE-9DE0-4C87-9F82-9315A9B03985}" = Windows Live Writer
"{1BD07DF4-FB06-41BA-B896-B2DA59000C96}" = Windows Live Toolbar
"{205C6BDD-7B73-42DE-8505-9A093F35A238}" = Windows Live Upload Tool
"{22B775E7-6C42-4FC5-8E10-9A5E3257BD94}" = MSVCRT
"{2318C2B1-4965-11d4-9B18-009027A5CD4F}" = Google Toolbar for Internet Explorer
"{2EEEC858-21F8-419B-8FE2-820621BFFCD7}" = GetDataBack for FAT
"{3175E049-F9A9-4A3D-8F19-AC9FB04514D1}" = Windows Live Communications Platform
"{350C97B0-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{3CF0858D-1AC5-4308-9DE7-AD15288A8BDC}" = TOSHIBA Console
"{45338B07-A236-4270-9A77-EBB4115517B5}" = Windows Live Sign-in Assistant
"{474F25F5-BDC9-40E5-B1B6-F6BF23FC106F}" = Windows Live Essentials
"{4CBA3D4C-8F51-4D60-B27E-F6B641C571E7}" = Microsoft Search Enhancement Pack
"{6412CECE-8172-4BE5-935B-6CECACD2CA87}" = Windows Live Mail
"{6855CCDD-BDF9-48E4-B80A-80DFB96FE36C}" = CmdHere Powertoy For Windows XP
"{700C359B-A0A6-4851-8D66-23375EA7647A}" = Toshiba Manuals
"{76EFFC7C-17A6-479D-9E47-8E658C1695AE}" = Windows Backup Utility
"{770657D0-A123-3C07-8E44-1C83EC895118}" = Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
"{774088D4-0777-4D78-904D-E435B318F5D2}" = Microsoft Antimalware
"{77A776C4-D10F-416D-88F0-53F2D9DCD9B3}" = Microsoft Security Client
"{7862BAD8-A379-4128-8AA1-EFD5A9603C53}" = Wireless Hotkey
"{8214CC02-6271-4DC8-B8DD-779933450264}" = HP RecordNow
"{837b34e3-7c30-493c-8f6a-2b0f04e2912c}" = Microsoft Visual C++ 2005 Redistributable
"{89B078C4-50B0-453E-BF53-3A7E6A0D85FA}" = Windows Support Tools
"{8A74E887-8F0F-4017-AF53-CBA42211AAA5}" = Microsoft Sync Framework Runtime Native v1.0 (x86)
"{8E5233E1-7495-44FB-8DEB-4BE906D59619}" = Junk Mail filter update
"{95120000-00B9-0409-0000-0000000FF1CE}" = Microsoft Application Error Reporting
"{9A25302D-30C0-39D9-BD6F-21E6EC160475}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
"{9F72EF8B-AEC9-4CA5-B483-143980AFD6FD}" = ALPS Touch Pad Driver
"{A01D570A-B7B8-4E11-8B5F-6A1043B95C5B}" = TOSHIBA Controls
"{A1F66FC9-11EE-4F2F-98C9-16F8D1E69FB7}" = Segoe UI
"{A3051CD0-2F64-3813-A88D-B8DCCDE8F8C7}" = Microsoft .NET Framework 3.0 Service Pack 2
"{A899DA1F-D626-401C-8651-F2921E3B4CB3}" = 3Connect
"{AC76BA86-7AD7-1033-7B44-A70900000002}" = Adobe Reader 7.0.9
"{B10914FD-8812-47A4-85A1-50FCDE7F1F33}" = Windows Live Sync
"{B57EAFF2-D6EE-4C6C-9175-ED9F17BFC1BC}" = Windows Live Messenger
"{BD64AF4A-8C80-4152-AD77-FCDDF05208AB}" = Microsoft Sync Framework Services Native v1.0 (x86)
"{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}" = Microsoft .NET Framework 2.0 Service Pack 2
"{C9E4932C-8417-4E4C-A0E3-EE534810AB4D}" = ClearType Tuning Control Panel Applet
"{CAE7D1D9-3794-4169-B4DD-964ADBC534EE}" = HP Product Detection
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{D92FF8EB-BD77-40AE-B68B-A6BFC6F8661D}" = Windows Live Family Safety
"{E6158D07-2637-4ECF-B576-37C489669174}" = Windows Live Call
"{EE39FFBD-544E-49E4-A999-6819828EAE91}" = Windows Live Photo Gallery
"{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}" = Microsoft SQL Server 2005 Compact Edition [ENU]
"{F0E12BBA-AD66-4022-A453-A1C8A0C4D570}" = Microsoft Choice Guard
"ABBYY FineReader 4.0 Sprint" = ABBYY FineReader 4.0 Sprint
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe SVG Viewer" = Adobe SVG Viewer 3.0
"ALi Audio Accelerator WDM Driver" = ALi Audio Accelerator WDM Driver
"CCleaner" = CCleaner
"Defraggler" = Defraggler
"ESET Online Scanner" = ESET Online Scanner v3
"ExamDiff_is1" = ExamDiff 1.8 (Build 1.8.0.5)
"File List Viewer" = File List Viewer
"ImgBurn" = ImgBurn
"IrfanView" = IrfanView (remove only)
"LHTTSENG" = L&H TTS3000 British English
"Malwarebytes' Anti-Malware_is1" = Malwarebytes' Anti-Malware
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"Microsoft Security Client" = Microsoft Security Essentials
"MSTTS" = Microsoft Text-to-Speech Engine 4.0 (English)
"ReadPlease 2003_is1" = ReadPlease 2003/ReadPlease PLUS 2003
"Recuva" = Recuva
"Speccy" = Speccy
"STARWARS: The Battle of Endor v2.1_is1" = STARWARS: The Battle of Endor version 2.1
"STARWARS: The Battle of Yavin v1.1_is1" = STARWARS: The Battle of Yavin version 1.1
"Toshiba Power Saver" = TOSHIBA Power Saver
"Toshiba Soft Modem" = Toshiba Soft Modem AMR
"TOSHIBA Software Modem" = TOSHIBA Software Modem
"TOSHIBA Utilities" = Toshiba Utilities
"Tweak UI 2.10" = Tweak UI
"Wdf01009" = Microsoft Kernel-Mode Driver Framework Feature Pack 1.9
"Windows XP Service Pack" = Windows XP Service Pack 3
"WinLiveSuite_Wave3" = Windows Live Essentials
"WinMerge_is1" = WinMerge 2.12.4
"WordWeb" = WordWeb
"ZTE_MF627_LEGACY_DRIVER_1.2059.0.4" = ZTE_MF627_USB_MODEM_1.2059.0.4

========== HKEY_USERS Uninstall List ==========

[HKEY_USERS\S-1-5-21-2856520603-3802400216-3657561249-1005\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"Consumer Input Software" = Consumer Input Software (remove only)
"Google Chrome" = Google Chrome

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 25/01/2011 18:14:10 | Computer Name = SATELLITE1800 | Source = Microsoft Security Client | ID = 5000
Description =

Error - 25/01/2011 18:14:40 | Computer Name = SATELLITE1800 | Source = Microsoft Security Client | ID = 1001
Description = Microsoft Security Client failed to apply security policy: "FEP clean-up
policy". Error: . Error Code: 0x8004015

Error - 26/01/2011 05:27:16 | Computer Name = SATELLITE1800 | Source = MPSampleSubmission | ID = 5000
Description = EventType mptelemetry, P1 0x80070003, P2 moac, P3 cachereset, P4 3.0.8107.0,
P5 unspecified, P6 unspecified, P7 unspecified, P8 NIL, P9 NIL, P10 NIL.

Error - 26/01/2011 05:46:32 | Computer Name = SATELLITE1800 | Source = Microsoft Security Client | ID = 5000
Description =

Error - 26/01/2011 05:47:01 | Computer Name = SATELLITE1800 | Source = Microsoft Security Client | ID = 1001
Description = Microsoft Security Client failed to apply security policy: "FEP clean-up
policy". Error: . Error Code: 0x8004015

Error - 26/01/2011 06:10:14 | Computer Name = SATELLITE1800 | Source = Application Error | ID = 1000
Description = Faulting application iexplore.exe, version 6.0.2900.5512, faulting
module urlmon.dll, version 6.0.2900.6049, fault address 0x0002024b.

Error - 26/01/2011 06:49:22 | Computer Name = SATELLITE1800 | Source = MPSampleSubmission | ID = 5000
Description = EventType mptelemetry, P1 0x80070003, P2 moac, P3 cachereset, P4 3.0.8107.0,
P5 unspecified, P6 unspecified, P7 unspecified, P8 NIL, P9 NIL, P10 NIL.

Error - 26/01/2011 07:03:39 | Computer Name = SATELLITE1800 | Source = MPSampleSubmission | ID = 5000
Description = EventType mptelemetry, P1 microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094),
P2 3.0.8107.0, P3 timeout, P4 1.1.6502.0, P5 fixed, P6 1 _ 512, P7 10 _ not boot,
P8 NIL, P9 NIL, P10 NIL.

Error - 28/01/2011 11:04:09 | Computer Name = SATELLITE1800 | Source = MPSampleSubmission | ID = 5000
Description = EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 3.0.8107.0,
P5 mpsigdwn.dll, P6 3.0.8107.0, P7 microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094),
P8 NIL, P9 NIL, P10 NIL.

Error - 29/01/2011 14:23:10 | Computer Name = SATELLITE1800 | Source = Application Error | ID = 1000
Description = Faulting application iexplore.exe, version 6.0.2900.5512, faulting
module urlmon.dll, version 6.0.2900.6049, fault address 0x0002024b.

[ System Events ]
Error - 30/01/2011 12:36:51 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 12:37:53 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 12:54:40 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 15:15:35 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 16:44:06 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 17:42:57 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 17:44:44 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 17:49:31 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 17:51:37 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}

Error - 30/01/2011 18:02:02 | Computer Name = SATELLITE1800 | Source = DCOM | ID = 10005
Description = DCOM got error "%1058" attempting to start the service SeaPort with
arguments "-Service" in order to run the server: {D6381B4A-D254-46EB-9018-A62E0F4BA6BA}


< End of report >


Rootkit Unhooker LE report

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0x804D7000 C:\WINDOWS\system32\ntoskrnl.exe 2189952 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2189952 bytes
0x804D7000 RAW 2189952 bytes
0x804D7000 WMIxWDM 2189952 bytes
0xBF800000 Win32k 1855488 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1855488 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF2B68000 C:\WINDOWS\System32\DRIVERS\LTSM.sys 802816 bytes (LT, SoftModem Device Driver)
0xBF012000 C:\WINDOWS\System32\tridxp.dll 569344 bytes (Trident Microsystems Inc., Trident Display Driver)
0xF7448000 wdf01000.sys 462848 bytes (Microsoft Corporation, Kernel Mode Driver Framework Runtime)
0xF29A8000 C:\WINDOWS\System32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xF7074000 C:\WINDOWS\System32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xF2AB5000 C:\WINDOWS\System32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xF0B40000 C:\WINDOWS\System32\DRIVERS\srv.sys 360448 bytes (Microsoft Corporation, Server driver)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 290816 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xF0857000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF71D2000 C:\WINDOWS\system32\drivers\ac97ali.sys 233472 bytes (Acer Laboratories Inc., ALi Audio Accelerator WDM Driver)
0xF7266000 C:\WINDOWS\System32\DRIVERS\tridxpm.sys 225280 bytes (Trident Microsystems Inc., Trident Miniport Driver)
0xF74CA000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xF0D13000 C:\WINDOWS\System32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF7359000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xF2A40000 C:\WINDOWS\System32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF2A8D000 C:\WINDOWS\System32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF2B41000 C:\WINDOWS\system32\DRIVERS\MpFilter.sys 159744 bytes (Microsoft Corporation, Microsoft antimalware file system filter driver)
0xF2982000 C:\WINDOWS\System32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xF739D000 Fastfat.sys 147456 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xF71AE000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF722E000 C:\WINDOWS\System32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF720B000 C:\WINDOWS\System32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xF2A6B000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xF73D3000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF740B000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF742A000 pcmcia.sys 122880 bytes (Microsoft Corporation, PCMCIA Bus Driver)
0xF733F000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF0586000 C:\WINDOWS\system32\DRIVERS\ZTEusbmdm6k.sys 106496 bytes (ZTE Incorporated, USB Modem/Serial Device Driver)
0xF05A0000 C:\WINDOWS\system32\DRIVERS\ZTEusbnmea.sys 106496 bytes (ZTE Incorporated, USB Modem/Serial Device Driver)
0xF05BA000 C:\WINDOWS\system32\DRIVERS\ZTEusbser6k.sys 106496 bytes (ZTE Incorporated, USB Modem/Serial Device Driver)
0xF73F3000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xF296A000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xF7386000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF7183000 C:\WINDOWS\System32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xF0F5C000 C:\WINDOWS\System32\DRIVERS\irda.sys 90112 bytes (Microsoft Corporation, IRDA Protocol Driver)
0xF0CD6000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF0F48000 C:\WINDOWS\system32\drivers\mdvrmng.sys 81920 bytes (-, SmartRoaming Client)
0xF719A000 C:\WINDOWS\System32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xF7252000 C:\WINDOWS\System32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0x806EE000 ACPI_HAL 81152 bytes
0x806EE000 C:\WINDOWS\system32\hal.dll 81152 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF2B0E000 C:\WINDOWS\System32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF73C1000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xF74B9000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF7172000 C:\WINDOWS\System32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xF7709000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF75B9000 C:\WINDOWS\System32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF7609000 C:\WINDOWS\System32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)
0xF75D9000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF75C9000 C:\WINDOWS\System32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xF0E90000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF7689000 C:\WINDOWS\System32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF7529000 C:\WINDOWS\System32\Drivers\WDFLDR.SYS 57344 bytes (Microsoft Corporation, Kernel Mode Driver Framework Loader)
0xF7569000 C:\WINDOWS\System32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF75E9000 C:\WINDOWS\System32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF7619000 C:\WINDOWS\System32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF7549000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF75F9000 C:\WINDOWS\System32\DRIVERS\Apfiltr.sys 49152 bytes (Alps Electric Co., Ltd., Alps Pointing-device Driver)
0xF18C2000 C:\WINDOWS\system32\DRIVERS\fssfltr_tdi.sys 49152 bytes (Microsoft Corporation, Family Safety Filter Driver (TDI))
0xF7639000 C:\WINDOWS\System32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF7579000 alim1541.sys 45056 bytes (Microsoft Corporation, ALi M1541 NT AGP Filter)
0xF76D9000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF7539000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF75A9000 C:\WINDOWS\System32\DRIVERS\p3.sys 45056 bytes (Microsoft Corporation, Processor Device Driver)
0xF7629000 C:\WINDOWS\System32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF7519000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF7679000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF7659000 C:\WINDOWS\System32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF7559000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF7649000 C:\WINDOWS\System32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF76A9000 C:\WINDOWS\System32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xF09B8000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xF76E9000 C:\WINDOWS\System32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF7801000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xF7829000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF78A9000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xF77D9000 C:\WINDOWS\System32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xF7799000 C:\WINDOWS\System32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF78B9000 C:\WINDOWS\System32\DRIVERS\USBSTOR.SYS 28672 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0xF77C9000 C:\WINDOWS\System32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF77D1000 C:\WINDOWS\System32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF7899000 c:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{972A63B9-39CB-476B-93A5-D20E0E756B3B}\MpKsla24d55bc.sys 24576 bytes (Microsoft Corporation, KSLDriver)
0xF7819000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF7809000 C:\WINDOWS\System32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0xF7821000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF77A1000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF77F1000 C:\WINDOWS\System32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF77E1000 C:\WINDOWS\System32\DRIVERS\rasirda.sys 20480 bytes (Microsoft Corporation, IrDA WAN Miniport Driver)
0xF77F9000 C:\WINDOWS\System32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF77E9000 C:\WINDOWS\System32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF77C1000 C:\WINDOWS\System32\DRIVERS\usbohci.sys 20480 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0xF7831000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF10D2000 C:\WINDOWS\system32\DRIVERS\asyncmac.sys 16384 bytes (Microsoft Corporation, MS Remote Access serial network driver)
0xF7931000 C:\WINDOWS\System32\DRIVERS\BATTC.SYS 16384 bytes (Microsoft Corporation, Battery Class Driver)
0xF79B5000 C:\WINDOWS\System32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0xF79C9000 C:\WINDOWS\System32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xF108E000 C:\WINDOWS\System32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF7935000 PxHelp20.sys 16384 bytes (VERITAS Software, Inc., PxHelper Device Driver for Windows 2000)
0xF79B1000 C:\WINDOWS\System32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)
0xF7929000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF792D000 compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver)
0xF7307000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF79BD000 C:\WINDOWS\System32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xF79F5000 C:\WINDOWS\System32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xF7A1D000 aliide.sys 8192 bytes (Acer Laboratories Inc., ALi mini IDE Driver)
0xF7A29000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF7A2F000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xF7A27000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7A19000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7A2B000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7A3F000 C:\WINDOWS\System32\Drivers\ParVdm.SYS 8192 bytes (Microsoft Corporation, VDM Parallel Driver)
0xF7A2D000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7A23000 C:\WINDOWS\System32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7A1F000 TVALD.SYS 8192 bytes (Toshiba Corporation, Toshiba ACPI-Based Value Added Logical Device Driver)
0xF7A25000 C:\WINDOWS\System32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF7A1B000 C:\WINDOWS\System32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7B5D000 C:\WINDOWS\System32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF729D000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF72EB000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
==============================================
>Stealth
==============================================
0xE1200038 LDT (IN GDT of Core 1) Modification, Base+0xC58, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x85740000 LDT (IN GDT of Core 1) Modification, Base+0xC78, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x85840000 LDT (IN GDT of Core 1) Modification, Base+0xC88, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x85C085DD LDT (IN GDT of Core 1) Modification, Base+0xD08, DPL_SYSTEM, Rpl : 1, Type: CallGate32, Core [1]
0x851885F6 LDT (IN GDT of Core 1) Modification, Base+0x7C8, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0xE1788636 LDT (IN GDT of Core 1) Modification, Base+0x8E0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x69460A05 LDT (IN GDT of Core 1) Modification, Base+0xF40, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x69460A05 LDT (IN GDT of Core 1) Modification, Base+0xFB8, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0xE2080078 LDT (IN GDT of Core 1) Modification, Base+0x110, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0xE1300000 LDT (IN GDT of Core 1) Modification, Base+0x980, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x85780000 LDT (IN GDT of Core 1) Modification, Base+0xC80, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x859C0000 LDT (IN GDT of Core 1) Modification, Base+0xCA0, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0xE18885F8 LDT (IN GDT of Core 1) Modification, Base+0xD48, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x69460A05 LDT (IN GDT of Core 1) Modification, Base+0x978, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x85200000 LDT (IN GDT of Core 1) Modification, Base+0xA68, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x85F08626 LDT (IN GDT of Core 1) Modification, Base+0xB20, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x69460A05 LDT (IN GDT of Core 1) Modification, Base+0xCD0, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x86508629 LDT (IN GDT of Core 1) Modification, Base+0xD70, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x8614E266 LDT (IN GDT of Core 1) Modification, Base+0x3C0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x866085FE LDT (IN GDT of Core 1) Modification, Base+0x410, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x8608E1E8 LDT (IN GDT of Core 1) Modification, Base+0x890, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x85640000 LDT (IN GDT of Core 1) Modification, Base+0xC68, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x85B885F6 LDT (IN GDT of Core 1) Modification, Base+0xCC0, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x85F885FE LDT (IN GDT of Core 1) Modification, Base+0xD40, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x86308612 LDT (IN GDT of Core 1) Modification, Base+0xE38, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x860885F6 LDT (IN GDT of Core 1) Modification, Base+0x200, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x86B885FE LDT (IN GDT of Core 1) Modification, Base+0x598, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x00320000 LDT (IN GDT of Core 1) Modification, Base+0x678, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x85D00002 LDT (IN GDT of Core 1) Modification, Base+0x848, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x858085F7 LDT (IN GDT of Core 1) Modification, Base+0xB30, DPL_SYSTEM, Rpl : 3, Type: CallGate32, Core [1]
0x85808625 LDT (IN GDT of Core 1) Modification, Base+0xB70, DPL_SYSTEM, Rpl : 1, Type: CallGate32, Core [1]
0x85740000 LDT (IN GDT of Core 1) Modification, Base+0xC78, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x85B085FD LDT (IN GDT of Core 1) Modification, Base+0xCF8, DPL_SYSTEM, Rpl : 1, Type: CallGate32, Core [1]
0x85908626 LDT (IN GDT of Core 1) Modification, Base+0xD60, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x8554E11B LDT (IN GDT of Core 1) Modification, Base+0xF68, DPL_SYSTEM, Rpl : 3, Type: CallGate32, Core [1]
0x8648861D LDT (IN GDT of Core 1) Modification, Base+0x190, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x85E80000 LDT (IN GDT of Core 1) Modification, Base+0x1B8, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x86080000 LDT (IN GDT of Core 1) Modification, Base+0x490, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x86A885F7 LDT (IN GDT of Core 1) Modification, Base+0x488, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x86E885C4 LDT (IN GDT of Core 1) Modification, Base+0x7C0, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0xF2057FFF LDT (IN GDT of Core 1) Modification, Base+0x8A0, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x00100000 LDT (IN GDT of Core 1) Modification, Base+0xA98, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x851077E4 LDT (IN GDT of Core 1) Modification, Base+0xC18, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x85400000 LDT (IN GDT of Core 1) Modification, Base+0xC48, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x69460A05 LDT (IN GDT of Core 1) Modification, Base+0xC68, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x11010000 LDT (IN GDT of Core 1) Modification, Base+0x058, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x86C0861C LDT (IN GDT of Core 1) Modification, Base+0x428, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x86D08626 LDT (IN GDT of Core 1) Modification, Base+0x710, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x00510000 LDT (IN GDT of Core 1) Modification, Base+0x918, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x2C0885F7 LDT (IN GDT of Core 1) Modification, Base+0x1D8, DPL_SYSTEM, Rpl : 3, Type: CallGate32, Core [1]
0xF0C085F7 LDT (IN GDT of Core 1) Modification, Base+0x2C8, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0xF0C00000 LDT (IN GDT of Core 1) Modification, Base+0x5E0, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x853085FA LDT (IN GDT of Core 1) Modification, Base+0xC70, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0xA58C85F7 LDT (IN GDT of Core 1) Modification, Base+0xC90, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x8580861D LDT (IN GDT of Core 1) Modification, Base+0xCC0, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x85F00000 LDT (IN GDT of Core 1) Modification, Base+0xCF8, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x85D08616 LDT (IN GDT of Core 1) Modification, Base+0xD10, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x851C85F9 LDT (IN GDT of Core 1) Modification, Base+0xC20, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x85108612 LDT (IN GDT of Core 1) Modification, Base+0xC50, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x856C85F9 LDT (IN GDT of Core 1) Modification, Base+0xC70, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x85810000 LDT (IN GDT of Core 1) Modification, Base+0xC88, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x8560861F LDT (IN GDT of Core 1) Modification, Base+0xCA0, DPL_USER, Rpl : 3, Type: CallGate32, Core [1]
0x85BD85F9 LDT (IN GDT of Core 1) Modification, Base+0xCC0, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x85B08613 LDT (IN GDT of Core 1) Modification, Base+0xCF0, DPL_USER, Rpl : 3, Type: CallGate32, Core [1]

Attached Files


Edited by Ant S, 30 January 2011 - 06:26 PM.


#7 Casey_boy

Casey_boy

    Bleeping physicist


  • Malware Response Team
  • 7,765 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:58 PM

Posted 31 January 2011 - 02:56 PM

Hi again,

Those logs look good :) Just a few more files for you to identify:

C:\WINDOWS\System32\52.gam
C:\WINDOWS\System32\60.gam
C:\WINDOWS\System32\64.gam
C:\WINDOWS\System32\50.gam

If you don't recognise them, then please follow the instructions I gave earlier on how to submit them to the Jotti online scanner.


We'll do some tidying up here as well, nothing serious though.

:step1: We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.
    :OTL
    IE - HKU\S-1-5-21-2856520603-3802400216-3657561249-1005\..\URLSearchHook: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - Reg Error: Key error. File not found
    O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - No CLSID value found.
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
    O2 - BHO: (no name) - AutorunsDisabled - No CLSID value found.
    O4 - HKLM..\Run: [KernelFaultCheck] File not found
    O4 - HKLM..\Run: [TFncKy] File not found
    O16 - DPF: {0000000A-0000-0010-8000-00AA00389B71} http://download.microsoft.com/download/E/1/F/E1F6B9B3-49AA-42BB-9115-D9FB57768CC2/wmavax.CAB (Reg Error: Key error.)
    O16 - DPF: {31435657-9980-0010-8000-00AA00389B71} http://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab (Reg Error: Key error.)
    O16 - DPF: {33564D57-0000-0010-8000-00AA00389B71} http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB (Reg Error: Key error.)
    O16 - DPF: {41564D57-9980-0010-8000-00AA00389B71} http://download.microsoft.com/download/0/A/9/0A9F8B32-9F8C-4D74-A130-E4CAB36EB01F/wmvadvd.cab (Reg Error: Key error.)
    O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} http://download.bitdefender.com/resources/scanner/sources/en/scan8/oscan8.cab (Reg Error: Key error.)
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
    O16 - DPF: Microsoft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab (Reg Error: Key error.)
    
    :commands
    [CREATERESTOREPOINT]
    
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click Posted Image.
  • A report will open. Copy and Paste that report in your next reply.

:step2: Update Adobe Reader

Your version of Adobe Reader is out-of-date. Older versions has vulnerabilities which are fixed in later releases. I strongly recommend that you update your version. The latest version can be downloaded from here: http://get.adobe.com/uk/reader/?promoid=BUIGO

Casey

If I have been helping you and I do not reply within 48hours, feel free to send me a PM.


* My Website * Am I Infected? * Malware Removal Help * If you'd like to say thanks *


#8 Ant S

Ant S
  • Topic Starter

  • Members
  • 63 posts
  • OFFLINE
  •  
  • Local time:02:58 PM

Posted 01 February 2011 - 12:02 PM

Thanks very much, Casey, for checking the logs.

Yes, the .gam files are saved colour settings for my monitor. Well spotted again!

This is where things start to get hairy: the last time I ran OTL, my laptop started doing strange things. I know that "O4 - HKLM..\Run: [TFncKy] File not found" is a false postive. TFncKy.exe does exist; it looks after the non-standard keyboard buttons on my laptop. (I've taken it out of the script.)

If problems occur it may be necessary to do a system restore. If there are any other entries in the script you think might be problematic, do let me know.


OTL report

========== OTL ==========
Registry value HKEY_USERS\S-1-5-21-2856520603-3802400216-3657561249-1005\Software\Microsoft\Internet Explorer\URLSearchHooks\\{EF99BD32-C1FB-11D2-892F-0090271D4F88} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EF99BD32-C1FB-11D2-892F-0090271D4F88}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5C255C8A-E604-49b4-9D64-90988571CECB}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\AutorunsDisabled\ deleted successfully.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\KernelFaultCheck deleted successfully.
Starting removal of ActiveX control {0000000A-0000-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\WMAVAX.inf not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0000000A-0000-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{0000000A-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-0000-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {31435657-9980-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\wvc1dmo.inf not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{31435657-9980-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{31435657-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{31435657-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{31435657-9980-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {33564D57-0000-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\WMV9VCM.inf not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{33564D57-0000-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33564D57-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{33564D57-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33564D57-0000-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {41564D57-9980-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\wmvadvd.inf not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{41564D57-9980-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41564D57-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{41564D57-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41564D57-9980-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}
C:\WINDOWS\Downloaded Program Files\oscan8.inf not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ not found.
Starting removal of ActiveX control {E2883E8F-472F-4FB0-9522-AC9BF37916A7}
C:\WINDOWS\Downloaded Program Files\gp.inf not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
File oft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab not found.
Starting removal of ActiveX control Microsoft XML Parser for Java
Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\DownloadInformation\\INF .
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Microsoft XML Parser for Java\ not found.
========== COMMANDS ==========
Restore point Set: OTL Restore Point (0)

OTL by OldTimer - Version 3.2.20.6 log created on 02012011_164442

#9 Casey_boy

Casey_boy

    Bleeping physicist


  • Malware Response Team
  • 7,765 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:58 PM

Posted 02 February 2011 - 09:10 AM

Hi,

This is where things start to get hairy: the last time I ran OTL, my laptop started doing strange things...If problems occur it may be necessary to do a system restore.


No problem, though nothing we did there should cause any problems at all.

From all of the logs you've provided there seems to be no evidence of malware on your PC. That being said, let's play safe and get another opinion.

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

You could also run another scan with MBAM (make sure you update it first) and post me the resultant log.

Casey

If I have been helping you and I do not reply within 48hours, feel free to send me a PM.


* My Website * Am I Infected? * Malware Removal Help * If you'd like to say thanks *


#10 Ant S

Ant S
  • Topic Starter

  • Members
  • 63 posts
  • OFFLINE
  •  
  • Local time:02:58 PM

Posted 03 February 2011 - 01:31 PM

That's good new, Casey. Thanks!

The ESET online scanner found no threats.


Malwarebytes log

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5662

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

02/02/2011 23:31:02
mbam-log-2011-02-02 (23-31-01).txt

Scan type: Quick scan
Objects scanned: 166708
Time elapsed: 1 hour(s), 5 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#11 Casey_boy

Casey_boy

    Bleeping physicist


  • Malware Response Team
  • 7,765 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:58 PM

Posted 03 February 2011 - 03:07 PM

Hi,

Well, seeing as all your logs are clear, I'm going to give you the all clean :thumbsup:

We Need to Clean Up our Mess
Our work on your machine has left considerable leftovers on your box. Let's clean those up real quick:
  • Reopen Posted Image on your desktop.
  • Click on Posted Image
  • You will be prompted to reboot your system. Please do so.

Below I have outlined a series of categories that outline how you can increase the security of your computer and help prevent reinfection. Please take the time to read through them and follow the advice given.

Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

  • Windows XP users
    You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.

Hiding Hidden Files
Please set your system to hide all hidden files.
Click Start, open My Computer, select the Tools menu and click Folder Options.
Select the View Tab. Under the Hidden files and folders heading, uncheck Show hidden files and folders.
Check: Hide file extensions for known file types
Check the Hide protected operating system files (recommended) option.
Click Yes to confirm.

Purging System Restore Points
Now you should Set a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which sometimes can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then go to Start > Run and type: Cleanmgr
  • Click "OK".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
One of the most common questions found when cleaning Spyware or other Malware is "how did my machine get infected?". There are a variety of reasons, but the most common ones are that you are going to sites that you are not practicing Safe Internet, you are not running the proper security software, and that your computer's security settings are set too low.

Practice Safe Internet

One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will. Below are a list of simple precautions to take to keep your computer clean and running securely:
  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.

  • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.

  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.

  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article: Foistware, And how to avoid it.

    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. For a list of these types of programs we recommend you visit this link: Rogue/Suspect Anti-Spyware Products & Web Sites

  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you. We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake.

  • Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.

  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.

  • Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.

  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site.

  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.

Make Internet Explorer more secure
  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialize and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • Change the Navigate sub-frames across different domains to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
  • Next press the Apply button and then the OK to exit the Internet Properties page.


Regularly Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

Install SpywareBlaster

SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

A tutorial on installing & using this product can be found here:

Using SpywareBlaster to protect your computer from Spyware and Malware


Update all these programs regularly
Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.

Follow this list and your potential for being infected again will reduce dramatically.

Casey

If I have been helping you and I do not reply within 48hours, feel free to send me a PM.


* My Website * Am I Infected? * Malware Removal Help * If you'd like to say thanks *


#12 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:58 AM

Posted 07 February 2011 - 04:41 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#13 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:58 AM

Posted 09 February 2011 - 10:16 PM

This topic has been re-opened at the request of the person who originally posted.
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#14 Ant S

Ant S
  • Topic Starter

  • Members
  • 63 posts
  • OFFLINE
  •  
  • Local time:02:58 PM

Posted 10 February 2011 - 04:02 PM

Thanks very much for all your help, Casey.

There's just been an article in my local newspaper about key-logging devices found attached to public access PC's. I was right to suspect that my eBay and PayPal passwords had been obtained from a PC I'd used. Nonetheless, it's good to know that my PC's got the all clear.

Thanks again. Good luck with the rest of your training!

Ant :)

#15 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:58 AM

Posted 11 February 2011 - 12:20 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users