Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rootkit & Google Redirects


  • This topic is locked This topic is locked
19 replies to this topic

#1 Teahupo'o

Teahupo'o

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:40 AM

Posted 30 April 2011 - 05:02 PM

Trying to fix a friend's desktop that was infected by various virii. Even after using a few programs (Avast, AVG, Malwarebytes, and Spybot S&D), and replacing his infected 'hosts' file, he's still getting redirects. If anyone can help, I'd greatly appreciate it!

Here are the logs:


DDS (Ver_11-03-05.01) - NTFSx86
Run by PRIVATE at 21:47:37.56 on Tue 04/26/2011
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_15
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1278.792 [GMT -4:00]
.
AV: AVG Anti-Virus Free Edition 2011 *Enabled/Outdated* {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.
============== Running Processes ===============
.
C:\PROGRA~1\AVG\AVG10\avgchsvx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spool\drivers\w32x86\3\WrtMon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\WrtProc.exe
C:\Program Files\AVG\AVG10\avgwdsvc.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe
C:\Program Files\AVG\AVG10\avgnsx.exe
C:\Program Files\AVG\AVG10\avgemcx.exe
C:\PROGRA~1\AVG\AVG10\avgrsx.exe
C:\Program Files\AVG\AVG10\avgcsrvx.exe
C:\Documents and Settings\PRIVATE\Desktop\dds.scr
.
============== Pseudo HJT Report ===============
.
uDefault_Page_URL = hxxp://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
uInternet Settings,ProxyOverride = <local>
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
mWinlogon: Userinit=c:\windows\system32\userinit.exe,c:\windows\system32\appconf32.exe,
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: bho2gr Class: {31ff080d-12a3-439a-a2ef-4ba95a3148e8} - c:\program files\getright\xx2gr.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg10\avgssie.dll
BHO: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SearchHelper.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: {A3EF6FD4-4769-4734-9494-4707087225B9} - No File
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: Windows Live Toolbar Helper: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - c:\program files\windows live\toolbar\wltcore.dll
BHO: {E5886C91-CDD7-4832-B32D-0830705A9C60} - No File
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: BandooIEPlugin Class: {eb5cee80-030a-4ed8-8e20-454e9c68380f} - c:\program files\bandoo\plugins\ie\ieplugin.dll
BHO: SingleInstance Class: {fdad4da1-61a2-4fd8-9c17-86f7ac245081} - c:\program files\yahoo!\companion\installs\cpn1\YTSingleInstance.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} - c:\program files\windows live\toolbar\wltcore.dll
TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File
TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil10o_Plugin.exe -update plugin
mRun: [WrtMon.exe] c:\windows\system32\spool\drivers\w32x86\3\WrtMon.exe
mRun: [AVG_TRAY] c:\program files\avg\avg10\avgtray.exe
uPolicies-explorer: DisallowRun = 1 (0x1)
uPolicies-disallowrun: 0 = msseces.exe
uPolicies-disallowrun: 1 = MSASCui.exe
uPolicies-disallowrun: 2 = ekrn.exe
uPolicies-disallowrun: 3 = egui.exe
uPolicies-disallowrun: 4 = avgnt.exe
uPolicies-disallowrun: 5 = avcenter.exe
uPolicies-disallowrun: 6 = avscan.exe
uPolicies-disallowrun: 7 = avgfrw.exe
uPolicies-disallowrun: 8 = avgui.exe
uPolicies-disallowrun: 9 = avgtray.exe
uPolicies-disallowrun: 10 = avgscanx.exe
uPolicies-disallowrun: 11 = avgcfgex.exe
uPolicies-disallowrun: 12 = avgemc.exe
uPolicies-disallowrun: 13 = avgchsvx.exe
uPolicies-disallowrun: 14 = avgcmgr.exe
uPolicies-disallowrun: 15 = avgwdsvc.exe
IE: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
IE: Download with GetRight - c:\program files\getright\GRdownload.htm
IE: Open with GetRight Browser - c:\program files\getright\GRbrowse.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FA9B9510-9FCB-4ca0-818C-5D0987B47C4D} - c:\program files\pokerstars.net\PokerStarsUpdate.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {362C56AA-6E4F-40C7-A0B5-85501DBDAD77} - hxxp://i.dell.com/images/global/js/scanner/SysProExe.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1230321751484
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1230321743609
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} - hxxp://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - hxxp://zone.msn.com/bingame/popcaploader_v10.cab
Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program files\belarc\advisor\system\BAVoilaX.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg10\avgpp.dll
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: c:\progra~1\bandoo\bndhook.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
IFEO: image file execution options - svchost.exe
IFEO: mrt.exe - svchost.exe
IFEO: OLT.exe - svchost.exe
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\docume~1\PRIVATE~1\applic~1\mozilla\firefox\profiles\gezgnind.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.bing.com/search?FORM=IEFM1&q=
FF - prefs.js: browser.search.selectedEngine - search
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - prefs.js: keyword.URL - hxxp://www.searchqu.com/web?src=ffb&q=
FF - prefs.js: network.proxy.type - 4
FF - component: c:\documents and settings\PRIVATE\application data\mozilla\firefox\profiles\gezgnind.default\extensions\firefox@bandoo.com\components\FFPlugin.dll
FF - component: c:\program files\avg\avg10\firefox4\components\avgssff4.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npvlc.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - %profile%\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Ext: FavLoc: {472f4ef0-a825-11da-a746-0800200c9a66} - %profile%\extensions\{472f4ef0-a825-11da-a746-0800200c9a66}
FF - Ext: Adobe DLM (powered by getPlus®): {CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7} - %profile%\extensions\{CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7}
FF - Ext: Bandoo for Firefox: firefox@bandoo.com - %profile%\extensions\firefox@bandoo.com
FF - Ext: New Tab Homepage: {66E978CD-981F-47DF-AC42-E3CF417C1467} - %profile%\extensions\{66E978CD-981F-47DF-AC42-E3CF417C1467}
FF - Ext: Yahoo! Toolbar: {635abd67-4fe9-1b23-4f01-e679fa7484c1} - %profile%\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
FF - Ext: AVG Safe Search: {1E73965B-8B48-48be-9C8D-68B920ABC1C4} - c:\program files\avg\avg10\Firefox4
.
---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
============= SERVICES / DRIVERS ===============
.
R0 AVGIDSEH;AVGIDSEH;c:\windows\system32\drivers\AVGIDSEH.sys [2010-9-13 25680]
R0 Avgrkx86;AVG Anti-Rootkit Driver;c:\windows\system32\drivers\avgrkx86.sys [2010-9-7 26064]
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-3-28 64160]
R1 Avgldx86;AVG AVI Loader Driver;c:\windows\system32\drivers\avgldx86.sys [2010-12-8 251728]
R1 Avgmfx86;AVG Mini-Filter Resident Anti-Virus Shield;c:\windows\system32\drivers\avgmfx86.sys [2010-9-7 34384]
R1 Avgtdix;AVG TDI Driver;c:\windows\system32\drivers\avgtdix.sys [2010-11-12 299984]
R2 AVGIDSAgent;AVGIDSAgent;c:\program files\avg\avg10\identity protection\agent\bin\AVGIDSAgent.exe [2011-1-6 6128720]
R2 avgwd;AVG WatchDog;c:\program files\avg\avg10\avgwdsvc.exe [2010-10-22 265400]
R3 AVGIDSDriver;AVGIDSDriver;c:\windows\system32\drivers\AVGIDSDriver.sys [2010-8-3 123472]
R3 AVGIDSFilter;AVGIDSFilter;c:\windows\system32\drivers\AVGIDSFilter.sys [2010-8-3 30288]
R3 AVGIDSShim;AVGIDSShim;c:\windows\system32\drivers\AVGIDSShim.sys [2010-8-3 26192]
S3 VX6000;Microsoft LifeCam VX-6000;c:\windows\system32\drivers\VX6000Xp.sys [2007-9-16 2383152]
S4 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-3-9 1029456]
S4 McComponentHostService;McAfee Security Scan Component Host Service;"c:\program files\mcafee security scan\2.0.181\mcchsvc.exe" --> c:\program files\mcafee security scan\2.0.181\McCHSvc.exe [?]
.
=============== Created Last 30 ================
.
2011-04-24 19:51:24 -------- d-----w- c:\docume~1\PRIVATE~1\applic~1\AVG10
2011-04-15 02:20:51 237949 ----a-w- c:\program files\mozilla firefox\null0.946889857201332.exe
2011-04-04 19:34:18 4313359 ----a-w- C:\ComboFix.exe
2011-04-04 17:30:46 -------- d--h--w- C:\$AVG
2011-04-04 17:08:20 -------- d-----w- c:\windows\system32\drivers\AVG
2011-04-04 15:04:43 43008 ----a-w- c:\windows\system32\xb6zaasm.default.tmp
2011-04-04 14:55:44 0 ----a-w- c:\windows\system32\ol3a4fkm.default.tmp
.
==================== Find3M ====================
.
2011-04-14 00:34:24 6686 --sha-w- c:\windows\system32\KGyGaAvL.sys
2011-04-04 18:38:39 56 --sh--r- c:\windows\system32\AFE1171005.sys
2011-03-01 05:33:29 112 ----a-w- c:\windows\system32\srvblck2.tmp
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: HDS728080PLAT20 rev.PF2OA27A -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8A0265D9]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x8a02c970]; MOV EAX, [0x8a02c9ec]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37C5] -> \Device\Harddisk0\DR0[0x8A14DAB8]
3 CLASSPNP[0xF7637FD7] -> nt!IofCallDriver[0x804E37C5] -> [0x8A09A2F8]
\Driver\atapi[0x8A0AC388] -> IRP_MJ_CREATE -> 0x8A0265D9
kernel: MBR read successfully
_asm { MOV AX, 0x0; MOV SS, AX; MOV SP, 0x7c00; MOV DS, AX; CLD ; MOV CX, 0x80; MOV SI, SP; MOV DI, 0x600; MOV ES, AX; REP MOVSD ; JMP FAR 0x0:0x62d; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskHDS728080PLAT20_________________________PF2OA27A#5&2a84b1a5&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x8A02641F
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
.
============= FINISH: 21:50:08.26 ===============

GMER 1.0.15.15570 - http://www.gmer.net
Rootkit scan 2011-04-27 00:08:28
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 HDS728080PLAT20 rev.PF2OA27A
Running: gmer.exe; Driver: C:\DOCUME~1\PRIVATE~1\LOCALS~1\Temp\pwrcrpog.sys


---- System - GMER 1.0.15 ----

SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwCreateKey [0xF764787E]
SSDT sptd.sys ZwEnumerateKey [0xF750584E]
SSDT sptd.sys ZwEnumerateValueKey [0xF7505BEE]
SSDT sptd.sys ZwOpenKey [0xF7500090]
SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwOpenProcess [0xBA77A6C0]
SSDT sptd.sys ZwQueryKey [0xF7505CC6]
SSDT sptd.sys ZwQueryValueKey [0xF7505B46]
SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwSetValueKey [0xF7647BFE]
SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwTerminateProcess [0xBA77A770]
SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwTerminateThread [0xBA77A810]
SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwWriteVirtualMemory [0xBA77A8B0]

---- Kernel code sections - GMER 1.0.15 ----

? C:\WINDOWS\system32\drivers\sptd.sys The process cannot access the file because it is being used by another process.
.text USBPORT.SYS!DllUnload B90128AC 5 Bytes JMP 89F77600
init C:\WINDOWS\system32\drivers\senfilt.sys entry point in "init" section [0xB8D30F80]
? C:\DOCUME~1\PRIVATE~1\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 8A0E31D8

AttachedDevice \FileSystem\Ntfs \Ntfs AVGIDSFilter.Sys (IDS Application Activity Monitor Filter Driver./AVG Technologies CZ, s.r.o. )

Device \FileSystem\Fastfat \FatCdrom 89BED440

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\usbuhci \Device\USBPDO-0 89F4A980
Device \Driver\usbuhci \Device\USBPDO-1 89F4A980
Device \Driver\usbuhci \Device\USBPDO-2 89F4A980
Device \Driver\NetBT \Device\NetBT_Tcpip_{C8C24747-CB6C-4A82-B8E0-2766E3DD93A6} 89F624A0
Device \Driver\usbehci \Device\USBPDO-3 89F41980

AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\Ftdisk \Device\HarddiskVolume1 8A1521D8
Device \Driver\Ftdisk \Device\HarddiskVolume2 8A1521D8
Device \Driver\Cdrom \Device\CdRom0 89F011D8
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8A02641F
Device \Driver\atapi \Device\Ide\IdePort0 [F7869B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8A02641F
Device \Driver\atapi \Device\Ide\IdePort1 [F7869B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8A02641F
Device \Driver\atapi \Device\Ide\IdeDeviceP1T0L0-e [F7869B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\Ftdisk \Device\HarddiskVolume3 8A1521D8
Device \Driver\Ftdisk \Device\HarddiskVolume4 8A1521D8
Device \Driver\NetBT \Device\NetBt_Wins_Export 89F624A0
Device \Driver\NetBT \Device\NetbiosSmb 89F624A0

AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\usbuhci \Device\USBFDO-0 89F4A980
Device \Driver\usbuhci \Device\USBFDO-1 89F4A980
Device \FileSystem\MRxSmb \Device\LanmanDatagramReceiver 89EDB980
Device \Driver\usbuhci \Device\USBFDO-2 89F4A980
Device \FileSystem\MRxSmb \Device\LanmanRedirector 89EDB980
Device \Driver\usbehci \Device\USBFDO-3 89F41980
Device \Driver\Ftdisk \Device\FtControl 8A1521D8
Device \FileSystem\Fastfat \Fat 89BED440

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat AVGIDSFilter.Sys (IDS Application Activity Monitor Filter Driver./AVG Technologies CZ, s.r.o. )

Device \FileSystem\Cdfs \Cdfs 89B25980
Device \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskHDS728080PLAT20_________________________PF2OA27A#5&2a84b1a5&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1 -1376279192
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2 -1530540029
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0x69 0x53 0x72 0xAC ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0x69 0x53 0x72 0xAC ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 C:\Program Files\DAEMON Tools\
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xB5 0x54 0xCE 0x90 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x3D 0x44 0xBB 0xF3 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xB3 0x00 0x73 0x4E ...

---- EOF - GMER 1.0.15 ----

BC AdBot (Login to Remove)

 


#2 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 06 May 2011 - 11:59 AM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me ST for short), it's a pleasure to meet you. :)

I am very sorry for the delay in responding, but as you can see we are at the moment being flooded with logs which, when paired with the never-ending shortage of helpers, resulted in the delayed responding to your thread.

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Please do not PM me directly for help. If you have any questions, post them in this topic.
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.

____________________________________________________


Posted Image One or more of the identified infections is a backdoor trojan and password stealer.

This type of infection allows hackers to access and remotely control your computer, log keystrokes, steal critical system information, and download and execute files without your knowledge.
If you do any banking or other financial transactions on the PC or if it contains any other sensitive information, then from a clean computer, change all passwords where applicable.
It would also be wise to contact those same financial institutions to appraise them of your situation.


I highly suggest you take a look at the two links provided below:
1. How Do I Handle Possible Identify Theft, Internet Fraud, and CC Fraud?
2. When should I re-format? How should I reinstall?


We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.



NEXT:



Running TDSSKiller

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop.
  • Once extracted, open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.


    Posted Image

  • If an infected file is detected, the default action will be Cure, click on Continue.


    Posted Image

  • If a suspicious file is detected, the default action will be Skip, click on Continue.


    Posted Image

  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.


    Posted Image

  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.


NEXT:



Running OTL

We need to create an OTL Report
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized


NEXT:


Please provide an update on how things are running in your next reply.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#3 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 10 May 2011 - 11:29 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#4 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 12 May 2011 - 11:22 AM

This topic has been re-opened at the request of the person who originally posted.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#5 Teahupo'o

Teahupo'o
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:40 AM

Posted 12 May 2011 - 09:15 PM

Thank you ST,

Here are the logs:

2011/05/11 21:18:23.0296 4048 TDSS rootkit removing tool 2.5.0.0 May 1 2011 14:20:16
2011/05/11 21:18:23.0921 4048 ================================================================================
2011/05/11 21:18:23.0921 4048 SystemInfo:
2011/05/11 21:18:23.0921 4048
2011/05/11 21:18:23.0921 4048 OS Version: 5.1.2600 ServicePack: 3.0
2011/05/11 21:18:23.0921 4048 Product type: Workstation
2011/05/11 21:18:23.0921 4048 ComputerName: PRIVATE
2011/05/11 21:18:23.0921 4048 UserName: PRIVATE
2011/05/11 21:18:23.0921 4048 Windows directory: C:\WINDOWS
2011/05/11 21:18:23.0921 4048 System windows directory: C:\WINDOWS
2011/05/11 21:18:23.0921 4048 Processor architecture: Intel x86
2011/05/11 21:18:23.0921 4048 Number of processors: 1
2011/05/11 21:18:23.0921 4048 Page size: 0x1000
2011/05/11 21:18:23.0921 4048 Boot type: Normal boot
2011/05/11 21:18:23.0921 4048 ================================================================================
2011/05/11 21:18:24.0312 4048 Initialize success
2011/05/11 21:18:56.0812 3452 ================================================================================
2011/05/11 21:18:56.0812 3452 Scan started
2011/05/11 21:18:56.0812 3452 Mode: Manual;
2011/05/11 21:18:56.0812 3452 ================================================================================
2011/05/11 21:18:57.0812 3452 abp480n5 (6abb91494fe6c59089b9336452ab2ea3) C:\WINDOWS\system32\DRIVERS\ABP480N5.SYS
2011/05/11 21:18:58.0187 3452 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/05/11 21:18:58.0593 3452 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2011/05/11 21:18:58.0921 3452 adpu160m (9a11864873da202c996558b2106b0bbc) C:\WINDOWS\system32\DRIVERS\adpu160m.sys
2011/05/11 21:18:59.0328 3452 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2011/05/11 21:18:59.0734 3452 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2011/05/11 21:19:00.0109 3452 agp440 (08fd04aa961bdc77fb983f328334e3d7) C:\WINDOWS\system32\DRIVERS\agp440.sys
2011/05/11 21:19:00.0468 3452 agpCPQ (03a7e0922acfe1b07d5db2eeb0773063) C:\WINDOWS\system32\DRIVERS\agpCPQ.sys
2011/05/11 21:19:00.0828 3452 Aha154x (c23ea9b5f46c7f7910db3eab648ff013) C:\WINDOWS\system32\DRIVERS\aha154x.sys
2011/05/11 21:19:01.0156 3452 aic78u2 (19dd0fb48b0c18892f70e2e7d61a1529) C:\WINDOWS\system32\DRIVERS\aic78u2.sys
2011/05/11 21:19:01.0546 3452 aic78xx (b7fe594a7468aa0132deb03fb8e34326) C:\WINDOWS\system32\DRIVERS\aic78xx.sys
2011/05/11 21:19:01.0890 3452 AliIde (1140ab9938809700b46bb88e46d72a96) C:\WINDOWS\system32\DRIVERS\aliide.sys
2011/05/11 21:19:02.0218 3452 alim1541 (cb08aed0de2dd889a8a820cd8082d83c) C:\WINDOWS\system32\DRIVERS\alim1541.sys
2011/05/11 21:19:02.0625 3452 amdagp (95b4fb835e28aa1336ceeb07fd5b9398) C:\WINDOWS\system32\DRIVERS\amdagp.sys
2011/05/11 21:19:02.0968 3452 amsint (79f5add8d24bd6893f2903a3e2f3fad6) C:\WINDOWS\system32\DRIVERS\amsint.sys
2011/05/11 21:19:03.0328 3452 asc (62d318e9a0c8fc9b780008e724283707) C:\WINDOWS\system32\DRIVERS\asc.sys
2011/05/11 21:19:03.0687 3452 asc3350p (69eb0cc7714b32896ccbfd5edcbea447) C:\WINDOWS\system32\DRIVERS\asc3350p.sys
2011/05/11 21:19:04.0031 3452 asc3550 (5d8de112aa0254b907861e9e9c31d597) C:\WINDOWS\system32\DRIVERS\asc3550.sys
2011/05/11 21:19:04.0406 3452 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/05/11 21:19:04.0796 3452 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/05/11 21:19:05.0375 3452 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/05/11 21:19:05.0734 3452 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/05/11 21:19:06.0093 3452 AVGIDSDriver (0c61f066f4d94bd67063dc6691935143) C:\WINDOWS\system32\DRIVERS\AVGIDSDriver.Sys
2011/05/11 21:19:06.0406 3452 AVGIDSEH (84853f800cd69252c3c764fe50d0346f) C:\WINDOWS\system32\DRIVERS\AVGIDSEH.Sys
2011/05/11 21:19:06.0750 3452 AVGIDSFilter (28d6adcd03e10f3838488b9b5d407dd4) C:\WINDOWS\system32\DRIVERS\AVGIDSFilter.Sys
2011/05/11 21:19:07.0093 3452 AVGIDSShim (0eb16f4dbbb946360af30d2b13a52d1d) C:\WINDOWS\system32\DRIVERS\AVGIDSShim.Sys
2011/05/11 21:19:07.0500 3452 Avgldx86 (5fe5a2c2330c376a1d8dcff8d2680a2d) C:\WINDOWS\system32\DRIVERS\avgldx86.sys
2011/05/11 21:19:07.0843 3452 Avgmfx86 (54f1a9b4c9b540c2d8ac4baa171696b1) C:\WINDOWS\system32\DRIVERS\avgmfx86.sys
2011/05/11 21:19:08.0156 3452 Avgrkx86 (8da3b77993c5f354cc2977b7ea06d03a) C:\WINDOWS\system32\DRIVERS\avgrkx86.sys
2011/05/11 21:19:08.0593 3452 Avgtdix (660788ec46f10ece80274d564fa8b4aa) C:\WINDOWS\system32\DRIVERS\avgtdix.sys
2011/05/11 21:19:08.0937 3452 BANTExt (5d7be7b19e827125e016325334e58ff1) C:\WINDOWS\System32\Drivers\BANTExt.sys
2011/05/11 21:19:09.0265 3452 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/05/11 21:19:09.0640 3452 bvrp_pci (c945dc4eee3f624dfd07788ea7f0db0a) C:\WINDOWS\system32\drivers\bvrp_pci.sys
2011/05/11 21:19:10.0000 3452 cbidf (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\DRIVERS\cbidf2k.sys
2011/05/11 21:19:10.0265 3452 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/05/11 21:19:10.0562 3452 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2011/05/11 21:19:10.0890 3452 cd20xrnt (f3ec03299634490e97bbce94cd2954c7) C:\WINDOWS\system32\DRIVERS\cd20xrnt.sys
2011/05/11 21:19:11.0203 3452 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/05/11 21:19:11.0515 3452 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/05/11 21:19:11.0843 3452 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/05/11 21:19:12.0468 3452 CmdIde (e5dcb56c533014ecbc556a8357c929d5) C:\WINDOWS\system32\DRIVERS\cmdide.sys
2011/05/11 21:19:12.0828 3452 Cpqarray (3ee529119eed34cd212a215e8c40d4b6) C:\WINDOWS\system32\DRIVERS\cpqarray.sys
2011/05/11 21:19:13.0250 3452 dac2w2k (e550e7418984b65a78299d248f0a7f36) C:\WINDOWS\system32\DRIVERS\dac2w2k.sys
2011/05/11 21:19:13.0625 3452 dac960nt (683789caa3864eb46125ae86ff677d34) C:\WINDOWS\system32\DRIVERS\dac960nt.sys
2011/05/11 21:19:14.0000 3452 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/05/11 21:19:14.0640 3452 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2011/05/11 21:19:15.0281 3452 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2011/05/11 21:19:15.0718 3452 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/05/11 21:19:16.0078 3452 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2011/05/11 21:19:16.0437 3452 dpti2o (40f3b93b4e5b0126f2f5c0a7a5e22660) C:\WINDOWS\system32\DRIVERS\dpti2o.sys
2011/05/11 21:19:16.0750 3452 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/05/11 21:19:16.0937 3452 DSproct (413f2d5f9d802688242c23b38f767ecb) C:\Program Files\DellSupport\GTAction\triggers\DSproct.sys
2011/05/11 21:19:17.0265 3452 dsunidrv (dfeabb7cfffadea4a912ab95bdc3177a) C:\WINDOWS\system32\DRIVERS\dsunidrv.sys
2011/05/11 21:19:17.0671 3452 E100B (7d91dc6342248369f94d6eba0cf42e99) C:\WINDOWS\system32\DRIVERS\e100b325.sys
2011/05/11 21:19:18.0187 3452 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/05/11 21:19:18.0578 3452 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2011/05/11 21:19:18.0906 3452 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2011/05/11 21:19:19.0265 3452 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2011/05/11 21:19:19.0671 3452 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2011/05/11 21:19:20.0046 3452 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/05/11 21:19:20.0390 3452 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/05/11 21:19:20.0765 3452 GEARAspiWDM (ab8a6a87d9d7255c3884d5b9541a6e80) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
2011/05/11 21:19:21.0109 3452 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/05/11 21:19:21.0468 3452 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/05/11 21:19:21.0828 3452 hpn (b028377dea0546a5fcfba928a8aefae0) C:\WINDOWS\system32\DRIVERS\hpn.sys
2011/05/11 21:19:22.0281 3452 HSFHWBS2 (77e4ff0b73bc0aeaaf39bf0c8104231f) C:\WINDOWS\system32\DRIVERS\HSFHWBS2.sys
2011/05/11 21:19:23.0046 3452 HSF_DP (60e1604729a15ef4a3b05f298427b3b1) C:\WINDOWS\system32\DRIVERS\HSF_DP.sys
2011/05/11 21:19:23.0828 3452 HTTP (f6aacf5bce2893e0c1754afeb672e5c9) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/05/11 21:19:24.0281 3452 i2omgmt (9368670bd426ebea5e8b18a62416ec28) C:\WINDOWS\system32\drivers\i2omgmt.sys
2011/05/11 21:19:24.0609 3452 i2omp (f10863bf1ccc290babd1a09188ae49e0) C:\WINDOWS\system32\DRIVERS\i2omp.sys
2011/05/11 21:19:24.0937 3452 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/05/11 21:19:25.0750 3452 ialm (9a883c3c4d91292c0d09de7c728e781c) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
2011/05/11 21:19:26.0593 3452 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/05/11 21:19:26.0953 3452 ini910u (4a40e045faee58631fd8d91afc620719) C:\WINDOWS\system32\DRIVERS\ini910u.sys
2011/05/11 21:19:27.0312 3452 IntelIde (b5466a9250342a7aa0cd1fba13420678) C:\WINDOWS\system32\DRIVERS\intelide.sys
2011/05/11 21:19:27.0656 3452 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2011/05/11 21:19:27.0984 3452 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2011/05/11 21:19:28.0328 3452 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/05/11 21:19:28.0640 3452 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/05/11 21:19:29.0015 3452 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/05/11 21:19:29.0453 3452 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/05/11 21:19:29.0828 3452 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/05/11 21:19:30.0156 3452 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/05/11 21:19:30.0500 3452 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/05/11 21:19:30.0843 3452 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/05/11 21:19:31.0234 3452 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2011/05/11 21:19:31.0671 3452 KSecDD (1705745d900dabf2d89f90ebaddc7517) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/05/11 21:19:32.0078 3452 Lbd (419590ebe7855215bb157ea0cf0d0531) C:\WINDOWS\system32\DRIVERS\Lbd.sys
2011/05/11 21:19:32.0718 3452 MCSTRM (5bb01b9f582259d1fb7653c5c1da3653) C:\WINDOWS\system32\drivers\MCSTRM.sys
2011/05/11 21:19:33.0046 3452 mdmxsdk (eeaea6514ba7c9d273b5e87c4e1aab30) C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys
2011/05/11 21:19:33.0359 3452 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/05/11 21:19:33.0718 3452 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2011/05/11 21:19:34.0062 3452 MODEMCSA (1992e0d143b09653ab0f9c5e04b0fd65) C:\WINDOWS\system32\drivers\MODEMCSA.sys
2011/05/11 21:19:34.0375 3452 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/05/11 21:19:34.0796 3452 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/05/11 21:19:35.0109 3452 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/05/11 21:19:35.0453 3452 mraid35x (3f4bb95e5a44f3be34824e8e7caf0737) C:\WINDOWS\system32\DRIVERS\mraid35x.sys
2011/05/11 21:19:35.0828 3452 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/05/11 21:19:36.0359 3452 MRxSmb (60ae98742484e7ab80c3c1450e708148) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/05/11 21:19:36.0890 3452 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2011/05/11 21:19:37.0250 3452 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/05/11 21:19:37.0578 3452 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/05/11 21:19:37.0890 3452 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/05/11 21:19:38.0203 3452 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/05/11 21:19:38.0546 3452 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
2011/05/11 21:19:38.0906 3452 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2011/05/11 21:19:39.0265 3452 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2011/05/11 21:19:39.0703 3452 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2011/05/11 21:19:40.0062 3452 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2011/05/11 21:19:40.0375 3452 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/05/11 21:19:40.0734 3452 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/05/11 21:19:41.0078 3452 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/05/11 21:19:41.0437 3452 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/05/11 21:19:41.0843 3452 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/05/11 21:19:42.0218 3452 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/05/11 21:19:42.0640 3452 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2011/05/11 21:19:43.0171 3452 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/05/11 21:19:43.0718 3452 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/05/11 21:19:44.0718 3452 nv (2b298519edbfcf451d43e0f1e8f1006d) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
2011/05/11 21:19:45.0703 3452 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/05/11 21:19:46.0031 3452 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/05/11 21:19:46.0390 3452 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2011/05/11 21:19:46.0734 3452 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/05/11 21:19:47.0093 3452 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/05/11 21:19:47.0421 3452 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/05/11 21:19:48.0000 3452 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2011/05/11 21:19:48.0359 3452 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/05/11 21:19:49.0687 3452 perc2 (6c14b9c19ba84f73d3a86dba11133101) C:\WINDOWS\system32\DRIVERS\perc2.sys
2011/05/11 21:19:50.0031 3452 perc2hib (f50f7c27f131afe7beba13e14a3b9416) C:\WINDOWS\system32\DRIVERS\perc2hib.sys
2011/05/11 21:19:50.0421 3452 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/05/11 21:19:50.0796 3452 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/05/11 21:19:51.0125 3452 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/05/11 21:19:51.0421 3452 PxHelp20 (d86b4a68565e444d76457f14172c875a) C:\WINDOWS\system32\Drivers\PxHelp20.sys
2011/05/11 21:19:51.0765 3452 ql1080 (0a63fb54039eb5662433caba3b26dba7) C:\WINDOWS\system32\DRIVERS\ql1080.sys
2011/05/11 21:19:52.0125 3452 Ql10wnt (6503449e1d43a0ff0201ad5cb1b8c706) C:\WINDOWS\system32\DRIVERS\ql10wnt.sys
2011/05/11 21:19:52.0468 3452 ql12160 (156ed0ef20c15114ca097a34a30d8a01) C:\WINDOWS\system32\DRIVERS\ql12160.sys
2011/05/11 21:19:52.0796 3452 ql1240 (70f016bebde6d29e864c1230a07cc5e6) C:\WINDOWS\system32\DRIVERS\ql1240.sys
2011/05/11 21:19:53.0156 3452 ql1280 (907f0aeea6bc451011611e732bd31fcf) C:\WINDOWS\system32\DRIVERS\ql1280.sys
2011/05/11 21:19:53.0468 3452 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/05/11 21:19:53.0828 3452 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/05/11 21:19:54.0203 3452 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/05/11 21:19:54.0500 3452 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/05/11 21:19:54.0843 3452 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/05/11 21:19:55.0250 3452 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/05/11 21:19:55.0656 3452 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
2011/05/11 21:19:56.0109 3452 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/05/11 21:19:56.0500 3452 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/05/11 21:19:56.0937 3452 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/05/11 21:19:57.0562 3452 senfilt (b9c7617c1e8ab6fdff75d3c8dafcb4c8) C:\WINDOWS\system32\drivers\senfilt.sys
2011/05/11 21:19:58.0171 3452 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2011/05/11 21:19:58.0500 3452 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2011/05/11 21:19:58.0843 3452 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/05/11 21:19:59.0453 3452 sisagp (6b33d0ebd30db32e27d1d78fe946a754) C:\WINDOWS\system32\DRIVERS\sisagp.sys
2011/05/11 21:19:59.0781 3452 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2011/05/11 21:20:00.0187 3452 smwdm (0066ff77aeb4ae70066f7e94d5a6d866) C:\WINDOWS\system32\drivers\smwdm.sys
2011/05/11 21:20:00.0593 3452 Sparrow (83c0f71f86d3bdaf915685f3d568b20e) C:\WINDOWS\system32\DRIVERS\sparrow.sys
2011/05/11 21:20:00.0921 3452 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2011/05/11 21:20:01.0500 3452 sptd (4e3c4ffcb2c95c2ec1fa04a6f4531533) C:\WINDOWS\System32\Drivers\sptd.sys
2011/05/11 21:20:02.0062 3452 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/05/11 21:20:02.0546 3452 Srv (4f8a43adef66f135564085a9dca96a26) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/05/11 21:20:03.0031 3452 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2011/05/11 21:20:03.0375 3452 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/05/11 21:20:03.0703 3452 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2011/05/11 21:20:04.0078 3452 symc810 (1ff3217614018630d0a6758630fc698c) C:\WINDOWS\system32\DRIVERS\symc810.sys
2011/05/11 21:20:04.0421 3452 symc8xx (070e001d95cf725186ef8b20335f933c) C:\WINDOWS\system32\DRIVERS\symc8xx.sys
2011/05/11 21:20:04.0734 3452 sym_hi (80ac1c4abbe2df3b738bf15517a51f2c) C:\WINDOWS\system32\DRIVERS\sym_hi.sys
2011/05/11 21:20:05.0078 3452 sym_u3 (bf4fab949a382a8e105f46ebb4937058) C:\WINDOWS\system32\DRIVERS\sym_u3.sys
2011/05/11 21:20:05.0453 3452 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/05/11 21:20:05.0953 3452 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/05/11 21:20:06.0421 3452 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/05/11 21:20:06.0734 3452 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/05/11 21:20:07.0109 3452 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/05/11 21:20:07.0468 3452 TosIde (f2790f6af01321b172aa62f8e1e187d9) C:\WINDOWS\system32\DRIVERS\toside.sys
2011/05/11 21:20:07.0812 3452 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2011/05/11 21:20:08.0156 3452 ultra (1b698a51cd528d8da4ffaed66dfc51b9) C:\WINDOWS\system32\DRIVERS\ultra.sys
2011/05/11 21:20:08.0609 3452 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2011/05/11 21:20:09.0109 3452 USBAAPL (c1ca131f4e3ed63d6bc89a35ffad4cda) C:\WINDOWS\system32\Drivers\usbaapl.sys
2011/05/11 21:20:09.0500 3452 usbaudio (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys
2011/05/11 21:20:09.0859 3452 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/05/11 21:20:10.0187 3452 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/05/11 21:20:10.0531 3452 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/05/11 21:20:10.0890 3452 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/05/11 21:20:11.0218 3452 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2011/05/11 21:20:11.0546 3452 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/05/11 21:20:11.0875 3452 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/05/11 21:20:12.0203 3452 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2011/05/11 21:20:12.0562 3452 viaagp (754292ce5848b3738281b4f3607eaef4) C:\WINDOWS\system32\DRIVERS\viaagp.sys
2011/05/11 21:20:12.0890 3452 ViaIde (3b3efcda263b8ac14fdf9cbdd0791b2e) C:\WINDOWS\system32\DRIVERS\viaide.sys
2011/05/11 21:20:13.0218 3452 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/05/11 21:20:14.0421 3452 VX6000 (61fc38a2e136a2e5944e7ca286abaaae) C:\WINDOWS\system32\DRIVERS\VX6000Xp.sys
2011/05/11 21:20:15.0640 3452 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/05/11 21:20:16.0000 3452 wanatw (0a716c08cb13c3a8f4f51e882dbf7416) C:\WINDOWS\system32\DRIVERS\wanatw4.sys
2011/05/11 21:20:16.0625 3452 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/05/11 21:20:17.0281 3452 winachsf (f59ed5a43b988a18ef582bb07b2327a7) C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys
2011/05/11 21:20:18.0031 3452 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2011/05/11 21:20:18.0359 3452 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2011/05/11 21:20:18.0750 3452 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2011/05/11 21:20:18.0937 3452 \HardDisk0 - detected Rootkit.Win32.TDSS.tdl4 (0)
2011/05/11 21:20:18.0937 3452 ================================================================================
2011/05/11 21:20:18.0937 3452 Scan finished
2011/05/11 21:20:18.0937 3452 ================================================================================
2011/05/11 21:20:18.0968 0536 Detected object count: 1
2011/05/11 21:21:31.0343 0536 \HardDisk0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
2011/05/11 21:21:31.0343 0536 \HardDisk0 - ok
2011/05/11 21:21:31.0343 0536 Rootkit.Win32.TDSS.tdl4(\HardDisk0) - User select action: Cure
2011/05/11 21:21:59.0390 1400 Deinitialize success

----------

OTL logfile created on: 5/11/2011 9:34:47 PM - Run 1
OTL by OldTimer - Version 3.2.22.3 Folder = C:\Documents and Settings\PRIVATE\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1.00 Gb Total Physical Memory | 1.00 Gb Available Physical Memory | 65.00% Memory free
1.00 Gb Paging File | 1.00 Gb Available in Paging File | 77.00% Paging File free
Paging file location(s): C:\pagefile.sys 384 768 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 52.71 Gb Total Space | 30.22 Gb Free Space | 57.33% Space Free | Partition Type: NTFS
Drive D: | 18.60 Gb Total Space | 18.53 Gb Free Space | 99.61% Space Free | Partition Type: NTFS

Computer Name: PRIVATE | User Name: PRIVATE | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2011/05/11 21:33:05 | 000,580,608 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\PRIVATE\Desktop\OTL.exe
PRC - [2011/01/07 01:22:44 | 001,084,256 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG10\avgnsx.exe
PRC - [2011/01/07 01:22:12 | 001,052,512 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG10\avgemcx.exe
PRC - [2011/01/06 15:23:18 | 006,128,720 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe
PRC - [2010/12/05 16:26:40 | 000,654,176 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG10\avgrsx.exe
PRC - [2010/12/05 16:26:12 | 000,650,592 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG10\avgchsvx.exe
PRC - [2010/10/22 04:58:18 | 000,265,400 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG10\avgwdsvc.exe
PRC - [2010/10/22 04:56:58 | 000,845,664 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG10\avgcsrvx.exe
PRC - [2008/04/13 20:12:19 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2006/10/30 17:59:34 | 000,024,576 | ---- | M] () -- C:\WINDOWS\system32\spool\drivers\w32x86\3\WrtProc.exe
PRC - [2006/09/20 09:35:26 | 000,020,480 | ---- | M] () -- C:\WINDOWS\system32\spool\drivers\w32x86\3\WrtMon.exe


========== Modules (SafeList) ==========

MOD - [2011/05/11 21:33:05 | 000,580,608 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\PRIVATE\Desktop\OTL.exe
MOD - [2008/04/13 20:12:51 | 001,054,208 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.5512_x-ww_35d4ce83\comctl32.dll
MOD - [2008/04/13 20:12:08 | 000,270,336 | ---- | M] () -- C:\WINDOWS\icugewusuya.dll


========== Win32 Services (SafeList) ==========

SRV - File not found [Disabled | Stopped] -- -- (YahooAUService)
SRV - File not found [Disabled | Stopped] -- -- (McComponentHostService)
SRV - File not found [Disabled | Stopped] -- -- (HidServ)
SRV - File not found [Disabled | Stopped] -- -- (aswUpdSv)
SRV - File not found [On_Demand | Stopped] -- -- (AppMgmt)
SRV - [2011/01/06 15:23:18 | 006,128,720 | ---- | M] (AVG Technologies CZ, s.r.o.) [Auto | Running] -- C:\Program Files\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe -- (AVGIDSAgent)
SRV - [2010/10/22 04:58:18 | 000,265,400 | ---- | M] (AVG Technologies CZ, s.r.o.) [Auto | Running] -- C:\Program Files\AVG\AVG10\avgwdsvc.exe -- (avgwd)
SRV - [2010/03/01 16:43:27 | 001,029,456 | ---- | M] (Lavasoft) [Disabled | Stopped] -- C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe -- (Lavasoft Ad-Aware Service)
SRV - [2010/01/18 19:31:32 | 001,678,272 | ---- | M] (Discordia Limited) [Disabled | Stopped] -- C:\Program Files\Bandoo\Bandoo.exe -- (Bandoo Coordinator)
SRV - [2007/04/13 12:20:22 | 000,097,432 | ---- | M] () [Disabled | Stopped] -- C:\Program Files\Canon\IJPLM\ijplmsvc.exe -- (IJPLMSVC)
SRV - [2007/03/07 16:47:46 | 000,076,848 | ---- | M] () [Disabled | Stopped] -- C:\Program Files\DellSupport\brkrsvc.exe -- (DSBrokerService)
SRV - [2006/10/23 08:50:35 | 000,046,640 | R--- | M] (AOL LLC) [Disabled | Stopped] -- C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe -- (AOL ACS)
SRV - [2006/10/13 17:01:06 | 000,207,664 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Program Files\Microsoft LifeCam\MSCamS32.exe -- (MSCamSvc)
SRV - [2003/08/27 11:29:46 | 000,065,536 | ---- | M] (America Online, Inc.) [Disabled | Stopped] -- C:\WINDOWS\wanmpsvc.exe -- (WANMiniportService) WAN Miniport (ATW)


========== Driver Services (SafeList) ==========

DRV - [2010/12/08 04:12:38 | 000,251,728 | ---- | M] (AVG Technologies CZ, s.r.o.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\avgldx86.sys -- (Avgldx86)
DRV - [2010/11/12 13:19:38 | 000,299,984 | ---- | M] (AVG Technologies CZ, s.r.o.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\avgtdix.sys -- (Avgtdix)
DRV - [2010/09/13 15:27:24 | 000,025,680 | ---- | M] (AVG Technologies CZ, s.r.o. ) [Kernel | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\AVGIDSEH.Sys -- (AVGIDSEH)
DRV - [2010/09/07 03:48:56 | 000,034,384 | ---- | M] (AVG Technologies CZ, s.r.o.) [File_System | System | Running] -- C:\WINDOWS\system32\drivers\avgmfx86.sys -- (Avgmfx86)
DRV - [2010/09/07 03:48:50 | 000,026,064 | ---- | M] (AVG Technologies CZ, s.r.o.) [File_System | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\avgrkx86.sys -- (Avgrkx86)
DRV - [2010/08/03 15:23:36 | 000,026,192 | ---- | M] (AVG Technologies CZ, s.r.o. ) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\AVGIDSShim.sys -- (AVGIDSShim)
DRV - [2010/08/03 15:23:34 | 000,123,472 | ---- | M] (AVG Technologies CZ, s.r.o. ) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\AVGIDSDriver.sys -- (AVGIDSDriver)
DRV - [2010/08/03 15:23:32 | 000,030,288 | ---- | M] (AVG Technologies CZ, s.r.o. ) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\AVGIDSFilter.sys -- (AVGIDSFilter)
DRV - [2009/04/25 15:47:37 | 000,064,160 | ---- | M] (Lavasoft AB) [File_System | Boot | Running] -- C:\WINDOWS\system32\DRIVERS\Lbd.sys -- (Lbd)
DRV - [2008/02/27 13:49:00 | 000,003,840 | ---- | M] () [Kernel | System | Running] -- C:\WINDOWS\System32\Drivers\BANTExt.sys -- (BANTExt)
DRV - [2008/01/09 21:59:44 | 000,008,413 | ---- | M] (RealNetworks, Inc.) [Kernel | Auto | Running] -- C:\WINDOWS\System32\drivers\mcstrm.sys -- (MCSTRM)
DRV - [2007/02/25 13:10:48 | 000,005,376 | --S- | M] (Gteko Ltd.) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\dsunidrv.sys -- (dsunidrv)
DRV - [2006/11/23 21:20:01 | 000,639,224 | ---- | M] (Duplex Secure Ltd.) [Kernel | Disabled | Stopped] -- C:\WINDOWS\System32\Drivers\sptd.sys -- (sptd)
DRV - [2006/10/13 17:04:44 | 002,383,152 | ---- | M] (Microsoft Corporation
) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\VX6000Xp.sys -- (VX6000)
DRV - [2006/10/05 17:07:28 | 000,004,736 | ---- | M] (Gteko Ltd.) [Kernel | On_Demand | Stopped] -- C:\Program Files\DellSupport\GTAction\triggers\DSproct.sys -- (DSproct)
DRV - [2004/09/17 15:02:54 | 000,732,928 | ---- | M] (Creative Technology Ltd.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\senfilt.sys -- (senfilt)
DRV - [2004/03/24 11:12:44 | 000,004,272 | ---- | M] () [Kernel | On_Demand | Stopped] -- C:\WINDOWS\System32\drivers\bvrp_pci.sys -- (bvrp_pci)
DRV - [2003/11/17 22:59:20 | 000,212,224 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSFHWBS2.sys -- (HSFHWBS2)
DRV - [2003/11/17 22:58:02 | 000,680,704 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSF_CNXT.sys -- (winachsf)
DRV - [2003/11/17 22:56:26 | 001,042,432 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSF_DP.sys -- (HSF_DP)
DRV - [2003/01/10 17:13:04 | 000,033,588 | R--- | M] (America Online, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\wanatw4.sys -- (wanatw) WAN Miniport (ATW)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.com/
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,CustomSearch = http://us.rd.yahoo.com/customize/ie/defaults/cs/msgr8/*http://www.yahoo.com/ext/search/search.html
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,Default_Page_URL = http://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,Start Page = http://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us


IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0



IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.com/
IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/
IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 10 F6 FC D9 DF 9E CA 01 [binary data]
IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\..\URLSearchHook: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll (Yahoo! Inc.)
IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = <local>

========== FireFox ==========

FF - prefs.js..browser.search.defaultenginename: "Web Search"
FF - prefs.js..browser.search.defaulturl: "http://www.bing.com/search?FORM=IEFM1&q="
FF - prefs.js..browser.search.order.1: "Web Search"
FF - prefs.js..browser.search.selectedEngine: "search"
FF - prefs.js..browser.search.useDBForOrder: true
FF - prefs.js..browser.startup.homepage: "http://www.yahoo.com/"
FF - prefs.js..extensions.enabledItems: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}:1.3.6
FF - prefs.js..extensions.enabledItems: firefox@bandoo.com:5.0
FF - prefs.js..extensions.enabledItems: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}:0.9.8
FF - prefs.js..extensions.enabledItems: {472f4ef0-a825-11da-a746-0800200c9a66}:1.2
FF - prefs.js..extensions.enabledItems: jqs@sun.com:1.0
FF - prefs.js..extensions.enabledItems: {66E978CD-981F-47DF-AC42-E3CF417C1467}:0.4.3
FF - prefs.js..extensions.enabledItems: {635abd67-4fe9-1b23-4f01-e679fa7484c1}:2.1.3.20100310105313
FF - prefs.js..extensions.enabledItems: {1E73965B-8B48-48be-9C8D-68B920ABC1C4}:10.0.0.1209
FF - prefs.js..extensions.enabledItems: {02DCF11F-FDEE-4985-908D-F2CD60470563}:1.9.1
FF - prefs.js..keyword.URL: "http://www.searchqu.com/web?src=ffb&q="
FF - prefs.js..network.proxy.no_proxies_on: " "
FF - prefs.js..network.proxy.type: 4


FF - HKLM\software\mozilla\Firefox\Extensions\\{ABDE892B-13A8-4d1b-88E6-365A6E755758}: C:\Program Files\Real\RealPlayer\browserrecord [2008/07/07 21:29:47 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Firefox\Extensions\\{E5886C91-CDD7-4832-B32D-0830705A9C60}: C:\WINDOWS\system32\5012 [2011/03/03 11:43:08 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Firefox\Extensions\\{1E73965B-8B48-48be-9C8D-68B920ABC1C4}: C:\Program Files\AVG\AVG10\Firefox4\ [2011/04/04 13:10:02 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Firefox\Extensions\\{02DCF11F-FDEE-4985-908D-F2CD60470563}: C:\Documents and Settings\PRIVATE\Local Settings\Application Data\{02DCF11F-FDEE-4985-908D-F2CD60470563} [2011/05/10 21:12:04 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.17\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2011/05/01 21:39:40 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.17\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2011/05/01 21:39:40 | 000,000,000 | ---D | M]

[2008/09/02 19:51:07 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Extensions
[2011/05/10 21:13:18 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions
[2011/04/04 14:58:35 | 000,000,000 | ---D | M] (FlashGot) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}
[2008/12/27 16:01:38 | 000,000,000 | ---D | M] (FavLoc) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\{472f4ef0-a825-11da-a746-0800200c9a66}
[2011/03/16 09:27:56 | 000,000,000 | ---D | M] (Yahoo! Toolbar) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
[2011/03/16 09:27:57 | 000,000,000 | ---D | M] (New Tab Homepage) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\{66E978CD-981F-47DF-AC42-E3CF417C1467}
[2009/05/09 19:54:41 | 000,000,000 | ---D | M] (Adobe DLM (powered by getPlus®)) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\{CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7}
[2011/04/09 17:21:09 | 000,000,000 | ---D | M] (Adblock Plus) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
[2011/03/16 09:28:10 | 000,000,000 | ---D | M] (Download Statusbar) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
[2010/01/29 18:24:50 | 000,000,000 | ---D | M] (Bandoo for Firefox) -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\firefox@bandoo.com
[2009/09/23 08:19:36 | 000,002,163 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\searchplugins\bing.xml
[2006/12/01 00:27:35 | 000,002,095 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\searchplugins\expediacom.xml
[2011/05/11 06:43:09 | 000,002,125 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\searchplugins\flickr-tags.xml
[2008/06/23 02:50:44 | 000,000,908 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\searchplugins\imdb.xml
[2008/06/23 02:50:44 | 000,000,681 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\searchplugins\webster.xml
[2008/06/23 02:50:43 | 000,001,108 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\searchplugins\wikipedia-en.xml
[2011/05/10 21:13:18 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2011/05/10 21:12:04 | 000,000,000 | ---D | M] (XULRunner) -- C:\DOCUMENTS AND SETTINGS\PRIVATE\LOCAL SETTINGS\APPLICATION DATA\{02DCF11F-FDEE-4985-908D-F2CD60470563}
[2011/04/04 13:10:02 | 000,000,000 | ---D | M] (AVG Safe Search) -- C:\PROGRAM FILES\AVG\AVG10\FIREFOX4
[2008/12/26 18:26:17 | 000,000,000 | ---D | M] (Java Quick Starter) -- C:\PROGRAM FILES\JAVA\JRE6\LIB\DEPLOY\JQS\FF
[2006/05/06 12:42:04 | 007,260,160 | ---- | M] () -- C:\Program Files\Mozilla Firefox\plugins\libvlc.dll
[2006/05/06 12:42:04 | 000,478,720 | ---- | M] (VideoLAN Team) -- C:\Program Files\Mozilla Firefox\plugins\npvlc.dll
[2009/12/09 05:46:54 | 000,000,832 | ---- | M] () -- C:\Program Files\Mozilla Firefox\searchplugins\WebSearch.xml

O1 HOSTS File: ([2011/04/04 14:51:50 | 000,000,732 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (&Yahoo! Toolbar Helper) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll (Yahoo! Inc.)
O2 - BHO: (Adobe PDF Reader Link Helper) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll (Adobe Systems Incorporated)
O2 - BHO: (RealPlayer Download and Record Plugin for Internet Explorer) - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll (RealPlayer)
O2 - BHO: (bho2gr Class) - {31FF080D-12A3-439A-A2EF-4BA95A3148E8} - C:\Program Files\GetRight\xx2gr.dll (Headlight Software, Inc.)
O2 - BHO: (AVG Safe Search) - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG10\avgssie.dll (AVG Technologies CZ, s.r.o.)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
O2 - BHO: (no name) - {A3EF6FD4-4769-4734-9494-4707087225B9} - No CLSID value found.
O2 - BHO: (no name) - {E5886C91-CDD7-4832-B32D-0830705A9C60} - No CLSID value found.
O2 - BHO: (BandooIEPlugin Class) - {EB5CEE80-030A-4ED8-8E20-454E9C68380F} - C:\Program Files\Bandoo\Plugins\IE\ieplugin.dll (Discordia Limited)
O2 - BHO: (SingleInstance Class) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\YTSingleInstance.dll (Yahoo! Inc)
O3 - HKLM\..\Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No CLSID value found.
O3 - HKLM\..\Toolbar: (Yahoo! Toolbar) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll (Yahoo! Inc.)
O3 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\..\Toolbar\WebBrowser: (no name) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No CLSID value found.
O4 - HKLM..\Run: [AVG_TRAY] C:\Program Files\AVG\AVG10\avgtray.exe (AVG Technologies CZ, s.r.o.)
O4 - HKLM..\Run: [Lrawelole] C:\WINDOWS\icugewusuya.dll ()
O4 - HKLM..\Run: [WrtMon.exe] C:\WINDOWS\system32\spool\drivers\w32x86\3\WrtMon.exe ()
O4 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006..\Run: [Hwujisetaco] C:\WINDOWS\odbdap.dll (ArcSoft Inc.)
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 0
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: DisallowRun = 1
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 0 = msseces.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 1 = MSASCui.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 2 = ekrn.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 3 = egui.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 4 = avgnt.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 5 = avcenter.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 6 = avscan.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 7 = avgfrw.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 8 = avgui.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 9 = avgtray.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 10 = avgscanx.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 11 = avgcfgex.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 12 = avgemc.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 13 = avgchsvx.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 14 = avgcmgr.exe
O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 15 = avgwdsvc.exe
O8 - Extra context menu item: Download with GetRight - C:\Program Files\GetRight\GRDownload.htm ()
O8 - Extra context menu item: Open with GetRight Browser - C:\Program Files\GetRight\GRBrowse.htm ()
O9 - Extra Button: PokerStars.net - {FA9B9510-9FCB-4ca0-818C-5D0987B47C4D} - C:\Program Files\PokerStars.NET\PokerStarsUpdate.exe (PokerStars)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000004 [] - C:\Program Files\Bonjour\mdnsNSP.dll (Apple Inc.)
O15 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\..Trusted Domains: aol.com ([objects] * is out of zone range - 5)
O16 - DPF: {362C56AA-6E4F-40C7-A0B5-85501DBDAD77} http://i.dell.com/images/global/js/scanner/SysProExe.cab (Scanner.SysScanner)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1230321751484 (WUWebControl Class)
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1230321743609 (MUWebControl Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab (Java Plug-in 1.6.0_15)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab (MSN Games - Installer)
O16 - DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} http://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab (Java Plug-in 1.6.0_15)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab (Java Plug-in 1.6.0_15)
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} http://zone.msn.com/bingame/popcaploader_v10.cab (PopCapLoader Object)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 24.92.226.11 24.92.226.12
O18 - Protocol\Handler\belarc {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - C:\Program Files\Belarc\Advisor\System\BAVoilaX.dll (Belarc, Inc.)
O18 - Protocol\Handler\linkscanner {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG10\avgpp.dll (AVG Technologies CZ, s.r.o.)
O20 - AppInit_DLLs: (c:\progra~1\bandoo\bndhook.dll) - c:\Program Files\Bandoo\BndHook.dll (Discordia Limited)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\appconf32.exe) - File not found
O20 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006 Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O24 - Desktop WallPaper: C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Desktop Background.bmp
O24 - Desktop BackupWallPaper: C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Desktop Background.bmp
O27 - HKLM IFEO\mrt.exe: Debugger - svchost.exe (Microsoft Corporation)
O27 - HKLM IFEO\OLT.exe: Debugger - svchost.exe (Microsoft Corporation)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2004/08/10 14:04:08 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O34 - HKLM BootExecute: (lsdelete) - C:\WINDOWS\System32\lsdelete.exe ()
O34 - HKLM BootExecute: (C:\PROGRA~1\AVG\AVG10\avgchsvx.exe /sync) - C:\Program Files\AVG\AVG10\avgchsvx.exe (AVG Technologies CZ, s.r.o.)
O34 - HKLM BootExecute: (C:\PROGRA~1\AVG\AVG10\avgrsx.exe /sync /restart) - C:\Program Files\AVG\AVG10\avgrsx.exe (AVG Technologies CZ, s.r.o.)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O35 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O37 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2011/05/11 21:33:03 | 000,580,608 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\PRIVATE\Desktop\OTL.exe
[2011/05/11 21:18:00 | 000,000,000 | ---D | C] -- C:\Documents and Settings\PRIVATE\Desktop\tdsskiller
[2011/05/10 21:12:03 | 000,000,000 | ---D | C] -- C:\Documents and Settings\PRIVATE\Local Settings\Application Data\{02DCF11F-FDEE-4985-908D-F2CD60470563}
[2011/05/03 21:59:14 | 000,000,000 | ---D | C] -- C:\Documents and Settings\PRIVATE\Desktop\New Folder
[2011/04/24 17:30:04 | 000,000,000 | ---D | C] -- C:\Documents and Settings\PRIVATE\Desktop\gmer
[2011/04/24 15:51:24 | 000,000,000 | ---D | C] -- C:\Documents and Settings\PRIVATE\Application Data\AVG10
[4 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp -> ]
[1 C:\Documents and Settings\PRIVATE\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Application Data\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2011/05/11 21:33:05 | 000,580,608 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\PRIVATE\Desktop\OTL.exe
[2011/05/11 21:26:17 | 000,002,206 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2011/05/11 21:26:13 | 000,000,000 | ---- | M] () -- C:\WINDOWS\Llahogagimogoyi.bin
[2011/05/11 21:25:20 | 000,000,310 | -H-- | M] () -- C:\WINDOWS\tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
[2011/05/11 21:24:39 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2011/05/11 21:17:05 | 001,280,815 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Desktop\tdsskiller.zip
[2011/05/11 09:51:34 | 114,769,675 | ---- | M] () -- C:\WINDOWS\System32\drivers\AVG\incavi.avm
[2011/05/10 21:12:06 | 000,000,120 | ---- | M] () -- C:\WINDOWS\Nsevu.dat
[2011/05/10 20:55:03 | 000,000,000 | ---- | M] () -- C:\Documents and Settings\PRIVATE\2gweorjqjutp92vjy9gake
[2011/05/09 16:41:37 | 000,006,686 | -HS- | M] () -- C:\WINDOWS\System32\KGyGaAvL.sys
[2011/05/09 15:43:48 | 000,000,472 | ---- | M] () -- C:\WINDOWS\tasks\Ad-Aware Update (Weekly).job
[2011/05/03 21:48:30 | 000,000,020 | ---- | M] () -- C:\Documents and Settings\PRIVATE\defogger_reenable
[2011/04/26 21:44:27 | 000,050,477 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Desktop\Defogger.exe
[2011/04/24 16:06:52 | 000,293,019 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Desktop\gmer.zip
[2011/04/24 16:06:00 | 000,625,664 | ---- | M] () -- C:\Documents and Settings\PRIVATE\Desktop\dds.scr
[2011/04/24 15:50:58 | 000,001,580 | -HS- | M] () -- C:\Documents and Settings\PRIVATE\Local Settings\Application Data\1957920475
[2011/04/24 15:50:58 | 000,001,580 | -HS- | M] () -- C:\Documents and Settings\All Users\Application Data\1957920475
[4 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp -> ]
[1 C:\Documents and Settings\PRIVATE\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Application Data\*.tmp -> ]

========== Files Created - No Company Name ==========

[2011/05/11 21:16:58 | 001,280,815 | ---- | C] () -- C:\Documents and Settings\PRIVATE\Desktop\tdsskiller.zip
[2011/05/10 21:12:06 | 000,000,120 | ---- | C] () -- C:\WINDOWS\Nsevu.dat
[2011/05/10 21:12:06 | 000,000,000 | ---- | C] () -- C:\WINDOWS\Llahogagimogoyi.bin
[2011/05/10 20:55:03 | 000,000,000 | ---- | C] () -- C:\Documents and Settings\PRIVATE\2gweorjqjutp92vjy9gake
[2011/05/03 21:48:04 | 000,000,020 | ---- | C] () -- C:\Documents and Settings\PRIVATE\defogger_reenable
[2011/05/03 21:47:42 | 000,050,477 | ---- | C] () -- C:\Documents and Settings\PRIVATE\Desktop\Defogger.exe
[2011/04/24 17:29:54 | 000,293,019 | ---- | C] () -- C:\Documents and Settings\PRIVATE\Desktop\gmer.zip
[2011/04/24 17:25:40 | 000,625,664 | ---- | C] () -- C:\Documents and Settings\PRIVATE\Desktop\dds.scr
[2011/04/14 22:21:08 | 000,001,580 | -HS- | C] () -- C:\Documents and Settings\PRIVATE\Local Settings\Application Data\1957920475
[2011/04/14 22:21:08 | 000,001,580 | -HS- | C] () -- C:\Documents and Settings\All Users\Application Data\1957920475
[2011/04/04 11:04:41 | 000,053,248 | ---- | C] () -- C:\WINDOWS\System32\xb6zaasm.default.dat
[2011/04/04 11:04:41 | 000,002,576 | ---- | C] () -- C:\WINDOWS\System32\xb6zaasm.default.dat-journal
[2011/03/14 21:04:04 | 000,009,216 | ---- | C] () -- C:\WINDOWS\System32\ol3a4fkm.default.dat
[2011/03/14 20:51:36 | 000,000,022 | ---- | C] () -- C:\WINDOWS\System32\urhtps.dat
[2011/03/02 13:37:08 | 000,055,296 | ---- | C] () -- C:\WINDOWS\System32\gezgnind.default.dat
[2011/02/28 15:33:24 | 000,000,664 | ---- | C] () -- C:\WINDOWS\System32\d3d9caps.dat
[2009/03/28 15:51:13 | 000,015,688 | ---- | C] () -- C:\WINDOWS\System32\lsdelete.exe
[2008/12/26 15:11:48 | 000,003,840 | ---- | C] () -- C:\WINDOWS\System32\drivers\BANTExt.sys
[2008/11/29 03:26:36 | 000,024,575 | ---- | C] () -- C:\WINDOWS\System32\Mpwinapppiobas69.dat
[2008/11/29 03:25:24 | 000,112,156 | ---- | C] () -- C:\WINDOWS\System32\Msdts325.dat
[2008/10/12 15:45:17 | 000,000,020 | -H-- | C] () -- C:\Documents and Settings\All Users\Application Data\PKP_DLec.DAT
[2008/10/12 15:42:02 | 000,000,268 | RH-- | C] () -- C:\Documents and Settings\All Users\Application Data\Gems
[2008/10/12 15:42:02 | 000,000,268 | RH-- | C] () -- C:\Documents and Settings\PRIVATE\Application Data\Fruit
[2008/10/12 15:42:02 | 000,000,020 | -H-- | C] () -- C:\Documents and Settings\All Users\Application Data\PKP_DLds.DAT
[2008/07/07 21:33:13 | 000,000,025 | ---- | C] () -- C:\WINDOWS\cdplayer.ini
[2008/02/26 18:24:10 | 000,011,776 | ---- | C] () -- C:\WINDOWS\System32\pmsbfn32.dll
[2008/02/26 18:22:46 | 000,000,412 | ---- | C] () -- C:\WINDOWS\MAXLINK.INI
[2007/12/24 18:29:49 | 000,000,000 | ---- | C] () -- C:\WINDOWS\iplayer.INI
[2007/11/23 22:47:58 | 000,010,752 | ---- | C] () -- C:\WINDOWS\System32\ff_vfw.dll
[2007/09/16 21:16:38 | 000,015,497 | ---- | C] () -- C:\WINDOWS\VX6KStd.ini
[2007/03/24 20:25:39 | 000,000,104 | RHS- | C] () -- C:\WINDOWS\System32\8C8EA62A78.sys
[2006/11/25 19:05:46 | 000,765,952 | ---- | C] () -- C:\WINDOWS\System32\xvidcore.dll
[2006/11/25 19:05:46 | 000,180,224 | ---- | C] () -- C:\WINDOWS\System32\xvidvfw.dll
[2006/11/23 20:45:27 | 000,064,000 | ---- | C] () -- C:\Documents and Settings\PRIVATE\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2006/08/27 14:54:46 | 000,061,678 | ---- | C] () -- C:\Documents and Settings\PRIVATE\Application Data\PFP120JPR.{PB
[2006/08/27 14:54:46 | 000,012,358 | ---- | C] () -- C:\Documents and Settings\PRIVATE\Application Data\PFP120JCM.{PB
[2006/08/27 14:07:53 | 000,004,272 | ---- | C] () -- C:\WINDOWS\System32\drivers\bvrp_pci.sys
[2006/06/03 18:20:54 | 000,006,686 | -HS- | C] () -- C:\WINDOWS\System32\KGyGaAvL.sys
[2006/06/03 18:20:54 | 000,000,056 | RHS- | C] () -- C:\WINDOWS\System32\AFE1171005.sys
[2006/06/03 01:42:02 | 000,003,564 | ---- | C] () -- C:\WINDOWS\mozver.dat
[2006/04/12 20:01:29 | 000,000,061 | ---- | C] () -- C:\WINDOWS\smscfg.ini
[2006/04/12 19:55:22 | 000,000,189 | ---- | C] () -- C:\WINDOWS\wininit.ini
[2006/04/12 19:50:39 | 000,149,504 | ---- | C] () -- C:\WINDOWS\UNWISE.EXE
[2006/04/12 19:47:59 | 000,712,704 | ---- | C] () -- C:\WINDOWS\System32\DellSystemRestore.dll
[2006/04/12 19:42:21 | 000,000,335 | ---- | C] () -- C:\WINDOWS\nsreg.dat
[2006/04/12 19:20:24 | 000,049,152 | ---- | C] () -- C:\WINDOWS\setpwrcg.exe
[2006/04/12 19:20:04 | 000,012,288 | ---- | C] () -- C:\WINDOWS\System32\e100bmsg.dll
[2006/04/12 19:20:02 | 000,000,392 | ---- | C] () -- C:\WINDOWS\System32\OEMINFO.INI
[2004/08/10 14:12:05 | 000,000,780 | ---- | C] () -- C:\WINDOWS\orun32.ini
[2004/08/10 14:07:31 | 000,002,048 | --S- | C] () -- C:\WINDOWS\bootstat.dat
[2004/08/10 14:02:15 | 000,021,640 | ---- | C] () -- C:\WINDOWS\System32\emptyregdb.dat
[2004/08/10 14:01:18 | 000,001,793 | ---- | C] () -- C:\WINDOWS\System32\fxsperf.ini
[2004/08/10 13:57:52 | 000,004,161 | ---- | C] () -- C:\WINDOWS\ODBCINST.INI
[2004/08/10 13:57:15 | 000,184,224 | ---- | C] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2004/08/10 13:51:27 | 000,270,336 | ---- | C] () -- C:\WINDOWS\icugewusuya.dll
[2004/08/10 13:51:21 | 000,004,569 | ---- | C] () -- C:\WINDOWS\System32\secupd.dat
[2004/08/10 13:51:20 | 000,407,670 | ---- | C] () -- C:\WINDOWS\System32\perfh009.dat
[2004/08/10 13:51:20 | 000,272,128 | ---- | C] () -- C:\WINDOWS\System32\perfi009.dat
[2004/08/10 13:51:20 | 000,064,200 | ---- | C] () -- C:\WINDOWS\System32\perfc009.dat
[2004/08/10 13:51:20 | 000,028,626 | ---- | C] () -- C:\WINDOWS\System32\perfd009.dat
[2004/08/10 13:51:18 | 000,004,627 | ---- | C] () -- C:\WINDOWS\System32\oembios.dat
[2004/08/10 13:51:17 | 013,107,200 | ---- | C] () -- C:\WINDOWS\System32\oembios.bin
[2004/08/10 13:51:16 | 000,000,741 | ---- | C] () -- C:\WINDOWS\System32\noise.dat
[2004/08/10 13:51:12 | 000,673,088 | ---- | C] () -- C:\WINDOWS\System32\mlang.dat
[2004/08/10 13:51:11 | 000,046,258 | ---- | C] () -- C:\WINDOWS\System32\mib.bin
[2004/08/10 13:51:05 | 000,218,003 | ---- | C] () -- C:\WINDOWS\System32\dssec.dat
[2004/08/10 13:50:56 | 000,001,804 | ---- | C] () -- C:\WINDOWS\System32\dcache.bin

========== Alternate Data Streams ==========

@Alternate Data Stream - 144 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:CBAC4FD8

< End of report >

----------

OTL Extras logfile created on: 5/11/2011 9:34:47 PM - Run 1
OTL by OldTimer - Version 3.2.22.3 Folder = C:\Documents and Settings\PRIVATE\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1.00 Gb Total Physical Memory | 1.00 Gb Available Physical Memory | 65.00% Memory free
1.00 Gb Paging File | 1.00 Gb Available in Paging File | 77.00% Paging File free
Paging file location(s): C:\pagefile.sys 384 768 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 52.71 Gb Total Space | 30.22 Gb Free Space | 57.33% Space Free | Partition Type: NTFS
Drive D: | 18.60 Gb Total Space | 18.53 Gb Free Space | 99.61% Space Free | Partition Type: NTFS

Computer Name: PRIVATE | User Name: PRIVATE | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*
.html [@ = FirefoxHTML] -- C:\Program Files\Mozilla Firefox\firefox.exe (Mozilla Corporation)

[HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Classes\<extension>]

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*
exefile [open] -- "%1" %*
htmlfile [edit] -- Reg Error: Key error.
http [open] -- "C:\Program Files\Mozilla Firefox\firefox.exe" -requestPending -osint -url "%1" (Mozilla Corporation)
https [open] -- "C:\Program Files\Mozilla Firefox\firefox.exe" -requestPending -osint -url "%1" (Mozilla Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [AddToPlaylistVLC] -- C:\Program Files\VideoLAN\VLC\vlc.exe --one-instance-when-started-from-file --playlist-enqueue "%1" ()
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Directory [PlayWithVLC] -- C:\Program Files\VideoLAN\VLC\vlc.exe --one-instance-when-started-from-file --no-playlist-enqueue "%1" ()
Directory [Winamp.Bookmark] -- "C:\Program Files\Winamp\winamp.exe" /BOOKMARK "%1" (Nullsoft)
Directory [Winamp.Enqueue] -- "C:\Program Files\Winamp\winamp.exe" /ADD "%1" (Nullsoft)
Directory [Winamp.Play] -- "C:\Program Files\Winamp\winamp.exe" "%1" (Nullsoft)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"AntiVirusOverride" = 1
"FirewallOverride" = 1
"AntiVirusDisableNotify" = 1
"FirewallDisableNotify" = 1
"UpdatesDisableNotify" = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

========== System Restore Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sr]
"Start" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SrService]
"Start" = 2

========== Firewall Settings ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"EnableFirewall" = 1
"DoNotAllowExceptions" = 0
"DisableNotifications" = 1

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1
"DoNotAllowExceptions" = 0
"DisableNotifications" = 1

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"41255:TCP" = 41255:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"18762:TCP" = 18762:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"42501:TCP" = 42501:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"18361:TCP" = 18361:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"28315:TCP" = 28315:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"41008:TCP" = 41008:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"38019:TCP" = 38019:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"17254:TCP" = 17254:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"35049:TCP" = 35049:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"14899:TCP" = 14899:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"16487:TCP" = 16487:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"13405:TCP" = 13405:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"34199:TCP" = 34199:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"41856:TCP" = 41856:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"36678:TCP" = 36678:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"26221:TCP" = 26221:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2
"35117:TCP" = 35117:TCP:*:Enabled:0e40ca3b0e26e04d860913701de1e323f9c2

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe" = C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe:*:Enabled:AOL -- (AOL LLC)
"C:\Program Files\Common Files\AOL\ACS\AOLDial.exe" = C:\Program Files\Common Files\AOL\ACS\AOLDial.exe:*:Enabled:AOL -- (AOL LLC)
"C:\Program Files\America Online 9.0\waol.exe" = C:\Program Files\America Online 9.0\waol.exe:*:Enabled:AMERIC~1.0 -- (America Online, Inc.)
"C:\Program Files\MSN Messenger\livecall.exe" = C:\Program Files\MSN Messenger\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe" = C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe:*:Enabled:AOL -- (AOL LLC)
"C:\Program Files\Common Files\AOL\ACS\AOLDial.exe" = C:\Program Files\Common Files\AOL\ACS\AOLDial.exe:*:Enabled:AOL -- (AOL LLC)
"C:\Program Files\America Online 9.0\waol.exe" = C:\Program Files\America Online 9.0\waol.exe:*:Enabled:AMERIC~1.0 -- (America Online, Inc.)
"C:\Program Files\uTorrent\uTorrent.exe" = C:\Program Files\uTorrent\uTorrent.exe:*:Enabled:µTorrent -- (BitTorrent, Inc.)
"C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" = C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe:*:Enabled:Yahoo! Messenger
"C:\Program Files\Yahoo!\Messenger\YServer.exe" = C:\Program Files\Yahoo!\Messenger\YServer.exe:*:Enabled:Yahoo! FT Server
"C:\Program Files\MSN Messenger\livecall.exe" = C:\Program Files\MSN Messenger\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)
"C:\Documents and Settings\PRIVATE\Application Data\nscagent.exe" = C:\Documents and Settings\PRIVATE\Application Data\nscagent.exe:*:Enabled:Win32load
"C:\Program Files\Microsoft LifeCam\LifeCam.exe" = C:\Program Files\Microsoft LifeCam\LifeCam.exe:*:Enabled:LifeCam.exe -- (Microsoft Corporation)
"C:\Program Files\Microsoft LifeCam\LifeExp.exe" = C:\Program Files\Microsoft LifeCam\LifeExp.exe:*:Enabled:LifeExp.exe -- (Microsoft Corporation)
"C:\Documents and Settings\PRIVATE\Application Data\mjusbsp\magicJack.exe" = C:\Documents and Settings\PRIVATE\Application Data\mjusbsp\magicJack.exe:*:Enabled:magicJack -- (magicJack L.P.)
"C:\Documents and Settings\All Users\Application Data\f9a3cf\ISf9a_2300.exe" = C:\Documents and Settings\All Users\Application Data\f9a3cf\ISf9a_2300.exe:*:Enabled:Internet Security Essentials
"C:\Program Files\AVG\AVG10\avgnsx.exe" = C:\Program Files\AVG\AVG10\avgnsx.exe:*:Enabled:Online Shield -- (AVG Technologies CZ, s.r.o.)
"C:\Program Files\AVG\AVG10\avgmfapx.exe" = C:\Program Files\AVG\AVG10\avgmfapx.exe:*:Enabled:AVG Installer -- (AVG Technologies CZ, s.r.o.)
"C:\Program Files\AVG\AVG10\avgemcx.exe" = C:\Program Files\AVG\AVG10\avgemcx.exe:*:Enabled:Personal E-mail Scanner -- (AVG Technologies CZ, s.r.o.)


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{0EB5D9B7-8E6C-4A9E-B74F-16B7EE89A67B}" = Microsoft Plus! Photo Story 2 LE
"{1199FAD5-9546-44f3-81CF-FFDB8040B7BF}_Canon_MX310_series" = Canon MX310 series
"{17334AAF-C9E7-483B-9F45-E3FCAF07FFA7}" = Intel® PROSet for Wired Connections
"{1A15507A-8551-4626-915D-3D5FA095CC1B}" = Corel Paint Shop Pro X
"{1E04F83B-2AB9-4301-9EF7-E86307F79C72}" = Google Earth
"{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
"{205C6BDD-7B73-42DE-8505-9A093F35A238}" = Windows Live Upload Tool
"{22B775E7-6C42-4FC5-8E10-9A5E3257BD94}" = MSVCRT
"{26A24AE4-039D-4CA4-87B4-2F83216011FF}" = Java™ 6 Update 15
"{30465B6C-B53F-49A1-9EBA-A3F187AD502E}" = Sonic Update Manager
"{3175E049-F9A9-4A3D-8F19-AC9FB04514D1}" = Windows Live Communications Platform
"{318AB667-3230-41B5-A617-CB3BF748D371}" = iTunes
"{33BB4982-DC52-4886-A03B-F4C5C80BEE89}" = Windows Media Player 10
"{350C97B0-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{45338B07-A236-4270-9A77-EBB4115517B5}" = Windows Live Sign-in Assistant
"{4667B940-BB01-428B-986E-A0CC46497BF7}" = ELIcon
"{474F25F5-BDC9-40E5-B1B6-F6BF23FC106F}" = Windows Live Essentials
"{5905F42D-3F5F-4916-ADA6-94A3646AEE76}" = Dell Driver Reset Tool
"{5B6BE547-21E2-49CA-B2E2-6A5F470593B1}" = Sonic Activation Module
"{6190B8CA-366D-A8E1-9976-7EE50B7DC39E}" = Aloha Solitaire
"{62BD0AE0-4EB1-4BBB-8F43-B6400C8FEB2C}" = AOLIcon
"{6412CECE-8172-4BE5-935B-6CECACD2CA87}" = Windows Live Mail
"{6956856F-B6B3-4BE0-BA0B-8F495BE32033}" = Apple Software Update
"{6E45BA47-383C-4C1E-8ED0-0D4845C293D7}" = Microsoft Plus! Digital Media Edition Installer
"{7148F0A8-6813-11D6-A77B-00B0D0142030}" = Java 2 Runtime Environment, SE v1.4.2_03
"{716E0306-8318-4364-8B8F-0CC4E9376BAC}" = MSXML 4.0 SP2 Parser and SDK
"{74F7662C-B1DB-489E-A8AC-07A06B24978B}" = Dell System Restore
"{7EFA5E6F-74F7-4AFB-8AEA-AA790BD3A76D}" = DellSupport
"{7F142D56-3326-11D5-B229-002078017FBF}" = Modem Helper
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-110310727}" = Hardwood Solitaire Deluxe
"{837b34e3-7c30-493c-8f6a-2b0f04e2912c}" = Microsoft Visual C++ 2005 Redistributable
"{84EBDF39-4B33-49D7-A0BD-EB6E2C4E81C1}" = Windows Live Sync
"{8A25392D-C5D2-4E79-A2BD-C15DDC5B0959}" = Bonjour
"{8A62A068-3FD6-495A-9F66-26FE94F32EC9}" = Rhapsody Player Engine
"{8A708DD8-A5E6-11D4-A706-000629E95E20}" = Intel® Extreme Graphics 2 Driver
"{8A74E887-8F0F-4017-AF53-CBA42211AAA5}" = Microsoft Sync Framework Runtime Native v1.0 (x86)
"{8A9B8148-DDD7-448F-BD6C-358386D32354}" = Corel Photo Album 6
"{8CFC7570-DD90-486E-A239-E31D455BDE93}" = Microsoft LifeCam
"{95120000-00B9-0409-0000-0000000FF1CE}" = Microsoft Application Error Reporting
"{995F1E2E-F542-4310-8E1D-9926F5A279B3}" = Windows Live Toolbar
"{9C9CEB9D-53FD-49A7-85D2-FE674F72F24E}" = Microsoft Search Enhancement Pack
"{A1F66FC9-11EE-4F2F-98C9-16F8D1E69FB7}" = Segoe UI
"{A5F68DC8-0278-4AD8-B413-861509B5F25B}" = ArcSoft Panorama Maker 3
"{AA64977E-BEC8-4BDD-81E8-775F9F2FA2FF}" = Serials 2000
"{AC76BA86-7AD7-1033-7B44-A81300000003}" = Adobe Reader 8.1.3
"{AF19F291-F22F-4798-9662-525305AE9E48}" = WordPerfect Office 12
"{B2F3DBD9-A9D2-4838-B45D-C917DAB32BC3}" = ScanSoft OmniPage SE 4
"{B3AEF776-7FFF-4C50-A402-9119E3849EE0}" = AVG 2011
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy
"{B508B3F1-A24A-32C0-B310-85786919EF28}" = Microsoft .NET Framework 2.0 Service Pack 1
"{BD64AF4A-8C80-4152-AD77-FCDDF05208AB}" = Microsoft Sync Framework Services Native v1.0 (x86)
"{C4E94401-0AEE-4119-82EE-A74D4EE89075}" = Percoid Image Viewer 5.0
"{CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1}" = Microsoft .NET Framework 1.1
"{D2988E9B-C73F-422C-AD4B-A66EBE257120}" = MCU
"{D2D6B9EB-C6DC-4DAA-B4DE-BB7D9735E7DA}" = Presto! PageManager 7.15.16
"{D2FCC1AE-6311-47C5-8130-C6C66D77DD71}" = Nikon Message Center
"{D4E53304-1F6C-4111-9872-1BCD2CF5B642}" = AVG 2011
"{D6C75F0B-3BC1-4FC9-B8C5-3F7E8ED059CA}" = Windows Live Photo Gallery
"{DB0A8A2A-4EA7-4FE3-802E-8A6DEE32696C}_is1" = Orban/Coding Technologies AAC/aacPlus Player Plugin™ 1.0
"{DED53B0B-B67C-4244-AE6A-D6FD3C28D1EF}" = Ad-Aware
"{E2DFE069-083E-4631-9B6C-43C48E991DE5}" = Junk Mail filter update
"{E6158D07-2637-4ECF-B576-37C489669174}" = Windows Live Call
"{EC4455AB-F155-4CC1-A4C5-88F3777F9886}" = Apple Mobile Device Support
"{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}" = Microsoft SQL Server 2005 Compact Edition [ENU]
"{F0E12BBA-AD66-4022-A453-A1C8A0C4D570}" = Microsoft Choice Guard
"{F333A33D-125C-32A2-8DCE-5C5D14231E27}" = Visual C++ 2008 x86 Runtime - (v9.0.30729)
"{F333A33D-125C-32A2-8DCE-5C5D14231E27}.vc_x86runtime_30729_01" = Visual C++ 2008 x86 Runtime - v9.0.30729.01
"{F958CA02-BB40-4007-894B-258729456EE4}" = QuickTime
"{FF3999BE-1A7B-4738-88AA-97BF14094A4A}" = PictureProject
"Ad-Aware" = Ad-Aware
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe Flash Player Plugin" = Adobe Flash Player 10 Plugin
"Aloha Solitaire" = Aloha Solitaire (remove only)
"America Online us" = America Online (Choose which version to remove)
"AOL Uninstaller" = AOL Uninstaller (Choose which Products to Remove)
"AOLCoach" = AOL Coach Version 1.0(Build:20040229.1 en)
"AVG" = AVG 2011
"Bandoo" = Bandoo
"Belarc Advisor" = Belarc Advisor 7.2
"Canon MX310 series User Registration" = Canon MX310 series User Registration
"CANONIJPLM100" = PIXMA Extended Survey Program
"CanonMyPrinter" = Canon My Printer
"CanonSolutionMenu" = Canon Utilities Solution Menu
"CCleaner" = CCleaner
"CNXT_MODEM_PCI_VEN_14F1&DEV_2F20&SUBSYS_200F14F1" = Conexant D850 56K V.9x DFVc Modem
"Dell Digital Jukebox Driver" = Dell Digital Jukebox Driver
"Easy-PhotoPrint EX" = Canon Utilities Easy-PhotoPrint EX
"EVEREST Ultimate Edition_is1" = EVEREST Ultimate Edition v4.60
"ffdshow_is1" = ffdshow [rev 1324] [2007-07-01]
"GameHouse Solitaire Challenge" = GameHouse Solitaire Challenge (remove only)
"GetRight" = GetRight
"Hardwood Solitaire Deluxe" = Hardwood Solitaire Deluxe
"HijackThis" = HijackThis 1.99.1
"IDNMitigationAPIs" = Microsoft Internationalized Domain Names Mitigation APIs
"ie7" = Windows Internet Explorer 7
"ie8" = Windows Internet Explorer 8
"Malwarebytes' Anti-Malware_is1" = Malwarebytes' Anti-Malware
"Microsoft .NET Framework 1.1 (1033)" = Microsoft .NET Framework 1.1
"mIRC" = mIRC
"Mozilla Firefox (3.6.17)" = Mozilla Firefox (3.6.17)
"MP Navigator EX 1.0" = Canon MP Navigator EX 1.0
"MSCompPackV1" = Microsoft Compression Client Pack 1.0 for Windows XP
"MSNINST" = MSN
"NLSDownlevelMapping" = Microsoft National Language Support Downlevel APIs
"PictureProject In Touch Downloader" = PictureProject In Touch Downloader 1.0
"PokerStars.net" = PokerStars.net
"PROSet" = Intel® PRO Network Adapters and Drivers
"QuickPar" = QuickPar 0.9
"RealPlayer 6.0" = RealPlayer
"Registry Clean Expert_is1" = Registry Clean Expert
"Rhapsody" = Rhapsody
"Serials 2000 7.1+_is1" = Serials 2000 7.1+
"SopCast" = SopCast 2.0.4
"Spybot - Search & Destroy_is1" = Spybot - Search & Destroy 1.4
"TVAnts 1.0" = TVAnts 1.0
"TVUPlayer" = TVUPlayer 2.3.3.2
"ViewpointMediaPlayer" = Viewpoint Media Player
"VLC media player" = VideoLAN VLC media player 0.8.5
"WebCyberCoach_wtrb" = WebCyberCoach 3.2 Dell
"Winamp" = Winamp
"Windows Media Format Runtime" = Windows Media Format 11 runtime
"Windows Media Player" = Windows Media Player 11
"Windows XP Service Pack" = Windows XP Service Pack 3
"WinLiveSuite_Wave3" = Windows Live Essentials
"WinRAR archiver" = WinRAR archiver
"WMFDist11" = Windows Media Format 11 runtime
"wmp11" = Windows Media Player 11
"Wudf01000" = Microsoft User-Mode Driver Framework Feature Pack 1.0
"Xvid_is1" = Xvid 1.1.2 final uninstall

========== HKEY_USERS Uninstall List ==========

[HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"aaa" = aaa
"magicJack" = magicJack
"uTorrent" = µTorrent
"Yahoo! BrowserPlus" = Yahoo! BrowserPlus 2.7.1

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 2/7/2011 4:43:54 PM | Computer Name = PRIVATE | Source = Lavasoft Ad-Aware Service | ID = 0
Description =

Error - 2/9/2011 8:48:37 PM | Computer Name = PRIVATE | Source = crypt32 | ID = 131083
Description = Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab>
with error: An internal certificate chaining error has occurred.

Error - 2/14/2011 4:43:56 PM | Computer Name = PRIVATE | Source = Lavasoft Ad-Aware Service | ID = 0
Description =

Error - 2/21/2011 4:44:08 PM | Computer Name = PRIVATE | Source = Lavasoft Ad-Aware Service | ID = 0
Description =

Error - 3/2/2011 11:46:14 AM | Computer Name = PRIVATE | Source = Application Error | ID = 1000
Description = Faulting application ufr.exe, version 5.0.572.1152, faulting module
unknown, version 0.0.0.0, fault address 0x035d5a00.

Error - 3/2/2011 10:08:11 PM | Computer Name = PRIVATE | Source = Application Error | ID = 1000
Description = Faulting application isf9a_2300.exe, version 0.0.0.0, faulting module
unknown, version 0.0.0.0, fault address 0x003b4ff3.

Error - 3/3/2011 9:55:40 AM | Computer Name = PRIVATE | Source = Application Error | ID = 1000
Description = Faulting application explorer.exe, version 6.0.2900.5512, faulting
module unknown, version 0.0.0.0, fault address 0x01a92fe7.

Error - 3/14/2011 9:48:56 PM | Computer Name = PRIVATE | Source = MsiInstaller | ID = 10005
Description = SA_Error1709: StandardAction(0xC00706AD): Product: AVG 2011 -- Error
27035. CA_Error27035: ReloadAvi(0xE001003D): Reloading of AVG databases failed

Error - 3/14/2011 9:58:56 PM | Computer Name = PRIVATE | Source = MsiInstaller | ID = 10005
Description = SA_Error1709: StandardAction(0xC00706AD): Product: AVG 2011 -- Error
27035. CA_Error27035: ReloadAvi(0xE001003D): Reloading of AVG databases failed

Error - 5/11/2011 9:10:16 PM | Computer Name = PRIVATE | Source = Application Error | ID = 1000
Description = Faulting application explorer.exe, version 6.0.2900.5512, faulting
module icugewusuya.dll, version 0.0.0.0, fault address 0x00025e4b.

[ System Events ]
Error - 5/3/2011 11:03:09 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/3/2011 11:14:25 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/3/2011 11:14:26 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/4/2011 10:20:51 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/4/2011 10:20:56 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/4/2011 10:20:59 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/4/2011 11:11:05 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/4/2011 11:22:41 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/4/2011 11:22:50 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.

Error - 5/4/2011 11:22:52 PM | Computer Name = PRIVATE | Source = atapi | ID = 262153
Description = The device, \Device\Ide\IdePort0, did not respond within the timeout
period.


< End of report >

----------

#6 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 13 May 2011 - 08:28 AM

Hi!

The main infection that you were infected with is called TDL4.

See the snippet of text below:

2011/05/11 21:20:18.0968 0536 Detected object count: 1
2011/05/11 21:21:31.0343 0536 \HardDisk0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
2011/05/11 21:21:31.0343 0536 \HardDisk0 - ok
2011/05/11 21:21:31.0343 0536 Rootkit.Win32.TDSS.tdl4(\HardDisk0) - User select action: Cure
2011/05/11 21:21:59.0390 1400 Deinitialize success


You can read more about this infection here:

Special thanks to quietman7 for providing the above links.



NEXT:



GooredFix
Please download GooredFix from one of the locations below and save it to your Desktop
Download Mirror #1
  • Ensure all Firefox windows are closed.
  • To run the tool, double-click it (XP), or right-click and select Run As Administrator (Vista).
  • When prompted to run the scan, click Yes.
  • GooredFix will check for infections, and then a log will appear. Please post the contents of that log in your next reply (it can also be found on your desktop, called GooredFix.txt).


NEXT:



Back-Up Registry
First, we need to backup your registry:
Please go to Start > Run
Paste in the following line:

regedit /e c:\registrybackup.reg

Click OK.
It won't appear to be doing anything, that's normal.
Your mouse pointer may turn to an hour glass for a minute.
Please continue when it no longer has the hour glass.



NEXT:



OTL Fix

We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.
    :Services
    :OTL
    MOD - [2008/04/13 20:12:08 | 000,270,336 | ---- | M] () -- C:\WINDOWS\icugewusuya.dll
    SRV - File not found [Disabled | Stopped] -- -- (YahooAUService)
    SRV - File not found [Disabled | Stopped] -- -- (McComponentHostService)
    SRV - File not found [Disabled | Stopped] -- -- (aswUpdSv)
    IE - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
    FF - prefs.js..keyword.URL: "http://www.searchqu.com/web?src=ffb&q="
    FF - prefs.js..network.proxy.type: 4
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
    O2 - BHO: (no name) - {A3EF6FD4-4769-4734-9494-4707087225B9} - No CLSID value found.
    O2 - BHO: (no name) - {E5886C91-CDD7-4832-B32D-0830705A9C60} - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No CLSID value found.
    O3 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\..\Toolbar\WebBrowser: (no name) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No CLSID value found.
    O4 - HKLM..\Run: [Lrawelole] C:\WINDOWS\icugewusuya.dll ()
    O4 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006..\Run: [Hwujisetaco] C:\WINDOWS\odbdap.dll (ArcSoft Inc.)
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 0 = msseces.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 1 = MSASCui.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 2 = ekrn.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 3 = egui.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 4 = avgnt.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 5 = avcenter.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 6 = avscan.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 7 = avgfrw.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 8 = avgui.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 9 = avgtray.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 10 = avgscanx.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 11 = avgcfgex.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 12 = avgemc.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 13 = avgchsvx.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 14 = avgcmgr.exe
    O7 - HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun: 15 = avgwdsvc.exe
    O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab (Reg Error: Key error.)
    O16 - DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} http://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab (Reg Error: Key error.)
    O27 - HKLM IFEO\mrt.exe: Debugger - svchost.exe (Microsoft Corporation)
    O27 - HKLM IFEO\OLT.exe: Debugger - svchost.exe (Microsoft Corporation)
    [4 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
    [1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
    [1 C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp -> ]
    [1 C:\Documents and Settings\PRIVATE\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Application Data\*.tmp -> ]
    [2011/05/11 21:26:13 | 000,000,000 | ---- | M] () -- C:\WINDOWS\Llahogagimogoyi.bin
    [2011/05/11 21:25:20 | 000,000,310 | -H-- | M] () -- C:\WINDOWS\tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
    [2011/05/10 21:12:06 | 000,000,120 | ---- | M] () -- C:\WINDOWS\Nsevu.dat
    [2011/05/10 20:55:03 | 000,000,000 | ---- | M] () -- C:\Documents and Settings\PRIVATE\2gweorjqjutp92vjy9gake
    [2011/04/24 15:50:58 | 000,001,580 | -HS- | M] () -- C:\Documents and Settings\PRIVATE\Local Settings\Application Data\1957920475
    [2011/04/24 15:50:58 | 000,001,580 | -HS- | M] () -- C:\Documents and Settings\All Users\Application Data\1957920475
    [4 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
    [1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
    [1 C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Local Settings\Application Data\*.tmp -> ]
    [1 C:\Documents and Settings\PRIVATE\Application Data\*.tmp files -> C:\Documents and Settings\PRIVATE\Application Data\*.tmp -> ]
    [2011/05/10 21:12:06 | 000,000,120 | ---- | C] () -- C:\WINDOWS\Nsevu.dat
    [2011/05/10 21:12:06 | 000,000,000 | ---- | C] () -- C:\WINDOWS\Llahogagimogoyi.bin
    [2011/05/10 20:55:03 | 000,000,000 | ---- | C] () -- C:\Documents and Settings\PRIVATE\2gweorjqjutp92vjy9gake
    [2011/04/14 22:21:08 | 000,001,580 | -HS- | C] () -- C:\Documents and Settings\PRIVATE\Local Settings\Application Data\1957920475
    [2011/04/14 22:21:08 | 000,001,580 | -HS- | C] () -- C:\Documents and Settings\All Users\Application Data\1957920475
    [2008/11/29 03:26:36 | 000,024,575 | ---- | C] () -- C:\WINDOWS\System32\Mpwinapppiobas69.dat
    [2008/11/29 03:25:24 | 000,112,156 | ---- | C] () -- C:\WINDOWS\System32\Msdts325.dat
    
    :Reg
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
    "41255:TCP"=-
    "18762:TCP"=-
    "42501:TCP"=-
    "18361:TCP"=-
    "28315:TCP"=-
    "41008:TCP"=-
    "38019:TCP"=-
    "17254:TCP"=-
    "35049:TCP"=-
    "14899:TCP"=-
    "16487:TCP"=-
    "13405:TCP"=-
    "34199:TCP"=-
    "41856:TCP"=-
    "36678:TCP"=-
    "26221:TCP"=-
    "35117:TCP"=-
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
    "C:\Documents and Settings\All Users\Application Data\f9a3cf\ISf9a_2300.exe"=-
    
    :Files
    ipconfig /flushdns /c
    :Commands
    [purity]
    [resethosts]
    [CreateRestorePoint]
    [emptytemp]
    [EMPTYFLASH]
    
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click the OK button.
  • A report will open. Copy and Paste that report in your next reply.
  • If the machine reboots, the log will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.


NEXT:


Running ComboFix
Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop
  • IMPORTANT - Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here

    Note: If AVG or CA Internet Security Suite is installed, you must remove these programs before using Combofix. If for some reason these applications will not uninstall, try uninstalling with AppRemover by Opswat.
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Please make sure you include the ComboFix log in your next reply as well as describe how your computer is running now

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#7 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 16 May 2011 - 04:09 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#8 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 17 May 2011 - 08:22 AM

This topic has been re-opened at the request of the person who originally posted.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#9 Teahupo'o

Teahupo'o
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:40 AM

Posted 17 May 2011 - 04:39 PM

Thank you ST!

----------

GooredFix by jpshortstuff (04.04.11.1)
Log created at 21:11 on 16/05/2011 (PRIVATE)
Firefox version 3.6.17 (en-US)

========== GooredScan ==========

Deleting HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions\\{02DCF11F-FDEE-4985-908D-F2CD60470563} -> Success!
Deleting C:\Documents and Settings\PRIVATE\Local Settings\Application Data\{02DCF11F-FDEE-4985-908D-F2CD60470563} -> Success!

========== GooredLog ==========

C:\Program Files\Mozilla Firefox\extensions\
{972ce4c6-7e08-4474-a285-3208198ce6fd} [05:42 03/06/2006]
{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} [15:58 09/08/2009]

C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\
firefox@bandoo.com [22:24 29/01/2010]
{19503e42-ca3c-4c27-b1e2-9cdb2170ee34} [18:58 04/04/2011]
{472f4ef0-a825-11da-a746-0800200c9a66} [20:01 27/12/2008]
{635abd67-4fe9-1b23-4f01-e679fa7484c1} [13:27 16/03/2011]
{66E978CD-981F-47DF-AC42-E3CF417C1467} [13:27 16/03/2011]
{CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7} [23:54 09/05/2009]
{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} [21:21 09/04/2011]
{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} [13:28 16/03/2011]

[HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions]
"{ABDE892B-13A8-4d1b-88E6-365A6E755758}"="C:\Program Files\Real\RealPlayer\browserrecord" [01:29 08/07/2008]
"jqs@sun.com"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff" [22:26 26/12/2008]
"{E5886C91-CDD7-4832-B32D-0830705A9C60}"="C:\WINDOWS\system32\5012" [15:43 03/03/2011]
"{1E73965B-8B48-48be-9C8D-68B920ABC1C4}"="C:\Program Files\AVG\AVG10\Firefox4\" [17:08 04/04/2011]

-=E.O.F=-

----------

All processes killed
========== SERVICES/DRIVERS ==========
========== OTL ==========
Service YahooAUService stopped successfully!
Service YahooAUService deleted successfully!
Service McComponentHostService stopped successfully!
Service McComponentHostService deleted successfully!
Service aswUpdSv stopped successfully!
Service aswUpdSv deleted successfully!
HKU\S-1-5-21-1186478716-3061497463-2265077323-1006\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
Prefs.js: "http://www.searchqu.com/web?src=ffb&q=" removed from keyword.URL
Prefs.js: 4 removed from network.proxy.type
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5C255C8A-E604-49b4-9D64-90988571CECB}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A3EF6FD4-4769-4734-9494-4707087225B9}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3EF6FD4-4769-4734-9494-4707087225B9}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E5886C91-CDD7-4832-B32D-0830705A9C60}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E5886C91-CDD7-4832-B32D-0830705A9C60}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\ not found.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{2318C2B1-4965-11D4-9B18-009027A5CD4F} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2318C2B1-4965-11D4-9B18-009027A5CD4F}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\Lrawelole deleted successfully.
C:\WINDOWS\icugewusuya.dll moved successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\Software\Microsoft\Windows\CurrentVersion\Run\\Hwujisetaco deleted successfully.
C:\WINDOWS\odbdap.dll moved successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\0 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\1 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\2 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\3 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\4 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\5 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\6 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\7 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\8 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\9 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\10 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\11 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\12 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\13 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\14 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-1186478716-3061497463-2265077323-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\\15 deleted successfully.
Starting removal of ActiveX control {8FFBE65D-2C9C-4669-84BD-5829DC0B603C}
C:\WINDOWS\Downloaded Program Files\erma.inf moved successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.
Starting removal of ActiveX control {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrt.exe\ deleted successfully.
Item C:\WINDOWS\System32\svchost.exe is whitelisted and cannot be moved.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OLT.exe\ deleted successfully.
Item C:\WINDOWS\System32\svchost.exe is whitelisted and cannot be moved.
C:\WINDOWS\System32\CONFIG.TMP deleted successfully.
C:\WINDOWS\System32\ol3a4fkm.default.tmp deleted successfully.
C:\WINDOWS\System32\srvblck2.tmp deleted successfully.
C:\WINDOWS\System32\xb6zaasm.default.tmp deleted successfully.
C:\WINDOWS\002746_.tmp deleted successfully.
C:\Documents and Settings\PRIVATE\Local Settings\Application Data\GLF7C5.tmp deleted successfully.
C:\Documents and Settings\PRIVATE\Application Data\~eu37.tmp deleted successfully.
C:\WINDOWS\Llahogagimogoyi.bin moved successfully.
C:\WINDOWS\tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job moved successfully.
C:\WINDOWS\Nsevu.dat moved successfully.
C:\Documents and Settings\PRIVATE\2gweorjqjutp92vjy9gake moved successfully.
C:\Documents and Settings\PRIVATE\Local Settings\Application Data\1957920475 moved successfully.
C:\Documents and Settings\All Users\Application Data\1957920475 moved successfully.
File C:\WINDOWS\Nsevu.dat not found.
File C:\WINDOWS\Llahogagimogoyi.bin not found.
File C:\Documents and Settings\PRIVATE\2gweorjqjutp92vjy9gake not found.
File C:\Documents and Settings\PRIVATE\Local Settings\Application Data\1957920475 not found.
File C:\Documents and Settings\All Users\Application Data\1957920475 not found.
C:\WINDOWS\system32\Mpwinapppiobas69.dat moved successfully.
C:\WINDOWS\system32\Msdts325.dat moved successfully.
========== REGISTRY ==========
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\41255:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\18762:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\42501:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\18361:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\28315:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\41008:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\38019:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\17254:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\35049:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\14899:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\16487:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\13405:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\34199:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\41856:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\36678:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\26221:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\\35117:TCP deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Documents and Settings\All Users\Application Data\f9a3cf\ISf9a_2300.exe deleted successfully.
========== FILES ==========
< ipconfig /flushdns /c >
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
C:\Documents and Settings\PRIVATE\Desktop\cmd.bat deleted successfully.
C:\Documents and Settings\PRIVATE\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========
C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully
Restore point Set: OTL Restore Point (0)

[EMPTYTEMP]

User: Administrator
->Temp folder emptied: 282292 bytes
->Temporary Internet Files folder emptied: 9348229 bytes
->FireFox cache emptied: 35664292 bytes
->Flash cache emptied: 560 bytes

User: All Users

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 32768 bytes

User: PRIVATE
->Temp folder emptied: 115057 bytes
->Temporary Internet Files folder emptied: 164825 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 9529312 bytes
->Flash cache emptied: 658 bytes

User: LocalService
->Temp folder emptied: 67561 bytes
->Temporary Internet Files folder emptied: 3192099 bytes
->Flash cache emptied: 405 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: Owner

User: PRIVATE
->Temp folder emptied: 57757899 bytes
->Temporary Internet Files folder emptied: 615278 bytes
->Java cache emptied: 322547 bytes
->FireFox cache emptied: 137296589 bytes
->Flash cache emptied: 15544631 bytes

User: PRIVATE
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 7056557 bytes
->Java cache emptied: 21131938 bytes
->FireFox cache emptied: 50115376 bytes
->Flash cache emptied: 14162 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 1204771 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 34318 bytes
RecycleBin emptied: 5542 bytes

Total Files Cleaned = 333.00 mb


[EMPTYFLASH]

User: Administrator
->Flash cache emptied: 0 bytes

User: All Users

User: Default User

User: PRIVATE
->Flash cache emptied: 0 bytes

User: LocalService
->Flash cache emptied: 0 bytes

User: NetworkService

User: Owner

User: PRIVATE
->Flash cache emptied: 0 bytes

User: PRIVATE
->Flash cache emptied: 0 bytes

Total Flash Files Cleaned = 0.00 mb


OTL by OldTimer - Version 3.2.22.3 log created on 05162011_212515

Files\Folders moved on Reboot...
File\Folder C:\Documents and Settings\PRIVATE\Local Settings\Temp\ColecçăodeCalcinhas.pps not found!

Registry entries deleted on Reboot...

----------

ComboFix 11-05-16.02 - PRIVATE 05/16/2011 22:20:30.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1278.957 [GMT -4:00]
Running from: c:\documents and settings\PRIVATE\Desktop\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\documents and settings\PRIVATE\Application Data\Adobe\plugs
c:\documents and settings\PRIVATE\Application Data\Adobe\plugs\mmc514371937.txt
c:\documents and settings\PRIVATE\Application Data\Adobe\shed
c:\documents and settings\PRIVATE\Application Data\Adobe\shed\thr1.chm
c:\documents and settings\PRIVATE\Application Data\Internet Security Essentials
c:\documents and settings\PRIVATE\Application Data\Internet Security Essentials\cookies.sqlite
c:\documents and settings\PRIVATE\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Security Essentials.lnk
c:\documents and settings\PRIVATE\Desktop\Internet Security Essentials.lnk
c:\documents and settings\PRIVATE\Start Menu\Internet Security Essentials.lnk
c:\documents and settings\PRIVATE\Start Menu\Programs\Internet Security Essentials.lnk
c:\hijackthis\hijackthis.exe
c:\windows\Downloaded Program Files\popcaploader.dll
c:\windows\Downloaded Program Files\popcaploader.inf
c:\windows\system32\drivers\1028_DELL_XPS_Dell DE051 .MRK
c:\windows\system32\drivers\DELL_XPS_Dell DE051 .MRK
c:\windows\system32\kock
c:\windows\system32\kock\administrator@ad.yieldmanager[1].txt
c:\windows\system32\kock\administrator@advertising[2].txt
c:\windows\system32\kock\administrator@atdmt[1].txt
c:\windows\system32\kock\administrator@avgtechnologies.112.2o7[1].txt
c:\windows\system32\kock\administrator@content.yieldmanager[1].txt
c:\windows\system32\kock\administrator@doubleclick[1].txt
c:\windows\system32\kock\administrator@interclick[1].txt
c:\windows\system32\kock\administrator@revsci[2].txt
c:\windows\system32\kock\administrator@scorecardresearch[1].txt
c:\windows\system32\kock\administrator@turn[2].txt
c:\windows\system32\kock\administrator@yahoo[1].txt
c:\windows\system32\kock\administrator@yahoo[2].txt
c:\windows\system32\kock\PRIVATE@2o7[1].txt
c:\windows\system32\kock\PRIVATE@2o7[3].txt
c:\windows\system32\kock\PRIVATE@360.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@360.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@72.3.253[2].txt
c:\windows\system32\kock\PRIVATE@72.3.253[3].txt
c:\windows\system32\kock\PRIVATE@a1.interclick[1].txt
c:\windows\system32\kock\PRIVATE@abmr[1].txt
c:\windows\system32\kock\PRIVATE@abmr[10].txt
c:\windows\system32\kock\PRIVATE@abmr[2].txt
c:\windows\system32\kock\PRIVATE@abmr[3].txt
c:\windows\system32\kock\PRIVATE@abmr[4].txt
c:\windows\system32\kock\PRIVATE@abmr[5].txt
c:\windows\system32\kock\PRIVATE@abmr[6].txt
c:\windows\system32\kock\PRIVATE@abmr[7].txt
c:\windows\system32\kock\PRIVATE@abmr[8].txt
c:\windows\system32\kock\PRIVATE@abmr[9].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[1].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[2].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[3].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[4].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[5].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[6].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[7].txt
c:\windows\system32\kock\PRIVATE@ad.yieldmanager[8].txt
c:\windows\system32\kock\PRIVATE@adbrite[1].txt
c:\windows\system32\kock\PRIVATE@adbrite[2].txt
c:\windows\system32\kock\PRIVATE@adbrite[3].txt
c:\windows\system32\kock\PRIVATE@adbrite[4].txt
c:\windows\system32\kock\PRIVATE@adbrite[5].txt
c:\windows\system32\kock\PRIVATE@adbrite[6].txt
c:\windows\system32\kock\PRIVATE@adbrite[7].txt
c:\windows\system32\kock\PRIVATE@adbrite[8].txt
c:\windows\system32\kock\PRIVATE@adbrite[9].txt
c:\windows\system32\kock\PRIVATE@admonkey.dapper[1].txt
c:\windows\system32\kock\PRIVATE@admonkey.dapper[2].txt
c:\windows\system32\kock\PRIVATE@admonkey.dapper[3].txt
c:\windows\system32\kock\PRIVATE@ads.bridgetrack[1].txt
c:\windows\system32\kock\PRIVATE@ads.bridgetrack[3].txt
c:\windows\system32\kock\PRIVATE@ads.bridgetrack[4].txt
c:\windows\system32\kock\PRIVATE@ads.undertone[1].txt
c:\windows\system32\kock\PRIVATE@ads.undertone[2].txt
c:\windows\system32\kock\PRIVATE@ads.undertone[3].txt
c:\windows\system32\kock\PRIVATE@ads.undertone[4].txt
c:\windows\system32\kock\PRIVATE@ads.undertone[5].txt
c:\windows\system32\kock\PRIVATE@advertising[1].txt
c:\windows\system32\kock\PRIVATE@advertising[2].txt
c:\windows\system32\kock\PRIVATE@advertising[3].txt
c:\windows\system32\kock\PRIVATE@advertising[4].txt
c:\windows\system32\kock\PRIVATE@advertising[5].txt
c:\windows\system32\kock\PRIVATE@advertising[6].txt
c:\windows\system32\kock\PRIVATE@advertising[7].txt
c:\windows\system32\kock\PRIVATE@advertising[8].txt
c:\windows\system32\kock\PRIVATE@apmebf[1].txt
c:\windows\system32\kock\PRIVATE@apmebf[2].txt
c:\windows\system32\kock\PRIVATE@apmebf[3].txt
c:\windows\system32\kock\PRIVATE@apmebf[4].txt
c:\windows\system32\kock\PRIVATE@apmebf[5].txt
c:\windows\system32\kock\PRIVATE@apmebf[6].txt
c:\windows\system32\kock\PRIVATE@apmebf[7].txt
c:\windows\system32\kock\PRIVATE@apmebf[8].txt
c:\windows\system32\kock\PRIVATE@apmebf[9].txt
c:\windows\system32\kock\PRIVATE@atdmt.combing[2].txt
c:\windows\system32\kock\PRIVATE@atdmt.combing[3].txt
c:\windows\system32\kock\PRIVATE@atdmt.combing[4].txt
c:\windows\system32\kock\PRIVATE@atdmt[1].txt
c:\windows\system32\kock\PRIVATE@atdmt[2].txt
c:\windows\system32\kock\PRIVATE@atdmt[3].txt
c:\windows\system32\kock\PRIVATE@atdmt[4].txt
c:\windows\system32\kock\PRIVATE@atdmt[5].txt
c:\windows\system32\kock\PRIVATE@atdmt[6].txt
c:\windows\system32\kock\PRIVATE@atdmt[7].txt
c:\windows\system32\kock\PRIVATE@atdmt[8].txt
c:\windows\system32\kock\PRIVATE@atdmt[9].txt
c:\windows\system32\kock\PRIVATE@bankofamerica[2].txt
c:\windows\system32\kock\PRIVATE@brownshoe.112.2o7[1].txt
c:\windows\system32\kock\PRIVATE@burstnet[2].txt
c:\windows\system32\kock\PRIVATE@burstnet[3].txt
c:\windows\system32\kock\PRIVATE@burstnet[4].txt
c:\windows\system32\kock\PRIVATE@burstnet[5].txt
c:\windows\system32\kock\PRIVATE@careerbuilder[1].txt
c:\windows\system32\kock\PRIVATE@casalemedia[1].txt
c:\windows\system32\kock\PRIVATE@casalemedia[2].txt
c:\windows\system32\kock\PRIVATE@casalemedia[3].txt
c:\windows\system32\kock\PRIVATE@casalemedia[4].txt
c:\windows\system32\kock\PRIVATE@chat.bankofamerica[1].txt
c:\windows\system32\kock\PRIVATE@chat.bankofamerica[3].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[1].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[10].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[11].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[2].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[3].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[4].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[5].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[6].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[7].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[8].txt
c:\windows\system32\kock\PRIVATE@content.yieldmanager[9].txt
c:\windows\system32\kock\PRIVATE@deals.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@digitalentertainment.122.2o7[1].txt
c:\windows\system32\kock\PRIVATE@doubleclick[1].txt
c:\windows\system32\kock\PRIVATE@doubleclick[2].txt
c:\windows\system32\kock\PRIVATE@doubleclick[3].txt
c:\windows\system32\kock\PRIVATE@doubleclick[4].txt
c:\windows\system32\kock\PRIVATE@doubleclick[5].txt
c:\windows\system32\kock\PRIVATE@doubleclick[6].txt
c:\windows\system32\kock\PRIVATE@doubleclick[7].txt
c:\windows\system32\kock\PRIVATE@doubleclick[8].txt
c:\windows\system32\kock\PRIVATE@doubleclick[9].txt
c:\windows\system32\kock\PRIVATE@ehg-worldwildlifefund.hitbox[1].txt
c:\windows\system32\kock\PRIVATE@equifaxps.122.2o7[1].txt
c:\windows\system32\kock\PRIVATE@eyereturn[1].txt
c:\windows\system32\kock\PRIVATE@fetchback[2].txt
c:\windows\system32\kock\PRIVATE@fleetcor.122.2o7[1].txt
c:\windows\system32\kock\PRIVATE@healthination.122.2o7[1].txt
c:\windows\system32\kock\PRIVATE@hitbox[2].txt
c:\windows\system32\kock\PRIVATE@ie.search.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@insider.msg.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@insider.msg.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@insider.msg.yahoo[3].txt
c:\windows\system32\kock\PRIVATE@insider.msg.yahoo[4].txt
c:\windows\system32\kock\PRIVATE@interclick[1].txt
c:\windows\system32\kock\PRIVATE@interclick[2].txt
c:\windows\system32\kock\PRIVATE@interclick[3].txt
c:\windows\system32\kock\PRIVATE@interclick[4].txt
c:\windows\system32\kock\PRIVATE@interclick[5].txt
c:\windows\system32\kock\PRIVATE@interclick[6].txt
c:\windows\system32\kock\PRIVATE@interclick[7].txt
c:\windows\system32\kock\PRIVATE@interclick[8].txt
c:\windows\system32\kock\PRIVATE@internet-advertising-studio[1].txt
c:\windows\system32\kock\PRIVATE@internet-advertising-studio[2].txt
c:\windows\system32\kock\PRIVATE@kitaramedia.122.2o7[1].txt
c:\windows\system32\kock\PRIVATE@kitaramedia.122.2o7[2].txt
c:\windows\system32\kock\PRIVATE@liveperson[1].txt
c:\windows\system32\kock\PRIVATE@liveperson[2].txt
c:\windows\system32\kock\PRIVATE@liveperson[3].txt
c:\windows\system32\kock\PRIVATE@liveperson[4].txt
c:\windows\system32\kock\PRIVATE@liveperson[6].txt
c:\windows\system32\kock\PRIVATE@liveperson[7].txt
c:\windows\system32\kock\PRIVATE@mail.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@maps.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@marriottinternational.122.2o7[1].txt
c:\windows\system32\kock\PRIVATE@my.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@my.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@news.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@news.yahoo[3].txt
c:\windows\system32\kock\PRIVATE@onetoone.112.2o7[1].txt
c:\windows\system32\kock\PRIVATE@onlineeast1.bankofamerica[1].txt
c:\windows\system32\kock\PRIVATE@penske.112.2o7[1].txt
c:\windows\system32\kock\PRIVATE@quantserve[1].txt
c:\windows\system32\kock\PRIVATE@quantserve[10].txt
c:\windows\system32\kock\PRIVATE@quantserve[2].txt
c:\windows\system32\kock\PRIVATE@quantserve[3].txt
c:\windows\system32\kock\PRIVATE@quantserve[4].txt
c:\windows\system32\kock\PRIVATE@quantserve[5].txt
c:\windows\system32\kock\PRIVATE@quantserve[6].txt
c:\windows\system32\kock\PRIVATE@quantserve[7].txt
c:\windows\system32\kock\PRIVATE@quantserve[8].txt
c:\windows\system32\kock\PRIVATE@quantserve[9].txt
c:\windows\system32\kock\PRIVATE@revsci[1].txt
c:\windows\system32\kock\PRIVATE@revsci[2].txt
c:\windows\system32\kock\PRIVATE@revsci[3].txt
c:\windows\system32\kock\PRIVATE@revsci[4].txt
c:\windows\system32\kock\PRIVATE@revsci[5].txt
c:\windows\system32\kock\PRIVATE@revsci[6].txt
c:\windows\system32\kock\PRIVATE@revsci[7].txt
c:\windows\system32\kock\PRIVATE@revsci[8].txt
c:\windows\system32\kock\PRIVATE@richmedia.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@richmedia.yahoo[3].txt
c:\windows\system32\kock\PRIVATE@richmedia.yahoo[4].txt
c:\windows\system32\kock\PRIVATE@ru4[1].txt
c:\windows\system32\kock\PRIVATE@ru4[2].txt
c:\windows\system32\kock\PRIVATE@ru4[3].txt
c:\windows\system32\kock\PRIVATE@ru4[4].txt
c:\windows\system32\kock\PRIVATE@ru4[5].txt
c:\windows\system32\kock\PRIVATE@ru4[6].txt
c:\windows\system32\kock\PRIVATE@ru4[7].txt
c:\windows\system32\kock\PRIVATE@sales.liveperson[1].txt
c:\windows\system32\kock\PRIVATE@sales.liveperson[2].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[1].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[10].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[2].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[3].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[4].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[5].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[6].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[7].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[8].txt
c:\windows\system32\kock\PRIVATE@scorecardresearch[9].txt
c:\windows\system32\kock\PRIVATE@search.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@searchportal.information[1].txt
c:\windows\system32\kock\PRIVATE@searchportal.information[2].txt
c:\windows\system32\kock\PRIVATE@searchportal.information[3].txt
c:\windows\system32\kock\PRIVATE@server.iad.liveperson[2].txt
c:\windows\system32\kock\PRIVATE@server.iad.liveperson[3].txt
c:\windows\system32\kock\PRIVATE@server.iad.liveperson[4].txt
c:\windows\system32\kock\PRIVATE@sharethis[2].txt
c:\windows\system32\kock\PRIVATE@sharethis[3].txt
c:\windows\system32\kock\PRIVATE@shopping.112.2o7[1].txt
c:\windows\system32\kock\PRIVATE@sitekey.bankofamerica[2].txt
c:\windows\system32\kock\PRIVATE@specificclick[1].txt
c:\windows\system32\kock\PRIVATE@specificclick[3].txt
c:\windows\system32\kock\PRIVATE@specificclick[4].txt
c:\windows\system32\kock\PRIVATE@specificclick[5].txt
c:\windows\system32\kock\PRIVATE@specificclick[6].txt
c:\windows\system32\kock\PRIVATE@specificclick[7].txt
c:\windows\system32\kock\PRIVATE@specificclick[8].txt
c:\windows\system32\kock\PRIVATE@sports.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@store.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@tc.bankofamerica[2].txt
c:\windows\system32\kock\PRIVATE@tribalfusion[1].txt
c:\windows\system32\kock\PRIVATE@tribalfusion[2].txt
c:\windows\system32\kock\PRIVATE@tribalfusion[3].txt
c:\windows\system32\kock\PRIVATE@tribalfusion[4].txt
c:\windows\system32\kock\PRIVATE@tribalfusion[5].txt
c:\windows\system32\kock\PRIVATE@tribalfusion[6].txt
c:\windows\system32\kock\PRIVATE@turn[1].txt
c:\windows\system32\kock\PRIVATE@turn[2].txt
c:\windows\system32\kock\PRIVATE@turn[3].txt
c:\windows\system32\kock\PRIVATE@turn[4].txt
c:\windows\system32\kock\PRIVATE@turn[5].txt
c:\windows\system32\kock\PRIVATE@turn[6].txt
c:\windows\system32\kock\PRIVATE@turn[7].txt
c:\windows\system32\kock\PRIVATE@turn[8].txt
c:\windows\system32\kock\PRIVATE@undertone[1].txt
c:\windows\system32\kock\PRIVATE@undertone[2].txt
c:\windows\system32\kock\PRIVATE@undertone[3].txt
c:\windows\system32\kock\PRIVATE@undertone[4].txt
c:\windows\system32\kock\PRIVATE@wa.marketingsolutions.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@wa.marketingsolutions.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@washingtonpost[1].txt
c:\windows\system32\kock\PRIVATE@wwf.122.2o7[1].txt
c:\windows\system32\kock\PRIVATE@www.burstnet[1].txt
c:\windows\system32\kock\PRIVATE@www.burstnet[2].txt
c:\windows\system32\kock\PRIVATE@www.burstnet[3].txt
c:\windows\system32\kock\PRIVATE@www.burstnet[4].txt
c:\windows\system32\kock\PRIVATE@www.burstnet[5].txt
c:\windows\system32\kock\PRIVATE@www.mediakey[1].txt
c:\windows\system32\kock\PRIVATE@www.yahoo[1].txt
c:\windows\system32\kock\PRIVATE@www.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@www.yahoo[3].txt
c:\windows\system32\kock\PRIVATE@www.yahoo[4].txt
c:\windows\system32\kock\PRIVATE@www.yahoo[5].txt
c:\windows\system32\kock\PRIVATE@yahoo[1].txt
c:\windows\system32\kock\PRIVATE@yahoo[10].txt
c:\windows\system32\kock\PRIVATE@yahoo[11].txt
c:\windows\system32\kock\PRIVATE@yahoo[2].txt
c:\windows\system32\kock\PRIVATE@yahoo[3].txt
c:\windows\system32\kock\PRIVATE@yahoo[4].txt
c:\windows\system32\kock\PRIVATE@yahoo[5].txt
c:\windows\system32\kock\PRIVATE@yahoo[6].txt
c:\windows\system32\kock\PRIVATE@yahoo[7].txt
c:\windows\system32\kock\PRIVATE@yahoo[8].txt
c:\windows\system32\kock\PRIVATE@yahoo[9].txt
c:\windows\system32\kock\PRIVATE@yieldmanager[1].txt
c:\windows\system32\kock\PRIVATE@yieldmanager[2].txt
c:\windows\system32\kock\PRIVATE@yieldmanager[3].txt
c:\windows\system32\kock\PRIVATE@yieldmanager[4].txt
c:\windows\system32\kock\PRIVATE@yieldmanager[5].txt
c:\windows\system32\kock\PRIVATE@zedo[1].txt
c:\windows\system32\kock\PRIVATE@zedo[2].txt
c:\windows\system32\kock\PRIVATE@zedo[3].txt
c:\windows\system32\kock\PRIVATE@zedo[4].txt
c:\windows\system32\kock\PRIVATE@zedo[5].txt
c:\windows\system32\kock\PRIVATE@zedo[6].txt
c:\windows\system32\kock\PRIVATE@zedo[7].txt
c:\windows\system32\kock\PRIVATE@zedo[8].txt
c:\windows\system32\kock\PRIVATE@zedo[9].txt
c:\windows\system32\kock\PRIVATE@interclick[1].txt
c:\windows\system32\kock\PRIVATE@quantserve[2].txt
c:\windows\system32\kock\PRIVATE@www.yahoo[2].txt
c:\windows\system32\kock\PRIVATE@yahoo[1].txt
c:\windows\system32\kock\system@yahoo[1].txt
c:\windows\system32\UAs
c:\windows\system32\UAs\firefox.exe_UAs001.dat
c:\windows\system32\UAs\IEXPLORE.EXE_UAs001.dat
c:\windows\system32\UAs\IEXPLORE.EXE_UAs002.dat
.
----- BITS: Possible infected sites -----
.
hxxp://download.yimg.com
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_MSUPDATE
-------\Legacy_UACD.SYS
.
.
((((((((((((((((((((((((( Files Created from 2011-04-17 to 2011-05-17 )))))))))))))))))))))))))))))))
.
.
2011-05-17 01:25 . 2011-05-17 01:25 -------- d-----w- C:\_OTL
2011-05-17 01:16 . 2011-05-17 01:16 78138808 ----a-w- C:\registrybackup.reg
2011-05-11 00:54 . 2011-05-11 00:55 204800 ----a-w- c:\program files\Mozilla Firefox\null0.6487520676433288.exe
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-04-04 19:32 . 2011-04-04 19:34 4313359 ----a-w- C:\ComboFix.exe
2006-05-06 16:42 . 2006-11-24 01:45 7260160 ----a-w- c:\program files\mozilla firefox\plugins\libvlc.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WrtMon.exe"="c:\windows\system32\spool\drivers\w32x86\3\WrtMon.exe" [2006-09-20 20480]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Bandoo\BndHook.dll
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ autocheck autochk *\0lsdelete\0c:\progra~1\AVG\AVG10\avgchsvx.exe /sync\0c:\progra~1\AVG\AVG10\avgrsx.exe /sync /restart
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^America Online 9.0 Tray Icon.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\America Online 9.0 Tray Icon.lnk
backup=c:\windows\pss\America Online 9.0 Tray Icon.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Digital Line Detect.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Digital Line Detect.lnk
backup=c:\windows\pss\Digital Line Detect.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^GetRight - Tray Icon.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\GetRight - Tray Icon.lnk
backup=c:\windows\pss\GetRight - Tray Icon.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^McAfee Security Scan Plus.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\McAfee Security Scan Plus.lnk
backup=c:\windows\pss\McAfee Security Scan Plus.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^NkbMonitor.exe.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\NkbMonitor.exe.lnk
backup=c:\windows\pss\NkbMonitor.exe.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^VersionTrackerPro.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\VersionTrackerPro.lnk
backup=c:\windows\pss\VersionTrackerPro.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Ad-Watch]
2010-03-01 20:43 524632 ----a-w- c:\program files\Lavasoft\Ad-Aware\AAWTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-10-15 06:04 39792 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CanonMyPrinter]
2007-04-04 01:50 1603152 ----a-w- c:\program files\Canon\MyPrinter\BJMYPRT.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CanonSolutionMenu]
2007-05-15 01:01 644696 ----a-w- c:\program files\Canon\SolutionMenu\CNSLMAIN.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cdloader]
2010-08-15 13:39 50592 ----a-w- c:\documents and settings\PRIVATE\Application Data\mjusbsp\cdloader2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 00:12 15360 ----a-w- c:\windows\system32\ctfmon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HostManager]
2006-09-26 00:52 50736 ----a-w- c:\program files\Common Files\AOL\1156709216\ee\aolsoftware.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxhkcmd]
2005-09-20 13:32 77824 ----a-w- c:\windows\system32\hkcmd.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxpers]
2005-09-20 13:36 114688 ----a-w- c:\windows\system32\igfxpers.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxtray]
2005-09-20 13:35 94208 ----a-w- c:\windows\system32\igfxtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ISUSPM Startup]
2005-06-10 15:44 249856 ----a-w- c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ISUSScheduler]
2005-06-10 15:44 81920 ----a-w- c:\program files\Common Files\InstallShield\UpdateService\issch.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2008-11-20 18:20 290088 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LifeCam]
2006-10-13 21:01 277296 ----a-w- c:\program files\Microsoft LifeCam\LifeExp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSKDetectorExe]
2005-08-12 20:16 1121792 ----a-w- c:\program files\McAfee\SpamKiller\MSKDetct.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ----a-w- c:\program files\Messenger\msmsgs.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OpwareSE4]
2007-02-04 17:02 79400 ----a-w- c:\program files\ScanSoft\OmniPageSE4\OpWareSE4.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2008-11-04 15:30 413696 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealTray]
2008-07-08 01:28 214560 ----a-w- c:\program files\Real\RealPlayer\realplay.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RegClean Expert Scheduler]
2008-10-12 16:53 602872 ----a-w- c:\program files\Registry Clean Expert\RCHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
2004-10-15 00:42 1404928 ----a-w- c:\program files\Analog Devices\Core\smax4pnp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SSBkgdUpdate]
2006-10-25 14:03 210472 ----a-w- c:\program files\Common Files\ScanSoft Shared\SSBkgdUpdate\SSBkgdUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2009-07-25 09:23 149280 ----a-w- c:\program files\Java\jre6\bin\jusched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
2008-07-08 01:28 185896 ----a-w- c:\program files\Common Files\Real\Update_OB\realsched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VX6000]
2006-10-13 21:04 994096 ----a-w- c:\windows\vVX6000.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"MskService"=2 (0x2)
"McShield"=2 (0x2)
"mcupdmgr.exe"=3 (0x3)
"McTskshd.exe"=2 (0x2)
"McDetect.exe"=2 (0x2)
"Symantec Core LC"=3 (0x3)
"Norton Ghost"=3 (0x3)
"ccSetMgr"=2 (0x2)
"ccPwdSvc"=3 (0x3)
"ccEvtMgr"=2 (0x2)
"NetSvc"=3 (0x3)
"AVG Anti-Spyware Guard"=2 (0x2)
"WMPNetworkSvc"=3 (0x3)
"DSBrokerService"=3 (0x3)
"AOL ACS"=3 (0x3)
"WANMiniportService"=2 (0x2)
"usnjsvc"=3 (0x3)
"MSCamSvc"=2 (0x2)
"IJPLMSVC"=2 (0x2)
"aawservice"=2 (0x2)
"msupdate"=2 (0x2)
"JavaQuickStarterService"=2 (0x2)
"getPlus® Helper"=3 (0x3)
"Bonjour Service"=2 (0x2)
"Bandoo Coordinator"=2 (0x2)
"YahooAUService"=2 (0x2)
"SeaPort"=2 (0x2)
"McComponentHostService"=3 (0x3)
"Lavasoft Ad-Aware Service"=2 (0x2)
"iPod Service"=3 (0x3)
"aswUpdSv"=2 (0x2)
"Apple Mobile Device"=2 (0x2)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\America Online 9.0\\waol.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Documents and Settings\\PRIVATE\\Application Data\\mjusbsp\\magicJack.exe"=
.
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [3/28/2009 3:43 PM 64160]
S3 VX6000;Microsoft LifeCam VX-6000;c:\windows\system32\drivers\VX6000Xp.sys [9/16/2007 9:16 PM 2383152]
S4 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [3/9/2009 3:06 PM 1029456]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [11/23/2006 9:20 PM 639224]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WUAUSERV
.
Contents of the 'Scheduled Tasks' folder
.
2011-05-16 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-03-09 20:43]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = <local>
IE: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
IE: Download with GetRight - c:\program files\GetRight\GRdownload.htm
IE: Open with GetRight Browser - c:\program files\GetRight\GRbrowse.htm
IE: {{FA9B9510-9FCB-4ca0-818C-5D0987B47C4D} - c:\program files\PokerStars.NET\PokerStarsUpdate.exe
FF - ProfilePath - c:\documents and settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.bing.com/search?FORM=IEFM1&q=
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - %profile%\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Ext: FavLoc: {472f4ef0-a825-11da-a746-0800200c9a66} - %profile%\extensions\{472f4ef0-a825-11da-a746-0800200c9a66}
FF - Ext: Adobe DLM (powered by getPlus®): {CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7} - %profile%\extensions\{CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7}
FF - Ext: Bandoo for Firefox: firefox@bandoo.com - %profile%\extensions\firefox@bandoo.com
FF - Ext: New Tab Homepage: {66E978CD-981F-47DF-AC42-E3CF417C1467} - %profile%\extensions\{66E978CD-981F-47DF-AC42-E3CF417C1467}
FF - Ext: Yahoo! Toolbar: {635abd67-4fe9-1b23-4f01-e679fa7484c1} - %profile%\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-AVG Anti-Spyware Driver
SafeBoot-AVG Anti-Spyware Guard
MSConfigStartUp-agent - c:\program files\PCenter\agent.exe
MSConfigStartUp-AVG7_CC - c:\progra~1\Grisoft\AVG7\avgcc.exe
MSConfigStartUp-ccApp - c:\program files\Common Files\Symantec Shared\ccApp.exe
MSConfigStartUp-DAEMON Tools - c:\program files\DAEMON Tools\daemon.exe
MSConfigStartUp-DLA - c:\windows\System32\DLA\DLACTRLW.EXE
MSConfigStartUp-DMXLauncher - c:\program files\Dell\Media Experience\DMXLauncher.exe
MSConfigStartUp-efjjdbsi - c:\docume~1\PRIVATE~1\LOCALS~1\Temp\rsjdyhksn\yvviwykhmof.exe
MSConfigStartUp-Google Desktop Search - c:\program files\Google\Google Desktop Search\GoogleDesktop.exe
MSConfigStartUp-Internet Security Essentials - c:\documents and settings\All Users\Application Data\f9a3cf\ISf9a_2300.exe
MSConfigStartUp-LKGGOPABUH - c:\docume~1\PRIVATE~1\LOCALS~1\Temp\ufr.exe
MSConfigStartUp-MCAgentExe - c:\progra~1\mcafee.com\agent\mcagent.exe
MSConfigStartUp-MCUpdateExe - c:\progra~1\mcafee.com\agent\McUpdate.exe
MSConfigStartUp-Messenger (Yahoo!) - c:\progra~1\Yahoo!\MESSEN~1\YahooMessenger.exe
MSConfigStartUp-MimBoot - c:\progra~1\MUSICM~1\MUSICM~3\mimboot.exe
MSConfigStartUp-MPFExe - c:\progra~1\McAfee.com\PERSON~1\MpfTray.exe
MSConfigStartUp-MSKAGENTEXE - c:\progra~1\McAfee\SPAMKI~1\MskAgent.exe
MSConfigStartUp-MsnMsgr - c:\program files\Windows Live\Messenger\msnmsgr.exe
MSConfigStartUp-Norton Ghost 10 - c:\program files\Norton Ghost\Agent\GhostTray.exe
MSConfigStartUp-OASClnt - c:\program files\McAfee.com\VSO\oasclnt.exe
MSConfigStartUp-pjmmafmg - c:\docume~1\PRIVATE~1\LOCALS~1\Temp\rgelgcbgh\fhwaanchmof.exe
MSConfigStartUp-sysav - c:\documents and settings\PRIVATE\Application Data\pcdefender.exe
MSConfigStartUp-VirusScan Online - c:\program files\McAfee.com\VSO\mcvsshld.exe
MSConfigStartUp-VSOCheckTask - c:\progra~1\McAfee.com\VSO\mcmnhdlr.exe
MSConfigStartUp-Win32load - c:\documents and settings\PRIVATE\Application Data\nscagent.exe
MSConfigStartUp-Yahoo! Pager - c:\progra~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE
AddRemove-HijackThis - c:\hijackthis\HijackThis.exe
AddRemove-WebCyberCoach_wtrb - c:\program files\WebCyberCoach\b_Dell\WCC_Wipe.exe WebCyberCoach ext\wtrb
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-05-16 22:31
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(1620)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\wscntfy.exe
c:\windows\system32\spool\drivers\w32x86\3\WrtProc.exe
.
**************************************************************************
.
Completion time: 2011-05-16 22:39:12 - machine was rebooted
ComboFix-quarantined-files.txt 2011-05-17 02:38
.
Pre-Run: 33,110,327,296 bytes free
Post-Run: 32,998,887,424 bytes free
.
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
.
- - End Of File - - 640DC6D71B4B907C4CCF44BCF7DB6C74

#10 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 17 May 2011 - 04:58 PM

Hi!

Please do the following:

Please download ZipIt from here:
Download Link
  • Double-click ZipIt! to run it. (Windows Vista & 7 users need to right click and Run as Administrator)
  • Then copy the content of the following codebox into the textfield:

    ::info::http://www.bleepingcomputer.com/forums/topic394692.html/page__view__findpost__p__2252312
    ::bleeping::102
    c:\program files\Mozilla Firefox\null0.6487520676433288.exe
    
  • Then, just click the Zip button.
  • When finished, and if successful, it should automatically submit a file for me, so that it may be analyzed further. You should also see that a new .zip file has been created on your Desktop. You will be notified of what the file name is when the process has been completed.


NEXT:



Malwarebytes' Anti-Malware

I see that you have Malwarebytes' Anti-Malware installed on your computer could you please do a scan using these settings:

  • Open Malwarebytes' Anti-Malware
  • Select the Update tab
  • Click Check for Updates
  • After the update have been completed, Select the Scanner tab.
  • Select Perform quick scan, then click on Scan
  • Leave the default options as it is and click on Start Scan
  • When done, you will be prompted. Click OK, then click on Show Results
  • Checked (ticked) all items and click on Remove Selected
  • After it has removed the items, Notepad will open. Please post this log in your next reply. You can also find the log in the Logs tab. The bottom most log is the latest
Extra Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT:



ESET Online Scanner
I'd like us to scan your machine with ESET Online Scan

Note: It is recommended to disable on-board anti-virus program and anti-spyware programs while performing scans so there are no conflicts and it will speed up scan time.
Please don't go surfing while your resident protection is disabled!
Once the scan is finished remember to re-enable your anti-virus along with your anti-spyware programs.



  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Make sure that the option "Remove found threats" is Unchecked
  • When the Computer scan settings display shows, click the Advanced option, the place a check next to the following (if it is not already checked):
    • Enable Anti-Stealth technology
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin
    scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as
    ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NEXT:



Security Check
Download Security Check by screen317 from here or here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#11 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 20 May 2011 - 10:00 AM

Still with me?

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#12 Teahupo'o

Teahupo'o
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:40 AM

Posted 20 May 2011 - 06:01 PM

Yeah still here ST.

Just waiting on the logs from my friend. Walked him through it last night, but eset apparently took quite a while, so he's supposed to e-mail me the logs tonight or tomorrow morning. Thanks for your patience and I'll post them asap.

#13 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 20 May 2011 - 06:09 PM

Okay.

Thanks for letting me know.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#14 Teahupo'o

Teahupo'o
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:40 AM

Posted 21 May 2011 - 07:58 PM

Here they are:

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6621

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

5/19/2011 9:58:54 PM
mbam-log-2011-05-19 (21-58-54).txt

Scan type: Quick scan
Objects scanned: 186191
Time elapsed: 9 minute(s), 15 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\LKGGOPABUH (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\tst (Trojan.Banker) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\acroiehelpe.txt (Malware.Trace) -> Quarantined and deleted successfully.

----------

C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\firefox@bandoo.com\components\FFPlugin.dll a variant of Win32/Adware.Bandoo.AA application
C:\Documents and Settings\PRIVATE\My Documents\My Music\BandooV5.exe a variant of Win32/Adware.Bandoo.AA application
C:\firefox downloads\BandooV3(2).exe probably a variant of Win32/Adware.Bandoo.AA application
C:\firefox downloads\Downloads_E(2).zip Win32/TrojanDownloader.Banload.PFH trojan
C:\firefox downloads\Downloads_E.zip Win32/TrojanDownloader.Banload.PFH trojan
C:\Program Files\Bandoo\Bandoo.exe a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\BandooGo.exe a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\BandooUI.exe a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\BndCore.exe a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\ExtensionsManager.exe a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\InstallerHelper.dll a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\Plugins\AIM\AIMPlugin.dll a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\Plugins\IE\ieplugin.dll a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\Plugins\MSN\msnplugin.dll a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Bandoo\Plugins\Yahoo\YahooPlugin.dll a variant of Win32/Adware.Bandoo.AA application
C:\Program Files\Common Files\AOL\Backup\ACS\Current\Suite\comps\acslang.exe probably a variant of Win32/StartPage.HSZAKFT trojan
C:\Program Files\Common Files\AOL\Backup\ACS\Current\US\acslang.exe probably a variant of Win32/StartPage.HSZAKFT trojan
C:\Program Files\Common Files\AOL\Backup\ACS\Current\US\acssetup.exe probably a variant of Win32/StartPage.HSZAKFT trojan
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\crude.exe probably a variant of Win32/Agent.MTLAOGF trojan
C:\Program Files\mIRC\download\AVG.Anti.Spyware.v7.5.0.50.Cracked.PROPER-CRD\cgg0410b\cgg04100\TEAM CRUDE\crude.exe probably a variant of Win32/Agent.MTLAOGF trojan
C:\Qoobox\Quarantine\C\Documents and Settings\PRIVATE\Application Data\Adobe\plugs\mmc514371937.txt.vir a variant of Win32/Kryptik.NQE trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1267\A0080923.dll a variant of Win32/Spy.Banker.VPA trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1267\A0084978.dll probably a variant of Win32/Spy.Banker.VPA trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1280\A0088612.exe a variant of Win32/Kryptik.MQJ trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1287\A0088906.exe a variant of Win32/Injector.GBY trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1294\A0089121.exe Win32/Olmarik.AMN trojan
C:\WINDOWS\system32\5012\components\AcroFF012.dll a variant of Win32/Spy.Banker.VPA trojan
C:\_OTL\MovedFiles\05162011_212515\C_WINDOWS\icugewusuya.dll a variant of Win32/Kryptik.NOS trojan
C:\_OTL\MovedFiles\05162011_212515\C_WINDOWS\odbdap.dll a variant of Win32/Kryptik.NQE trojan
Operating memory a variant of Win32/Adware.Bandoo.AA application

----------

Results of screen317's Security Check version 0.99.11
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
ESET Online Scanner v3
```````````````````````````````
Anti-malware/Other Utilities Check:

Out of date Spybot installed!
Ad-Aware
Malwarebytes' Anti-Malware
CCleaner
Java™ 6 Update 15
Java 2 Runtime Environment, SE v1.4.2_03
Out of date Java installed!
Adobe Flash Player 10.2.153.1
Adobe Reader 8.1.3
Out of date Adobe Reader installed!
Mozilla Firefox (3.6.17) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Ad-Aware AAWService.exe is disabled!
Ad-Aware AAWTray.exe is disabled!
``````````End of Log````````````

#15 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:04:40 AM

Posted 22 May 2011 - 08:58 AM

Hi!

Looks like we have some work to do!

Some of the threats found by ESET are currently in System Restore/Quarantine and will be removed when we clean-up our tools.

Please go to Add/Remove Programs and Remove Bandoo from your computer.


Also your version of Spybot is outdated. I suggest you either update it or uninstall it if you don't use it.



Update Adobe Reader
Earlier versions of Adobe Reader have known security flaws so it is recommended that you update your copy
  • Go to Start > Control Panel > Add/Remove Programs
  • Remove ALL instances of Adobe Reader
  • Re-boot your computer as required.
  • Once ALL versions of Adobe Reader have been uninstalled, visit: <<here>> and download the latest version of Adobe Reader
Alternative Option: after uninstalling Adobe Reader, you could try installing Foxit Reader from >here< Foxit Reader has fewer add-ons therefore loads more quickly.



NEXT:



Java Outdated
Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform.
    • 32-bit Select: Windows x86 Offline.
    • 64-bit Select: Windows x64.
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u25-windows-i586.exe to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
-- Starting with Java 6u10, the uninstaller incorporated in each new release uses Enhanced Auto update to automatically remove the previous version when updating to a later update release. It will not remove older versions, so they will need to be removed manually.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.


NEXT



No Anti-Virus Present

Looking over your log it seems you don't have any evidence of an anti-virus software.

Anti-virus software are programs that detect cleans and erase harmful virus files on a computer
Web server or network.
Unchecked virus files can unintentionally be forwarded to others including trading partners and thereby spreading infection. Because new viruses regularly emerge anti-virus software should be updated frequently. Anti-virus software can scan the computer memory and disk drives for malicious code. They can alert the user if a virus is present and will clean delete (or quarantine) infected files or directories. Please download a free anti-virus software from one these excellent vendors
  • Avira AntiVir Personal - Free anti-virus software for Windows. Detects and removes more than 50000 viruses. Free support.
  • avast! 6 Home Edition - Anti-virus program for Windows. The home edition is freeware for noncommercial users.

It is strongly recommended that you run only one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts and false virus alerts. If you choose to install more than one antivirus program on your computer then only one of them should be active in memory at a time.



NEXT:



OTL Fix

We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.
    :Services
    :OTL
    
    :Reg
    
    :Files
    C:\Documents and Settings\PRIVATE\Application Data\Mozilla\Firefox\Profiles\gezgnind.default\extensions\firefox@bandoo.com\components\FFPlugin.dll
    C:\Documents and Settings\PRIVATE\My Documents\My Music\BandooV5.exe
    C:\firefox downloads\BandooV3(2).exe
    C:\firefox downloads\Downloads_E(2).zip
    C:\firefox downloads\Downloads_E.zip
    C:\Program Files\Bandoo\Bandoo.exe
    C:\Program Files\Bandoo\BandooGo.exe
    C:\Program Files\Bandoo\BandooUI.exe
    C:\Program Files\Bandoo\BndCore.exe
    C:\Program Files\Bandoo\ExtensionsManager.exe
    C:\Program Files\Bandoo\InstallerHelper.dll
    C:\Program Files\Bandoo\Plugins\AIM\AIMPlugin.dll
    C:\Program Files\Bandoo\Plugins\IE\ieplugin.dll
    C:\Program Files\Bandoo\Plugins\MSN\msnplugin.dll
    C:\Program Files\Bandoo\Plugins\Yahoo\YahooPlugin.dll
    C:\Program Files\Common Files\AOL\Backup\ACS\Current\Suite\comps\acslang.exe
    C:\Program Files\Common Files\AOL\Backup\ACS\Current\US\acslang.exe
    C:\Program Files\Common Files\AOL\Backup\ACS\Current\US\acssetup.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\crude.exe
    C:\Program Files\mIRC\download\AVG.Anti.Spyware.v7.5.0.50.Cracked.PROPER-CRD\
    C:\WINDOWS\system32\5012\components\AcroFF012.dll
    ipconfig /flushdns /c
    :Commands
    [purity]
    [resethosts]
    [CreateRestorePoint]
    [emptytemp]
    [EMPTYFLASH]
    
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click the OK button.
  • A report will open. Copy and Paste that report in your next reply.
  • If the machine reboots, the log will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.


NEXT:



OTL Custom Scan

We need to run an OTL Custom Scan
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.


    netsvcs
    drivers32
    hklm\software\clients\startmenuinternet|command /rs
    %USERPROFILE%\AppData\Local\Google\Chrome\User Data\*.* /s
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs

  • Push the Posted Image button.
  • A report will open. Copy and Paste that report in your next reply.


NEXT:



What outstanding issues (if any) are you still experiencing with your computer?

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users