Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Desktop Trouble, Computer Stops Working! [RESOLVED]


  • This topic is locked This topic is locked

#1
jstribtpt

jstribtpt

    Member

  • Member
  • PipPip
  • 20 posts
Well, im on my new laptop and i am trying to help fix my moms desktop, everytime she tryies to go on and check her email it freezes up and the desktop icons dissapear, and also the blue status bar at the bottom goes away and dosent come back... so i was wondering if there was anthing any one could tell me to do to help me out... that would be much appreciated.

This is my HijackThis Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:06:01 PM, on 4/13/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\windows\system\hpsysdrv.exe
C:\WINDOWS\System32\hkcmd.exe
C:\windows\system\hpsysdrv .exe
C:\WINDOWS\System32\hkcmd .exe
C:\WINDOWS\system32\ps2.exe
C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
C:\WINDOWS\system32\ps2 .exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus7.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus7.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-qus7.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://srch-qus7.hpwis.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://qus7.hpwis.com/
F3 - REG:win.ini: load=C:\WINDOWS\System32\pmkjj.exe
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Common\ycomp5,0,8,0.dll
O4 - HKLM\..\Run: [BlockTracker] c:\hp\bin\BlockTracker.exe
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
O4 - HKLM\..\Run: [StorageGuard] "C:\Program Files\VERITAS Software\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded
O4 - HKLM\..\Run: [BCNT] C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - S-1-5-18 Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'SYSTEM')
O4 - S-1-5-18 Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'SYSTEM')
O4 - .DEFAULT Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'Default user')
O4 - .DEFAULT Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'Default user')
O4 - .DEFAULT User Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'Default user')
O4 - .DEFAULT User Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'Default user')
O4 - Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
O4 - Global Startup: Quicken Scheduled Updates.lnk = C:\Program Files\Quicken\bagent.exe
O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoft...s/as2stubie.cab
O23 - Service: Content Monitoring Tool (msCMTSrvc) - Unknown owner - C:\WINDOWS\system32\msCMTSrvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

--
End of file - 4835 bytes



This is my Malwarebytes' Anti-Malware Log:

Malwarebytes' Anti-Malware 1.11
Database version: 615

Scan type: Quick Scan
Objects scanned: 68512
Time elapsed: 18 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 13
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 10
Files Infected: 128

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\pmkjj.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\system32\tyukxcdc.dll (Trojan.Vundo) -> Unloaded module successfully.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5dfa7abc-bba0-45fd-bf58-69784d2a11c3} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{5dfa7abc-bba0-45fd-bf58-69784d2a11c3} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\jkwslist (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\aldd (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Juan (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\54906eda (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM57a35d46 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load (Trojan.Vundo) -> Data: c:\windows\system32\pmkjj.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\pmkjj -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\pmkjj -> Delete on reboot.

Folders Infected:
C:\WINDOWS\system32\f02WtR (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\capcom (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cfig322 (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\D2 (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drvr2 (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\o08PrEz (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\Accoona (Adware.Accoona) -> Quarantined and deleted successfully.
C:\Program Files\e-zshopper (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\acespy (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\Spruce (Adware.Spruce) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\kikhmbkw.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pepolykj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pepolykj.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pmkjj.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\pmkjj.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jjkmp.ini (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\jjkmp.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pyiwgqga.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\agqgwiyp.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qqkhzqyu.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twezhxax.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tyukxcdc.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\cdcxkuyt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tzqjaese.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uzdakvgj.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vgljnsfg.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ynxjoxid.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ynxjoxid.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cru629.dat (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ldcore(2).dll (Trojan.DownLoader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tuvtrpp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\users32.dat (Adware.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\windows (Trojan.Zapchast) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\UGA6P_0001_N122M2210NetInstaller.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\WINDOWS\cru629.dat (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\Program Files\Common Files\mebel22011.exe (Adware.TTC) -> Quarantined and deleted successfully.
C:\Program Files\Accoona\ASearchAssist.dll (Adware.Accoona) -> Quarantined and deleted successfully.
C:\Program Files\e-zshopper\BarLcher.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\acespy\systune.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\acespy\__acelog.ndx (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ypgccfef.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pac.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\japanese1.zip (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\os1zn2mO7Z.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\rs.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sft.res (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lt.res (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gebbccd.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fccdbxu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jkklkkk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nnnlkhh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ssqoppm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ldinfo.ldr (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\CONFLICT.1\xpreload.ocx (Heuristics.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\xpreload.ocx (Heuristics.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\System32KBRunOnce2.tm_ (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\System32KBRunOnce2.t__ (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\KBRunOnce2.t__ (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\bg_bg.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\blank.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\box_1.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\box_2.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\box_3.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\button_buynow.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\button_freescan.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\cell_bg.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\cell_footer.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\cell_header_block.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\cell_header_remove.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\cell_header_scan.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\close_ico.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\download_box.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\download_btn.jpg (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\download_now_btn.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\footer_back.jpg (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_1.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_2.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_3.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_4.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_red_bg.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_red_free_scan.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_red_free_scan_bg.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\header_red_protect_your_pc.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\icon_warning_big.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\infected.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\main_back.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\perfect_cleaner_box.jpg (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\product_1_header.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\product_1_name_small.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\product_2_header.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\product_2_name_small.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\product_3_header.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\product_3_name_small.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\product_features.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\rating.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\remove_spyware_header.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\screenshot.jpg (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\sep_hor.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\sep_vert.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\shadow.jpg (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\shadow_bg.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\spacer.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\spy_away_box.jpg (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\spyware_detected.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\star.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\star_gray.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\star_gray_small.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\star_small.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\style.css (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\v.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\warning_ico.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\warning_icon.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\win_logo.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\x.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\yellow_warning_ico.gif (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\absolute key logger.lnk (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\acontidialer.txt (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\adbar.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\daxtime.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\dp0.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\eventlowg.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\fhfmm-Uninstaller.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\ie_32.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\jd2002.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\kkcomp$.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\liqad$.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\liqui-Uninstaller.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\ngd.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\spredirect.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\wbeInst$.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\xadbrk_.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\xxxvideo.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Desktop\Help and Support Center.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lsass.ex_ (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\services.ex_ (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\svchost.ex_ (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winlogon.ex_ (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.
C:\WINDOWS\explorer.ex_ (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.






And this my SUPERAntiSpyware Log:

SUPERAntiSpyware Scan Log
Generated 04/11/2008 at 11:45 PM

Application Version : 3.6.1000

Core Rules Database Version : 3437
Trace Rules Database Version: 1429

Scan type : Complete Scan
Total Scan Time : 01:16:29

Memory items scanned : 285
Memory threats detected : 3
Registry items scanned : 3982
Registry threats detected : 16
File items scanned : 63878
File threats detected : 833

Trojan.Vundo/Variant-Installer/A
C:\WINDOWS\SYSTEM\HPSYSDRV.EXE
C:\WINDOWS\SYSTEM\HPSYSDRV.EXE
C:\WINDOWS\SYSTEM32\HKCMD.EXE
C:\WINDOWS\SYSTEM32\HKCMD.EXE
C:\WINDOWS\SYSTEM32\PS2.EXE
C:\WINDOWS\SYSTEM32\PS2.EXE
[hpsysdrv] C:\WINDOWS\SYSTEM\HPSYSDRV.EXE
[HotKeysCmds] C:\WINDOWS\SYSTEM32\HKCMD.EXE
[KBD] C:\HP\KBD\KBD.EXE
C:\HP\KBD\KBD.EXE
[StorageGuard] C:\PROGRAM FILES\VERITAS SOFTWARE\UPDATE MANAGER\SGTRAY.EXE
C:\PROGRAM FILES\VERITAS SOFTWARE\UPDATE MANAGER\SGTRAY.EXE
[TkBellExe] C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
[MoneyStartUp10.0] C:\PROGRAM FILES\MICROSOFT MONEY\SYSTEM\ACTIVATION.EXE
C:\PROGRAM FILES\MICROSOFT MONEY\SYSTEM\ACTIVATION.EXE
[Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
C:\WINDOWS\SMINST\RECGUARD.EXE
[BCNT] C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE
C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE
[PS2] C:\WINDOWS\SYSTEM32\PS2.EXE
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\SGTRAY.EXE
C:\PROGRAM FILES\AIM6\AIM6.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\DESKTOP\AIM 6.LNK
C:\DOCUMENTS AND SETTINGS\ALL USERS\START MENU\PROGRAMS\AIM\AIM 6.LNK
C:\PROGRAM FILES\PC TOOLS FIREWALL PLUS\FIREWALLGUI.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\START MENU\PROGRAMS\PC TOOLS FIREWALL PLUS\PC TOOLS FIREWALL PLUS.LNK
C:\DOCUMENTS AND SETTINGS\DEFAULT USER\APPLICATION DATA\MICROSOFT\INTERNET EXPLORER\QUICK LAUNCH\AIM 6.LNK
C:\DOCUMENTS AND SETTINGS\DEFAULT USER\DESKTOP\AIM 6.LNK
C:\DOCUMENTS AND SETTINGS\DEFAULT USER\DESKTOP\JONATHANS ITEMS\AIM 6.LNK
C:\DOCUMENTS AND SETTINGS\OWNER\APPLICATION DATA\MICROSOFT\INTERNET EXPLORER\QUICK LAUNCH\AIM 6.LNK
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\AIM 6.LNK
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\JONATHANS ITEMS\AIM 6.LNK
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\JONATHANS ITEMS\PC TOOLS FIREWALL PLUS.LNK
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\JONATHANS ITEMS\VERITAS STUFF\VERITAS SOFTWARE\UPDATE MANAGER\SGTRAY.EXE
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\PC TOOLS FIREWALL PLUS.LNK
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX104.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX11C.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX11F.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX137.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX149.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX149A.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX14A0.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX14AC.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX14AF.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX14B5.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX14C.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX15.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX164.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX19.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX1A.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX1B.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX1E.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX1F.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX20.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX21.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX22.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX24.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX26.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX27.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX28.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX29.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX2A.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX2B.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX2C.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX2E.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX2F.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX3.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX31.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX33.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX37.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX39.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX3A.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX3C.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX3D.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX58.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX6.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX62.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX6E.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX70.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX71.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX71C1.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX71D0.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX71D3.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX71DC.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX73.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75BB.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75BE.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75C7.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75CA.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75CD.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75E9.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75EC.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75F5.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75F8.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX75FB.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX76.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX7663.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX7666.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX766F.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX7672.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX7675.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX7691.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX7694.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX769D.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX76A0.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX76A3.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX78.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX7F.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX82.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX85.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX86B7.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX86BA.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX86C6.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX86C9.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8CCC.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8CDF.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8CE2.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8CE8.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8CEF.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8D04.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8D07.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX8D0D.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCX9.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCXC.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCXC8.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCXCB.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCXCE.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\RCXF.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\TMP10.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\TMP5D.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\TMP5E.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\TMP6E.TMP
C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\TMP9D.TMP
C:\PROGRAM FILES\AIM6\AIM6 .EXE
C:\PROGRAM FILES\AWS\WEATHERBUG\BCNT.EXE
C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\1.2.1128.5462\GOOGLETOOLBARNOTIFIER.EXE
C:\PROGRAM FILES\JAVA\JRE1.6.0_01\BIN\JUSCHED.EXE
C:\PROGRAM FILES\JAVA\JRE1.6.0_03\BIN\JUSCHED.EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK .EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE
C:\PROGRAM FILES\SBC SELF SUPPORT TOOL\SMARTBRIDGE\MOTIVESB.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001693.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001694.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001695.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001696.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001697.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001698.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001700.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001701.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001702.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001716.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001729.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001730.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001731.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001732.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001733.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001734.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001735.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001736.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001739.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001741.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP10\A0001751.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001767.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001768.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001769.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001770.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001771.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001773.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001774.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001775.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001776.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001778.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001779.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001788.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001809.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001810.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001811.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001812.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001813.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001814.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001815.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001816.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001817.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001818.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001819.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001831.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001847.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001848.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001849.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001850.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001851.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001852.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001853.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001854.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001855.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001857.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001870.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001892.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001893.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001894.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001895.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001896.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001897.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001898.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001899.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001900.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001901.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001903.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001913.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0001927.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002000.LNK
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002013.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002015.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002016.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002017.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002018.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002019.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002020.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002021.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002022.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002024.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002026.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002037.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002058.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002064.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002066.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002067.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002068.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002069.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002070.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002071.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002072.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002073.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002074.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002075.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002076.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002077.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0002087.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003062.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003065.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003066.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003067.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003068.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003069.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003070.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003071.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003072.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003073.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003075.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003076.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003077.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0003088.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004062.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004065.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004066.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004067.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004068.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004069.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004070.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004071.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004072.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004073.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004075.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004076.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004077.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP11\A0004091.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005059.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005064.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005067.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005068.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005069.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005070.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005071.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005072.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005073.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005074.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005076.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005077.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005087.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005103.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005108.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005110.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005111.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005112.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005113.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005114.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005115.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005117.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP12\A0005128.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005147.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005148.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005149.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005150.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005151.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005152.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005153.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005155.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP13\A0005167.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005187.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005188.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005189.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005190.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005191.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005192.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005193.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005195.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005196.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP14\A0005206.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005237.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005238.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005239.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005240.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005241.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005242.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005243.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005244.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005245.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005246.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005256.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005261.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005270.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005271.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005272.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005273.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005274.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005276.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005277.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005279.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005285.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005315.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005330.LNK
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005385.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005388.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005396.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005403.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005407.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005408.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP15\A0005570.EXE

Edited by jstribtpt, 13 April 2008 - 05:07 PM.

  • 0

Advertisements


#2
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Hi there and sorry for the delay - could I have a fresh look at your system

Please download Deckard's System Scanner (DSS) and save it to your Desktop.
  • Close all other windows before proceeding.
  • Double-click on dss.exe and follow the prompts.
  • When it has finished, dss will open two Notepads main.txt and extra.txt -- please copy (CTRL+A and then CTRL+C) and paste (CTRL+V) the contents of main.txt and extra.txt in your next reply.

  • 0

#3
jstribtpt

jstribtpt

    Member

  • Topic Starter
  • Member
  • PipPip
  • 20 posts
Hey essexboy,

Thankyou for responding, i was starting to think that i did somthing worng LoL. But any way here is my DDS Log

main.txt:

Deckard's System Scanner v20071014.68
Run by Owner on 2008-04-14 16:19:54
Computer is in Normal Mode.
--------------------------------------------------------------------------------

-- System Restore --------------------------------------------------------------

Successfully created a Deckard's System Scanner Restore Point.


-- Last 5 Restore Point(s) --
25: 2008-04-14 23:19:57 UTC - RP25 - Deckard's System Scanner Restore Point
24: 2008-04-12 16:59:40 UTC - RP24 - Last known good configuration
23: 2008-04-12 16:59:36 UTC - RP23 - Installed SUPERAntiSpyware Free Edition
22: 2008-04-12 16:59:35 UTC - RP22 - Removed iTunes
21: 2008-04-12 16:59:35 UTC - RP21 - geeks to go


-- First Restore Point --
1: 2008-04-12 16:59:13 UTC - RP1 - System Checkpoint


Backed up registry hives.
Performed disk cleanup.

Total Physical Memory: 504 MiB (512 MiB recommended).


-- HijackThis (run as Owner.exe) -----------------------------------------------

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:20:55 PM, on 4/14/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\windows\system\hpsysdrv.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\VERITAS Software\Update Manager\sgtray.exe
C:\windows\system\hpsysdrv .exe
C:\WINDOWS\System32\hkcmd .exe
C:\WINDOWS\system32\ps2.exe
C:\Program Files\VERITAS Software\Update Manager\sgtray .exe
C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
C:\WINDOWS\system32\ps2 .exe
C:\Documents and Settings\Owner\Desktop\Computer fix files\dss.exe
C:\PROGRA~1\TRENDM~1\HIJACK~1\Owner.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus7.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus7.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-qus7.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://srch-qus7.hpwis.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://qus7.hpwis.com/
F3 - REG:win.ini: load=C:\WINDOWS\System32\pmkjj.exe
O2 - BHO: (no name) - {ACC23AF7-8FC9-40E3-A61E-DEF6726DD220} - C:\WINDOWS\System32\pmkjj.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Common\ycomp5,0,8,0.dll
O4 - HKLM\..\Run: [BlockTracker] c:\hp\bin\BlockTracker.exe
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
O4 - HKLM\..\Run: [StorageGuard] "C:\Program Files\VERITAS Software\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded
O4 - HKLM\..\Run: [BCNT] C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - S-1-5-18 Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'SYSTEM')
O4 - S-1-5-18 Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'SYSTEM')
O4 - .DEFAULT Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'Default user')
O4 - .DEFAULT Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'Default user')
O4 - .DEFAULT User Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'Default user')
O4 - .DEFAULT User Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'Default user')
O4 - Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
O4 - Global Startup: Quicken Scheduled Updates.lnk = C:\Program Files\Quicken\bagent.exe
O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoft...s/as2stubie.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Content Monitoring Tool (msCMTSrvc) - Unknown owner - C:\WINDOWS\system32\msCMTSrvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

--
End of file - 5142 bytes

-- File Associations -----------------------------------------------------------

.reg - regfile - shell\open\command - regedit.exe "%1" %*
.scr - scrfile - shell\open\command - "%1" %*


-- Drivers: 0-Boot, 1-System, 2-Auto, 3-Demand, 4-Disabled ---------------------

R1 SASDIFSV - c:\program files\superantispyware\sasdifsv.sys
R1 SASKUTIL - c:\program files\superantispyware\saskutil.sys
R3 pfc (Padus ASPI Shell) - c:\windows\system32\drivers\pfc.sys <Not Verified; Padus, Inc.; Padus® ASPI Shell>

S3 SASENUM - c:\program files\superantispyware\sasenum.sys <Not Verified; SuperAdBlocker, Inc.; SuperAntiSpyware>


-- Services: 0-Boot, 1-System, 2-Auto, 3-Demand, 4-Disabled --------------------

S3 msCMTSrvc (Content Monitoring Tool) - c:\windows\system32\mscmtsrvc.exe


-- Device Manager: Disabled ----------------------------------------------------

Class GUID:
Description: PCI Simple Communications Controller
Device ID: PCI\VEN_01C1&DEV_044E&SUBSYS_044E0235&REV_02\4&2C53C0AE&0&58F0
Manufacturer:
Name: PCI Simple Communications Controller
PNP Device ID: PCI\VEN_01C1&DEV_044E&SUBSYS_044E0235&REV_02\4&2C53C0AE&0&58F0
Service:


-- Scheduled Tasks -------------------------------------------------------------

2008-02-21 16:20:08 284 --a------ C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
2008-02-06 03:29:00 330 --ah----- C:\WINDOWS\Tasks\MP Scheduled Scan.job


-- Files created between 2008-03-14 and 2008-04-14 -----------------------------

2008-04-14 16:13:56 85056 --a------ C:\WINDOWS\System32\mehibcvw.dll
2008-04-14 16:10:57 92224 --a------ C:\WINDOWS\System32\pnxkwvvt.dll
2008-04-14 16:10:56 3648 --a------ C:\WINDOWS\System32\oarxviho.dll
2008-04-14 16:08:58 96320 --a------ C:\WINDOWS\System32\vtekowtm.dll
2008-04-12 09:59:05 348160 --a------ C:\WINDOWS\System32\pmkjj.exe
2008-04-12 09:59:02 266999 --ahs---- C:\WINDOWS\System32\jjkmp.ini2
2008-04-11 23:51:54 0 d-------- C:\Program Files\Panda Security
2008-04-11 22:31:37 0 --a------ C:\WINDOWS\ORUN32.EXE
2008-04-11 22:31:33 0 --a------ C:\WINDOWS\System32\CMMGR32.EXE
2008-04-11 22:24:57 0 d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-04-11 22:24:52 0 d-------- C:\Program Files\SUPERAntiSpyware
2008-04-11 22:24:52 0 d-------- C:\Documents and Settings\Owner\Application Data\SUPERAntiSpyware.com
2008-04-11 21:49:31 0 d-------- C:\Documents and Settings\Owner\Application Data\Malwarebytes
2008-04-11 21:49:23 0 d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-04-11 21:49:23 0 d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-04-11 21:49:02 0 d-------- C:\Program Files\Common Files\Download Manager
2008-04-11 21:41:44 86080 -----n--- C:\WINDOWS\System32\tyukxcdc.dll
2008-04-11 21:39:22 91712 --a------ C:\WINDOWS\System32\llbaunxr.dll
2008-04-11 21:39:20 3648 --a------ C:\WINDOWS\System32\oprfjhsx.dll
2008-04-11 21:34:31 94784 --a------ C:\WINDOWS\System32\dlwohkhu.dll
2008-04-11 21:30:03 0 dr-h----- C:\Documents and Settings\Owner\Recent


-- Find3M Report ---------------------------------------------------------------

2008-04-14 16:17:27 431104 --a------ C:\WINDOWS\System32\ps2.exe <Not Verified; Hewlett-Packard Company; Hewlett-Packard Company PS2 EXE>
2008-04-14 16:17:23 463872 --a------ C:\WINDOWS\System32\hkcmd.exe <Not Verified; Intel Corporation; Intel® Common User Interface>
2008-04-12 09:58:55 344576 -----n--- C:\WINDOWS\System32\pmkjj.dll
2008-04-11 22:31:38 0 d-------- C:\Program Files\PC-Doctor
2008-04-11 22:24:35 0 d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-04-11 22:15:14 0 d-------- C:\Program Files\iTunes
2008-04-11 22:15:14 0 d-------- C:\Program Files\iPod
2008-04-11 21:49:02 0 d-------- C:\Program Files\Common Files
2008-04-11 21:31:40 0 d-------- C:\Program Files\QuickTime
2008-04-11 21:30:16 0 d-------- C:\Documents and Settings\Owner\Application Data\U3
2008-04-11 21:29:57 0 d-------- C:\Program Files\Spyware Doctor
2008-04-11 21:29:57 0 d-------- C:\Program Files\Google
2008-04-11 21:29:50 0 d-------- C:\Program Files\PC Tools Firewall Plus
2008-04-11 21:26:57 0 d--h----- C:\Program Files\InstallShield Installation Information
2008-03-09 17:57:31 0 d-------- C:\Program Files\Webroot
2008-03-09 17:57:31 0 d-------- C:\Documents and Settings\Owner\Application Data\Webroot
2008-02-21 18:36:20 688 --a------ C:\Documents and Settings\Owner\Application Data\synOtunes.plist
2008-02-20 17:21:23 0 d--h----- C:\Program Files\WindowsUpdate
2008-02-20 16:51:27 0 d-------- C:\Program Files\America Online 7.0g
2008-02-20 16:50:43 0 d-------- C:\Program Files\Common Files\aolshare
2008-02-20 15:59:29 0 d-------- C:\Program Files\AIM6
2008-02-20 15:19:39 0 d-------- C:\Program Files\Windows NT
2008-02-20 15:19:32 0 d-------- C:\Program Files\Movie Maker
2008-02-20 15:19:32 0 d-------- C:\Program Files\Messenger
2008-02-19 20:25:53 89152 --a------ C:\WINDOWS\System32\bueevfsu.dll
2008-02-18 21:29:14 0 d-------- C:\Documents and Settings\Owner\Application Data\uTorrent
2008-02-18 21:27:59 0 d-------- C:\Documents and Settings\Owner\Application Data\MegauploadToolbar
2008-02-18 21:23:00 0 d-------- C:\Program Files\Windows Installer Clean Up
2008-02-17 00:17:34 0 d-------- C:\Documents and Settings\Owner\Application Data\LimeWire
2008-02-16 00:29:07 0 d-------- C:\Program Files\Intelore
2008-02-09 18:48:51 93760 --a------ C:\WINDOWS\System32\milbwgmt.dll
2008-02-08 17:43:27 94784 --a------ C:\WINDOWS\System32\gcifxopk.dll
2008-02-08 17:40:28 163904 --a------ C:\WINDOWS\System32\xtoqhcqv.dll
2008-01-20 20:17:34 348160 --a------ C:\WINDOWS\System32\wmprvse.exe
2008-01-20 19:38:42 32256 --a------ C:\WINDOWS\System32\wmpns.exe


-- Registry Dump ---------------------------------------------------------------

*Note* empty entries & legit default entries are not shown


[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{ACC23AF7-8FC9-40E3-A61E-DEF6726DD220}]
04/12/2008 09:58 AM 344576 --------- C:\WINDOWS\System32\pmkjj.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BlockTracker"="c:\hp\bin\BlockTracker.exe" []
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [04/14/2008 04:17 PM]
"HotKeysCmds"="C:\WINDOWS\System32\hkcmd.exe" [04/14/2008 04:17 PM]
"KBD"="C:\HP\KBD\KBD.EXE" [04/14/2008 04:17 PM]
"StorageGuard"="C:\Program Files\VERITAS Software\Update Manager\sgtray.exe" [04/14/2008 04:17 PM]
"Recguard"="C:\WINDOWS\SMINST\RECGUARD.EXE" [04/14/2008 04:17 PM]
"nwiz"="nwiz.exe" [10/01/2002 12:39 AM C:\WINDOWS\system32\nwiz.exe]
"BCNT"="C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE" [04/14/2008 04:17 PM]
"PS2"="C:\WINDOWS\system32\ps2.exe" [04/14/2008 04:17 PM]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NVIEW"="nview.dll,nViewLoadHook" []

C:\Documents and Settings\Owner\Start Menu\Programs\Startup\
Stardock ObjectDock.lnk - C:\Program Files\Stardock\ObjectDock\ObjectDock.exe [6/3/2007 1:14:10 AM]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Quicken Scheduled Updates.lnk - C:\Program Files\Quicken\bagent.exe [9/20/2002 8:20:02 PM]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
@=

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [12/20/2006 12:55 PM 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 02/27/2007 11:39 AM 282624 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
SecurityProviders msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll,

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MoneyStartUp10.0]
"c:\Program Files\Microsoft Money\System\Activation.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SUPERAntiSpyware]
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
C:\Program Files\Common Files\Real\Update_OB\realsched.exe -osboot




-- End of Deckard's System Scanner: finished at 2008-04-14 16:22:10 ------------


and this is the extra.txt:


Deckard's System Scanner v20071014.68
Extra logfile - please post this as an attachment with your post.
--------------------------------------------------------------------------------

-- System Information ----------------------------------------------------------

Microsoft Windows XP Home Edition (build 2600) SP 1.0
Architecture: X86; Language: English

CPU 0: Intel® Pentium® 4 CPU 2.50GHz
Percentage of Memory in Use: 35%
Physical Memory (total/avail): 503.52 MiB / 323.05 MiB
Pagefile Memory (total/avail): 1230.71 MiB / 1072.73 MiB
Virtual Memory (total/avail): 2047.88 MiB / 1948.14 MiB

A: is Removable (No Media)
C: is Fixed (NTFS) - 108.33 GiB total, 68.51 GiB free.
D: is Fixed (FAT32) - 3.44 GiB total, 0.67 GiB free.
E: is CDROM (No Media)
F: is CDROM (No Media)

\\.\PHYSICALDRIVE0 - ST3120020A - 111.79 GiB - 2 partitions
\PARTITION0 - Unknown - 3.45 GiB - D:
\PARTITION1 (bootable) - Installable File System - 108.33 GiB - C:



-- Security Center -------------------------------------------------------------

AUOptions is not configured.
AUState says computer is in an unknown state.


-- Environment Variables -------------------------------------------------------

ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\Owner\Application Data
CLIENTNAME=Console
CommonProgramFiles=C:\Program Files\Common Files
COMPUTERNAME=YOUR-KYBTG65GXE
ComSpec=C:\WINDOWS\system32\cmd.exe
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\Owner
LOGONSERVER=\\YOUR-KYBTG65GXE
NUMBER_OF_PROCESSORS=1
OS=Windows_NT
Path=C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;c:\Python22;C:\Program Files\PC-Doctor\services;C:\Program Files\Sonic\MyDVD;;C:\Program Files\Internet Explorer;
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 15 Model 2 Stepping 7, GenuineIntel
PROCESSOR_LEVEL=15
PROCESSOR_REVISION=0207
ProgramFiles=C:\Program Files
PROMPT=$P$G
SESSIONNAME=Console
SystemDrive=C:
SystemRoot=C:\WINDOWS
TEMP=C:\DOCUME~1\Owner\LOCALS~1\Temp
TMP=C:\DOCUME~1\Owner\LOCALS~1\Temp
USERDOMAIN=YOUR-KYBTG65GXE
USERNAME=Owner
USERPROFILE=C:\Documents and Settings\Owner
windir=C:\WINDOWS


-- User Profiles ---------------------------------------------------------------

Owner (admin)


-- Add/Remove Programs ---------------------------------------------------------

--> C:\Program Files\Common Files\Real\Update_OB\rnuninst.exe RealNetworks|RealPlayer|6.0
--> C:\WINDOWS\IsUninst.exe -fC:\WINDOWS\orun32.isu
--> C:\WINDOWS\System32\\MSIEXEC.EXE /x {09DA4F91-2A09-4232-AB8C-6BC740096DE3}
--> c:\WINDOWS\System32\\MSIEXEC.EXE /x {8214CC02-6271-4DC8-B8DD-779933450264}
--> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{39DA87A1-0B26-4562-A70C-2A6147366E47}\Setup.exe"
--> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{8D5D99B8-DFA2-4018-ADE9-A6B83E655C65}\setup.exe" -l0x9 -L0x9anything
--> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{9F765BD0-B900-4EDE-A90B-61C8A9E95C42}\Setup.exe"
--> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{BAD59025-5B73-4E12-B789-0028C5A573C2}\Setup.exe"
--> rundll32.exe setupapi.dll,InstallHinfSection DefaultUninstall 132 C:\WINDOWS\INF\PCHealth.inf
Adobe Acrobat 5.0 --> C:\WINDOWS\ISUNINST.EXE -f"C:\Program Files\Common Files\Adobe\Acrobat 5.0\NT\Uninst.isu" -c"C:\Program Files\Common Files\Adobe\Acrobat 5.0\NT\Uninst.dll"
Adobe Flash Player ActiveX --> C:\WINDOWS\System32\Macromed\Flash\uninstall_activeX.exe
America Online --> C:\Program Files\Common Files\aolshare\Aolunins_us.exe
AOL Coach Version 1.0(Build:20011028.1) --> C:\WINDOWS\AolCInUn.exe
Apple Software Update --> MsiExec.exe /I{B74F042E-E1B9-4A5B-8D46-387BB172F0A4}
Betty Bad --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {3C5E25C7-D999-4AB6-BE8C-532FD5B79D6A}
Blackhawk Striker --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {33A16A26-1533-4016-AE2D-89D6398D7EB2}
Blasterball 2 --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {350CC34B-2B8E-4EE5-AE4D-F04FDF37DC39}
Blasterball Wild --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {31403AA7-7357-43E1-9B46-4B45847C37D5}
Coloreal --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{BDE90251-93EB-4F6A-89D8-086E2D91DC56}\Setup.exe"
CompuServe --> C:\Program Files\Common Files\csshare\csunins_us.exe
Dark Orbit --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {865917D2-33F4-4223-BDCD-C7DA958C216C}
Detto IntelliMover Demo --> MsiExec.exe /X{E62C706B-1352-4DCA-B4D4-81C24750B70F}
Disney's Lilo and Stitch Pinball --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {67D9A48A-81E9-4863-8B55-744BAEA180E2}
easy Internet sign-up --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{2B5DDB2C-0807-47FD-9C11-80EA761902C0}\setup.exe" -l0x9
HijackThis 2.0.2 --> "C:\Program Files\Trend Micro\HijackThis\HijackThis.exe" /uninstall
Inactive HP Printer Drivers (Remove only) --> RunDll32 hpuninst.dll,InstallHinfSection UninstDefault 132 prntunin.inf
Indeo® Software --> C:\WINDOWS\IsUninst.exe -f"C:\Program Files\Ligos\Indeo\Uninst.isu"
Intel® Extreme Graphics Driver Software --> RUNDLL32.EXE C:\WINDOWS\System32\ialmrem.dll,UninstallW2KIGfx PCI\VEN_8086&DEV_2562
InterVideo WinDVD 4 --> "C:\Program Files\InstallShield Installation Information\{98E8A2EF-4EAE-43B8-A172-74842B764777}\setup.exe" REMOVEALL
Java 2 Runtime Environment Standard Edition v1.3.1_02 --> C:\WINDOWS\IsUninst.exe -f"C:\Program Files\JavaSoft\JRE\1.3.1_02\Uninst.isu"
Java 2 Runtime Environment, SE v1.4.0_01 --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{7CF31609-270B-11D6-9445-000102308676}\Setup.exe" Anytext
Java Web Start --> "C:\Program Files\Java Web Start\uninst-javaws.exe"
KBD --> C:\HP\KBD\KBD.EXE uninstalled
Malwarebytes' Anti-Malware --> "C:\Program Files\Malwarebytes' Anti-Malware\unins000.exe"
Men In Black II CROSSFIRE Trial Version --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {2B4B4104-7AC7-4950-8BF2-6BB5E3E61CA7}
Microsoft Money 2002 --> MsiExec.exe /I{E7298FD5-1386-11D5-8D6C-0050DAD32D95}
Microsoft Money 2002 System Pack --> MsiExec.exe /I{CF5193F7-6B37-11D5-B7D2-00AA00A204F1}
Microsoft Works 7.0 --> MsiExec.exe /I{764D06D8-D8DE-411E-A1C8-D9E9380F8A84}
Netscape (7.0) --> C:\WINDOWS\NSUninst.exe /ua "7.0 (en)"
NVIDIA Windows 2000/XP Display Drivers --> rundll32.exe C:\WINDOWS\System32\nvinstnt.dll,NvUninstallNT4 nvhp.inf
Panda ActiveScan 2.0 --> C:\Program Files\Panda Security\ActiveScan 2.0\as2uninst.exe
PC-Doctor for Windows --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{1F7CCFA3-D926-4882-B2A5-A0217ED25597}\Setup.exe"
Pig Pen --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {4E5B5975-1138-4B20-A53F-30704B135B5C}
PS2 --> C:\WINDOWS\system32\ps2.exe uninstall
Python 2.2 combined Win32 extensions --> C:\Python22\Lib\SITE-P~1\UNWISE~1.EXE C:\Python22\Lib\SITE-P~1\w32inst.log
Python 2.2.1 --> C:\Python22\UNWISE.EXE C:\Python22\INSTALL.LOG
Quicken 2003 New User Edition --> C:\PROGRA~1\COMMON~1\INSTAL~1\Driver\7\INTEL3~1\IDriver.exe /M{F61F2821-694C-475F-99AB-6AF2EFDF40FD} anything
RealOne Player --> C:\Program Files\Common Files\Real\Update_OB\rnuninst.exe RealNetworks|RealPlayer|6.0
RecordNow --> MsiExec.exe /I{8214CC02-6271-4DC8-B8DD-779933450264}
RecordNow Update Manager --> MsiExec.exe /I{09DA4F91-2A09-4232-AB8C-6BC740096DE3}
S3Display --> s3uninst.exe -reg 5 'HKLM\Software\S3\S3Uninst\S3Display'
S3Gamma2 --> s3uninst.exe -reg 5 'HKLM\Software\S3\S3Uninst\S3Gamma2'
S3Info2 --> s3uninst.exe -reg 5 'HKLM\Software\S3\S3Uninst\S3Info2'
S3Overlay --> s3uninst.exe -reg 5 'HKLM\Software\S3\S3Uninst\S3Overlay'
Simple Installer - Multilanguage Version --> RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{EEF397AC-DAEF-4C04-90A9-5B2BD31875DC}\setup.exe"
Snowboard Extreme --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {80E21EE8-007B-4C28-ADB2-5110B4401E2E}
Space Rocks --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {27565B66-EC6D-48A9-A1C3-8886A849995F}
SUPERAntiSpyware Free Edition --> MsiExec.exe /X{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}
Viewpoint Media Player (Remove Only) --> C:\Program Files\Viewpoint\Viewpoint Experience Technology\mtsAxInstaller.exe -u
Virtual Warfare --> "C:\Program Files\WildTangent\DDC\ActiveMenu\DDCActiveMenu.exe" -UninstallItem {EEDAA297-DFDF-436A-B977-D95EA63C907D}
WeatherBug --> C:\PROGRA~1\AWS\WEATHE~1\REMOVE.EXE /S
WildTangent Channel Manager --> C:\Program Files\WildTangent\DDC\DDCManager\Uninstall.exe
Yahoo! Companion --> regsvr32 /s /u C:\PROGRA~1\Yahoo!\Common\YCOMP5~1.DLL
Yahoo! Essentials --> C:\Program Files\Yahoo!\Common\unwise.exe C:\progra~1\yahoo!\common\install.log
Yahoo! Internet Mail --> C:\WINDOWS\System32\regsvr32 /u /s C:\WINDOWS\DOWNLO~1\ymmapi.dll
Yahoo! Login --> C:\WINDOWS\System32\regsvr32 /u /s C:\PROGRA~1\Yahoo!\Common\ylogin.dll
Yahoo! Messenger --> C:\PROGRA~1\Yahoo!\MESSEN~1\UNWISE.EXE C:\PROGRA~1\Yahoo!\MESSEN~1\INSTALL.LOG
Yahoo! Messenger Explorer Bar --> C:\WINDOWS\System32\regsvr32 /u /s C:\PROGRA~1\Yahoo!\MESSEN~1\yhexbmes.dll


-- Application Event Log -------------------------------------------------------

Event Record #/Type333 / Warning
Event Submitted/Written: 04/14/2008 04:17:50 PM
Event ID/Source: 32068 / Microsoft Fax
Event Description:
The outgoing routing rule is not valid because it cannot find a valid device. The outgoing faxes that use this rule will not be routed. Verify that the targeted device or devices (if routed to a group of devices) is connected and installed correctly, and turned on. If routed to a group, verify that the group is configured correctly.
Country/region code: '*'
Area code: '*'

Event Record #/Type332 / Warning
Event Submitted/Written: 04/14/2008 04:17:50 PM
Event ID/Source: 32026 / Microsoft Fax
Event Description:
Fax Service failed to initialize any assigned fax devices (virtual or TAPI).
No faxes can be sent or received until a fax device is installed.

Event Record #/Type331 / Warning
Event Submitted/Written: 04/14/2008 04:08:23 PM
Event ID/Source: 32068 / Microsoft Fax
Event Description:
The outgoing routing rule is not valid because it cannot find a valid device. The outgoing faxes that use this rule will not be routed. Verify that the targeted device or devices (if routed to a group of devices) is connected and installed correctly, and turned on. If routed to a group, verify that the group is configured correctly.
Country/region code: '*'
Area code: '*'

Event Record #/Type330 / Warning
Event Submitted/Written: 04/14/2008 04:08:23 PM
Event ID/Source: 32026 / Microsoft Fax
Event Description:
Fax Service failed to initialize any assigned fax devices (virtual or TAPI).
No faxes can be sent or received until a fax device is installed.

Event Record #/Type328 / Warning
Event Submitted/Written: 04/13/2008 03:57:32 PM
Event ID/Source: 32068 / Microsoft Fax
Event Description:
The outgoing routing rule is not valid because it cannot find a valid device. The outgoing faxes that use this rule will not be routed. Verify that the targeted device or devices (if routed to a group of devices) is connected and installed correctly, and turned on. If routed to a group, verify that the group is configured correctly.
Country/region code: '*'
Area code: '*'



-- Security Event Log ----------------------------------------------------------

No Errors/Warnings found.


-- System Event Log ------------------------------------------------------------

Event Record #/Type3333 / Error
Event Submitted/Written: 04/14/2008 04:18:47 PM
Event ID/Source: 7000 / Service Control Manager
Event Description:
The mrtRate service failed to start due to the following error:
%%2

Event Record #/Type3320 / Error
Event Submitted/Written: 04/14/2008 04:09:17 PM
Event ID/Source: 7000 / Service Control Manager
Event Description:
The mrtRate service failed to start due to the following error:
%%2

Event Record #/Type3304 / Error
Event Submitted/Written: 04/13/2008 03:58:29 PM
Event ID/Source: 7000 / Service Control Manager
Event Description:
The mrtRate service failed to start due to the following error:
%%2

Event Record #/Type3291 / Error
Event Submitted/Written: 04/13/2008 03:53:35 PM
Event ID/Source: 7000 / Service Control Manager
Event Description:
The mrtRate service failed to start due to the following error:
%%2

Event Record #/Type3283 / Warning
Event Submitted/Written: 04/13/2008 00:44:10 PM
Event ID/Source: 20 / Print
Event Description:
Printer Driver HP DeskJet 640C/642C/648C for Windows NT x86 Version-3 was added or updated. Files:- UNIDRV.DLL, UNIDRVUI.DLL, HPFDJ640.GPD, UNIDRV.HLP, HPVDJ50.INI, HPVUD50.DLL, HPVUI50.DLL, HPFIMG50.DLL, HPV600AL.DLL, HPFDJ6xx.GPD, HPFDJ69x.GPD, HPFDJ200.HLP, HPFNAM50.GPD, UNIRES.DLL, STDNAMES.GPD.



-- End of Deckard's System Scanner: finished at 2008-04-14 16:22:10 ------------

Edited by jstribtpt, 14 April 2008 - 05:27 PM.

  • 0

#4
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
OK then the first thing I have noticed is that you do not appear to have an Antivirus pprogramme running. First you have to download an antivirus. This program is basic for the security of your computer and in todays age not having one will probably lead to disaster for your computer.


There are several free versions around :

Avast
AVG

Please download and install one of them


Now to work - first to secure your system

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) 6 Update 5 and save it to your desktop.
  • Scroll down to where it says "Java Runtime Environment (JRE) 6 Update 5...allows end-users to run Java applications".
  • Click the "Download" button to the right.
  • Read the License Agreement and then check the box that says: "Accept License Agreement". The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u5-windows-i586-p.exe to install the newest version.

NEXT

Please re-open HiJackThis and scan. Check the boxes next to all the entries listed below.

F3 - REG:win.ini: load=C:\WINDOWS\System32\pmkjj.exe
O2 - BHO: (no name) - {ACC23AF7-8FC9-40E3-A61E-DEF6726DD220} - C:\WINDOWS\System32\pmkjj.dll

Now close all windows other than HiJackThis, then click Fix Checked. Close HiJackThis.


THEN

Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it.
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    C:\WINDOWS\System32\mehibcvw.dll
    C:\WINDOWS\System32\pnxkwvvt.dll
    C:\WINDOWS\System32\oarxviho.dll
    C:\WINDOWS\System32\vtekowtm.dll
    C:\WINDOWS\System32\pmkjj.exe
    C:\WINDOWS\System32\jjkmp.ini2
    C:\WINDOWS\System32\tyukxcdc.dll
    C:\WINDOWS\System32\llbaunxr.dll
    C:\WINDOWS\System32\oprfjhsx.dll
    C:\WINDOWS\System32\dlwohkhu.dll
    C:\WINDOWS\System32\pmkjj.dll
    C:\WINDOWS\System32\bueevfsu.dll
    C:\WINDOWS\System32\milbwgmt.dll
    C:\WINDOWS\System32\gcifxopk.dll
    C:\WINDOWS\System32\xtoqhcqv.dll
    Purity
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

FINALLY FOR NOW

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Logs required : OTMoveit and Combofix
  • 0

#5
jstribtpt

jstribtpt

    Member

  • Topic Starter
  • Member
  • PipPip
  • 20 posts
Hey essexboy,

I have performed the requested actions and these are the resulting logs:

OTMoveit:

LoadLibrary failed for C:\WINDOWS\System32\mehibcvw.dll
C:\WINDOWS\System32\mehibcvw.dll NOT unregistered.
File move failed. C:\WINDOWS\System32\mehibcvw.dll scheduled to be moved on reboot.
LoadLibrary failed for C:\WINDOWS\System32\pnxkwvvt.dll
C:\WINDOWS\System32\pnxkwvvt.dll NOT unregistered.
C:\WINDOWS\System32\pnxkwvvt.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\oarxviho.dll
C:\WINDOWS\System32\oarxviho.dll NOT unregistered.
C:\WINDOWS\System32\oarxviho.dll moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\System32\vtekowtm.dll
C:\WINDOWS\System32\vtekowtm.dll NOT unregistered.
C:\WINDOWS\System32\vtekowtm.dll moved successfully.
C:\WINDOWS\System32\pmkjj.exe moved successfully.
C:\WINDOWS\System32\jjkmp.ini2 moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\tyukxcdc.dll
C:\WINDOWS\System32\tyukxcdc.dll NOT unregistered.
C:\WINDOWS\System32\tyukxcdc.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\llbaunxr.dll
C:\WINDOWS\System32\llbaunxr.dll NOT unregistered.
C:\WINDOWS\System32\llbaunxr.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\oprfjhsx.dll
C:\WINDOWS\System32\oprfjhsx.dll NOT unregistered.
C:\WINDOWS\System32\oprfjhsx.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\dlwohkhu.dll
C:\WINDOWS\System32\dlwohkhu.dll NOT unregistered.
C:\WINDOWS\System32\dlwohkhu.dll moved successfully.
File/Folder C:\WINDOWS\System32\pmkjj.dll not found.
LoadLibrary failed for C:\WINDOWS\System32\bueevfsu.dll
C:\WINDOWS\System32\bueevfsu.dll NOT unregistered.
C:\WINDOWS\System32\bueevfsu.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\milbwgmt.dll
C:\WINDOWS\System32\milbwgmt.dll NOT unregistered.
C:\WINDOWS\System32\milbwgmt.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\gcifxopk.dll
C:\WINDOWS\System32\gcifxopk.dll NOT unregistered.
C:\WINDOWS\System32\gcifxopk.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\xtoqhcqv.dll
C:\WINDOWS\System32\xtoqhcqv.dll NOT unregistered.
C:\WINDOWS\System32\xtoqhcqv.dll moved successfully.
< Purity >

OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04152008_125756

Files moved on Reboot...
LoadLibrary failed for C:\WINDOWS\System32\mehibcvw.dll
C:\WINDOWS\System32\mehibcvw.dll NOT unregistered.
C:\WINDOWS\System32\mehibcvw.dll moved successfully.



Combofix:


ComboFix 08-04-14.2 - Owner 2008-04-15 13:07:58.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.1.1252.1.1033.18.295 [GMT -7:00]
Running from: C:\Documents and Settings\Owner\Desktop\ComboFix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\All Users.\documents\settings
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\CnsMin.zip
C:\Program Files\winupdates
C:\Temp\1cb
C:\Temp\1cb\syscheck.log
C:\Temp\bkR11
C:\Temp\bkR11\ftCa.log
C:\Temp\gbRve12
C:\temp\iee
C:\Temp\tpBe12
C:\WINDOWS\Downloaded Program Files\setup.inf
C:\WINDOWS\gf1002.cnf2
C:\WINDOWS\pskt.ini
C:\WINDOWS\system32\cdcxkuyt.ini
C:\WINDOWS\system32\config\system~1\Applic~1\Microsoft\25319.dat
C:\WINDOWS\system32\ctfmon.exe.tmp
C:\WINDOWS\system32\ineWc01
C:\WINDOWS\system32\ineWc01\ineWc011065.exe
C:\WINDOWS\system32\jjkmp.ini
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\pmkjj(2).dll
C:\WINDOWS\system32\wkcmeuwp.ini
C:\WINDOWS\system32\wvcbihem.ini
D:\Autorun.inf

.
((((((((((((((((((((((((( Files Created from 2008-03-15 to 2008-04-15 )))))))))))))))))))))))))))))))
.

2008-04-15 12:57 . 2008-04-15 12:57 <DIR> d-------- C:\_OTMoveIt
2008-04-15 11:54 . 2008-04-15 11:54 348,160 --a------ C:\WINDOWS\system32\RCX16.tmp
2008-04-14 16:19 . 2008-04-14 16:19 <DIR> d-------- C:\Deckard
2008-04-14 16:17 . 2008-04-14 16:17 348,160 --a------ C:\WINDOWS\system32\RCX28.tmp
2008-04-14 16:07 . 2008-04-14 16:07 348,160 --a------ C:\WINDOWS\system32\RCX27.tmp
2008-04-13 15:57 . 2008-04-13 15:57 348,160 --a------ C:\WINDOWS\system32\RCX1E.tmp
2008-04-13 15:52 . 2008-04-13 15:52 348,160 --a------ C:\WINDOWS\system32\RCX1D.tmp
2008-04-12 10:02 . 2008-04-12 10:02 348,160 --a------ C:\WINDOWS\system32\RCX45.tmp
2008-04-11 23:51 . 2008-04-11 23:52 <DIR> d-------- C:\Program Files\Panda Security
2008-04-11 22:31 . 2008-04-11 22:31 0 --a------ C:\WINDOWS\system32\CMMGR32.EXE
2008-04-11 22:31 . 2008-04-11 22:31 0 --a------ C:\WINDOWS\ORUN32.EXE
2008-04-11 22:24 . 2008-04-11 23:48 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2008-04-11 22:24 . 2008-04-11 22:24 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\SUPERAntiSpyware.com
2008-04-11 22:24 . 2008-04-11 22:24 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Program Files\Common Files\Download Manager
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Malwarebytes
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-04-11 21:16 . 2008-04-11 21:16 348,160 --a------ C:\WINDOWS\system32\RCX12.tmp
2008-04-11 21:09 . 2008-04-11 21:09 348,160 --a------ C:\WINDOWS\system32\RCX11.tmp
2008-04-07 18:20 . 2008-04-07 18:20 348,160 --a------ C:\WINDOWS\system32\RCX15.tmp
2008-03-30 19:33 . 2008-03-30 19:33 348,160 --a------ C:\WINDOWS\system32\RCX19.tmp
2008-03-30 18:46 . 2008-03-30 18:46 348,160 --a------ C:\WINDOWS\system32\RCX1C.tmp
2008-03-30 18:19 . 2008-03-30 18:19 348,160 --a------ C:\WINDOWS\system32\RCX25.tmp
2008-03-25 20:32 . 2008-03-25 20:32 348,160 --a------ C:\WINDOWS\system32\RCX21.tmp
2008-03-19 21:11 . 2008-03-19 21:11 348,160 --a------ C:\WINDOWS\system32\RCX20.tmp

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-15 19:50 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-04-15 19:50 --------- d-----w C:\Program Files\Java
2008-04-15 19:16 --------- d-----w C:\Documents and Settings\Owner\Application Data\AVG7
2008-04-15 19:15 --------- d-----w C:\Documents and Settings\All Users\Application Data\Grisoft
2008-04-15 19:15 --------- d-----w C:\Documents and Settings\All Users\Application Data\Avg7
2008-04-12 05:31 --------- d-----w C:\Program Files\PC-Doctor
2008-04-12 05:24 --------- d-----w C:\Program Files\Common Files\Wise Installation Wizard
2008-04-12 05:15 --------- d-----w C:\Program Files\iTunes
2008-04-12 05:15 --------- d-----w C:\Program Files\iPod
2008-04-12 04:31 --------- d-----w C:\Program Files\QuickTime
2008-04-12 04:30 --------- d-----w C:\Documents and Settings\Owner\Application Data\U3
2008-04-12 04:29 --------- d-----w C:\Program Files\Spyware Doctor
2008-04-12 04:29 --------- d-----w C:\Program Files\PC Tools Firewall Plus
2008-04-12 04:29 --------- d-----w C:\Program Files\Google
2008-04-12 04:26 --------- d---a-w C:\Documents and Settings\All Users\Application Data\TEMP
2008-03-10 00:57 --------- d-----w C:\Program Files\Webroot
2008-03-10 00:57 --------- d-----w C:\Documents and Settings\Owner\Application Data\Webroot
2008-03-10 00:57 --------- d-----w C:\Documents and Settings\LocalService\Application Data\Webroot
2008-03-10 00:57 --------- d-----w C:\Documents and Settings\All Users\Application Data\Webroot
2008-02-21 00:07 4,164 --sha-r C:\WINDOWS\system32\drivers\HP_DF203A-ABA 6454NX NA910_YC_Pres_QMX3103_E31NAheRED4_4_IP4G533LA_SASUSTeK Computer INC._VREV 1.xx_B3.05_T021218_WXH1_L409_M504_J120_7Intel_8Pentium 4_92.49_1_N10EC8139_P_Z_K_A808624C5_U808624C2_G80862562.MRK
2008-02-20 23:51 --------- d-----w C:\Program Files\America Online 7.0g
2008-02-20 23:50 --------- d-----w C:\Program Files\Common Files\aolshare
2008-02-20 22:59 --------- d-----w C:\Program Files\AIM6
2008-02-19 04:29 --------- d-----w C:\Documents and Settings\Owner\Application Data\uTorrent
2008-02-19 04:27 --------- d-----w C:\Documents and Settings\Owner\Application Data\MegauploadToolbar
2008-02-19 04:23 --------- d-----w C:\Program Files\Windows Installer Clean Up
2008-02-17 07:17 --------- d-----w C:\Documents and Settings\Owner\Application Data\LimeWire
2008-02-16 07:29 --------- d-----w C:\Program Files\Intelore
2007-07-18 22:07 934 ----a-w C:\Documents and Settings\Owner\xx_log.dat
2007-06-27 23:17 57,344 ----a-w C:\Documents and Settings\All Users\Application Data\hwfutczk.exe
2007-09-03 18:57 109 --sha-w C:\WINDOWS\system32\1418751605.dat
.
<pre>
----a-w		   155,648 2008-01-01 21:28:40  C:\Documents and Settings\Owner\Desktop\Jonathans Items\veritas stuff\VERITAS Software\Update Manager\sgtray .exe
----a-w			61,440 2008-04-15 18:54:40  C:\hp\KBD\KBD .EXE
----a-w			50,528 2008-02-20 22:16:33  C:\Program Files\AIM6\aim6  .exe
----a-w		   423,936 2008-02-20 22:15:12  C:\Program Files\AIM6\aim6 .exe
----a-w			28,672 2008-04-15 18:54:45  C:\Program Files\AWS\WeatherBug\BCNT .EXE
----a-w		   368,706 2007-12-31 20:48:27  C:\Program Files\BroadJump\Client Foundation\CFD .exe
----a-w		   151,597 2008-04-12 16:46:37  C:\Program Files\Common Files\Real\Update_OB\realsched .exe
----a-w		   143,360 2008-04-12 05:13:08  C:\Program Files\COMPAQ\Coloreal\coloreal .exe
----a-w		   171,448 2008-02-20 22:16:38  C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier .exe
----a-w		   267,064 2008-04-12 05:13:15  C:\Program Files\iTunes\iTunesHelper .exe
----a-w			83,608 2008-01-02 00:07:42  C:\Program Files\Java\jre1.6.0_01\bin\jusched .exe
----a-w		   132,496 2008-02-20 22:16:24  C:\Program Files\Java\jre1.6.0_03\bin\jusched .exe
----a-w		 1,667,584 2008-01-24 06:48:36  C:\Program Files\Messenger\MSMSGS .EXE
----a-w		   241,714 2008-04-12 16:46:37  C:\Program Files\Microsoft Money\System\Activation .exe
----a-w		 2,483,504 2008-04-12 16:58:53  C:\Program Files\PC Tools Firewall Plus\FirewallGUI .exe
----a-w		   662,016 2008-02-20 22:59:31  C:\Program Files\QuickTime\qttask			   .exe
----a-w		   662,016 2008-02-20 22:15:37  C:\Program Files\QuickTime\qttask			  .exe
----a-w		   662,016 2008-02-20 03:21:46  C:\Program Files\QuickTime\qttask			 .exe
----a-w		   662,016 2008-02-19 21:18:44  C:\Program Files\QuickTime\qttask			.exe
----a-w		   662,016 2008-02-19 18:10:37  C:\Program Files\QuickTime\qttask		   .exe
----a-w		   662,016 2008-02-19 17:43:31  C:\Program Files\QuickTime\qttask		  .exe
----a-w		   662,016 2008-02-19 04:41:05  C:\Program Files\QuickTime\qttask		 .exe
----a-w		   662,016 2008-02-10 00:44:35  C:\Program Files\QuickTime\qttask		.exe
----a-w		   662,016 2008-02-10 00:39:59  C:\Program Files\QuickTime\QTTask	   .exe
----a-w		   662,016 2008-02-10 00:27:31  C:\Program Files\QuickTime\qttask	  .exe
----a-w		   662,016 2008-02-09 22:54:53  C:\Program Files\QuickTime\QTTask	 .exe
----a-w		   662,016 2008-02-09 06:55:37  C:\Program Files\QuickTime\qttask	.exe
----a-w		   662,016 2008-02-09 01:13:05  C:\Program Files\QuickTime\QTTask   .exe
----a-w		   662,016 2008-02-08 23:34:51  C:\Program Files\QuickTime\QTTask  .exe
----a-w		   662,016 2008-02-08 04:57:05  C:\Program Files\QuickTime\qttask .exe
----a-w		   380,928 2008-01-01 12:51:36  C:\Program Files\SBC Self Support Tool\SmartBridge\MotiveSB .exe
----a-w		 1,103,752 2008-01-21 19:16:47  C:\Program Files\Spyware Doctor\pctsTray .exe
----a-w		   155,648 2008-04-15 18:54:43  C:\Program Files\VERITAS Software\Update Manager\sgtray .exe
----a-w		   145,408 2008-04-12 17:02:29  C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig .exe
----a-w		   212,992 2008-04-15 18:54:45  C:\WINDOWS\SMINST\RECGUARD .EXE
----a-w			52,736 2008-04-15 18:54:37  C:\WINDOWS\system\hpsysdrv .exe
----a-w			15,360 2008-01-21 03:18:14  C:\WINDOWS\system32\ctfmon .exe
----a-w		   114,688 2008-04-15 18:54:39  C:\WINDOWS\system32\hkcmd .exe
----a-w		   155,648 2008-02-20 22:16:30  C:\WINDOWS\system32\igfxtray .exe
----a-w			81,920 2008-04-15 18:54:48  C:\WINDOWS\system32\ps2 .exe
</pre>


-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NVIEW"="nview.dll" [2002-10-01 00:39 548933 C:\WINDOWS\system32\nview.dll]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BlockTracker"="c:\hp\bin\BlockTracker.exe" [ ]
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [2008-04-15 11:54 401920]
"HotKeysCmds"="C:\WINDOWS\System32\hkcmd.exe" [2008-04-15 11:54 463872]
"KBD"="C:\HP\KBD\KBD.EXE" [2008-04-15 12:00 410624]
"StorageGuard"="C:\Program Files\VERITAS Software\Update Manager\sgtray.exe" [2008-04-15 12:00 504320]
"Recguard"="C:\WINDOWS\SMINST\RECGUARD.EXE" [2008-04-15 12:00 570880]
"nwiz"="nwiz.exe" [2002-10-01 00:39 372736 C:\WINDOWS\system32\nwiz.exe]
"BCNT"="C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE" [2008-04-15 12:00 377856]
"PS2"="C:\WINDOWS\system32\ps2.exe" [2008-04-15 11:54 431104]
"AVG7_CC"="C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" [2008-04-15 12:15 579072]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 04:25 144784]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"AVG7_Run"="C:\PROGRA~1\Grisoft\AVG7\avgw.exe" [2008-04-15 12:15 219136]

C:\WINDOWS\system32\config\systemprofile\Start Menu\Programs\Startup\
MySurvey Messenger.lnk - C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe [2007-06-24 22:59:50 462848]
Stardock ObjectDock.lnk - C:\Program Files\Stardock\ObjectDock\ObjectDock.exe [2007-06-03 01:14:10 2746104]

C:\Documents and Settings\Default User\Start Menu\Programs\Startup\
MySurvey Messenger.lnk - C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe [2007-06-24 22:59:50 462848]
Stardock ObjectDock.lnk - C:\Program Files\Stardock\ObjectDock\ObjectDock.exe [2007-06-03 01:14:10 2746104]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Quicken Scheduled Updates.lnk - C:\Program Files\Quicken\bagent.exe [2002-09-20 20:20:02 53248]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 12:55 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-02-27 11:39 282624 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MoneyStartUp10.0]
--a------ 2008-04-11 21:48 592384 c:\Program Files\Microsoft Money\System\Activation.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SUPERAntiSpyware]
--a------ 2007-02-27 11:39 1310720 C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
--a------ 2008-04-11 21:48 500736 C:\Program Files\Common Files\Real\Update_OB\realsched.exe

S3 msCMTSrvc;Content Monitoring Tool;C:\WINDOWS\system32\msCMTSrvc.exe [2002-03-27 04:42]

.
Contents of the 'Scheduled Tasks' folder
"2008-02-21 23:20:08 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
"2008-02-06 10:29:00 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
- C:\Program Files\Windows Defender\MpCmdRun.exe
.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-15 13:16:07
Windows 5.1.2600 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
.
**************************************************************************
.
Completion time: 2008-04-15 13:24:23 - machine was rebooted
ComboFix-quarantined-files.txt 2008-04-15 20:24:19

Pre-Run: 73,052,274,688 bytes free
Post-Run: 73,807,294,464 bytes free


New HijackThis:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:29:25 PM, on 4/15/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-qus7.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://qus7.hpwis.com/
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Common\ycomp5,0,8,0.dll
O4 - HKLM\..\Run: [BlockTracker] c:\hp\bin\BlockTracker.exe
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
O4 - HKLM\..\Run: [StorageGuard] "C:\Program Files\VERITAS Software\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded
O4 - HKLM\..\Run: [BCNT] C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - S-1-5-18 Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'SYSTEM')
O4 - S-1-5-18 Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'SYSTEM')
O4 - .DEFAULT Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'Default user')
O4 - .DEFAULT Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'Default user')
O4 - .DEFAULT User Startup: MySurvey Messenger.lnk = C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe (User 'Default user')
O4 - .DEFAULT User Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'Default user')
O4 - Global Startup: Quicken Scheduled Updates.lnk = C:\Program Files\Quicken\bagent.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll (file missing)
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll (file missing)
O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoft...s/as2stubie.cab
O16 - DPF: {CAFEEFAC-0014-0000-0001-ABCDEFFEDCBA} (Java Runtime Environment 1.4.0_01) -
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: Content Monitoring Tool (msCMTSrvc) - Unknown owner - C:\WINDOWS\system32\msCMTSrvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

--
End of file - 5813 bytes
  • 0

#6
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Looking a tad better but you have a nasty vundo variant

1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

File::
C:\WINDOWS\system32\RCX28.tmp
C:\WINDOWS\system32\RCX27.tmp
C:\WINDOWS\system32\RCX1E.tmp
C:\WINDOWS\system32\RCX1D.tmp
C:\WINDOWS\system32\RCX45.tmp
C:\WINDOWS\system32\RCX12.tmp
C:\WINDOWS\system32\RCX11.tmp
C:\WINDOWS\system32\RCX15.tmp
C:\WINDOWS\system32\RCX19.tmp
C:\WINDOWS\system32\RCX1C.tmp
C:\WINDOWS\system32\RCX25.tmp
C:\WINDOWS\system32\RCX21.tmp
C:\WINDOWS\system32\RCX20.tmp
C:\Documents and Settings\Owner\xx_log.dat
C:\Documents and Settings\All Users\Application Data\hwfutczk.exe
C:\WINDOWS\system32\1418751605.dat

Renv::
<pre>
----a-w		   155,648 2008-01-01 21:28:40  C:\Documents and Settings\Owner\Desktop\Jonathans Items\veritas stuff\VERITAS Software\Update Manager\sgtray .exe
----a-w			61,440 2008-04-15 18:54:40  C:\hp\KBD\KBD .EXE
----a-w			50,528 2008-02-20 22:16:33  C:\Program Files\AIM6\aim6  .exe
----a-w		   423,936 2008-02-20 22:15:12  C:\Program Files\AIM6\aim6 .exe
----a-w			28,672 2008-04-15 18:54:45  C:\Program Files\AWS\WeatherBug\BCNT .EXE
----a-w		   368,706 2007-12-31 20:48:27  C:\Program Files\BroadJump\Client Foundation\CFD .exe
----a-w		   151,597 2008-04-12 16:46:37  C:\Program Files\Common Files\Real\Update_OB\realsched .exe
----a-w		   143,360 2008-04-12 05:13:08  C:\Program Files\COMPAQ\Coloreal\coloreal .exe
----a-w		   171,448 2008-02-20 22:16:38  C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier .exe
----a-w		   267,064 2008-04-12 05:13:15  C:\Program Files\iTunes\iTunesHelper .exe
----a-w			83,608 2008-01-02 00:07:42  C:\Program Files\Java\jre1.6.0_01\bin\jusched .exe
----a-w		   132,496 2008-02-20 22:16:24  C:\Program Files\Java\jre1.6.0_03\bin\jusched .exe
----a-w		 1,667,584 2008-01-24 06:48:36  C:\Program Files\Messenger\MSMSGS .EXE
----a-w		   241,714 2008-04-12 16:46:37  C:\Program Files\Microsoft Money\System\Activation .exe
----a-w		 2,483,504 2008-04-12 16:58:53  C:\Program Files\PC Tools Firewall Plus\FirewallGUI .exe
----a-w		   662,016 2008-02-20 22:59:31  C:\Program Files\QuickTime\qttask			   .exe
----a-w		   662,016 2008-02-20 22:15:37  C:\Program Files\QuickTime\qttask			  .exe
----a-w		   662,016 2008-02-20 03:21:46  C:\Program Files\QuickTime\qttask			 .exe
----a-w		   662,016 2008-02-19 21:18:44  C:\Program Files\QuickTime\qttask			.exe
----a-w		   662,016 2008-02-19 18:10:37  C:\Program Files\QuickTime\qttask		   .exe
----a-w		   662,016 2008-02-19 17:43:31  C:\Program Files\QuickTime\qttask		  .exe
----a-w		   662,016 2008-02-19 04:41:05  C:\Program Files\QuickTime\qttask		 .exe
----a-w		   662,016 2008-02-10 00:44:35  C:\Program Files\QuickTime\qttask		.exe
----a-w		   662,016 2008-02-10 00:39:59  C:\Program Files\QuickTime\QTTask	   .exe
----a-w		   662,016 2008-02-10 00:27:31  C:\Program Files\QuickTime\qttask	  .exe
----a-w		   662,016 2008-02-09 22:54:53  C:\Program Files\QuickTime\QTTask	 .exe
----a-w		   662,016 2008-02-09 06:55:37  C:\Program Files\QuickTime\qttask	.exe
----a-w		   662,016 2008-02-09 01:13:05  C:\Program Files\QuickTime\QTTask   .exe
----a-w		   662,016 2008-02-08 23:34:51  C:\Program Files\QuickTime\QTTask  .exe
----a-w		   662,016 2008-02-08 04:57:05  C:\Program Files\QuickTime\qttask .exe
----a-w		   380,928 2008-01-01 12:51:36  C:\Program Files\SBC Self Support Tool\SmartBridge\MotiveSB .exe
----a-w		 1,103,752 2008-01-21 19:16:47  C:\Program Files\Spyware Doctor\pctsTray .exe
----a-w		   155,648 2008-04-15 18:54:43  C:\Program Files\VERITAS Software\Update Manager\sgtray .exe
----a-w		   145,408 2008-04-12 17:02:29  C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig .exe
----a-w		   212,992 2008-04-15 18:54:45  C:\WINDOWS\SMINST\RECGUARD .EXE
----a-w			52,736 2008-04-15 18:54:37  C:\WINDOWS\system\hpsysdrv .exe
----a-w			15,360 2008-01-21 03:18:14  C:\WINDOWS\system32\ctfmon .exe
----a-w		   114,688 2008-04-15 18:54:39  C:\WINDOWS\system32\hkcmd .exe
----a-w		   155,648 2008-02-20 22:16:30  C:\WINDOWS\system32\igfxtray .exe
----a-w			81,920 2008-04-15 18:54:48  C:\WINDOWS\system32\ps2 .exe
</pre>

3. Then in the text file go to FILE > SAVE AS and in the dropdown box select SAVE AS TYPE to ALL FILES

4. Save the above as CFScript.txt

5. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

Posted Image


5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
  • A new HijackThis log.

THEN

Please download Malwarebytes' Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Logs required : Combofix and MBAM plus how is your computer running now
  • 0

#7
jstribtpt

jstribtpt

    Member

  • Topic Starter
  • Member
  • PipPip
  • 20 posts
Hey,

Ok,The Computer seems to be running alot better and more consistant, here is the Logs:

Combofix Log:


ComboFix 08-04-14.2 - Owner 2008-04-15 13:53:54.2 - NTFSx86
Running from: C:\Documents and Settings\Owner\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Owner\Desktop\CFScript.txt
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

FILE ::
C:\Documents and Settings\All Users\Application Data\hwfutczk.exe
C:\Documents and Settings\Owner\xx_log.dat
C:\WINDOWS\system32\1418751605.dat
C:\WINDOWS\system32\RCX11.tmp
C:\WINDOWS\system32\RCX12.tmp
C:\WINDOWS\system32\RCX15.tmp
C:\WINDOWS\system32\RCX19.tmp
C:\WINDOWS\system32\RCX1C.tmp
C:\WINDOWS\system32\RCX1D.tmp
C:\WINDOWS\system32\RCX1E.tmp
C:\WINDOWS\system32\RCX20.tmp
C:\WINDOWS\system32\RCX21.tmp
C:\WINDOWS\system32\RCX25.tmp
C:\WINDOWS\system32\RCX27.tmp
C:\WINDOWS\system32\RCX28.tmp
C:\WINDOWS\system32\RCX45.tmp
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\All Users\Application Data\hwfutczk.exe
C:\Documents and Settings\Owner\xx_log.dat
C:\WINDOWS\system32\1418751605.dat
C:\WINDOWS\system32\RCX11.tmp
C:\WINDOWS\system32\RCX12.tmp
C:\WINDOWS\system32\RCX15.tmp
C:\WINDOWS\system32\RCX19.tmp
C:\WINDOWS\system32\RCX1C.tmp
C:\WINDOWS\system32\RCX1D.tmp
C:\WINDOWS\system32\RCX1E.tmp
C:\WINDOWS\system32\RCX20.tmp
C:\WINDOWS\system32\RCX21.tmp
C:\WINDOWS\system32\RCX25.tmp
C:\WINDOWS\system32\RCX27.tmp
C:\WINDOWS\system32\RCX28.tmp
C:\WINDOWS\system32\RCX45.tmp

.
((((((((((((((((((((((((( Files Created from 2008-03-15 to 2008-04-15 )))))))))))))))))))))))))))))))
.

2008-04-15 13:51 . 2008-04-15 13:51 0 --a------ C:\Documents and Settings\Owner\.exe
2008-04-15 12:57 . 2008-04-15 12:57 <DIR> d-------- C:\_OTMoveIt
2008-04-15 11:54 . 2008-04-15 11:54 348,160 --a------ C:\WINDOWS\system32\RCX16.tmp
2008-04-14 16:19 . 2008-04-14 16:19 <DIR> d-------- C:\Deckard
2008-04-11 23:51 . 2008-04-11 23:52 <DIR> d-------- C:\Program Files\Panda Security
2008-04-11 22:31 . 2008-04-11 22:31 0 --a------ C:\WINDOWS\system32\CMMGR32.EXE
2008-04-11 22:31 . 2008-04-11 22:31 0 --a------ C:\WINDOWS\ORUN32.EXE
2008-04-11 22:24 . 2008-04-11 23:48 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2008-04-11 22:24 . 2008-04-11 22:24 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\SUPERAntiSpyware.com
2008-04-11 22:24 . 2008-04-11 22:24 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Program Files\Common Files\Download Manager
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Malwarebytes
2008-04-11 21:49 . 2008-04-11 21:49 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-15 20:55 --------- d-----w C:\Program Files\Spyware Doctor
2008-04-15 20:55 --------- d-----w C:\Program Files\QuickTime
2008-04-15 20:54 --------- d-----w C:\Program Files\PC Tools Firewall Plus
2008-04-15 20:54 --------- d-----w C:\Program Files\iTunes
2008-04-15 20:54 --------- d-----w C:\Program Files\AIM6
2008-04-15 20:51 0 ----a-w C:\Documents and Settings\Owner\.exe
2008-04-15 19:50 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-04-15 19:50 --------- d-----w C:\Program Files\Java
2008-04-15 19:16 --------- d-----w C:\Documents and Settings\Owner\Application Data\AVG7
2008-04-15 19:15 --------- d-----w C:\Documents and Settings\All Users\Application Data\Grisoft
2008-04-15 19:15 --------- d-----w C:\Documents and Settings\All Users\Application Data\Avg7
2008-04-15 18:54 81,920 ----a-w C:\WINDOWS\system32\ps2.exe
2008-04-15 18:54 114,688 ----a-w C:\WINDOWS\system32\hkcmd.exe
2008-04-12 17:02 145,408 ----a-w C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe
2008-04-12 05:31 --------- d-----w C:\Program Files\PC-Doctor
2008-04-12 05:24 --------- d-----w C:\Program Files\Common Files\Wise Installation Wizard
2008-04-12 05:15 --------- d-----w C:\Program Files\iPod
2008-04-12 04:30 --------- d-----w C:\Documents and Settings\Owner\Application Data\U3
2008-04-12 04:29 --------- d-----w C:\Program Files\Google
2008-04-12 04:26 --------- d---a-w C:\Documents and Settings\All Users\Application Data\TEMP
2008-03-27 01:47 496,128 ----a-w C:\WINDOWS\PCHealth\HelpCtr\Binaries\msconfig.exe.tmp
2008-03-12 03:32 348,160 ----a-w C:\WINDOWS\system32\RCX1F.tmp
2008-03-10 06:46 348,160 ----a-w C:\WINDOWS\system32\RCX24.tmp
2008-03-10 03:49 348,160 ----a-w C:\WINDOWS\system32\RCX23.tmp
2008-03-10 03:43 348,160 ----a-w C:\WINDOWS\system32\RCX22.tmp
2008-03-10 03:15 348,160 ----a-w C:\WINDOWS\system32\RCX483.tmp
2008-03-10 01:07 348,160 ----a-w C:\WINDOWS\system32\RCX3A0.tmp
2008-03-10 00:57 --------- d-----w C:\Program Files\Webroot
2008-03-10 00:57 --------- d-----w C:\Documents and Settings\Owner\Application Data\Webroot
2008-03-10 00:57 --------- d-----w C:\Documents and Settings\LocalService\Application Data\Webroot
2008-03-10 00:57 --------- d-----w C:\Documents and Settings\All Users\Application Data\Webroot
2008-03-10 00:29 348,160 ----a-w C:\WINDOWS\system32\RCX3AC.tmp
2008-03-09 06:33 348,160 ----a-w C:\WINDOWS\system32\RCX4BC.tmp
2008-03-08 06:11 348,160 ----a-w C:\WINDOWS\system32\RCX41D.tmp
2008-03-08 06:03 348,160 ----a-w C:\WINDOWS\system32\RCX43E.tmp
2008-03-08 05:02 348,160 ----a-w C:\WINDOWS\system32\RCX4CC.tmp
2008-03-08 04:30 348,160 ----a-w C:\WINDOWS\system32\RCX49B.tmp
2008-03-08 04:19 348,160 ----a-w C:\WINDOWS\system32\RCX376.tmp
2008-03-07 23:08 348,160 ----a-w C:\WINDOWS\system32\RCX35A.tmp
2008-03-04 05:28 348,160 ----a-w C:\WINDOWS\system32\RCX327.tmp
2008-02-29 04:10 348,160 ----a-w C:\WINDOWS\system32\RCX204.tmp
2008-02-26 01:06 348,160 ----a-w C:\WINDOWS\system32\RCX2F3.tmp
2008-02-21 00:07 4,164 --sha-r C:\WINDOWS\system32\drivers\HP_DF203A-ABA 6454NX NA910_YC_Pres_QMX3103_E31NAheRED4_4_IP4G533LA_SASUSTeK Computer INC._VREV 1.xx_B3.05_T021218_WXH1_L409_M504_J120_7Intel_8Pentium 4_92.49_1_N10EC8139_P_Z_K_A808624C5_U808624C2_G80862562.MRK
2008-02-20 23:51 --------- d-----w C:\Program Files\America Online 7.0g
2008-02-20 23:50 --------- d-----w C:\Program Files\Common Files\aolshare
2008-02-20 22:16 155,648 ----a-w C:\WINDOWS\system32\igfxtray.exe
2008-02-19 04:29 --------- d-----w C:\Documents and Settings\Owner\Application Data\uTorrent
2008-02-19 04:27 --------- d-----w C:\Documents and Settings\Owner\Application Data\MegauploadToolbar
2008-02-19 04:23 --------- d-----w C:\Program Files\Windows Installer Clean Up
2008-02-17 07:17 --------- d-----w C:\Documents and Settings\Owner\Application Data\LimeWire
2008-02-16 07:29 --------- d-----w C:\Program Files\Intelore
2008-02-10 23:52 348,160 ----a-w C:\WINDOWS\system32\RCX44.tmp
2008-02-10 19:23 348,160 ----a-w C:\WINDOWS\system32\RCX43.tmp
2008-02-08 23:34 348,160 ----a-w C:\WINDOWS\system32\RCX42.tmp
2008-02-08 04:15 348,160 ----a-w C:\WINDOWS\system32\RCX41.tmp
2008-02-08 03:14 348,160 ----a-w C:\WINDOWS\system32\RCX40.tmp
2008-02-07 07:46 348,160 ----a-w C:\WINDOWS\system32\RCX3F.tmp
2008-02-06 04:24 348,160 ----a-w C:\WINDOWS\system32\RCX3E.tmp
2008-02-05 03:09 348,160 ----a-w C:\WINDOWS\system32\RCX3D.tmp
2008-02-05 01:53 348,160 ----a-w C:\WINDOWS\system32\RCX3C.tmp
2008-02-04 21:49 348,160 ----a-w C:\WINDOWS\system32\RCX3B.tmp
2008-02-04 03:30 348,160 ----a-w C:\WINDOWS\system32\RCX3A.tmp
2008-02-03 02:09 348,160 ----a-w C:\WINDOWS\system32\RCX39.tmp
2008-02-02 01:51 348,160 ----a-w C:\WINDOWS\system32\RCX38.tmp
2008-01-31 04:47 348,160 ----a-w C:\WINDOWS\system32\RCX37.tmp
2008-01-30 23:20 348,160 ----a-w C:\WINDOWS\system32\RCX36.tmp
2008-01-30 14:45 348,160 ----a-w C:\WINDOWS\system32\RCX2D.tmp
2008-01-30 04:18 348,160 ----a-w C:\WINDOWS\system32\RCX2C.tmp
2008-01-30 00:22 348,160 ----a-w C:\WINDOWS\system32\RCX35.tmp
2008-01-29 02:41 348,160 ----a-w C:\WINDOWS\system32\RCX34.tmp
2008-01-27 05:40 348,160 ----a-w C:\WINDOWS\system32\RCX33.tmp
2008-01-27 04:17 348,160 ----a-w C:\WINDOWS\system32\RCX32.tmp
2008-01-27 04:13 348,160 ----a-w C:\WINDOWS\system32\RCX31.tmp
2008-01-25 01:34 348,160 ----a-w C:\WINDOWS\system32\RCX30.tmp
2008-01-24 08:53 348,160 ----a-w C:\WINDOWS\system32\RCX2F.tmp
2008-01-23 23:37 348,160 ----a-w C:\WINDOWS\system32\RCX16A5.tmp
2008-01-23 03:58 348,160 ----a-w C:\WINDOWS\system32\RCX6E.tmp
2008-01-21 21:48 348,160 ----a-w C:\WINDOWS\system32\RCX4A.tmp
2008-01-21 03:18 15,360 ----a-w C:\WINDOWS\system32\ctfmon.exe
2008-01-21 03:17 348,160 ----a-w C:\WINDOWS\system32\wmprvse.exe
2008-01-21 02:38 32,256 ----a-w C:\WINDOWS\system32\wmpns.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NVIEW"="nview.dll" [2002-10-01 00:39 548933 C:\WINDOWS\system32\nview.dll]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BlockTracker"="c:\hp\bin\BlockTracker.exe" [ ]
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [2008-04-15 11:54 52736]
"HotKeysCmds"="C:\WINDOWS\System32\hkcmd.exe" [2008-04-15 11:54 114688]
"KBD"="C:\HP\KBD\KBD.EXE" [2008-04-15 11:54 61440]
"StorageGuard"="C:\Program Files\VERITAS Software\Update Manager\sgtray.exe" [2008-04-15 11:54 155648]
"Recguard"="C:\WINDOWS\SMINST\RECGUARD.EXE" [2008-04-15 11:54 212992]
"nwiz"="nwiz.exe" [2002-10-01 00:39 372736 C:\WINDOWS\system32\nwiz.exe]
"BCNT"="C:\PROGRA~1\AWS\WEATHE~1\BCNT.EXE" [2008-04-15 11:54 28672]
"PS2"="C:\WINDOWS\system32\ps2.exe" [2008-04-15 11:54 81920]
"AVG7_CC"="C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" [2008-04-15 12:15 579072]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 04:25 144784]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"AVG7_Run"="C:\PROGRA~1\Grisoft\AVG7\avgw.exe" [2008-04-15 12:15 219136]

C:\WINDOWS\system32\config\systemprofile\Start Menu\Programs\Startup\
MySurvey Messenger.lnk - C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe [2007-06-24 22:59:50 462848]
Stardock ObjectDock.lnk - C:\Program Files\Stardock\ObjectDock\ObjectDock.exe [2007-06-03 01:14:10 2746104]

C:\Documents and Settings\Default User\Start Menu\Programs\Startup\
MySurvey Messenger.lnk - C:\Program Files\MySurvey Messenger\MySurveyMessenger.exe [2007-06-24 22:59:50 462848]
Stardock ObjectDock.lnk - C:\Program Files\Stardock\ObjectDock\ObjectDock.exe [2007-06-03 01:14:10 2746104]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Quicken Scheduled Updates.lnk - C:\Program Files\Quicken\bagent.exe [2002-09-20 20:20:02 53248]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 12:55 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-02-27 11:39 282624 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MoneyStartUp10.0]
--a------ 2008-04-12 09:46 241714 c:\Program Files\Microsoft Money\System\Activation.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SUPERAntiSpyware]
--a------ 2007-02-27 11:39 1310720 C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
--a------ 2008-04-12 09:46 151597 C:\Program Files\Common Files\Real\Update_OB\realsched.exe

S3 msCMTSrvc;Content Monitoring Tool;C:\WINDOWS\system32\msCMTSrvc.exe [2002-03-27 04:42]

.
Contents of the 'Scheduled Tasks' folder
"2008-02-21 23:20:08 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
"2008-02-06 10:29:00 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
- C:\Program Files\Windows Defender\MpCmdRun.exe
.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-15 13:57:43
Windows 5.1.2600 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...


**************************************************************************
.
Completion time: 2008-04-15 14:00:31
ComboFix-quarantined-files.txt 2008-04-15 20:59:29
ComboFix2.txt 2008-04-15 20:24:24

Pre-Run: 73,421,922,304 bytes free
Post-Run: 73,409,380,352 bytes free



And here is the Malwarebytes' Anti-Malware Log:

Malwarebytes' Anti-Malware 1.11
Database version: 615

Scan type: Quick Scan
Objects scanned: 32657
Time elapsed: 8 minute(s), 57 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
  • 0

#8
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
OK then just a final little tidy up

  • Please double-click OTMoveIt2.exe to run it.
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    C:\WINDOWS\system32\RCX44.tmp
    C:\WINDOWS\system32\RCX43.tmp
    C:\WINDOWS\system32\RCX42.tmp
    C:\WINDOWS\system32\RCX41.tmp
    C:\WINDOWS\system32\RCX40.tmp
    C:\WINDOWS\system32\RCX3F.tmp
    C:\WINDOWS\system32\RCX3E.tmp
    C:\WINDOWS\system32\RCX3D.tmp
    C:\WINDOWS\system32\RCX3C.tmp
    C:\WINDOWS\system32\RCX3B.tmp
    C:\WINDOWS\system32\RCX3A.tmp
    C:\WINDOWS\system32\RCX39.tmp
    C:\WINDOWS\system32\RCX38.tmp
    C:\WINDOWS\system32\RCX37.tmp
    C:\WINDOWS\system32\RCX36.tmp
    C:\WINDOWS\system32\RCX2D.tmp
    C:\WINDOWS\system32\RCX2C.tmp
    C:\WINDOWS\system32\RCX35.tmp
    C:\WINDOWS\system32\RCX34.tmp
    C:\WINDOWS\system32\RCX33.tmp
    C:\WINDOWS\system32\RCX32.tmp
    C:\WINDOWS\system32\RCX31.tmp
    C:\WINDOWS\system32\RCX30.tmp
    C:\WINDOWS\system32\RCX2F.tmp
    C:\WINDOWS\system32\RCX16A5.tmp
    C:\WINDOWS\system32\RCX6E.tmp
    C:\WINDOWS\system32\RCX4A.tmp
    C:\WINDOWS\system32\RCX3AC.tmp
    C:\WINDOWS\system32\RCX4BC.tmp
    C:\WINDOWS\system32\RCX41D.tmp
    C:\WINDOWS\system32\RCX43E.tmp
    C:\WINDOWS\system32\RCX4CC.tmp
    C:\WINDOWS\system32\RCX49B.tmp
    C:\WINDOWS\system32\RCX376.tmp
    C:\WINDOWS\system32\RCX35A.tmp
    C:\WINDOWS\system32\RCX327.tmp
    C:\WINDOWS\system32\RCX204.tmp
    C:\WINDOWS\system32\RCX2F3.tmp
    C:\WINDOWS\system32\RCX1F.tmp
    C:\WINDOWS\system32\RCX24.tmp
    C:\WINDOWS\system32\RCX23.tmp
    C:\WINDOWS\system32\RCX22.tmp
    C:\WINDOWS\system32\RCX483.tmp
    C:\WINDOWS\system32\RCX3A0.tmp
    Purity
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to be Moved" window (under the yellow bar) and choose Paste.

  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

---------------------------------------------------------------------------------------

Then having done that .............................First priority will be to get you updated to Service Pack 2 on this page you will have the option to download or order the Service Pack on CD. Your choice , but whichever option you choose ensure are malware free before installation SP2 does not play well with an infected system, before installation pop back here for a quick health check.


Now the best part of the day ----- Your log now appears clean :)

Double click OTMoveit once again and you should see a CleanUp! button, press that button, you may get prompted by your firewall that OTMoveit wants to contact the internet, allow this, a cleanup.txt will be downloaded, a message dialog will ask you if you want to proceed with the cleanup process, click Yes. This will delete all the tools you have downloaded plus itself. MBAM can be removed via control panel


Now to get you off to a good start we will re-set your restore points so that all the bad stuff is gone for good. Then if you need to restore at some stage you will be clean. There are several ways to reset your your restore point but this is my method:

1. Select Start > All Programs > Accessories > System tools > System Restore.
2. On the dialogue box that appears select Create a Restore Point
3. Click NEXT
4. Enter a name e.g. Clean
5. Click CREATE

You now have a clean restore point, to get rid of the bad ones:

1. Select Start > All Programs > Accessories > System tools > Disk Cleanup.
2. In the Drop down box that appears select your main drive e.g. C
3. Click OK
4. The System will do some calculation and the display a dialogue box with TABS
5. Select the More Options Tab.
6. At the bottom will be a system restore box with a CLEANUP button click this
7. Accept the Warning and select OK again, the program will close and you are done



Now that you are clean, to help protect your computer in the future I recommend that you get the following free program: It is critical to have both a firewall and anti virus to protect your system and to keep them updated.

To keep your operating system up to date visit

To learn more about how to protect yourself while on the internet read this article by Tony Klien: So how did I get infected in the first place?


Keep safe :)
  • 0

#9
jstribtpt

jstribtpt

    Member

  • Topic Starter
  • Member
  • PipPip
  • 20 posts
WOW,
Thanks soooo much that was quick an painless.... here is the OTMoveit2 Log:

C:\WINDOWS\system32\RCX44.tmp moved successfully.
C:\WINDOWS\system32\RCX43.tmp moved successfully.
C:\WINDOWS\system32\RCX42.tmp moved successfully.
C:\WINDOWS\system32\RCX41.tmp moved successfully.
C:\WINDOWS\system32\RCX40.tmp moved successfully.
C:\WINDOWS\system32\RCX3F.tmp moved successfully.
C:\WINDOWS\system32\RCX3E.tmp moved successfully.
C:\WINDOWS\system32\RCX3D.tmp moved successfully.
C:\WINDOWS\system32\RCX3C.tmp moved successfully.
C:\WINDOWS\system32\RCX3B.tmp moved successfully.
C:\WINDOWS\system32\RCX3A.tmp moved successfully.
C:\WINDOWS\system32\RCX39.tmp moved successfully.
C:\WINDOWS\system32\RCX38.tmp moved successfully.
C:\WINDOWS\system32\RCX37.tmp moved successfully.
C:\WINDOWS\system32\RCX36.tmp moved successfully.
C:\WINDOWS\system32\RCX2D.tmp moved successfully.
C:\WINDOWS\system32\RCX2C.tmp moved successfully.
C:\WINDOWS\system32\RCX35.tmp moved successfully.
C:\WINDOWS\system32\RCX34.tmp moved successfully.
C:\WINDOWS\system32\RCX33.tmp moved successfully.
C:\WINDOWS\system32\RCX32.tmp moved successfully.
C:\WINDOWS\system32\RCX31.tmp moved successfully.
C:\WINDOWS\system32\RCX30.tmp moved successfully.
C:\WINDOWS\system32\RCX2F.tmp moved successfully.
C:\WINDOWS\system32\RCX16A5.tmp moved successfully.
C:\WINDOWS\system32\RCX6E.tmp moved successfully.
C:\WINDOWS\system32\RCX4A.tmp moved successfully.
C:\WINDOWS\system32\RCX3AC.tmp moved successfully.
C:\WINDOWS\system32\RCX4BC.tmp moved successfully.
C:\WINDOWS\system32\RCX41D.tmp moved successfully.
C:\WINDOWS\system32\RCX43E.tmp moved successfully.
C:\WINDOWS\system32\RCX4CC.tmp moved successfully.
C:\WINDOWS\system32\RCX49B.tmp moved successfully.
C:\WINDOWS\system32\RCX376.tmp moved successfully.
C:\WINDOWS\system32\RCX35A.tmp moved successfully.
C:\WINDOWS\system32\RCX327.tmp moved successfully.
C:\WINDOWS\system32\RCX204.tmp moved successfully.
C:\WINDOWS\system32\RCX2F3.tmp moved successfully.
C:\WINDOWS\system32\RCX1F.tmp moved successfully.
C:\WINDOWS\system32\RCX24.tmp moved successfully.
C:\WINDOWS\system32\RCX23.tmp moved successfully.
C:\WINDOWS\system32\RCX22.tmp moved successfully.
C:\WINDOWS\system32\RCX483.tmp moved successfully.
C:\WINDOWS\system32\RCX3A0.tmp moved successfully.
< Purity >

OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04152008_143939



So Now do i update to sp2?

Edited by jstribtpt, 15 April 2008 - 03:45 PM.

  • 0

#10
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Highly recommended young sir :)
  • 0

#11
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :)

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP