Ok here we go:
Explorer killed successfully
C:\WINDOWS\system32\bJQsutwa.ini2 moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\hfrkdl.dll
C:\WINDOWS\system32\hfrkdl.dll NOT unregistered.
C:\WINDOWS\system32\hfrkdl.dll moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\fxkrcjrj.dll
C:\WINDOWS\system32\fxkrcjrj.dll NOT unregistered.
C:\WINDOWS\system32\fxkrcjrj.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\system32\pdbieapl.dll
C:\WINDOWS\system32\pdbieapl.dll NOT unregistered.
C:\WINDOWS\system32\pdbieapl.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\system32\awtusQJb.dll
C:\WINDOWS\system32\awtusQJb.dll NOT unregistered.
C:\WINDOWS\system32\awtusQJb.dll moved successfully.
LoadLibrary failed for C:\WINDOWS\system32\efcYqNFU.dll
C:\WINDOWS\system32\efcYqNFU.dll NOT unregistered.
C:\WINDOWS\system32\efcYqNFU.dll moved successfully.
C:\WINDOWS\system32\bnlctehnguds.exe moved successfully.
C:\WINDOWS\system32\g99.exe moved successfully.
C:\WINDOWS\system32\HgMSYcdd.ini2 moved successfully.
C:\WINDOWS\system32\ncntqkdm.exe moved successfully.
LoadLibrary failed for C:\WINDOWS\system32\clbinit.dll
C:\WINDOWS\system32\clbinit.dll NOT unregistered.
C:\WINDOWS\system32\clbinit.dll moved successfully.
C:\WINDOWS\system32\hljwugsf.bin moved successfully.
C:\WINDOWS\system32\dsvovbeqnepq.dll unregistered successfully.
C:\WINDOWS\system32\dsvovbeqnepq.dll moved successfully.
C:\WINDOWS\system32\rfpkdfzbuqqlis.dll unregistered successfully.
C:\WINDOWS\system32\rfpkdfzbuqqlis.dll moved successfully.
< HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31db784a-ae79-4439-49b4-8c9a6b1b8d28} >
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31db784a-ae79-4439-49b4-8c9a6b1b8d28}\\ not found.
< HKEY_CLASSES_ROOT\CLSID\{31db784a-ae79-4439-49b4-8c9a6b1b8d28} >
Registry key HKEY_CLASSES_ROOT\CLSID\{31db784a-ae79-4439-49b4-8c9a6b1b8d28}\\ not found.
< HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wvUnKAqn >
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wvUnKAqn\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system\\DisableTaskMgr >
Registry value HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system\\DisableTaskMgr deleted successfully.
< EmptyTemp >
File delete failed. C:\WINDOWS\temp\mcmsc_6gz63oo3VsdRMSl scheduled to be deleted on reboot.
Temp folders emptied.
IE temp folders emptied.
< purity >
C:\WINDOWS\system32\Мicrosoft moved successfully.
C:\Documents and Settings\Robert\My Documents\Ѕymantec\Ѕymantec moved successfully.
C:\Documents and Settings\Robert\My Documents\Ѕymantec moved successfully.
Explorer started successfully
OTMoveIt2 by OldTimer - Version 1.0.4.3 log created on 07132008_124309
-----------------------------------------------------------------------------------------
SDFix: Version 1.205 Run by Robert on Sun 07/13/2008 at 01:04 PM
Microsoft Windows XP [Version 5.1.2600]
Running From: C:\DOCUME~1\Robert\Desktop\SDFix
Checking Services :
Name :
clbdriver
Path :
\??\globalroot\systemroot\system32\drivers\clbdriver.sys
clbdriver - Deleted
Restoring Default Security Values
Restoring Default Hosts File
Rebooting
Checking Files :
Trojan Files Found:
C:\Temp\1cb\syscheck.log - Deleted
C:\WINDOWS\megavid.cdt - Deleted
C:\WINDOWS\muotr.so - Deleted
C:\WINDOWS\system32\drivers\core.cache.dsk - Deleted
Folder C:\Temp\1cb - Removed
Folder C:\Temp\tn3 - Removed
Removing Temp Files
ADS Check :
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer,
http://www.gmer.netRootkit scan 2008-07-13 13:09:01
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
scanning hidden registry entries ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
Remaining Services :
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\support.com\\client\\bin\\tgcmd.exe"="C:\\Program Files\\support.com\\client\\bin\\tgcmd.exe:*:Disabled:tgcmd Module"
"D:\\World of Warcraft\\WoW-2.3.0-enUS-downloader.exe"="D:\\World of Warcraft\\WoW-2.3.0-enUS-downloader.exe:*:Enabled:Blizzard Downloader"
"C:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"="C:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe:*:Enabled:McAfee Network Agent"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
Remaining Files :
File Backups: - C:\DOCUME~1\Robert\Desktop\SDFix\backups\backups.zip
Files with Hidden Attributes :
Sat 12 Jul 2008 20,487 A.SHR --- "C:\Program Files\McAfee\MQC\MRU.bak"
Sat 12 Jul 2008 265 A.SHR --- "C:\Program Files\McAfee\MQC\qcconf.bak"
Sat 12 Jul 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\585dc2612ebcefc90e7dee4c276ee95e\BIT6D.tmp"
Sat 12 Jul 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\e3ae0283cc5a5b1aa1e0729354e5096d\BIT6E.tmp"
Finished!-------------------------------------------------------------------------------------
SUPERAntiSpyware Scan Log
http://www.superantispyware.comGenerated 07/13/2008 at 01:47 PM
Application Version : 4.15.1000
Core Rules Database Version : 3469
Trace Rules Database Version: 1494
Scan type : Complete Scan
Total Scan Time : 00:29:24
Memory items scanned : 322
Memory threats detected : 0
Registry items scanned : 3971
Registry threats detected : 0
File items scanned : 46775
File threats detected : 68
Adware.Tracking Cookie
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@adlegend[1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@adserver[1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@advertising[1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@atdmt[2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@doubleclick[1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@hitbox[2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\
[email protected][1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@questionmarket[1].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@revsci[2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@specificclick[2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@tacoda[2].txt
C:\Deckard\System Scanner\20080712215725\backup\DOCUME~1\Robert\LOCALS~1\Temp\Cookies\robert@zedo[2].txt
C:\Deckard\System Scanner\20080712215725\backup\WINDOWS\temp\Cookies\robert@atdmt[1].txt
C:\Documents and Settings\LocalService\Cookies\system@2o7[1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][3].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][4].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\robert@adecn[2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\robert@adrevolver[2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\robert@atdmt[2].txt
C:\Documents and Settings\Robert\Cookies\robert@azjmp[1].txt
C:\Documents and Settings\Robert\Cookies\robert@azjmp[3].txt
C:\Documents and Settings\Robert\Cookies\robert@crackle[2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\robert@enhance[2].txt
C:\Documents and Settings\Robert\Cookies\robert@findwhat[1].txt
C:\Documents and Settings\Robert\Cookies\robert@lynxtrack[1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\robert@mediaplex[1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\robert@pro-market[2].txt
C:\Documents and Settings\Robert\Cookies\robert@realmedia[1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\robert@specificclick[2].txt
C:\Documents and Settings\Robert\Cookies\robert@specificclick[3].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][1].txt
C:\Documents and Settings\Robert\Cookies\robert@tacoda[1].txt
C:\Documents and Settings\Robert\Cookies\robert@tacoda[2].txt
C:\Documents and Settings\Robert\Cookies\robert@trafficmp[1].txt
C:\Documents and Settings\Robert\Cookies\
[email protected][2].txt
C:\Documents and Settings\Robert\Cookies\robert@virusremover2008[1].txt
C:\Documents and Settings\Robert\Cookies\robert@wmvmedialease[1].txt
C:\Documents and Settings\Robert\Cookies\robert@wmvmedialease[2].txt
Rootkit.TNCore-Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018750.EXE
Adware.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP171\A0020737.CFG
Adware.ClickSpring/Yazzle
C:\WINDOWS\PREFETCH\YAZZLE1281OINADMIN.EXE-2D8F7800.PF
Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP
Trojan.Downloader-Gen/Suspicious
C:\WINDOWS\SYSTEM32\PROVDLL\GLOBSETUP.EXE
------------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Sunday, July 13, 2008 3:37:44 PM
Operating System: Microsoft Windows XP Home Edition, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 13/07/2008
Kaspersky Anti-Virus database records: 949040
Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true
Scan Target My Computer
A:\
C:\
D:\
E:\
F:\
G:\
H:\
I:\
Scan Statistics
Total number of scanned objects 47687
Number of viruses found 9
Number of infected objects 13
Number of suspicious objects 0
Duration of the scan process 00:49:00
Infected Object Name Virus Name Last Action
C:\Documents and Settings\All Users\Application Data\McAfee\MNA\NAData Object is locked skipped
C:\Documents and Settings\All Users\Application Data\McAfee\MSC\Logs\Events.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\McAfee\MSC\Logs\{0C3D80DE-8FC5-4C48-AC28-D198A74BF29B}.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\McAfee\MSC\Logs\{B736B7E5-CA72-4E18-96CD-12690D936E39}.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\McAfee\MSC\McUsers.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\McAfee\VirusScan\Data\TFR3.tmp Object is locked skipped
C:\Documents and Settings\All Users\Application Data\McAfee\VirusScan\Logs\OAS.Log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-df21699-5f28c0c0.zip/GetAccess.class Infected: Trojan-Downloader.Java.OpenConnection.aj skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-df21699-5f28c0c0.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.aj skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-df21699-5f28c0c0.zip/NewSecurityClassLoader.class Infected: Exploit.Java.ByteVerify skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-df21699-5f28c0c0.zip/NewURLClassLoader.class Infected: Exploit.Java.ByteVerify skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-df21699-5f28c0c0.zip ZIP: infected - 4 skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv435.jar-1c29204d-1b283994.zip/Matrix.class Infected: Trojan-Downloader.Java.OpenStream.c skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv435.jar-1c29204d-1b283994.zip/Counter.class Infected: Trojan.Java.ClassLoader.h skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv435.jar-1c29204d-1b283994.zip/Parser.class Infected: Trojan.Java.ClassLoader.d skipped
C:\Documents and Settings\Robert\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv435.jar-1c29204d-1b283994.zip ZIP: infected - 3 skipped
C:\Documents and Settings\Robert\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\AppLogs\SUPERANTISPYWARE-7-13-2008( 13-53-20 ).LOG Object is locked skipped
C:\Documents and Settings\Robert\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Robert\Desktop\SDFix\apps\Process.exe Object is locked skipped
C:\Documents and Settings\Robert\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Robert\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Robert\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Robert\Local Settings\History\History.IE5\MSHist012008071320080714\index.dat Object is locked skipped
C:\Documents and Settings\Robert\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Robert\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Robert\ntuser.dat.LOG Object is locked skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP160\A0017734.exe Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018736.dll Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018737.exe Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018738.exe Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018740.dll Infected: not-a-virus:AdWare.Win32.ZenoSearch.ad skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018741.exe Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018747.dll Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018749.exe Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018751.vbs Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP161\A0018752.vbs Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP162\A0018800.dll Object is locked skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP166\A0019013.dll Infected: Rootkit.Win32.Clbd.ez skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP174\A0020988.exe Infected: Trojan.Win32.DNSChanger.eyr skipped
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP174\change.log Object is locked skipped
C:\WINDOWS\$NtUninstallKB824141$\user32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB824141$\win32k.sys Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\accwiz.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\crypt32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\cryptsvc.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\hh.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\hhctrl.ocx Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\hhsetup.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\html32.cnv Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\itircl.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\itss.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\locator.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\magnify.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\migwiz.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\mrxsmb.sys Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\msconv97.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\narrator.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\newdev.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\ntdll.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\ntkrnlpa.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\ntoskrnl.exe Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\ole32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\pchshell.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\raspptp.sys Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\rpcrt4.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\rpcss.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\shell32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\shmedia.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\srrstr.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\srv.sys Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\user32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB826939$\winsrv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB828035$\msgsvc.dll Object is locked skipped
C:\WINDOWS\$NtUninstallKB828035$\wkssvc.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ828026$\msdxm.ocx Object is locked skipped
C:\WINDOWS\$NtUninstallQ828026$\wmpcore.dll Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\config\ACEEvent.evt Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\imp32\keysrve.exe Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\Temp\mcmsc_amEOsQSdjvm80CE Object is locked skipped
C:\WINDOWS\Temp\mcmsc_LHJYj2kdAR6MdeX Object is locked skipped
C:\WINDOWS\Temp\mcmsc_pMd0PDkRrFww659 Object is locked skipped
C:\WINDOWS\Temp\mcmsc_YA3NyHcMyv15DQF Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\_OTMoveIt\MovedFiles\07132008_124309\WINDOWS\system32\ncntqkdm.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.bv skipped
D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
D:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP174\change.log Object is locked skipped
Scan process completed.
---------------------------------------------------------------------------------------
Deckard's System Scanner v20071014.68
Run by Robert on 2008-07-13 15:39:39
Computer is in Normal Mode.
--------------------------------------------------------------------------------
-- HijackThis (run as Robert.exe) ----------------------------------------------
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:39:44 PM, on 7/13/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\System32\svchost.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Robert\Desktop\dss.exe
C:\PROGRA~1\TRENDM~1\HIJACK~1\Robert.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.yahoo.com/O2 - BHO: {31db784a-ae79-4439-49b4-8c9a6b1b8d28} - {82d8b1b6-a9c8-4b94-9344-97eaa487bd13} - C:\WINDOWS\system32\hfrkdl.dll (file missing)
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) -
http://www.kaspersky...can_unicode.cabO20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\Sptisrv.exe
--
End of file - 2696 bytes
-- Files created between 2008-06-13 and 2008-07-13 -----------------------------
2008-07-13 14:15:36 0 d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-07-13 14:15:34 0 d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-07-13 14:15:30 0 d-------- C:\WINDOWS\LastGood
2008-07-13 13:14:04 0 d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-07-13 13:13:57 0 d-------- C:\Program Files\SUPERAntiSpyware
2008-07-13 13:13:57 0 d-------- C:\Documents and Settings\Robert\Application Data\SUPERAntiSpyware.com
2008-07-13 13:01:18 0 d-------- C:\WINDOWS\ERUNT
2008-07-12 21:31:43 0 d-------- C:\Documents and Settings\Robert\Application Data\Malwarebytes
2008-07-12 21:31:33 0 d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-07-12 21:31:31 0 d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-07-12 21:20:36 0 d-------- C:\VundoFix Backups
2008-07-12 17:39:12 0 d-------- C:\Program Files\Trend Micro
2008-07-12 16:39:31 143360 --a------ C:\WINDOWS\system32\dunzip32.dll <Not Verified; Inner Media, Inc.; DynaZIP-32 Multi-Threading UnZIP DLL>
2008-07-12 16:36:46 0 d-------- C:\Program Files\McAfee.com
2008-07-12 16:36:40 0 d-------- C:\Program Files\Common Files\McAfee
2008-07-12 16:36:22 0 d-------- C:\Program Files\McAfee
2008-07-12 16:28:32 0 d-------- C:\Documents and Settings\All Users\Application Data\McAfee
2008-07-12 07:38:25 0 d------c- C:\WINDOWS\system32\DRVSTORE
2008-07-12 07:24:14 86 --ah----- C:\aaw7boot.cmd
2008-07-11 22:41:04 0 d-------- C:\WINDOWS\system32\3251
2008-07-11 22:24:48 0 d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-07-11 21:36:43 0 d-------- C:\Documents and Settings\LocalService\Application Data\Macromedia
2008-07-11 21:36:43 0 d-------- C:\Documents and Settings\LocalService\Application Data\Adobe
2008-07-11 21:36:39 0 dr------- C:\Documents and Settings\LocalService\Favorites
2008-07-11 21:36:32 0 d--hs---- C:\WINDOWS\Um9iZXJ0
2008-07-11 21:36:24 86144 -----n--- C:\WINDOWS\system32\drivers\slntamrr.sys
2008-07-11 21:36:23 0 d-------- C:\WINDOWS\system32\sfig
2008-07-11 21:36:23 0 d-------- C:\WINDOWS\system32\provdll
2008-07-11 21:36:23 0 d-------- C:\WINDOWS\system32\OBDE
2008-07-11 21:36:23 0 d-------- C:\WINDOWS\system32\imp32
2008-07-11 21:36:18 0 d-------- C:\WINDOWS\system32\olixds01
2008-07-11 21:36:18 0 d-------- C:\Temp
-- Find3M Report ---------------------------------------------------------------
2008-07-13 13:13:25 0 d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-07-12 16:36:40 0 d-------- C:\Program Files\Common Files
2008-07-12 08:13:58 0 d-------- C:\Program Files\Messenger
2008-07-09 21:25:27 0 d-------- C:\Documents and Settings\Robert\Application Data\Help
-- Registry Dump ---------------------------------------------------------------
*Note* empty entries & legit default entries are not shown
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{82d8b1b6-a9c8-4b94-9344-97eaa487bd13}]
C:\WINDOWS\system32\hfrkdl.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [05/28/2008 10:33 AM]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [05/13/2008 10:13 AM 77824]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 04/19/2007 01:41 PM 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
SecurityProviders msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll,
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\vds]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{533C5B84-EC70-11D2-9505-00C04F79DEAF}]
@="Volume shadow copy"
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
"C:\Program Files\Messenger\MSMSGS.EXE" /background
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Messenger"=2 (0x2)
"wscsvc"=2 (0x2)
"SamSs"=2 (0x2)
"NtLmSsp"=3 (0x3)
"ATI Smart"=2 (0x2)
"wuauserv"=2 (0x2)
*Newly Created Service* - GMER
-- End of Deckard's System Scanner: finished at 2008-07-13 15:40:11 ------------