Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

XP Antivirus 2012, System Fix, possibly others


  • This topic is locked This topic is locked
38 replies to this topic

#1 harbz

harbz

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 30 November 2011 - 03:04 AM

Hi, I think I'm in pretty big trouble. I am not sure how this happened but I got home a few nites ago and there was a large cascade of Internet Explorer advertisements on the screen on my wife's XP Home account. I simply deleted them and thought nothing of it until it happened again. I looked around c: and found something called qkmz.exe and just threw it into the recycle bin. I ran MBAM and cleaned everything that it found. Today when I got home from work, XP AV 2012 kept booting up and shut down MBAM, basically would shut down McAfee (which is my default antivirus program). I was in when I tried to run it, informed that the firewall had been shut off and it seems as though attempts to restart it resulted in McAfee getting shut down. I got multiple popups telling me that the Ping function and one of the McAfee programs needed to close and have an error report sent, which I agreed to. System Fix also kept popping up with the cascade of popups threatening dire HD damage. I saw your website and, in safe mode with networking, tried to run rkill which seemed to terminate akb.exe but akb keeps popping up whenever I try to run anything important (switch on Windows XP firewall, start MBAM, etc.). Basically I have restarted in Safe Mode with Networking and kept the Task Manager running in the background, periodically checking manually to see if akb.exe is running and terminating it every chance I get. I googled some of the other operating applications in the task manager and am having a hard time understanding which of them are viruses and which are regular windows files. Task manager won't let me terminate mfevtps.exe which I think is a virus too. I tried to run the TDSS killer and that didn't seem to do anything. I have followed the preparation instructions as best I could and here are the logs. The GMER rootkit scan ran for the better part of 3 hours and I decided to save/attach what I had and let it continue to run for the rest of the night if necessary, and to upload this post just in case something bad happened to the computer overnite.

.
DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 8.0.6001.18702
Run by Administrator at 18:51:34 on 2011-11-29
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3327.2883 [GMT -7:00]
.
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Firewall *Enabled*
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe
C:\Program Files\Common Files\McAfee\SystemCore\mfevtps.exe
C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
C:\WINDOWS\system32\ctfmon.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\System32\ping.exe
C:\Documents and Settings\Grant Harbison\Local Settings\Application Data\akb.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
.
============== Pseudo HJT Report ===============
.
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\common files\mcafee\systemcore\ScriptSn.20111111133533.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.7.7018.1622\swg.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Office Document Cache Handler: {b4f3a835-0e21-4959-ba22-42b3008e02ff} - e:\progra~1\micros~1\office14\URLREDIR.DLL
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [Six Engine] "c:\program files\asus\epu-6 engine\SixEngine.exe" -r
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [McPvTray] c:\program files\mcafee\anti-theft\McPvTray.exe
mRun: [mcui_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [LogitechQuickCamRibbon] "c:\program files\logitech\logitech webcam software\LWS.exe" /hide
mRun: [CanonSolutionMenu] c:\program files\canon\solutionmenu\CNSLMAIN.exe /logon
mRun: [CanonMyPrinter] c:\program files\canon\myprinter\BJMyPrt.exe /logon
mRun: [IJNetworkScanUtility] c:\program files\canon\canon ij network scan utility\CNMNSUT.EXE
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [YKNNWfXiCRNj.exe] c:\documents and settings\all users\application data\YKNNWfXiCRNj.exe
mPolicies-system: DisableTaskMgr = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - e:\program files\microsoft office\office14\ONBttnIE.dll
IE: {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - {FFFDC614-B694-4AE6-AB38-5D6374584B52} - e:\program files\microsoft office\office14\ONBttnIELinkedNotes.dll
LSP: mswsock.dll
DPF: {000F1EA4-5E08-4564-A29B-29076F63A37A} - hxxp://launch.soe.com/plugin/web/SOEWebInstaller.cab
TCP: DhcpNameServer = 10.0.0.1
TCP: Interfaces\{60F1A824-DAA1-47E8-A148-2713D5D13099} : DhcpNameServer = 10.0.0.1
Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\progra~1\mcafee\msc\McSnIePl.dll
Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - c:\program files\common files\microsoft shared\office14\MSOXMLMF.DLL
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
.
============= SERVICES / DRIVERS ===============
.
R0 McPvDrv;McPvDrv Driver;c:\windows\system32\drivers\McPvDrv.sys [2009-11-17 63080]
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2010-4-24 464176]
R0 mv61xx;mv61xx;c:\windows\system32\drivers\mv61xx.sys [2008-6-23 150568]
R1 mfetdi2k;McAfee Inc. mfetdi2k;c:\windows\system32\drivers\mfetdi2k.sys [2010-4-24 89792]
R2 McMPFSvc;McAfee Personal Firewall Service;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2010-4-24 214904]
R2 mfefire;McAfee Firewall Core Service;c:\program files\common files\mcafee\systemcore\mfefire.exe [2010-4-24 160608]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\program files\common files\mcafee\systemcore\mfevtps.exe [2010-4-24 150856]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [2010-4-24 338176]
R3 mfendiskmp;mfendiskmp;c:\windows\system32\drivers\mfendisk.sys [2010-4-24 83856]
S1 MOBKFilter;MOBKFilter;c:\windows\system32\drivers\MOBK.sys [2010-6-11 54776]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-2-10 135664]
S2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2008-12-5 94880]
S2 McNaiAnn;McAfee VirusScan Announcer;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2010-4-24 214904]
S2 McProxy;McAfee Proxy Service;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2010-4-24 214904]
S2 McShield;McAfee McShield;c:\program files\common files\mcafee\systemcore\mcshield.exe [2010-4-24 166288]
S2 MOBKbackup;McAfee Online Backup;c:\program files\mcafee online backup\MOBKbackup.exe [2010-2-5 229688]
S3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [2010-4-24 57600]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-2-10 135664]
S3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2010-4-24 180816]
S3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2010-4-24 59456]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;c:\windows\system32\drivers\mfendisk.sys [2010-4-24 83856]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2010-4-24 87656]
S3 NPF;WinPcap Packet Driver (NPF);c:\windows\system32\drivers\npf.sys [2011-11-25 50704]
S3 osppsvc;Office Software Protection Platform;c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\OSPPSVC.EXE [2010-1-9 4640000]
S3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\sisoftware\sisoftware sandra lite 2009.sp2\RpcAgentSrv.exe [2008-12-14 98488]
.
=============== Created Last 30 ================
.
2011-11-30 00:25:12 366592 ----a-w- c:\documents and settings\all users\application data\sxj5Hve9jhpEDa.exe
2011-11-30 00:21:45 514800 ----a-w- c:\windows\system32\PerfStringBackup.TMP
2011-11-29 23:59:25 459776 ---ha-w- c:\documents and settings\all users\application data\YKNNWfXiCRNj.exe
2011-11-29 23:50:23 41272 ---ha-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-11-28 18:11:02 445184 ---ha-w- c:\windows\system32\0.24045645028803986.exe
2011-11-27 19:53:07 -------- d--h--w- c:\windows\PIF
2011-11-25 10:55:47 50704 ---ha-w- c:\windows\system32\drivers\npf.sys
2011-11-25 10:55:47 281104 ---ha-w- c:\windows\system32\wpcap.dll
2011-11-25 10:55:47 100880 ---ha-w- c:\windows\system32\Packet.dll
2011-11-09 06:03:43 159744 ---ha-w- c:\program files\internet explorer\plugins\npqtplugin7.dll
2011-11-09 06:03:43 159744 ---ha-w- c:\program files\internet explorer\plugins\npqtplugin6.dll
2011-11-09 06:03:43 159744 ---ha-w- c:\program files\internet explorer\plugins\npqtplugin5.dll
2011-11-09 06:03:43 159744 ---ha-w- c:\program files\internet explorer\plugins\npqtplugin4.dll
2011-11-09 06:03:43 159744 ---ha-w- c:\program files\internet explorer\plugins\npqtplugin3.dll
2011-11-09 06:03:43 159744 ---ha-w- c:\program files\internet explorer\plugins\npqtplugin2.dll
2011-11-09 06:03:43 159744 ---ha-w- c:\program files\internet explorer\plugins\npqtplugin.dll
.
==================== Find3M ====================
.
2011-11-22 00:07:44 414368 ---ha-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-24 21:29:02 94208 ---ha-w- c:\windows\system32\QuickTimeVR.qtx
2011-10-24 21:29:02 69632 ---ha-w- c:\windows\system32\QuickTime.qts
2011-10-15 20:16:16 9608 ---ha-w- c:\windows\system32\drivers\mfeclnk.sys
2011-10-15 20:16:16 89792 ---ha-w- c:\windows\system32\drivers\mfetdi2k.sys
2011-10-15 20:16:16 87656 ---ha-w- c:\windows\system32\drivers\mferkdet.sys
2011-10-15 20:16:16 83856 ---ha-w- c:\windows\system32\drivers\mfendisk.sys
2011-10-15 20:16:16 59456 ---ha-w- c:\windows\system32\drivers\mfebopk.sys
2011-10-15 20:16:16 57600 ---ha-w- c:\windows\system32\drivers\cfwids.sys
2011-10-15 20:16:16 464176 ---ha-w- c:\windows\system32\drivers\mfehidk.sys
2011-10-15 20:16:16 338176 ---ha-w- c:\windows\system32\drivers\mfefirek.sys
2011-10-15 20:16:16 180816 ---ha-w- c:\windows\system32\drivers\mfeavfk.sys
2011-10-15 20:16:16 121256 ---ha-w- c:\windows\system32\drivers\mfeapfk.sys
2011-10-10 14:22:41 692736 ---h--w- c:\windows\system32\inetcomm.dll
2011-09-28 07:06:50 599040 ---ha-w- c:\windows\system32\crypt32.dll
2011-09-26 17:41:20 611328 ---ha-w- c:\windows\system32\uiautomationcore.dll
2011-09-26 17:41:20 220160 ---ha-w- c:\windows\system32\oleacc.dll
2011-09-26 17:41:14 20480 ---ha-w- c:\windows\system32\oleaccrc.dll
2011-09-06 13:20:51 1858944 ---h--w- c:\windows\system32\win32k.sys
2004-08-04 12:00:00 94784 --sh--w- c:\windows\twain.dll
2008-04-14 00:12:07 50688 --sh--w- c:\windows\twain_32.dll
.
============= FINISH: 18:52:05.23 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:03:45 PM

Posted 30 November 2011 - 03:56 AM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me Agent ST for short), it's a pleasure to meet you. :)

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:


  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • If I instruct you to download a specific tool in which you already have, please delete the copy that you have and re-download the tool. The reason I ask you to do this is because these tools are updated fairly regularly.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.
____________________________________________________


Back-Up Registry
First, we need to backup your registry:
Please go to Start > Run
Paste in the following line:

regedit /e c:\registrybackup.reg

Click OK.
It won't appear to be doing anything, that's normal.
Your mouse pointer may turn to an hour glass for a minute.
Please continue when it no longer has the hour glass.


NEXT:



Running OTM

We need to execute an OTM script
  • Please download OTM by OldTimer and save it to your desktop.
  • Double click the Posted Image icon on your desktop.
  • Paste the following code under the Posted Image area. Do not include the word "Code".
    :Processes
    :Services
    :Reg
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "YKNNWfXiCRNj.exe"=-
    :Files
    c:\documents and settings\all users\application data\YKNNWfXiCRNj.exe
    c:\documents and settings\all users\application data\YKNNWfXiCRNj.exe
    c:\documents and settings\all users\application data\sxj5Hve9jhpEDa.exe
    c:\windows\system32\0.24045645028803986.exe
    echo,Y|cacls "%WinDir%\system32\drivers\etc\hosts" /G everyone:f /c
    ipconfig /flushdns /c
    :Commands
    [purity]
    [EMPTYFLASH]
    [resethosts]
    [createrestorepoint]
    
  • Push the large Posted Image button.
  • OTM may ask to reboot the machine. Please do so if asked.
  • Copy/Paste the contents under the Posted Image line here in your next reply.
  • If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.


NEXT:



OTS Scan
Download OTS to your Desktop
  • Double-click on OTS.exe to start the program. Make sure you close all other programs.
  • Now click the Run Scan button on the toolbar. Make sure not to use the PC while the program is running or it will freeze.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Please copy and paste the OTS report into your next reply.

Edited by SweetTech, 30 November 2011 - 03:56 AM.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#3 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 30 November 2011 - 08:55 AM

Thanks for your help. Will comply. Full GMER scan is now complete and will post the content at the bottom of this post.

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-11-30 06:46:38
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 ST3250410AS rev.3.AAC
Running: gmer.exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kwtdqpow.sys


---- System - GMER 1.0.15 ----

Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenProcess [0xF7868484]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenThread [0xF7868498]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenProcess
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenThread

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154D5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9AD1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD10D C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB44 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25464E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5397 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52C9 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E5334 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E519A C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E51FC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E53FA C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E525E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDBA0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[368] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E56FF C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154D5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB44 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5397 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52C9 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E5334 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E519A C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E51FC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E53FA C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1344] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E525E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat mfehidk.sys (McAfee Link Driver/McAfee, Inc.)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\$NtUninstallKB57153$\1871877561 0 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076 0 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\bckfg.tmp 764 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\cfg.ini 207 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\keywords 161 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\kwrd.dll 223744 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\L 0 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\L\udvyqpuk 57600 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\lsflt7.ver 5176 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\U 0 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\U\00000001.@ 1536 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\U\00000002.@ 224768 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\U\00000004.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\U\80000000.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\U\80000004.@ 12800 bytes
File C:\WINDOWS\$NtUninstallKB57153$\3336903076\U\80000032.@ 98304 bytes

---- EOF - GMER 1.0.15 ----

#4 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 30 November 2011 - 09:04 AM

OTM also created a Notepad log. Here is the copy/pasted text under the "results" section.



========== PROCESSES ==========
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\YKNNWfXiCRNj.exe deleted successfully.
========== FILES ==========
c:\documents and settings\all users\application data\YKNNWfXiCRNj.exe moved successfully.
File/Folder c:\documents and settings\all users\application data\YKNNWfXiCRNj.exe not found.
c:\documents and settings\all users\application data\sxj5Hve9jhpEDa.exe moved successfully.
c:\windows\system32\0.24045645028803986.exe moved successfully.
< echo,Y|cacls "%WinDir%\system32\drivers\etc\hosts" /G everyone:f /c >
Are you sure (Y/N)?
C:\Documents and Settings\Administrator\Desktop\cmd.bat deleted successfully.
C:\Documents and Settings\Administrator\Desktop\cmd.txt deleted successfully.
< ipconfig /flushdns /c >
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
C:\Documents and Settings\Administrator\Desktop\cmd.bat deleted successfully.
C:\Documents and Settings\Administrator\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========

[EMPTYFLASH]

User: Administrator
->Flash cache emptied: 679 bytes

User: All Users

User: Beth Harbison
->Flash cache emptied: 1264192 bytes

User: Default User

User: Grant Harbison
->Flash cache emptied: 36394 bytes

User: Guest
->Flash cache emptied: 28369 bytes

User: LocalService
->Flash cache emptied: 618 bytes

User: NetworkService
->Flash cache emptied: 74387 bytes

User: Trey Harbison
->Flash cache emptied: 322923 bytes

User: Zane Harbison
->Flash cache emptied: 644406 bytes

Total Flash Files Cleaned = 2.00 mb

HOSTS file reset successfully
Error starting restore point: The function was called in safe mode.
Error closing restore point: The sequence number is invalid.

OTM by OldTimer - Version 3.1.19.0 log created on 11302011_070002

#5 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 30 November 2011 - 09:13 AM

Here is the OTS log. akb.exe autostarted when I ran OTM and when I ran OTS also, I would just terminate it using the Task Manager. If I do not terminate it in time, it closes my Internet Explorer window.

OTS logfile created on: 11/30/2011 7:05:58 AM - Run 1
OTS by OldTimer - Version 3.1.46.0     Folder = C:\Documents and Settings\Administrator\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy
 
3.00 Gb Total Physical Memory | 3.00 Gb Available Physical Memory | 83.00% Memory free
5.00 Gb Paging File | 5.00 Gb Available in Paging File | 94.00% Paging File free
Paging file location(s): C:\pagefile.sys 2046 4092 [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 37.57 Gb Total Space | 4.52 Gb Free Space | 12.03% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
Drive E: | 97.65 Gb Total Space | 80.70 Gb Free Space | 82.63% Space Free | Partition Type: NTFS
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded
 
Computer Name: CENTRAL
Current User Name: Administrator
Logged in as Administrator.
 
Current Boot Mode: SafeMode with Networking
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
 
[Processes - Safe List]
ots.exe -> C:\Documents and Settings\Administrator\Desktop\OTS.exe -> [2011/11/30 07:05:06 | 000,646,144 | ---- | M] (OldTimer Tools)
mfevtps.exe -> C:\Program Files\Common Files\McAfee\SystemCore\mfevtps.exe -> [2011/10/18 14:32:30 | 000,150,856 | -H-- | M] (McAfee, Inc.)
mfefire.exe -> C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe -> [2011/10/18 14:28:34 | 000,160,608 | -H-- | M] (McAfee, Inc.)
mcagent.exe -> c:\Program Files\McAfee.com\Agent\mcagent.exe -> [2011/09/16 17:38:10 | 001,318,552 | -H-- | M] (McAfee, Inc.)
mcsvhost.exe -> C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
explorer.exe -> C:\WINDOWS\explorer.exe -> [2008/04/13 17:12:19 | 001,033,728 | -H-- | M] (Microsoft Corporation)
 
[Modules - No Company Name]
[Win32 Services - Safe List]
(AppMgmt) Application Management [On_Demand | Stopped] ->  -> File not found
(mfevtp) McAfee Validation Trust Protection Service [Unknown | Running] -> C:\Program Files\Common Files\McAfee\SystemCore\mfevtps.exe -> [2011/10/18 14:32:30 | 000,150,856 | -H-- | M] (McAfee, Inc.)
(mfefire) McAfee Firewall Core Service [Unknown | Running] -> C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe -> [2011/10/18 14:28:34 | 000,160,608 | -H-- | M] ()
(McShield) McAfee McShield [Unknown | Stopped] -> C:\Program Files\Common Files\McAfee\SystemCore\\mcshield.exe -> [2011/10/18 14:28:18 | 000,166,288 | -H-- | M] ()
(McAfee SiteAdvisor Service) McAfee SiteAdvisor Service [Auto | Stopped] -> C:\Program Files\McAfee\SiteAdvisor\McSACore.exe -> [2011/08/10 10:53:46 | 000,094,880 | -H-- | M] (McAfee, Inc.)
(McODS) McAfee Scanner [On_Demand | Stopped] -> C:\Program Files\McAfee\VirusScan\mcods.exe -> [2011/03/17 15:38:42 | 000,361,712 | -H-- | M] (McAfee, Inc.)
(MSK80Service) McAfee Anti-Spam Service [Auto | Stopped] -> C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
(McProxy) McAfee Proxy Service [Auto | Stopped] -> C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
(McNASvc) McAfee Network Agent [Auto | Stopped] -> C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
(McNaiAnn) McAfee VirusScan Announcer [Auto | Stopped] -> C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
(mcmscsvc) McAfee Services [Auto | Running] -> C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
(McMPFSvc) McAfee Personal Firewall Service [Unknown | Running] -> C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
(MOBKbackup) McAfee Online Backup [Auto | Stopped] -> C:\Program Files\McAfee Online Backup\MOBKbackup.exe -> [2010/02/05 18:14:42 | 000,229,688 | -H-- | M] (McAfee, Inc.)
(LVPrcSrv) Process Monitor [Auto | Stopped] -> C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe -> [2009/10/07 01:47:34 | 000,154,136 | -H-- | M] (Logitech Inc.)
(SandraAgentSrv) SiSoftware Deployment Agent Service [On_Demand | Stopped] -> C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\RpcAgentSrv.exe -> [2008/12/11 12:53:38 | 000,098,488 | -H-- | M] (SiSoftware)
(CCALib8) Canon Camera Access Library 8 [Auto | Stopped] -> C:\Program Files\Canon\CAL\CALMAIN.exe -> [2007/01/31 12:55:42 | 000,096,370 | -H-- | M] (Canon Inc.)
 
[Driver Services - Safe List]
(NPF) WinPcap Packet Driver (NPF) [Kernel | On_Demand | Stopped] -> C:\WINDOWS\system32\drivers\npf.sys -> [2011/11/25 03:55:47 | 000,050,704 | -H-- | M] (CACE Technologies, Inc.)
(mfehidk) McAfee Inc. mfehidk [Kernel | Unknown | Running] -> C:\WINDOWS\system32\drivers\mfehidk.sys -> [2011/10/15 13:16:16 | 000,464,176 | -H-- | M] (McAfee, Inc.)
(mfefirek) McAfee Inc. mfefirek [Kernel | Unknown | Running] -> C:\WINDOWS\system32\drivers\mfefirek.sys -> [2011/10/15 13:16:16 | 000,338,176 | -H-- | M] (McAfee, Inc.)
(mfeavfk) McAfee Inc. mfeavfk [Kernel | Unknown | Stopped] -> C:\WINDOWS\system32\drivers\mfeavfk.sys -> [2011/10/15 13:16:16 | 000,180,816 | -H-- | M] (McAfee, Inc.)
(mfeapfk) McAfee Inc. mfeapfk [Kernel | Unknown | Stopped] -> C:\WINDOWS\system32\drivers\mfeapfk.sys -> [2011/10/15 13:16:16 | 000,121,256 | -H-- | M] (McAfee, Inc.)
(mfetdi2k) McAfee Inc. mfetdi2k [Kernel | Unknown | Running] -> C:\WINDOWS\system32\drivers\mfetdi2k.sys -> [2011/10/15 13:16:16 | 000,089,792 | -H-- | M] (McAfee, Inc.)
(mferkdet) McAfee Inc. mferkdet [Kernel | Unknown | Stopped] -> C:\WINDOWS\system32\drivers\mferkdet.sys -> [2011/10/15 13:16:16 | 000,087,656 | -H-- | M] (McAfee, Inc.)
(mfendiskmp) mfendiskmp [Kernel | On_Demand | Running] -> C:\WINDOWS\system32\drivers\mfendisk.sys -> [2011/10/15 13:16:16 | 000,083,856 | -H-- | M] (McAfee, Inc.)
(mfendisk) McAfee Core NDIS Intermediate Filter [Kernel | On_Demand | Stopped] -> C:\WINDOWS\system32\drivers\mfendisk.sys -> [2011/10/15 13:16:16 | 000,083,856 | -H-- | M] (McAfee, Inc.)
(mfebopk) McAfee Inc. mfebopk [Kernel | Unknown | Stopped] -> C:\WINDOWS\system32\drivers\mfebopk.sys -> [2011/10/15 13:16:16 | 000,059,456 | -H-- | M] (McAfee, Inc.)
(cfwids) McAfee Inc. cfwids [Kernel | Unknown | Stopped] -> C:\WINDOWS\system32\drivers\cfwids.sys -> [2011/10/15 13:16:16 | 000,057,600 | -H-- | M] (McAfee, Inc.)
(MOBKFilter) MOBKFilter [File_System | System | Stopped] -> C:\WINDOWS\system32\drivers\MOBK.sys -> [2010/02/05 18:13:48 | 000,054,776 | -H-- | M] (Mozy, Inc.)
(McPvDrv) McPvDrv Driver [Kernel | Boot | Running] -> C:\WINDOWS\system32\drivers\McPvDrv.sys -> [2009/11/17 09:15:28 | 000,063,080 | -H-- | M] (McAfee)
(LVPr2Mon) Logitech LVPr2Mon Driver [Kernel | On_Demand | Stopped] -> C:\WINDOWS\system32\drivers\LVPr2Mon.sys -> [2009/10/07 01:46:36 | 000,025,752 | -H-- | M] ()
(WinDriver6) WinDriver6 [Kernel | On_Demand | Stopped] -> C:\WINDOWS\system32\drivers\windrvr6.sys -> [2009/06/03 15:13:33 | 000,186,592 | -H-- | M] (Jungo)
(PID_PEPI) Logitech QuickCam IM(PID_PEPI) [Kernel | On_Demand | Stopped] -> C:\WINDOWS\system32\drivers\LV302V32.SYS -> [2009/04/30 22:55:58 | 002,687,512 | -H-- | M] (Logitech Inc.)
(SANDRA) SANDRA [Kernel | On_Demand | Stopped] -> C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\WNt500x86\sandra.sys -> [2008/11/25 20:57:04 | 000,022,432 | -H-- | M] (SiSoftware)
(L1e) Miniport Driver for Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller [Kernel | On_Demand | Running] -> C:\WINDOWS\system32\drivers\l1e51x86.sys -> [2008/06/25 09:47:00 | 000,036,864 | -H-- | M] (Atheros Communications, Inc.)
(mv61xx) mv61xx [Kernel | Boot | Running] -> C:\WINDOWS\system32\DRIVERS\mv61xx.sys -> [2008/06/23 15:21:48 | 000,150,568 | -H-- | M] (Marvell Semiconductor, Inc.)
(IntcAzAudAddService) Service for Realtek HD Audio (WDM) [Kernel | On_Demand | Stopped] -> C:\WINDOWS\system32\drivers\RtkHDAud.sys -> [2008/05/20 02:53:00 | 004,800,000 | -H-- | M] (Realtek Semiconductor Corp.)
(AsIO) AsIO [Kernel | System | Stopped] -> C:\WINDOWS\system32\drivers\AsIO.sys -> [2007/12/17 02:14:06 | 000,012,400 | -H-- | M] ()
(MTsensor) ATK0110 ACPI UTILITY [Kernel | On_Demand | Running] -> C:\WINDOWS\system32\drivers\ASACPI.sys -> [2004/08/13 03:56:20 | 000,005,810 | -H-- | M] ()
 
[Registry - Safe List]
< Internet Explorer Settings [HKEY_LOCAL_MACHINE\] > -> -> 
< Internet Explorer Settings [HKEY_CURRENT_USER\] > -> -> 
HKEY_CURRENT_USER\: Main\\"Start Page Redirect Cache" -> http://www.msn.com/?ocid=iehp -> 
HKEY_CURRENT_USER\: Main\\"Start Page Redirect Cache_TIMESTAMP" -> CE 04 D2 71 1B AF CC 01  [binary data] -> 
HKEY_CURRENT_USER\: "ProxyEnable" -> 0 -> 
< FireFox Extensions [HKLM] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla
HKLM\software\mozilla\Firefox\Extensions ->  -> 
HKLM\software\mozilla\Firefox\Extensions\\{4ED1F68A-5463-4931-9384-8FFF5ED91D92} -> C:\Program Files\McAfee\SiteAdvisor [C:\PROGRAM FILES\MCAFEE\SITEADVISOR] -> [2011/11/10 04:37:41 | 000,000,000 | -H-D | M]
HKLM\software\mozilla\Firefox\Extensions\\{D19CA586-DD6C-4a0a-96F8-14644F340D60} -> C:\Program Files\Common Files\McAfee\SystemCore [C:\PROGRAM FILES\COMMON FILES\MCAFEE\SYSTEMCORE] -> [2011/11/29 17:59:08 | 000,000,000 | -H-D | M]
< FireFox Extensions [User Folders] > -> 
< HOSTS File > ([2011/11/30 07:01:04 | 000,000,098 | ---- | M] - 2 lines) -> C:\WINDOWS\system32\drivers\etc\Hosts -> 
Reset Hosts
127.0.0.1       localhost
::1       localhost
< BHO's [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ -> 
{7DB2D5A0-7241-4E79-B68D-6309F01C5231} [HKLM] -> C:\Program Files\Common Files\McAfee\SystemCore\ScriptSn.20111111133533.dll [scriptproxy] -> [2011/10/18 14:29:40 | 000,079,744 | -H-- | M] (McAfee, Inc.)
{AF69DE43-7D58-4638-B6FA-CE66B5AD205D} [HKLM] -> C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\swg.dll [Google Toolbar Notifier BHO] -> [2011/11/11 22:44:32 | 001,003,576 | -H-- | M] (Google Inc.)
{B164E929-A1B6-4A06-B104-2CD0E90A88FF} [HKLM] -> c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll [McAfee SiteAdvisor BHO] -> [2011/08/11 09:57:04 | 000,258,120 | -H-- | M] (McAfee, Inc.)
{B4F3A835-0E21-4959-BA22-42B3008E02FF} [HKLM] -> E:\Program Files\Microsoft Office\Office14\URLREDIR.DLL [Office Document Cache Handler] -> [2010/12/21 01:05:22 | 000,561,552 | -H-- | M] (Microsoft Corporation)
< Internet Explorer ToolBars [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ToolBar -> 
"{0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064}" [HKLM] -> c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll [McAfee SiteAdvisor Toolbar] -> [2011/08/11 09:57:04 | 000,258,120 | -H-- | M] (McAfee, Inc.)
< Run [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run -> 
"Alcmtr" -> C:\WINDOWS\ALCMTR.EXE [ALCMTR.EXE] -> [2005/05/03 03:43:00 | 000,069,632 | RH-- | M] (Realtek Semiconductor Corp.)
"APSDaemon" -> C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe ["C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"] -> [2011/09/27 06:22:28 | 000,059,240 | -H-- | M] (Apple Inc.)
"CanonMyPrinter" -> C:\Program Files\Canon\MyPrinter\BJMyPrt.exe [C:\Program Files\Canon\MyPrinter\BJMyPrt.exe /logon] -> [2008/03/17 18:06:00 | 001,848,648 | -H-- | M] (CANON INC.)
"CanonSolutionMenu" -> C:\Program Files\Canon\SolutionMenu\CNSLMAIN.exe [C:\Program Files\Canon\SolutionMenu\CNSLMAIN.exe /logon] -> [2008/03/10 18:20:00 | 000,689,488 | -H-- | M] (CANON INC.)
"IJNetworkScanUtility" -> C:\Program Files\Canon\Canon IJ Network Scan Utility\CNMNSUT.EXE [C:\Program Files\Canon\Canon IJ Network Scan Utility\CNMNSUT.EXE] -> [2007/05/21 01:37:36 | 000,124,512 | -H-- | M] (CANON INC.)
"LogitechQuickCamRibbon" -> C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe ["C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe" /hide] -> [2009/10/14 13:36:56 | 002,793,304 | -H-- | M] ()
"McPvTray" -> C:\Program Files\McAfee\Anti-Theft\McPvTray.exe [C:\Program Files\McAfee\Anti-Theft\McPvTray.exe] -> [2009/11/17 09:15:42 | 000,670,312 | -H-- | M] (McAfee)
"mcui_exe" -> C:\Program Files\McAfee.com\Agent\mcagent.exe ["C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey] -> [2011/09/16 17:38:10 | 001,318,552 | -H-- | M] (McAfee, Inc.)
"NvCplDaemon" -> C:\WINDOWS\System32\NvCpl.dll [RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup] -> [2008/09/17 21:55:00 | 013,574,144 | -H-- | M] (NVIDIA Corporation)
"NvMediaCenter" -> C:\WINDOWS\System32\NvMcTray.dll [RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit] -> [2008/09/17 21:55:00 | 000,086,016 | -H-- | M] (NVIDIA Corporation)
"nwiz" -> C:\WINDOWS\System32\nwiz.exe [nwiz.exe /install] -> [2008/09/17 21:55:00 | 001,657,376 | -H-- | M] ()
"Six Engine" -> C:\Program Files\ASUS\EPU-6 Engine\SixEngine.exe ["C:\Program Files\ASUS\EPU-6 Engine\SixEngine.exe" -r] -> [2008/06/02 23:06:34 | 005,964,800 | -H-- | M] ()
"SunJavaUpdateSched" ->  ["C:\Program Files\Java\jre6\bin\jusched.exe"] -> File not found
< Administrator Startup Folder > -> C:\Documents and Settings\Administrator\Start Menu\Programs\Startup -> 
< CurrentVersion Policy Settings - Explorer [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer -> 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
\\"HonorAutoRunSetting" ->  [1] -> File not found
< CurrentVersion Policy Settings - System [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System -> 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System
\\"DisableTaskMgr" ->  [1] -> File not found
< CurrentVersion Policy Settings - Explorer [HKEY_CURRENT_USER] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer -> 
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
\\"NoDriveTypeAutoRun" ->  [145] -> File not found
< CurrentVersion Policy Settings - System [HKEY_CURRENT_USER] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System -> 
< Internet Explorer Extensions [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\ -> 
{2670000A-7350-4f3c-8081-5663EE0C6C49}:{48E73304-E1D6-4330-914C-F5F514E3486C} [HKLM] -> E:\Program Files\Microsoft Office\Office14\ONBttnIE.dll [Button: Send to OneNote] -> [2011/09/02 01:14:00 | 000,644,496 | -H-- | M] (Microsoft Corporation)
{2670000A-7350-4f3c-8081-5663EE0C6C49}:{48E73304-E1D6-4330-914C-F5F514E3486C} [HKLM] -> E:\Program Files\Microsoft Office\Office14\ONBttnIE.dll [Menu: Se&nd to OneNote] -> [2011/09/02 01:14:00 | 000,644,496 | -H-- | M] (Microsoft Corporation)
{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}:{FFFDC614-B694-4AE6-AB38-5D6374584B52} [HKLM] -> E:\Program Files\Microsoft Office\Office14\ONBttnIELinkedNotes.dll [Button: OneNote Lin&ked Notes] -> [2010/12/21 03:08:16 | 000,497,040 | -H-- | M] (Microsoft Corporation)
{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}:{FFFDC614-B694-4AE6-AB38-5D6374584B52} [HKLM] -> E:\Program Files\Microsoft Office\Office14\ONBttnIELinkedNotes.dll [Menu: OneNote Lin&ked Notes] -> [2010/12/21 03:08:16 | 000,497,040 | -H-- | M] (Microsoft Corporation)
< Internet Explorer Plugins [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Plugins\ -> 
< Default Prefix > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\URL\DefaultPrefix
"" -> http://
< Trusted Sites Domains [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ -> 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ -> [Key] 1 domain(s) found. -> 
< Trusted Sites Ranges [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ -> 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ -> [Key] 0 range(s) found. -> 
< Trusted Sites Domains [HKEY_CURRENT_USER\] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ -> 
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ -> [Key] 0 domain(s) found. -> 
< Trusted Sites Ranges [HKEY_CURRENT_USER\] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ -> 
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ -> [Key] 0 range(s) found. -> 
< Downloaded Program Files > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\ -> 
{000F1EA4-5E08-4564-A29B-29076F63A37A} [HKLM] -> http://launch.soe.com/plugin/web/SOEWebInstaller.cab [SOE Web Installer] -> 
< Name Servers [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\ -> 
DhcpNameServer -> 10.0.0.1 -> 
< Name Servers [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Adapters\ -> 
{60F1A824-DAA1-47E8-A148-2713D5D13099}\\DhcpNameServer -> 10.0.0.1   (Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller) -> 
< Winlogon settings [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon -> 
*Shell* -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell -> 
Explorer.exe -> C:\WINDOWS\explorer.exe -> [2008/04/13 17:12:19 | 001,033,728 | -H-- | M] (Microsoft Corporation)
*MultiFile Done* -> -> 
*UserInit* -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\UserInit -> 
C:\WINDOWS\system32\userinit.exe -> C:\WINDOWS\system32\userinit.exe -> [2008/04/13 17:12:38 | 000,026,112 | -H-- | M] (Microsoft Corporation)
*MultiFile Done* -> -> 
< Domain Profile Authorized Applications List > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List -> 
< Standard Profile Authorized Applications List > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List -> 
"C:\Program Files\Common Files\Apple\Apple Application Support\WebKit2WebProcess.exe" -> C:\Program Files\Common Files\Apple\Apple Application Support\WebKit2WebProcess.exe [C:\Program Files\Common Files\Apple\Apple Application Support\WebKit2WebProcess.exe:*:Enabled:WebKit] -> [2011/09/27 06:22:50 | 000,014,184 | -H-- | M] (Apple Inc.)
"C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe" -> C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe [C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe:*:Enabled:McAfee Shared Service Host] -> [2011/01/27 17:28:14 | 000,214,904 | -H-- | M] (McAfee, Inc.)
"C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe" ->  [C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:*:Enabled:McAfee Network Agent] -> File not found
"C:\Program Files\Logitech\Vid HD\Vid.exe" -> C:\Program Files\Logitech\Vid HD\Vid.exe [C:\Program Files\Logitech\Vid HD\Vid.exe:*:Enabled:Logitech Vid HD] -> [2010/10/29 13:06:08 | 005,915,480 | -H-- | M] (Logitech Inc.)
"C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\RpcAgentSrv.exe" -> C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\RpcAgentSrv.exe [C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\RpcAgentSrv.exe:*:Enabled:SiSoftware Deployment Agent Service] -> [2008/12/11 12:53:38 | 000,098,488 | -H-- | M] (SiSoftware)
"C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\WNt500x86\RpcSandraSrv.exe" -> C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\WNt500x86\RpcSandraSrv.exe [C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\WNt500x86\RpcSandraSrv.exe:*:Enabled:SiSoftware Sandra Agent Service] -> [2008/12/11 12:53:34 | 001,380,544 | -H-- | M] (SiSoftware)
"E:\Program Files\Microsoft Office\Office14\ONENOTE.EXE" -> E:\Program Files\Microsoft Office\Office14\ONENOTE.EXE [E:\Program Files\Microsoft Office\Office14\ONENOTE.EXE:*:Enabled:Microsoft OneNote] -> [2011/10/16 19:37:20 | 001,692,000 | -H-- | M] (Microsoft Corporation)
"E:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" -> E:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE [E:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE:*:Enabled:Microsoft Office Outlook] -> [2011/09/21 10:26:30 | 015,759,200 | -H-- | M] (Microsoft Corporation)
< SafeBoot AlternateShell [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot -> 
< CDROM Autorun Setting [HKEY_LOCAL_MACHINE]> -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom ->
"AutoRun" -> 1 -> 
"DisplayName" -> CD-ROM Driver -> 
"ImagePath" ->  [system32\DRIVERS\cdrom.sys] -> File not found
< Drives with AutoRun files > ->  -> 
C:\AUTOEXEC.BAT [] -> C:\AUTOEXEC.BAT [ NTFS ] -> [2008/12/05 06:40:39 | 000,000,000 | ---- | M] ()
< MountPoints2 [HKEY_CURRENT_USER] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 -> 
< Registry Shell Spawning - Select to Repair > -> HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command -> 
comfile [open] -> "%1" %* -> 
exefile [open] -> "%1" %* -> 
< Registry Shell Spawning - Select to Repair > -> HKEY_CURRENT_USER\SOFTWARE\Classes\<key>\shell\[command]\command -> 
exefile [open] -> "C:\Documents and Settings\Grant Harbison\Local Settings\Application Data\akb.exe" -a "%1" %* -> [2011/11/29 16:56:00 | 000,289,792 | -H-- | M] (Microsoft Corporation)
< File Associations - Select to Repair > -> HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>\ -> 
.com [@ = comfile] -> "%1" %* -> 
.exe [@ = exefile] -> "%1" %* -> 
< File Associations - Select to Repair > -> HKEY_CURRENT_USER\SOFTWARE\Classes\<extension>\ -> 
.exe [@ = exefile] -> C:\Documents and Settings\Grant Harbison\Local Settings\Application Data\akb.exe -> [2011/11/29 16:56:00 | 000,289,792 | -H-- | M] (Microsoft Corporation)
 
 
[Files/Folders - Created Within 30 Days]
 OTS.exe -> C:\Documents and Settings\Administrator\Desktop\OTS.exe -> [2011/11/30 07:05:04 | 000,646,144 | ---- | C] (OldTimer Tools)
 _OTM -> C:\_OTM -> [2011/11/30 07:00:02 | 000,000,000 | ---D | C]
 OTM.exe -> C:\Documents and Settings\Administrator\Desktop\OTM.exe -> [2011/11/30 06:59:08 | 000,523,264 | ---- | C] (OldTimer Tools)
 McAfee -> C:\Documents and Settings\All Users\Start Menu\Programs\McAfee -> [2011/11/29 21:51:40 | 000,000,000 | ---D | C]
 gmer -> C:\Documents and Settings\Administrator\Desktop\gmer -> [2011/11/29 21:48:43 | 000,000,000 | ---D | C]
 girya2.com.exe -> C:\Documents and Settings\Administrator\Desktop\girya2.com.exe -> [2011/11/29 20:36:52 | 009,851,496 | ---- | C] (Malwarebytes Corporation                                    )
 girya.com.exe -> C:\Documents and Settings\Administrator\Desktop\girya.com.exe -> [2011/11/29 20:29:08 | 001,566,512 | ---- | C] (Kaspersky Lab ZAO)
 My Videos -> C:\Documents and Settings\Administrator\My Documents\My Videos -> [2011/11/29 18:51:34 | 000,000,000 | R--D | C]
 My Pictures -> C:\Documents and Settings\Administrator\My Documents\My Pictures -> [2011/11/29 18:51:34 | 000,000,000 | R--D | C]
 My Music -> C:\Documents and Settings\Administrator\My Documents\My Music -> [2011/11/29 18:51:34 | 000,000,000 | R--D | C]
 Administrative Tools -> C:\Documents and Settings\Administrator\Start Menu\Programs\Administrative Tools -> [2011/11/29 18:51:34 | 000,000,000 | R--D | C]
 Cobian Backup 8 -> C:\Documents and Settings\All Users\Start Menu\Programs\Cobian Backup 8 -> [2011/11/29 18:50:02 | 000,000,000 | ---D | C]
 cbSetup8.exe -> C:\Documents and Settings\Administrator\Desktop\cbSetup8.exe -> [2011/11/29 18:48:44 | 008,499,200 | ---- | C] (Luis Cobian)
 dds.scr -> C:\Documents and Settings\Administrator\Desktop\dds.scr -> [2011/11/29 18:41:46 | 000,607,260 | R--- | C] (Swearware)
 Config.Msi -> C:\Config.Msi -> [2011/11/29 18:13:56 | 000,000,000 | ---D | C]
 mbamswissarmy.sys -> C:\WINDOWS\System32\drivers\mbamswissarmy.sys -> [2011/11/29 16:50:23 | 000,041,272 | -H-- | C] (Malwarebytes Corporation)
 PIF -> C:\WINDOWS\PIF -> [2011/11/27 12:53:07 | 000,000,000 | -H-D | C]
 Apple Computer -> C:\Documents and Settings\NetworkService\Local Settings\Application Data\Apple Computer -> [2011/11/25 06:37:14 | 000,000,000 | -H-D | C]
 Adobe -> C:\Documents and Settings\NetworkService\Local Settings\Application Data\Adobe -> [2011/11/25 06:06:57 | 000,000,000 | -H-D | C]
 wpcap.dll -> C:\WINDOWS\System32\wpcap.dll -> [2011/11/25 03:55:47 | 000,281,104 | -H-- | C] (CACE Technologies, Inc.)
 Packet.dll -> C:\WINDOWS\System32\Packet.dll -> [2011/11/25 03:55:47 | 000,100,880 | -H-- | C] (CACE Technologies, Inc.)
 npf.sys -> C:\WINDOWS\System32\drivers\npf.sys -> [2011/11/25 03:55:47 | 000,050,704 | -H-- | C] (CACE Technologies, Inc.)
 Sun -> C:\Documents and Settings\NetworkService\Application Data\Sun -> [2011/11/24 16:06:02 | 000,000,000 | -H-D | C]
 Macromedia -> C:\Documents and Settings\NetworkService\Application Data\Macromedia -> [2011/11/24 15:15:57 | 000,000,000 | -H-D | C]
 Adobe -> C:\Documents and Settings\NetworkService\Application Data\Adobe -> [2011/11/24 15:15:57 | 000,000,000 | -H-D | C]
 Google Earth -> C:\Documents and Settings\All Users\Start Menu\Programs\Google Earth -> [2011/11/11 13:31:28 | 000,000,000 | -H-D | C]
 QuickTime -> C:\Documents and Settings\All Users\Start Menu\Programs\QuickTime -> [2011/11/08 23:03:39 | 000,000,000 | -H-D | C]
 QuickTime -> C:\Program Files\QuickTime -> [2011/11/08 23:03:05 | 000,000,000 | -H-D | C]
 6 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> 
 3 C:\Documents and Settings\All Users\Application Data\*.tmp files -> C:\Documents and Settings\All Users\Application Data\*.tmp -> 
 2 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> 
 11 C:\WINDOWS\System32\dllcache\*.tmp files -> C:\WINDOWS\System32\dllcache\*.tmp -> 
 
[Files/Folders - Modified Within 30 Days]
 h0a0cnf2813 -> C:\Documents and Settings\All Users\Application Data\h0a0cnf2813 -> [2011/11/30 07:05:32 | 000,015,788 | -HS- | M] ()
 h0a0cnf2813 -> C:\Documents and Settings\Administrator\Local Settings\Application Data\h0a0cnf2813 -> [2011/11/30 07:05:32 | 000,015,788 | -HS- | M] ()
 OTS.exe -> C:\Documents and Settings\Administrator\Desktop\OTS.exe -> [2011/11/30 07:05:06 | 000,646,144 | ---- | M] (OldTimer Tools)
 d3d9caps.dat -> C:\WINDOWS\System32\d3d9caps.dat -> [2011/11/30 07:02:43 | 000,001,324 | ---- | M] ()
 Hosts -> C:\WINDOWS\System32\drivers\etc\Hosts -> [2011/11/30 07:01:04 | 000,000,098 | ---- | M] ()
 OTM.exe -> C:\Documents and Settings\Administrator\Desktop\OTM.exe -> [2011/11/30 06:59:12 | 000,523,264 | ---- | M] (OldTimer Tools)
 registrybackup.reg -> C:\registrybackup.reg -> [2011/11/30 06:58:10 | 072,885,796 | ---- | M] ()
 bootstat.dat -> C:\WINDOWS\bootstat.dat -> [2011/11/29 21:47:14 | 000,002,048 | --S- | M] ()
 gmer.zip -> C:\Documents and Settings\Administrator\Desktop\gmer.zip -> [2011/11/29 21:05:48 | 000,294,216 | ---- | M] ()
 defogger_reenable -> C:\Documents and Settings\Administrator\defogger_reenable -> [2011/11/29 21:00:16 | 000,000,000 | ---- | M] ()
 Defogger.exe -> C:\Documents and Settings\Administrator\Desktop\Defogger.exe -> [2011/11/29 20:59:51 | 000,050,477 | ---- | M] ()
 unhide.exe -> C:\Documents and Settings\Administrator\Desktop\unhide.exe -> [2011/11/29 20:38:49 | 000,684,297 | ---- | M] ()
 girya2.com.exe -> C:\Documents and Settings\Administrator\Desktop\girya2.com.exe -> [2011/11/29 20:36:52 | 009,851,496 | ---- | M] (Malwarebytes Corporation                                    )
 girya.com.exe -> C:\Documents and Settings\Administrator\Desktop\girya.com.exe -> [2011/11/29 20:29:11 | 001,566,512 | ---- | M] (Kaspersky Lab ZAO)
 iExplore.exe -> C:\Documents and Settings\Administrator\Desktop\iExplore.exe -> [2011/11/29 20:22:30 | 001,008,114 | ---- | M] ()
 rkill.com -> C:\Documents and Settings\Administrator\Desktop\rkill.com -> [2011/11/29 20:15:01 | 001,008,114 | ---- | M] ()
 cbSetup8.exe -> C:\Documents and Settings\Administrator\Desktop\cbSetup8.exe -> [2011/11/29 18:48:44 | 008,499,200 | ---- | M] (Luis Cobian)
 dds.scr -> C:\Documents and Settings\Administrator\Desktop\dds.scr -> [2011/11/29 18:41:49 | 000,607,260 | R--- | M] (Swearware)
 GoogleUpdateTaskMachineCore.job -> C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job -> [2011/11/29 18:02:21 | 000,000,882 | -H-- | M] ()
 sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\sxj5Hve9jhpEDa -> [2011/11/29 17:26:45 | 000,000,440 | ---- | M] ()
 ~sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDa -> [2011/11/29 17:25:50 | 000,000,312 | ---- | M] ()
 ~sxj5Hve9jhpEDar -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDar -> [2011/11/29 17:25:50 | 000,000,216 | ---- | M] ()
 GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005UA.job -> C:\WINDOWS\tasks\GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005UA.job -> [2011/11/29 17:00:00 | 000,001,010 | -H-- | M] ()
 mbamswissarmy.sys -> C:\WINDOWS\System32\drivers\mbamswissarmy.sys -> [2011/11/29 16:50:23 | 000,041,272 | -H-- | M] (Malwarebytes Corporation)
 nvapps.xml -> C:\WINDOWS\System32\nvapps.xml -> [2011/11/29 16:48:25 | 000,193,694 | -H-- | M] ()
 GoogleUpdateTaskMachineUA.job -> C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job -> [2011/11/29 16:29:01 | 000,000,886 | -H-- | M] ()
 perfh009.dat -> C:\WINDOWS\System32\perfh009.dat -> [2011/11/29 08:47:56 | 000,436,034 | -H-- | M] ()
 perfc009.dat -> C:\WINDOWS\System32\perfc009.dat -> [2011/11/29 08:47:56 | 000,068,738 | -H-- | M] ()
 GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005Core.job -> C:\WINDOWS\tasks\GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005Core.job -> [2011/11/29 01:00:00 | 000,000,958 | -H-- | M] ()
 wpa.dbl -> C:\WINDOWS\System32\wpa.dbl -> [2011/11/27 10:27:50 | 000,013,750 | -H-- | M] ()
 wpcap.dll -> C:\WINDOWS\System32\wpcap.dll -> [2011/11/25 03:55:47 | 000,281,104 | -H-- | M] (CACE Technologies, Inc.)
 Packet.dll -> C:\WINDOWS\System32\Packet.dll -> [2011/11/25 03:55:47 | 000,100,880 | -H-- | M] (CACE Technologies, Inc.)
 npf.sys -> C:\WINDOWS\System32\drivers\npf.sys -> [2011/11/25 03:55:47 | 000,050,704 | -H-- | M] (CACE Technologies, Inc.)
 AppleSoftwareUpdate.job -> C:\WINDOWS\tasks\AppleSoftwareUpdate.job -> [2011/11/22 23:01:01 | 000,000,284 | -H-- | M] ()
 FlashPlayerCPLApp.cpl -> C:\WINDOWS\System32\FlashPlayerCPLApp.cpl -> [2011/11/21 17:07:44 | 000,414,368 | -H-- | M] (Adobe Systems Incorporated)
 rpc.job -> C:\WINDOWS\tasks\rpc.job -> [2011/11/20 09:00:00 | 000,000,386 | -H-- | M] ()
 imsins.BAK -> C:\WINDOWS\imsins.BAK -> [2011/11/10 03:05:34 | 000,001,393 | -H-- | M] ()
 74 C:\WINDOWS\Temp\*.tmp files -> C:\WINDOWS\Temp\*.tmp -> 
 74 C:\WINDOWS\Temp\*.tmp files -> C:\WINDOWS\Temp\*.tmp -> 
 6 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> 
 3 C:\Documents and Settings\All Users\Application Data\*.tmp files -> C:\Documents and Settings\All Users\Application Data\*.tmp -> 
 2 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> 
 11 C:\WINDOWS\System32\dllcache\*.tmp files -> C:\WINDOWS\System32\dllcache\*.tmp -> 
 
[Files - No Company Name]
 registrybackup.reg -> C:\registrybackup.reg -> [2011/11/30 06:57:04 | 072,885,796 | ---- | C] ()
 gmer.zip -> C:\Documents and Settings\Administrator\Desktop\gmer.zip -> [2011/11/29 21:05:47 | 000,294,216 | ---- | C] ()
 defogger_reenable -> C:\Documents and Settings\Administrator\defogger_reenable -> [2011/11/29 21:00:16 | 000,000,000 | ---- | C] ()
 Defogger.exe -> C:\Documents and Settings\Administrator\Desktop\Defogger.exe -> [2011/11/29 20:59:51 | 000,050,477 | ---- | C] ()
 unhide.exe -> C:\Documents and Settings\Administrator\Desktop\unhide.exe -> [2011/11/29 20:38:48 | 000,684,297 | ---- | C] ()
 iExplore.exe -> C:\Documents and Settings\Administrator\Desktop\iExplore.exe -> [2011/11/29 20:22:26 | 001,008,114 | ---- | C] ()
 rkill.com -> C:\Documents and Settings\Administrator\Desktop\rkill.com -> [2011/11/29 20:14:57 | 001,008,114 | ---- | C] ()
 h0a0cnf2813 -> C:\Documents and Settings\Administrator\Local Settings\Application Data\h0a0cnf2813 -> [2011/11/29 18:09:09 | 000,015,788 | -HS- | C] ()
 ~sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDa -> [2011/11/29 17:25:50 | 000,000,312 | ---- | C] ()
 ~sxj5Hve9jhpEDar -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDar -> [2011/11/29 17:25:50 | 000,000,216 | ---- | C] ()
 sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\sxj5Hve9jhpEDa -> [2011/11/29 17:25:43 | 000,000,440 | ---- | C] ()
 h0a0cnf2813 -> C:\Documents and Settings\All Users\Application Data\h0a0cnf2813 -> [2011/11/29 16:56:08 | 000,015,788 | -HS- | C] ()
 LVPr2Mon.sys -> C:\WINDOWS\System32\drivers\LVPr2Mon.sys -> [2009/10/07 01:46:36 | 000,025,752 | -H-- | C] ()
 iKeyLFT2.dll -> C:\WINDOWS\System32\drivers\iKeyLFT2.dll -> [2009/10/07 01:23:08 | 000,013,584 | -H-- | C] ()
 d3d9caps.dat -> C:\WINDOWS\System32\d3d9caps.dat -> [2009/09/05 07:30:44 | 000,001,324 | ---- | C] ()
 lvcoinst.ini -> C:\WINDOWS\System32\lvcoinst.ini -> [2009/04/30 22:39:36 | 000,082,289 | -H-- | C] ()
 OPPRIN~1.INI -> C:\WINDOWS\OPPRIN~1.INI -> [2009/01/20 06:02:51 | 000,000,000 | -H-- | C] ()
 BRVIDEO.INI -> C:\WINDOWS\BRVIDEO.INI -> [2009/01/09 20:01:18 | 000,000,147 | -H-- | C] ()
 Brownie.ini -> C:\WINDOWS\Brownie.ini -> [2009/01/09 20:01:18 | 000,000,023 | -H-- | C] ()
 brmx2001.ini -> C:\WINDOWS\brmx2001.ini -> [2009/01/09 20:01:18 | 000,000,000 | -H-- | C] ()
 HL-5250DN.INI -> C:\WINDOWS\HL-5250DN.INI -> [2009/01/09 20:01:09 | 000,014,441 | -H-- | C] ()
 BRWMARK.INI -> C:\WINDOWS\BRWMARK.INI -> [2009/01/09 20:01:00 | 000,000,426 | -H-- | C] ()
 BD5250DN.DAT -> C:\WINDOWS\System32\BD5250DN.DAT -> [2009/01/09 20:01:00 | 000,000,034 | -H-- | C] ()
 DevMgr.ini -> C:\WINDOWS\DevMgr.ini -> [2008/12/23 16:29:46 | 000,002,693 | -H-- | C] ()
 Hposcv07.INI -> C:\WINDOWS\Hposcv07.INI -> [2008/12/23 16:24:14 | 000,000,020 | -H-- | C] ()
 sandra.mda -> C:\Documents and Settings\All Users\Application Data\sandra.mda -> [2008/12/14 14:02:48 | 008,626,176 | -H-- | C] ()
 ODBC.INI -> C:\WINDOWS\ODBC.INI -> [2008/12/08 16:46:47 | 000,000,376 | -H-- | C] ()
 AsIO.dll -> C:\WINDOWS\System32\AsIO.dll -> [2008/12/05 16:05:33 | 000,024,576 | -H-- | C] ()
 AsIO.sys -> C:\WINDOWS\System32\drivers\AsIO.sys -> [2008/12/05 16:05:33 | 000,012,400 | -H-- | C] ()
 Ascd_log.ini -> C:\WINDOWS\Ascd_log.ini -> [2008/12/05 07:17:22 | 000,037,605 | -H-- | C] ()
 ASACPI.sys -> C:\WINDOWS\System32\drivers\ASACPI.sys -> [2008/12/05 07:17:15 | 000,005,810 | -H-- | C] ()
 Ascd_tmp.ini -> C:\WINDOWS\Ascd_tmp.ini -> [2008/12/05 07:17:08 | 000,037,245 | -H-- | C] ()
 ASUSHWIO.SYS -> C:\WINDOWS\System32\drivers\ASUSHWIO.SYS -> [2008/12/05 07:17:08 | 000,010,296 | -H-- | C] ()
 bootstat.dat -> C:\WINDOWS\bootstat.dat -> [2008/12/05 06:41:45 | 000,002,048 | --S- | C] ()
 emptyregdb.dat -> C:\WINDOWS\System32\emptyregdb.dat -> [2008/12/05 06:38:55 | 000,021,640 | -H-- | C] ()
 ODBCINST.INI -> C:\WINDOWS\ODBCINST.INI -> [2008/12/05 01:26:27 | 000,004,161 | -H-- | C] ()
 FNTCACHE.DAT -> C:\WINDOWS\System32\FNTCACHE.DAT -> [2008/12/05 01:23:55 | 000,274,168 | -H-- | C] ()
 nvwdmcpl.dll -> C:\WINDOWS\System32\nvwdmcpl.dll -> [2008/03/11 01:25:00 | 001,724,416 | -H-- | C] ()
 nwiz.exe -> C:\WINDOWS\System32\nwiz.exe -> [2008/03/11 01:25:00 | 001,657,376 | -H-- | C] ()
 nview.dll -> C:\WINDOWS\System32\nview.dll -> [2008/03/11 01:25:00 | 001,503,232 | -H-- | C] ()
 nvdspsch.exe -> C:\WINDOWS\System32\nvdspsch.exe -> [2008/03/11 01:25:00 | 001,346,080 | -H-- | C] ()
 nvwimg.dll -> C:\WINDOWS\System32\nvwimg.dll -> [2008/03/11 01:25:00 | 001,101,824 | -H-- | C] ()
 nvshell.dll -> C:\WINDOWS\System32\nvshell.dll -> [2008/03/11 01:25:00 | 000,466,944 | -H-- | C] ()
 nvappbar.exe -> C:\WINDOWS\System32\nvappbar.exe -> [2008/03/11 01:25:00 | 000,449,056 | -H-- | C] ()
 keystone.exe -> C:\WINDOWS\System32\keystone.exe -> [2008/03/11 01:25:00 | 000,436,768 | -H-- | C] ()
 nvnt4cpl.dll -> C:\WINDOWS\System32\nvnt4cpl.dll -> [2008/03/11 01:25:00 | 000,286,720 | -H-- | C] ()
 oembios.bin -> C:\WINDOWS\System32\oembios.bin -> [2004/08/04 05:00:00 | 013,107,200 | -H-- | C] ()
 mlang.dat -> C:\WINDOWS\System32\mlang.dat -> [2004/08/04 05:00:00 | 000,673,088 | -H-- | C] ()
 perfh009.dat -> C:\WINDOWS\System32\perfh009.dat -> [2004/08/04 05:00:00 | 000,436,034 | -H-- | C] ()
 perfi009.dat -> C:\WINDOWS\System32\perfi009.dat -> [2004/08/04 05:00:00 | 000,272,128 | -H-- | C] ()
 dssec.dat -> C:\WINDOWS\System32\dssec.dat -> [2004/08/04 05:00:00 | 000,218,003 | -H-- | C] ()
 perfc009.dat -> C:\WINDOWS\System32\perfc009.dat -> [2004/08/04 05:00:00 | 000,068,738 | -H-- | C] ()
 mib.bin -> C:\WINDOWS\System32\mib.bin -> [2004/08/04 05:00:00 | 000,046,258 | -H-- | C] ()
 perfd009.dat -> C:\WINDOWS\System32\perfd009.dat -> [2004/08/04 05:00:00 | 000,028,626 | -H-- | C] ()
 secupd.dat -> C:\WINDOWS\System32\secupd.dat -> [2004/08/04 05:00:00 | 000,004,569 | -H-- | C] ()
 oembios.dat -> C:\WINDOWS\System32\oembios.dat -> [2004/08/04 05:00:00 | 000,004,461 | -H-- | C] ()
 dcache.bin -> C:\WINDOWS\System32\dcache.bin -> [2004/08/04 05:00:00 | 000,001,804 | -H-- | C] ()
 noise.dat -> C:\WINDOWS\System32\noise.dat -> [2004/08/04 05:00:00 | 000,000,741 | -H-- | C] ()
 MSRTEDIT.DLL -> C:\WINDOWS\System32\MSRTEDIT.DLL -> [1999/01/22 11:46:56 | 000,065,536 | -H-- | C] ()
< End of report >


#6 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:03:45 PM

Posted 01 December 2011 - 01:39 AM

Good Evening!

Thanks for that information.

It looks like you maybe infected with an infection known as ZeroAccess.

Among many other things it seems the infection has hidden the majority of your files.

Lets try and fix that now.

Please download UnHide.exe by Grinler.

It will unhide folders/files that were set to be hidden by the infection you had.



NEXT:



Running OTS Fix
Start OTS Copy/Paste the information inside the codebox below into the panel where it says "Paste fix here" and then click the Run Fix button.

[Kill All Processes]
[Unregister Dlls]
[Win32 Services - Safe List]
YN -> (AppMgmt) Application Management [On_Demand | Stopped] -> 
[Registry - Safe List]
< Run [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YN -> "SunJavaUpdateSched" -> ["C:\Program Files\Java\jre6\bin\jusched.exe"]
< CurrentVersion Policy Settings - System [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System
YN -> \\"DisableTaskMgr" -> [1]
< Standard Profile Authorized Applications List > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
YN -> "C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe" -> [C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:*:Enabled:McAfee Network Agent]
< Registry Shell Spawning - Select to Repair > -> HKEY_CURRENT_USER\SOFTWARE\Classes\<key>\shell\[command]\command
YN -> exefile [open] -> "C:\Documents and Settings\Grant Harbison\Local Settings\Application Data\akb.exe" -a "%1" %*
< File Associations - Select to Repair > -> HKEY_CURRENT_USER\SOFTWARE\Classes\<extension>\
YY -> .exe [@ = exefile] -> C:\Documents and Settings\Grant Harbison\Local Settings\Application Data\akb.exe
[Files/Folders - Modified Within 30 Days]
NY ->  h0a0cnf2813 -> C:\Documents and Settings\All Users\Application Data\h0a0cnf2813
NY ->  h0a0cnf2813 -> C:\Documents and Settings\Administrator\Local Settings\Application Data\h0a0cnf2813
NY ->  sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\sxj5Hve9jhpEDa
NY ->  ~sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDa
NY ->  ~sxj5Hve9jhpEDar -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDar
NY ->  rpc.job -> C:\WINDOWS\tasks\rpc.job
[Files - No Company Name]
NY ->  h0a0cnf2813 -> C:\Documents and Settings\Administrator\Local Settings\Application Data\h0a0cnf2813
NY ->  ~sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDa
NY ->  ~sxj5Hve9jhpEDar -> C:\Documents and Settings\All Users\Application Data\~sxj5Hve9jhpEDar
NY ->  sxj5Hve9jhpEDa -> C:\Documents and Settings\All Users\Application Data\sxj5Hve9jhpEDa
NY ->  h0a0cnf2813 -> C:\Documents and Settings\All Users\Application Data\h0a0cnf2813
[EmptyFlash]
[CreateRestorePoint]

The fix should only take a very short time. When the fix is completed a message box will popup either telling you that it is finished, or that a reboot is needed to complete the fix. If the fix is complete, click the Ok button and Notepad will open with a log of actions taken during the fix. Post that log back here in your next reply.

If a reboot is required, click the "Yes" button to reboot the machine. After the reboot, OTS will finish moving any files that could not be moved during the fix and NotePad will open with the final results at that time. Post that log back here in your next reply.


NEXT:



Running ComboFix

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop
* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon.
They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here

  • Double click on ComboFix.exe & follow the prompts.
  • Accept the disclaimer and allow to update if it asks
    Posted Image
    Posted Image
  • When finished, it shall produce a log for you.
  • Please include the C:\ComboFix.txt in your next reply.

Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.


Please make sure you include the ComboFix log in your next reply as well as describe how your computer is running now


NEXT:



What issues are you currently experiencing with your computer?

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#7 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 01 December 2011 - 09:44 AM

Okay, I ran unhide.exe and then OTS Fix having pasted in the suggested code. I rebooted the computer per OTS but OTS Fix did not automatically do anything on reboot, and the OTS Fix log did not pop up. I manually ran OTS Fix again and was told to reboot, did that. Again the OTS Fix log did not pop up and OTS did not automatically start.

Now the "Internet" program on the Start menu results in a dialog box "choose the program you want to use to open the file", I am told "the item you selected is unavailable. It might have been moved, renamed, or removed. Do you want to remove it from the list?".

So I am running Internet Explorer by going to Start -> Run -> iexplore.exe.

I have not downloaded or run ComboFix.

Thanks for your prompt help. I really appreciate it.

#8 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:03:45 PM

Posted 01 December 2011 - 08:33 PM

Good Evening.

Thanks for that information, and sorry to hear you ran into a bit of a roadblock.

I'd like to have you proceed with the ComboFix instructions.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#9 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 02 December 2011 - 09:58 AM

The ComboFix ran and produced a Notepad file called log.txt.

Should I re-enable my virus software (Mcafee)? Also, just to ask a question, does MBAM replace Mcafee or can it work with it?

Here is the ComboFix log text:

ComboFix 11-12-02.01 - Administrator 12/02/2011 7:38.1.2 - x86 NETWORK
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3327.3054 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Firewall *Disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\xml75.tmp
c:\documents and settings\All Users\Application Data\xml76.tmp
c:\documents and settings\All Users\Application Data\xml77.tmp
c:\documents and settings\Grant Harbison\Application Data\Microsoft\Internet Explorer\Quick Launch\System Fix.lnk
c:\documents and settings\Grant Harbison\Desktop\System Fix.lnk
c:\documents and settings\Grant Harbison\Start Menu\Programs\System Fix
c:\documents and settings\Grant Harbison\Start Menu\Programs\System Fix\System Fix.lnk
c:\documents and settings\Grant Harbison\Start Menu\Programs\System Fix\Uninstall System Fix.lnk
c:\documents and settings\Grant Harbison\WINDOWS
c:\documents and settings\Zane Harbison\Desktop\Security Protection.lnk
c:\documents and settings\Zane Harbison\My Documents\~WRL0497.tmp
c:\documents and settings\Zane Harbison\My Documents\~WRL2214.tmp
c:\documents and settings\Zane Harbison\My Documents\~WRL3125.tmp
c:\documents and settings\Zane Harbison\My Documents\~WRL3200.tmp
c:\documents and settings\Zane Harbison\My Documents\~WRL3246.tmp
c:\windows\$NtUninstallKB57153$
c:\windows\$NtUninstallKB57153$\1871877561
c:\windows\$NtUninstallKB57153$\3336903076\@
c:\windows\$NtUninstallKB57153$\3336903076\bckfg.tmp
c:\windows\$NtUninstallKB57153$\3336903076\cfg.ini
c:\windows\$NtUninstallKB57153$\3336903076\Desktop.ini
c:\windows\$NtUninstallKB57153$\3336903076\keywords
c:\windows\$NtUninstallKB57153$\3336903076\kwrd.dll
c:\windows\$NtUninstallKB57153$\3336903076\L\udvyqpuk
c:\windows\$NtUninstallKB57153$\3336903076\lsflt7.ver
c:\windows\$NtUninstallKB57153$\3336903076\U\00000001.@
c:\windows\$NtUninstallKB57153$\3336903076\U\00000002.@
c:\windows\$NtUninstallKB57153$\3336903076\U\00000004.@
c:\windows\$NtUninstallKB57153$\3336903076\U\80000000.@
c:\windows\$NtUninstallKB57153$\3336903076\U\80000004.@
c:\windows\$NtUninstallKB57153$\3336903076\U\80000032.@
c:\windows\system32\drivers\npf.sys
c:\windows\system32\Packet.dll
c:\windows\system32\usmt\migwiz_a.exe
c:\windows\system32\wpcap.dll
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_NPF
-------\Service_NPF
.
.
((((((((((((((((((((((((( Files Created from 2011-11-02 to 2011-12-02 )))))))))))))))))))))))))))))))
.
.
2011-12-01 14:36 . 2011-12-01 14:36 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Adobe
2011-12-01 14:17 . 2011-12-01 14:17 -------- d-----w- C:\_OTS
2011-11-30 14:00 . 2011-11-30 14:00 -------- d-----w- C:\_OTM
2011-11-30 13:57 . 2011-11-30 13:58 72885796 ----a-w- C:\registrybackup.reg
2011-11-30 01:14 . 2011-11-30 01:14 -------- d-----w- c:\documents and settings\Default User\Local Settings\Application Data\Microsoft Help
2011-11-29 23:56 . 2011-11-29 23:55 458752 ----a-w- c:\documents and settings\Grant Harbison\Application Data\uszu.exe
2011-11-29 23:50 . 2011-11-29 23:50 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-11-27 19:53 . 2011-11-27 19:53 -------- d-----w- c:\windows\PIF
2011-11-25 13:37 . 2011-11-25 13:37 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple Computer
2011-11-25 13:06 . 2011-11-26 12:49 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin7.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin6.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin5.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin4.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin3.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin2.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin.dll
2011-11-09 06:03 . 2011-11-09 06:03 -------- d-----w- c:\program files\QuickTime
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-11-30 03:33 . 2008-12-05 08:27 57600 ----a-w- c:\windows\system32\drivers\redbook.sys
2011-11-22 00:07 . 2011-05-22 14:58 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-24 21:29 . 2011-10-24 21:29 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2011-10-24 21:29 . 2011-10-24 21:29 69632 ----a-w- c:\windows\system32\QuickTime.qts
2011-10-15 20:16 . 2010-04-24 08:52 9608 ----a-w- c:\windows\system32\drivers\mfeclnk.sys
2011-10-15 20:16 . 2010-04-24 08:52 89792 ----a-w- c:\windows\system32\drivers\mfetdi2k.sys
2011-10-15 20:16 . 2010-04-24 08:52 87656 ----a-w- c:\windows\system32\drivers\mferkdet.sys
2011-10-15 20:16 . 2010-04-24 08:52 83856 ----a-w- c:\windows\system32\drivers\mfendisk.sys
2011-10-15 20:16 . 2010-04-24 08:52 59456 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2011-10-15 20:16 . 2010-04-24 08:52 57600 ----a-w- c:\windows\system32\drivers\cfwids.sys
2011-10-15 20:16 . 2010-04-24 08:52 464176 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2011-10-15 20:16 . 2010-04-24 08:52 338176 ----a-w- c:\windows\system32\drivers\mfefirek.sys
2011-10-15 20:16 . 2010-04-24 08:52 180816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2011-10-15 20:16 . 2010-04-24 08:52 121256 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
2011-10-10 14:22 . 2008-12-05 13:39 692736 ------w- c:\windows\system32\inetcomm.dll
2011-09-28 07:06 . 2004-08-04 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-26 17:41 . 2008-07-29 23:59 611328 ----a-w- c:\windows\system32\uiautomationcore.dll
2011-09-26 17:41 . 2004-08-04 12:00 220160 ----a-w- c:\windows\system32\oleacc.dll
2011-09-26 17:41 . 2004-08-04 12:00 20480 ----a-w- c:\windows\system32\oleaccrc.dll
2011-09-06 13:20 . 2004-08-04 12:00 1858944 ------w- c:\windows\system32\win32k.sys
2004-08-04 12:00 94784 --sh--w- c:\windows\twain.dll
2008-04-14 00:12 50688 --sh--w- c:\windows\twain_32.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\MOBK]
@="{3c3f3c1a-9153-7c05-f938-622e7003894d}"
[HKEY_CLASSES_ROOT\CLSID\{3c3f3c1a-9153-7c05-f938-622e7003894d}]
2010-02-06 01:14 2871608 ----a-w- c:\program files\McAfee Online Backup\MOBKshell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\MOBK2]
@="{e6ea1d7d-144e-b977-98c4-84c53c1a69d0}"
[HKEY_CLASSES_ROOT\CLSID\{e6ea1d7d-144e-b977-98c4-84c53c1a69d0}]
2010-02-06 01:14 2871608 ----a-w- c:\program files\McAfee Online Backup\MOBKshell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\MOBK3]
@="{b4caf489-1eec-c617-49ad-8d7088598c06}"
[HKEY_CLASSES_ROOT\CLSID\{b4caf489-1eec-c617-49ad-8d7088598c06}]
2010-02-06 01:14 2871608 ----a-w- c:\program files\McAfee Online Backup\MOBKshell.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-09-18 13574144]
"nwiz"="nwiz.exe" [2008-09-18 1657376]
"Six Engine"="c:\program files\ASUS\EPU-6 Engine\SixEngine.exe" [2008-06-03 5964800]
"RTHDCPL"="RTHDCPL.EXE" [2008-05-16 16862720]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-09-18 86016]
"McPvTray"="c:\program files\McAfee\Anti-Theft\McPvTray.exe" [2009-11-17 670312]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2011-09-17 1318552]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-09-07 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"LogitechQuickCamRibbon"="c:\program files\Logitech\Logitech WebCam Software\LWS.exe" [2009-10-14 2793304]
"CanonSolutionMenu"="c:\program files\Canon\SolutionMenu\CNSLMAIN.exe" [2008-03-11 689488]
"CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2008-03-18 1848648]
"IJNetworkScanUtility"="c:\program files\Canon\Canon IJ Network Scan Utility\CNMNSUT.EXE" [2007-05-21 124512]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-10-10 421736]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2011-10-24 421888]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\SiSoftware\\SiSoftware Sandra Lite 2009.SP2\\RpcAgentSrv.exe"=
"c:\\Program Files\\SiSoftware\\SiSoftware Sandra Lite 2009.SP2\\WNt500x86\\RpcSandraSrv.exe"=
"c:\\Program Files\\Common Files\\McAfee\\McSvcHost\\McSvHost.exe"=
"e:\\Program Files\\Microsoft Office\\Office14\\ONENOTE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office14\\OUTLOOK.EXE"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Logitech\\Vid HD\\Vid.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
"AllowInboundEchoRequest"= 1 (0x1)
.
R0 McPvDrv;McPvDrv Driver;c:\windows\system32\drivers\McPvDrv.sys [11/17/2009 9:15 AM 63080]
R0 mv61xx;mv61xx;c:\windows\system32\drivers\mv61xx.sys [6/23/2008 3:21 PM 150568]
R1 mfetdi2k;McAfee Inc. mfetdi2k;c:\windows\system32\drivers\mfetdi2k.sys [4/24/2010 1:52 AM 89792]
R2 McMPFSvc;McAfee Personal Firewall Service;"c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [4/24/2010 1:52 AM 214904]
R2 mfefire;McAfee Firewall Core Service;c:\program files\Common Files\McAfee\SystemCore\mfefire.exe [4/24/2010 1:53 AM 160608]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\program files\Common Files\McAfee\SystemCore\mfevtps.exe [4/24/2010 1:52 AM 150856]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [4/24/2010 1:52 AM 338176]
R3 mfendiskmp;mfendiskmp;c:\windows\system32\drivers\mfendisk.sys [4/24/2010 1:52 AM 83856]
S1 MOBKFilter;MOBKFilter;c:\windows\system32\drivers\MOBK.sys [6/11/2010 5:07 AM 54776]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/10/2010 4:39 AM 135664]
S2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\McAfee\SiteAdvisor\McSACore.exe [12/5/2008 5:19 PM 94880]
S2 McNaiAnn;McAfee VirusScan Announcer;"c:\program files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [4/24/2010 1:52 AM 214904]
S2 MOBKbackup;McAfee Online Backup;c:\program files\McAfee Online Backup\MOBKbackup.exe [2/5/2010 6:14 PM 229688]
S3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [4/24/2010 1:52 AM 57600]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/10/2010 4:39 AM 135664]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;c:\windows\system32\drivers\mfendisk.sys [4/24/2010 1:52 AM 83856]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [4/24/2010 1:52 AM 87656]
S3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [1/9/2010 8:37 PM 4640000]
S3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\RpcAgentSrv.exe [12/14/2008 2:02 PM 98488]
.
Contents of the 'Scheduled Tasks' folder
.
2011-11-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 23:57]
.
2011-11-30 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-10 11:39]
.
2011-11-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-10 11:39]
.
2011-11-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005Core.job
- c:\documents and settings\Beth Harbison\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-07 11:09]
.
2011-11-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005UA.job
- c:\documents and settings\Beth Harbison\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-07 11:09]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~1\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - e:\progra~1\MICROS~1\Office14\ONBttnIE.dll/105
TCP: DhcpNameServer = 10.0.0.1
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-93410946.sys
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-12-02 07:49
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-448539723-1390067357-839522115-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,86,9a,65,02,46,ec,04,47,83,94,bb,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,86,9a,65,02,46,ec,04,47,83,94,bb,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(496)
c:\windows\system32\WININET.dll
c:\program files\McAfee Online Backup\MOBKshell.dll
.
------------------------ Other Running Processes ------------------------
.
c:\progra~1\mcafee.com\agent\mcagent.exe
.
**************************************************************************
.
Completion time: 2011-12-02 07:51:31 - machine was rebooted
ComboFix-quarantined-files.txt 2011-12-02 14:51
.
Pre-Run: 4,736,737,280 bytes free
Post-Run: 7,452,295,168 bytes free
.
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
.
- - End Of File - - B5193A41D849E3A2EB979D9818EC6265

#10 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:03:45 PM

Posted 03 December 2011 - 02:34 AM

Hi harbz!

For the time being, no, please keep McAfee disabled.

No, MalwareBytes' Anti-Malaware can not replace McAfee.

MalwareBytes' Anti-Malware is an Anti-Malware program where as McAfee is your Anti-Virus program.

Instead they can work together to keep your computer protected.


ComboFix Script
  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

KillAll::
File::
c:\documents and settings\Grant Harbison\Application Data\uszu.exe

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix will now run a scan on your system. If ComboFix prompts you to update to the newest version, please allow it to do so. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.



NEXT:



Malwarebytes' Anti-Malware

I see that you have Malwarebytes' Anti-Malware installed on your computer could you please do a scan using these settings:

  • Open Malwarebytes' Anti-Malware
  • Select the Update tab
  • Click Check for Updates
  • After the update have been completed, Select the Scanner tab.
  • Select Perform quick scan, then click on Scan
  • Leave the default options as it is and click on Start Scan
  • When done, you will be prompted. Click OK, then click on Show Results
  • Checked (ticked) all items and click on Remove Selected
  • After it has removed the items, Notepad will open. Please post this log in your next reply. You can also find the log in the Logs tab. The bottom most log is the latest
Extra Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT:



ESET Online Scanner
I'd like us to scan your machine with ESET Online Scan

Note: It is recommended to disable on-board anti-virus program and anti-spyware programs while performing scans so there are no conflicts and it will speed up scan time.
Please don't go surfing while your resident protection is disabled!
Once the scan is finished remember to re-enable your anti-virus along with your anti-spyware programs.



  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Make sure that the option "Remove found threats" is Unchecked
  • When the Computer scan settings display shows, click the Advanced option, the place a check next to the following (if it is not already checked):
    • Enable Anti-Stealth technology
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin
    scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as
    ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NEXT:



Security Check
Download Security Check by screen317 from here or here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#11 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 03 December 2011 - 07:15 PM

Here is the next ComboFix log. Thanks again!

ComboFix 11-12-03.01 - Administrator 12/03/2011 16:52:57.2.2 - x86 NETWORK
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3327.2915 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Firewall *Disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
.
FILE ::
"c:\documents and settings\Grant Harbison\Application Data\uszu.exe"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Grant Harbison\Application Data\uszu.exe
.
.
((((((((((((((((((((((((( Files Created from 2011-11-04 to 2011-12-04 )))))))))))))))))))))))))))))))
.
.
2011-12-01 14:36 . 2011-12-01 14:36 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Adobe
2011-12-01 14:17 . 2011-12-01 14:17 -------- d-----w- C:\_OTS
2011-11-30 14:00 . 2011-11-30 14:00 -------- d-----w- C:\_OTM
2011-11-30 13:57 . 2011-11-30 13:58 72885796 ----a-w- C:\registrybackup.reg
2011-11-30 01:14 . 2011-11-30 01:14 -------- d-----w- c:\documents and settings\Default User\Local Settings\Application Data\Microsoft Help
2011-11-29 23:50 . 2011-11-29 23:50 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-11-27 19:53 . 2011-11-27 19:53 -------- d-----w- c:\windows\PIF
2011-11-25 13:37 . 2011-11-25 13:37 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple Computer
2011-11-25 13:06 . 2011-11-26 12:49 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin7.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin6.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin5.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin4.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin3.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin2.dll
2011-11-09 06:03 . 2011-11-09 06:03 159744 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin.dll
2011-11-09 06:03 . 2011-11-09 06:03 -------- d-----w- c:\program files\QuickTime
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-11-30 03:33 . 2008-12-05 08:27 57600 ----a-w- c:\windows\system32\drivers\redbook.sys
2011-11-22 00:07 . 2011-05-22 14:58 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-24 21:29 . 2011-10-24 21:29 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2011-10-24 21:29 . 2011-10-24 21:29 69632 ----a-w- c:\windows\system32\QuickTime.qts
2011-10-15 20:16 . 2010-04-24 08:52 9608 ----a-w- c:\windows\system32\drivers\mfeclnk.sys
2011-10-15 20:16 . 2010-04-24 08:52 89792 ----a-w- c:\windows\system32\drivers\mfetdi2k.sys
2011-10-15 20:16 . 2010-04-24 08:52 87656 ----a-w- c:\windows\system32\drivers\mferkdet.sys
2011-10-15 20:16 . 2010-04-24 08:52 83856 ----a-w- c:\windows\system32\drivers\mfendisk.sys
2011-10-15 20:16 . 2010-04-24 08:52 59456 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2011-10-15 20:16 . 2010-04-24 08:52 57600 ----a-w- c:\windows\system32\drivers\cfwids.sys
2011-10-15 20:16 . 2010-04-24 08:52 464176 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2011-10-15 20:16 . 2010-04-24 08:52 338176 ----a-w- c:\windows\system32\drivers\mfefirek.sys
2011-10-15 20:16 . 2010-04-24 08:52 180816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2011-10-15 20:16 . 2010-04-24 08:52 121256 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
2011-10-10 14:22 . 2008-12-05 13:39 692736 ------w- c:\windows\system32\inetcomm.dll
2011-09-28 07:06 . 2004-08-04 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-26 17:41 . 2008-07-29 23:59 611328 ----a-w- c:\windows\system32\uiautomationcore.dll
2011-09-26 17:41 . 2004-08-04 12:00 220160 ----a-w- c:\windows\system32\oleacc.dll
2011-09-26 17:41 . 2004-08-04 12:00 20480 ----a-w- c:\windows\system32\oleaccrc.dll
2011-09-06 13:20 . 2004-08-04 12:00 1858944 ------w- c:\windows\system32\win32k.sys
2004-08-04 12:00 94784 --sh--w- c:\windows\twain.dll
2008-04-14 00:12 50688 --sh--w- c:\windows\twain_32.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2011-12-02_14.49.17 )))))))))))))))))))))))))))))))))))))))))
.
- 2004-08-04 12:00 . 2011-12-02 14:42 68860 c:\windows\system32\perfc009.dat
+ 2004-08-04 12:00 . 2011-12-04 00:05 68860 c:\windows\system32\perfc009.dat
+ 2004-08-04 12:00 . 2011-12-04 00:05 436348 c:\windows\system32\perfh009.dat
- 2004-08-04 12:00 . 2011-12-02 14:42 436348 c:\windows\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\MOBK]
@="{3c3f3c1a-9153-7c05-f938-622e7003894d}"
[HKEY_CLASSES_ROOT\CLSID\{3c3f3c1a-9153-7c05-f938-622e7003894d}]
2010-02-06 01:14 2871608 ----a-w- c:\program files\McAfee Online Backup\MOBKshell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\MOBK2]
@="{e6ea1d7d-144e-b977-98c4-84c53c1a69d0}"
[HKEY_CLASSES_ROOT\CLSID\{e6ea1d7d-144e-b977-98c4-84c53c1a69d0}]
2010-02-06 01:14 2871608 ----a-w- c:\program files\McAfee Online Backup\MOBKshell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\MOBK3]
@="{b4caf489-1eec-c617-49ad-8d7088598c06}"
[HKEY_CLASSES_ROOT\CLSID\{b4caf489-1eec-c617-49ad-8d7088598c06}]
2010-02-06 01:14 2871608 ----a-w- c:\program files\McAfee Online Backup\MOBKshell.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-09-18 13574144]
"nwiz"="nwiz.exe" [2008-09-18 1657376]
"Six Engine"="c:\program files\ASUS\EPU-6 Engine\SixEngine.exe" [2008-06-03 5964800]
"RTHDCPL"="RTHDCPL.EXE" [2008-05-16 16862720]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-09-18 86016]
"McPvTray"="c:\program files\McAfee\Anti-Theft\McPvTray.exe" [2009-11-17 670312]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2011-09-17 1318552]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-09-07 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"LogitechQuickCamRibbon"="c:\program files\Logitech\Logitech WebCam Software\LWS.exe" [2009-10-14 2793304]
"CanonSolutionMenu"="c:\program files\Canon\SolutionMenu\CNSLMAIN.exe" [2008-03-11 689488]
"CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2008-03-18 1848648]
"IJNetworkScanUtility"="c:\program files\Canon\Canon IJ Network Scan Utility\CNMNSUT.EXE" [2007-05-21 124512]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-10-10 421736]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2011-10-24 421888]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\SiSoftware\\SiSoftware Sandra Lite 2009.SP2\\RpcAgentSrv.exe"=
"c:\\Program Files\\SiSoftware\\SiSoftware Sandra Lite 2009.SP2\\WNt500x86\\RpcSandraSrv.exe"=
"c:\\Program Files\\Common Files\\McAfee\\McSvcHost\\McSvHost.exe"=
"e:\\Program Files\\Microsoft Office\\Office14\\ONENOTE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office14\\OUTLOOK.EXE"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Logitech\\Vid HD\\Vid.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
"AllowInboundEchoRequest"= 1 (0x1)
.
R0 McPvDrv;McPvDrv Driver;c:\windows\system32\drivers\McPvDrv.sys [11/17/2009 9:15 AM 63080]
R0 mv61xx;mv61xx;c:\windows\system32\drivers\mv61xx.sys [6/23/2008 3:21 PM 150568]
R1 mfetdi2k;McAfee Inc. mfetdi2k;c:\windows\system32\drivers\mfetdi2k.sys [4/24/2010 1:52 AM 89792]
R2 McMPFSvc;McAfee Personal Firewall Service;"c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [4/24/2010 1:52 AM 214904]
R2 mfefire;McAfee Firewall Core Service;c:\program files\Common Files\McAfee\SystemCore\mfefire.exe [4/24/2010 1:53 AM 160608]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\program files\Common Files\McAfee\SystemCore\mfevtps.exe [4/24/2010 1:52 AM 150856]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [4/24/2010 1:52 AM 338176]
R3 mfendiskmp;mfendiskmp;c:\windows\system32\drivers\mfendisk.sys [4/24/2010 1:52 AM 83856]
S1 MOBKFilter;MOBKFilter;c:\windows\system32\drivers\MOBK.sys [6/11/2010 5:07 AM 54776]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/10/2010 4:39 AM 135664]
S2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\McAfee\SiteAdvisor\McSACore.exe [12/5/2008 5:19 PM 94880]
S2 McNaiAnn;McAfee VirusScan Announcer;"c:\program files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [4/24/2010 1:52 AM 214904]
S2 MOBKbackup;McAfee Online Backup;c:\program files\McAfee Online Backup\MOBKbackup.exe [2/5/2010 6:14 PM 229688]
S3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [4/24/2010 1:52 AM 57600]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/10/2010 4:39 AM 135664]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;c:\windows\system32\drivers\mfendisk.sys [4/24/2010 1:52 AM 83856]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [4/24/2010 1:52 AM 87656]
S3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [1/9/2010 8:37 PM 4640000]
S3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\SiSoftware\SiSoftware Sandra Lite 2009.SP2\RpcAgentSrv.exe [12/14/2008 2:02 PM 98488]
.
Contents of the 'Scheduled Tasks' folder
.
2011-11-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 23:57]
.
2011-11-30 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-10 11:39]
.
2011-11-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-10 11:39]
.
2011-11-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005Core.job
- c:\documents and settings\Beth Harbison\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-07 11:09]
.
2011-11-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-448539723-1390067357-839522115-1005UA.job
- c:\documents and settings\Beth Harbison\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-07 11:09]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~1\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - e:\progra~1\MICROS~1\Office14\ONBttnIE.dll/105
TCP: DhcpNameServer = 10.0.0.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-12-03 17:08
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-448539723-1390067357-839522115-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,86,9a,65,02,46,ec,04,47,83,94,bb,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,86,9a,65,02,46,ec,04,47,83,94,bb,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(1924)
c:\windows\system32\WININET.dll
c:\program files\McAfee Online Backup\MOBKshell.dll
.
------------------------ Other Running Processes ------------------------
.
c:\progra~1\mcafee.com\agent\mcagent.exe
.
**************************************************************************
.
Completion time: 2011-12-03 17:10:39 - machine was rebooted
ComboFix-quarantined-files.txt 2011-12-04 00:10
ComboFix2.txt 2011-12-02 14:51
.
Pre-Run: 7,437,275,136 bytes free
Post-Run: 7,435,476,992 bytes free
.
- - End Of File - - 1592F20DCB38B7EA14F741C07A829332

#12 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 03 December 2011 - 07:23 PM

Had to download and reinstall MBAM. Not sure why. But once I did, it ran fine, here is the log.

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8300

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

12/3/2011 5:22:36 PM
mbam-log-2011-12-03 (17-22-36).txt

Scan type: Quick scan
Objects scanned: 236166
Time elapsed: 2 minute(s), 12 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#13 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 03 December 2011 - 09:02 PM

I thought I had disabled all my AV programs. ESET Online detected the presence of McAfee Total Protection even though I had disabled all scanning, firewall, etc. I ran ESET Online anyway and the log is pasted below.

Am now re-enabling all McAfee programs. Thanks so much for your ongoing help!

C:\Qoobox\Quarantine\C\Documents and Settings\Grant Harbison\Application Data\uszu.exe.vir a variant of Win32/Injector.LLR trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP892\A0141258.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP892\A0141278.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141564.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141837.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141843.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141849.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141855.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141864.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0142864.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0142873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0143873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0144873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0145873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0145879.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0145891.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0146891.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146928.exe Win32/Adware.HDDRescue.AB application
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146936.exe a variant of Win32/Kryptik.WIP trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146937.exe a variant of Win32/Injector.LLR trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146938.exe a variant of Win32/Kryptik.WIT trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147184.exe a variant of Win32/Kryptik.WGO trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147189.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147199.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147205.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147211.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147219.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0148519.exe a variant of Win32/Injector.LLR trojan
C:\_OTM\MovedFiles\11302011_070002\c_documents and settings\all users\application data\sxj5Hve9jhpEDa.exe Win32/Adware.HDDRescue.AB application
C:\_OTM\MovedFiles\11302011_070002\c_documents and settings\all users\application data\YKNNWfXiCRNj.exe a variant of Win32/Kryptik.WIP trojan
C:\_OTM\MovedFiles\11302011_070002\c_windows\system32\0.24045645028803986.exe a variant of Win32/Kryptik.WGO trojan
C:\_OTS\MovedFiles\12012011_071741\C_Documents and Settings\Grant Harbison\Local Settings\Application Data\akb.exe a variant of Win32/Kryptik.WIT trojan

#14 harbz

harbz
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 03 December 2011 - 09:09 PM

Here is checkup.txt

Results of screen317's Security Check version 0.99.28
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Enabled!
ESET Online Scanner v3
McAfee Total Protection
McAfee Virtual Technician
McAfee Online Backup
McAfee Anti-Theft
McAfee Online Backup
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Winferno Registry Power Cleaner
Java™ 6 Update 18
Java version out of date!
Adobe Reader 9 Adobe Reader out of date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

``````````End of Log````````````

Also: for some reason McAfee total protection is not letting me turn on real-time scanning. Should I reinstall it?

#15 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:03:45 PM

Posted 04 December 2011 - 02:14 AM

Hi!

Thanks so much for your ongoing help!

You're more than welcome!

Also: for some reason McAfee total protection is not letting me turn on real-time scanning. Should I reinstall it?

Yes, you may have better luck by re-installing the application.

These threat(s) below are currently in Quarantine/System Restore and shall be removed when we clean up our tools later on.

C:\Qoobox\Quarantine\C\Documents and Settings\Grant Harbison\Application Data\uszu.exe.vir a variant of Win32/Injector.LLR trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP892\A0141258.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP892\A0141278.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141564.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141837.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141843.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141849.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141855.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0141864.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0142864.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0142873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0143873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0144873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0145873.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0145879.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0145891.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP894\A0146891.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146928.exe Win32/Adware.HDDRescue.AB application
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146936.exe a variant of Win32/Kryptik.WIP trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146937.exe a variant of Win32/Injector.LLR trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0146938.exe a variant of Win32/Kryptik.WIT trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147184.exe a variant of Win32/Kryptik.WGO trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147189.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147199.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147205.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147211.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0147219.sys a variant of Win32/Rootkit.Kryptik.FJ trojan
C:\System Volume Information\_restore{E33A1DDB-ACF4-4CBA-8F4F-5A76F8C43D41}\RP895\A0148519.exe a variant of Win32/Injector.LLR trojan
C:\_OTM\MovedFiles\11302011_070002\c_documents and settings\all users\application data\sxj5Hve9jhpEDa.exe Win32/Adware.HDDRescue.AB application
C:\_OTM\MovedFiles\11302011_070002\c_documents and settings\all users\application data\YKNNWfXiCRNj.exe a variant of Win32/Kryptik.WIP trojan
C:\_OTM\MovedFiles\11302011_070002\c_windows\system32\0.24045645028803986.exe a variant of Win32/Kryptik.WGO trojan
C:\_OTS\MovedFiles\12012011_071741\C_Documents and Settings\Grant Harbison\Local Settings\Application Data\akb.exe a variant of Win32/Kryptik.WIT trojan


____________________________________________________

From the looks of your SecurityCheck log, I can see that we have some outdated programs that need to be updated.

Lets address those programs that need updating now!

Java Outdated

Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform:
    • 32-bit Select: Windows x86 Offline.
    • 64-bit Select: Windows x64.
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7-windows-i586.exe to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.


NEXT



Update Adobe Reader
Earlier versions of Adobe Reader have known security flaws so it is recommended that you update your copy
  • Go to Start > Control Panel > Add/Remove Programs
  • Remove ALL instances of Adobe Reader
  • Re-boot your computer as required.
  • Once ALL versions of Adobe Reader have been uninstalled, visit: <<here>> and download the latest version of Adobe Reader
Alternative Option: after uninstalling Adobe Reader, you could try installing Foxit Reader from >here< Foxit Reader has fewer add-ons therefore loads more quickly.



NEXT:



OTL Fix

We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.
    :Services
    :OTL
    
    :Reg
    
    :Files
    ipconfig /flushdns /c
    :Commands
    [purity]
    [resethosts]
    [CreateRestorePoint]
    [emptytemp]
    [EMPTYFLASH]
    
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click the OK button.
  • A report will open. Copy and Paste that report in your next reply.
  • If the machine reboots, the log will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.


NEXT:



OTL Custom Scan

We need to run an OTL Custom Scan
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.


    netsvcs
    drivers32
    hklm\software\clients\startmenuinternet|command /rs
    %USERPROFILE%\AppData\Local\Google\Chrome\User Data\*.* /s
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs

  • Push the Posted Image button.
  • A report will open. Copy and Paste that report in your next reply.


NEXT:



What outstanding issues (if any) are you still experiencing with your computer?

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users