Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Another search engine redirect help request [Solved]


  • This topic is locked This topic is locked

#1
alphaman

alphaman

    Member

  • Member
  • PipPip
  • 11 posts
I have been reading the other topics on this subject. I have run TFC, ERUNT, MBAM and OTL. I did not have any success with GMER. My computer always reset itself before the program finished. My logs follow:

MBAM LOG:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4102

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

5/16/2010 5:42:48 PM
mbam-log-2010-05-16 (17-42-48).txt

Scan type: Quick scan
Objects scanned: 134630
Time elapsed: 11 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

OTL LOG

OTL logfile created on: 5/16/2010 7:28:27 PM - Run 4
OTL by OldTimer - Version 3.0.10.7 Folder = C:\Documents and Settings\David Hunter\Desktop\Malware Programs
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1023.23 Mb Total Physical Memory | 264.59 Mb Available Physical Memory | 25.86% Memory free
2.40 Gb Paging File | 1.52 Gb Available in Paging File | 63.38% Paging File free
Paging file location(s): C:\pagefile.sys 1536 3072 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 465.75 Gb Total Space | 361.59 Gb Free Space | 77.64% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
Drive E: | 694.72 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS
Drive F: | 149.04 Gb Total Space | 25.11 Gb Free Space | 16.85% Space Free | Partition Type: NTFS
G: Drive not present or media not loaded
Drive H: | 465.76 Gb Total Space | 80.22 Gb Free Space | 17.22% Space Free | Partition Type: NTFS
I: Drive not present or media not loaded
Drive J: | 7.51 Gb Total Space | 7.37 Gb Free Space | 98.23% Space Free | Partition Type: NTFS

Computer Name: DHA-COMP-1
Current User Name: David Hunter
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: On
Skip Microsoft Files: On
File Age = 14 Days
Output = Standard
Quick Scan

========== Processes (SafeList) ==========

PRC - [2008/04/17 15:14:00 | 00,102,712 | ---- | M] (ArcSoft Inc.) -- C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
PRC - [2010/01/22 09:56:24 | 00,112,592 | ---- | M] (Threat Expert Ltd.) -- C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
PRC - [2005/05/29 11:59:56 | 00,249,856 | ---- | M] (Aladdin Knowledge Systems Ltd.) -- C:\Windows\System32\nhsrvice.exe
PRC - [2008/10/10 06:45:26 | 00,013,088 | ---- | M] (Intuit Inc.) -- C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
PRC - [2010/05/15 12:54:22 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jqs.exe
PRC - [2007/05/17 14:45:34 | 00,271,720 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft LifeCam\MSCamS32.exe
PRC - [2008/02/26 23:08:50 | 29,183,504 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
PRC - [2005/07/20 21:07:00 | 00,127,043 | ---- | M] (NVIDIA Corporation) -- C:\Windows\System32\nvsvc32.exe
PRC - [2010/01/31 11:01:28 | 00,045,056 | ---- | M] (Intuit) -- C:\Program Files\Common Files\Intuit\QuickBooks\QBCFMonitorService.exe
PRC - [2010/03/11 11:09:22 | 00,366,840 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsAuxs.exe
PRC - [2010/03/15 11:50:36 | 01,142,224 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsSvc.exe
PRC - [2008/11/24 22:31:12 | 00,087,904 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
PRC - [2006/10/18 20:05:24 | 00,913,408 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Media Player\WMPNetwk.exe
PRC - [2010/03/09 08:40:26 | 01,286,608 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsTray.exe
PRC - [2008/04/13 20:12:19 | 01,033,728 | ---- | M] (Microsoft Corporation) -- C:\Windows\Explorer.EXE
PRC - [2010/02/02 09:13:54 | 00,070,928 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\TFEngine\TFService.exe
PRC - [2007/08/24 07:00:48 | 00,033,648 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
PRC - [2008/10/14 22:38:56 | 00,623,992 | ---- | M] (Adobe Systems Inc.) -- C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe
PRC - [2004/11/02 20:24:46 | 00,032,768 | ---- | M] (Cyberlink Corp.) -- C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
PRC - [2007/04/10 14:46:48 | 00,709,992 | ---- | M] (Microsoft Corporation) -- C:\Windows\vVX3000.exe
PRC - [2008/04/17 15:14:00 | 00,098,616 | ---- | M] (ArcSoft Inc.) -- C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe
PRC - [2007/04/16 15:28:22 | 00,577,536 | ---- | M] (Realtek Semiconductor Corp.) -- C:\Windows\SOUNDMAN.EXE
PRC - [2008/05/02 00:15:46 | 00,015,872 | ---- | M] () -- C:\Program Files\Unlocker\UnlockerAssistant.exe
PRC - [2010/03/10 10:52:48 | 00,202,256 | ---- | M] (RealNetworks, Inc.) -- C:\Program Files\Common Files\Real\Update_OB\realsched.exe
PRC - [2010/02/18 11:43:18 | 00,248,040 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Common Files\Java\Java Update\jusched.exe
PRC - [2006/11/13 13:39:52 | 01,289,000 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft ActiveSync\wcescomm.exe
PRC - [2004/05/12 16:04:54 | 00,196,608 | ---- | M] () -- C:\Program Files\Ahead\Ahead\data\Xtras\mssysmgr.exe
PRC - [2006/10/18 20:05:26 | 00,204,288 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Media Player\WMPNSCFG.exe
PRC - [2006/11/13 13:39:34 | 00,199,464 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft ActiveSync\rapimgr.exe
PRC - [2010/02/02 04:32:46 | 00,984,352 | ---- | M] (Intuit Inc.) -- C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
PRC - [2008/05/26 22:19:14 | 00,123,904 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Desktop Search\WindowsSearch.exe
PRC - [2009/12/02 19:05:24 | 00,867,080 | ---- | M] (Acresso Software Inc.) -- C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
PRC - [2009/08/20 13:02:55 | 00,514,048 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\David Hunter\Desktop\Malware Programs\OTL.exe

========== Win32 Services (SafeList) ==========

SRV - [2008/04/17 15:14:00 | 00,102,712 | ---- | M] (ArcSoft Inc.) -- C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe -- (ACDaemon [Auto | Running])
SRV - [2008/07/25 11:16:40 | 00,034,312 | ---- | M] (Microsoft Corporation) -- C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe -- (aspnet_state [On_Demand | Stopped])
SRV - [2008/11/04 15:48:31 | 00,085,096 | ---- | M] (Autodesk) -- C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe -- (Autodesk Licensing Service [On_Demand | Stopped])
SRV - [2008/06/06 00:41:12 | 01,322,648 | ---- | M] (Autodesk, Inc.) -- C:\Program Files\Common Files\Autodesk Shared\Service\AdskNetSrv.exe -- (Autodesk Network Licensing Service [On_Demand | Stopped])
SRV - [2010/01/22 09:56:24 | 00,112,592 | ---- | M] (Threat Expert Ltd.) -- C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe -- (Browser Defender Update Service [Auto | Running])
SRV - [2008/07/25 11:17:02 | 00,069,632 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe -- (clr_optimization_v2.0.50727_32 [On_Demand | Stopped])
SRV - [2009/12/02 19:05:24 | 00,867,080 | ---- | M] (Acresso Software Inc.) -- C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe -- (FLEXnet Licensing Service [On_Demand | Running])
SRV - [2008/07/29 21:10:04 | 00,046,104 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe -- (FontCache3.0.0.0 [On_Demand | Stopped])
SRV - [2009/06/30 16:10:45 | 00,133,104 | ---- | M] (Google Inc.) -- C:\Program Files\Google\Update\GoogleUpdate.exe -- (gupdate1c9f9bedd46dda2 [Auto | Stopped])
SRV - [2009/06/30 16:10:07 | 00,183,280 | ---- | M] (Google) -- C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe -- (gusvc [Auto | Stopped])
SRV - [2005/05/29 11:59:56 | 00,249,856 | ---- | M] (Aladdin Knowledge Systems Ltd.) -- C:\Windows\System32\nhsrvice.exe -- (HASP Loader [Auto | Running])
SRV - [2008/04/13 20:12:02 | 00,038,400 | ---- | M] (Microsoft Corporation) -- C:\Windows\PCHealth\HelpCtr\Binaries\pchsvc.dll -- (helpsvc [Auto | Running])
SRV - [2008/07/29 19:24:50 | 00,881,664 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe -- (idsvc [Unknown | Stopped])
SRV - [2008/10/10 06:45:26 | 00,013,088 | ---- | M] (Intuit Inc.) -- C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe -- (IntuitUpdateService [Auto | Running])
SRV - [2010/05/15 12:54:22 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jqs.exe -- (JavaQuickStarterService [Auto | Running])
SRV - [2007/08/24 06:59:20 | 00,068,464 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Office\Office12\GrooveAuditService.exe -- (Microsoft Office Groove Audit Service [On_Demand | Stopped])
SRV - [2007/05/17 14:45:34 | 00,271,720 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft LifeCam\MSCamS32.exe -- (MSCamSvc [Auto | Running])
SRV - [2008/02/26 23:08:50 | 29,183,504 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe -- (MSSQL$SIZINGMSDE [Auto | Running])
SRV - [2005/10/14 06:50:19 | 00,045,272 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft SQL Server\90\Shared\sqladhlp90.exe -- (MSSQLServerADHelper [Disabled | Stopped])
SRV - [2008/07/29 19:16:38 | 00,132,096 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe -- (NetTcpPortSharing [Disabled | Stopped])
SRV - [2005/07/20 21:07:00 | 00,127,043 | ---- | M] (NVIDIA Corporation) -- C:\Windows\System32\nvsvc32.exe -- (NVSvc [Auto | Running])
SRV - [2007/08/24 03:19:12 | 00,443,776 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Common Files\Microsoft Shared\OFFICE12\ODSERV.EXE -- (odserv [On_Demand | Stopped])
SRV - [2006/10/26 14:03:08 | 00,145,184 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE -- (ose [On_Demand | Stopped])
SRV - [2010/01/31 11:01:28 | 00,045,056 | ---- | M] (Intuit) -- C:\Program Files\Common Files\Intuit\QuickBooks\QBCFMonitorService.exe -- (QBCFMonitorService [Auto | Running])
SRV - [2008/11/18 16:45:28 | 00,061,440 | ---- | M] (Intuit Inc.) -- C:\Program Files\Common Files\Intuit\QuickBooks\FCS\Intuit.QuickBooks.FCS.exe -- (QBFCService [On_Demand | Stopped])
SRV - [2008/03/24 11:02:48 | 00,230,672 | ---- | M] (SonicWALL, Inc.) -- C:\Program Files\SonicWALL\SonicWALL Global VPN Client\RampartSvc.exe -- (RampartSvc [On_Demand | Stopped])
SRV - [2010/03/11 11:09:22 | 00,366,840 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsAuxs.exe -- (sdAuxService [Auto | Running])
SRV - [2010/03/15 11:50:36 | 01,142,224 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\pctsSvc.exe -- (sdCoreService [Auto | Running])
SRV - [2007/02/10 09:29:47 | 00,242,544 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe -- (SQLBrowser [Disabled | Stopped])
SRV - [2008/11/24 22:31:12 | 00,087,904 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe -- (SQLWriter [Auto | Running])
SRV - [2010/02/02 09:13:54 | 00,070,928 | ---- | M] (PC Tools) -- C:\Program Files\Spyware Doctor\TFEngine\TFService.exe -- (ThreatFire [On_Demand | Running])
SRV - [2006/10/18 20:05:24 | 00,913,408 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Windows Media Player\WMPNetwk.exe -- (WMPNetworkSvc [Auto | Running])

========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Secondary_Page_URL = [binary data]
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Extensions Off Page = about:NoAdd-ons
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\system32\blank.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Security Risk Page = about:SecurityRisk
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,CustomizeSearch = http://ie.search.msn...st/srchcust.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.google.com/ie
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = http://ie.search.msn...st/srchasst.htm

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\system32\blank.htm
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Page_Transitions = 1
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft...amp;ar=iesearch
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.com/
IE - URLSearchHook: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll (Yahoo! Inc.)
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

FF - HKLM\software\mozilla\Firefox\Extensions\\{20a82645-c095-46ed-80e3-08825760534b}: C:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ [2009/09/05 10:24:04 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Firefox\Extensions\\{A1012757-B292-4585-A7E5-18F2292550D2}: C:\Documents and Settings\David Hunter\Local Settings\Application Data\{A1012757-B292-4585-A7E5-18F2292550D2} [2009/04/06 07:24:33 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Firefox\Extensions\\{ABDE892B-13A8-4d1b-88E6-365A6E755758}: C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext [2010/03/10 10:55:01 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Firefox\Extensions\\[email protected]: C:\Program Files\Java\jre6\lib\deploy\jqs\ff [2010/05/15 12:54:24 | 00,000,000 | ---D | M]


O1 HOSTS File: (27 bytes) - C:\Windows\System32\drivers\etc\Hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (Adobe PDF Reader Link Helper) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll (Adobe Systems Incorporated)
O2 - BHO: (PC Tools Browser Guard BHO) - {2A0F3D1B-0909-4FF4-B272-609CCE6054E7} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O2 - BHO: (RealPlayer Download and Record Plugin for Internet Explorer) - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll (RealPlayer)
O2 - BHO: (Spybot-S&D IE Protection) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O2 - BHO: (Groove GFS Browser Helper) - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll (Microsoft Corporation)
O2 - BHO: (Adobe PDF Conversion Toolbar Helper) - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O2 - BHO: (Java™ Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll (Sun Microsystems, Inc.)
O2 - BHO: (JQSIEStartDetectorImpl Class) - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll (Sun Microsystems, Inc.)
O3 - HKLM\..\Toolbar: (PC Tools Browser Guard) - {472734EA-242A-422B-ADF8-83D1E48CC825} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O3 - HKLM\..\Toolbar: (Adobe PDF) - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O3 - HKLM\..\Toolbar: (Yahoo! Toolbar) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll (Yahoo! Inc.)
O3 - HKCU\..\Toolbar\ShellBrowser: (PC Tools Browser Guard) - {472734EA-242A-422B-ADF8-83D1E48CC825} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O3 - HKCU\..\Toolbar\WebBrowser: (PC Tools Browser Guard) - {472734EA-242A-422B-ADF8-83D1E48CC825} - C:\Program Files\Spyware Doctor\BDT\PCTBrowserDefender.dll (Threat Expert Ltd.)
O3 - HKCU\..\Toolbar\WebBrowser: (Adobe PDF) - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O4 - HKLM..\Run: [Acrobat Assistant 8.0] C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe (Adobe Systems Inc.)
O4 - HKLM..\Run: [AdobeCS4ServiceManager] C:\Program Files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe (Adobe Systems Incorporated)
O4 - HKLM..\Run: [ArcSoft Connection Service] C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe (ArcSoft Inc.)
O4 - HKLM..\Run: [GrooveMonitor] C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe (Microsoft Corporation)
O4 - HKLM..\Run: [Intuit SyncManager] C:\Program Files\Common Files\Intuit\Sync\IntuitSyncManager.exe (Intuit Inc. All rights reserved.)
O4 - HKLM..\Run: [ISTray] C:\Program Files\Spyware Doctor\pctsTray.exe (PC Tools)
O4 - HKLM..\Run: [LifeCam] c:\Program Files\Microsoft LifeCam\LifeExp.exe (Microsoft Corporation)
O4 - HKLM..\Run: [NeroFilterCheck] C:\Windows\System32\NeroCheck.exe (Ahead Software Gmbh)
O4 - HKLM..\Run: [NvCplDaemon] C:\Windows\System32\NvCpl.DLL (NVIDIA Corporation)
O4 - HKLM..\Run: [NvMediaCenter] C:\Windows\System32\NvMcTray.DLL (NVIDIA Corporation)
O4 - HKLM..\Run: [nwiz] C:\Windows\System32\nwiz.exe (NVIDIA Corporation)
O4 - HKLM..\Run: [QuickTime Task] C:\Program Files\QuickTime\qttask.exe (Apple Inc.)
O4 - HKLM..\Run: [RemoteControl] C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe (Cyberlink Corp.)
O4 - HKLM..\Run: [SBRegRebootCleaner] C:\Program Files\Sunbelt Software\CounterSpy\SBRC.exe File not found
O4 - HKLM..\Run: [SoundMan] C:\Windows\SOUNDMAN.EXE (Realtek Semiconductor Corp.)
O4 - HKLM..\Run: [SunJavaUpdateSched] C:\Program Files\Common Files\Java\Java Update\jusched.exe (Sun Microsystems, Inc.)
O4 - HKLM..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\realsched.exe (RealNetworks, Inc.)
O4 - HKLM..\Run: [UnlockerAssistant] C:\Program Files\Unlocker\UnlockerAssistant.exe ()
O4 - HKLM..\Run: [VX3000] C:\Windows\vVX3000.exe (Microsoft Corporation)
O4 - HKCU..\Run: [H/PC Connection Agent] C:\Program Files\Microsoft ActiveSync\wcescomm.exe (Microsoft Corporation)
O4 - HKCU..\Run: [NBJ] C:\Program Files\Ahead\Nero BackItUp\NBJ.exe (Ahead Software AG)
O4 - HKCU..\Run: [PhotoShow Deluxe Media Manager] C:\Program Files\Ahead\Ahead\data\Xtras\mssysmgr.exe ()
O4 - HKCU..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe (Microsoft Corporation)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe (Intuit Inc.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk = C:\Program Files\Windows Desktop Search\WindowsSearch.exe (Microsoft Corporation)
O4 - Startup: C:\Documents and Settings\David Hunter\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE (Microsoft Corporation)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: dontdisplaylastusername = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: legalnoticecaption =
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: legalnoticetext =
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: shutdownwithoutlogon = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: undockwithoutlogon = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableRegistryTools = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: EnableLUA = 0
O7 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O8 - Extra context menu item: Append to existing PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: Convert link target to Adobe PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: Convert link target to existing PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: Convert selected links to Adobe PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: Convert selected links to existing PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: Convert selection to Adobe PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: Convert selection to existing PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: Convert to Adobe PDF - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll (Adobe Systems Incorporated)
O8 - Extra context menu item: E&xport to Microsoft Excel - C:\Program Files\Microsoft Office\Office12\EXCEL.EXE (Microsoft Corporation)
O9 - Extra Button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files\Microsoft Office\Office12\ONBttnIE.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files\Microsoft Office\Office12\ONBttnIE.dll (Microsoft Corporation)
O9 - Extra Button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\INetRepl.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\INetRepl.dll (Microsoft Corporation)
O9 - Extra Button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\Program Files\Microsoft Office\OFFICE11\REFIEBAR.DLL (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O9 - Extra 'Tools' menuitem : @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\Windows\Network Diagnostic\xpnetdiag.exe (Microsoft Corporation)
O9 - Extra Button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000001 - C:\Program Files\Common Files\PC Tools\Lsp\PCTLsp.dll (PC Tools Research Pty Ltd.)
O10 - Protocol_Catalog9\Catalog_Entries\000000000002 - C:\Program Files\Common Files\PC Tools\Lsp\PCTLsp.dll (PC Tools Research Pty Ltd.)
O10 - Protocol_Catalog9\Catalog_Entries\000000000003 - C:\Program Files\Common Files\PC Tools\Lsp\PCTLsp.dll (PC Tools Research Pty Ltd.)
O10 - Protocol_Catalog9\Catalog_Entries\000000000027 - C:\Program Files\Common Files\PC Tools\Lsp\PCTLsp.dll (PC Tools Research Pty Ltd.)
O15 - HKLM\..Trusted Domains: 1 domain(s) and sub-domain(s) not assigned to a zone.
O15 - HKCU\..Trusted Domains: internet ([]about in Trusted sites)
O15 - HKCU\..Trusted Domains: intuit.com ([community] https in Trusted sites)
O15 - HKCU\..Trusted Domains: mcafee.com ([]http in Trusted sites)
O15 - HKCU\..Trusted Domains: mcafee.com ([]https in Trusted sites)
O15 - HKCU\..Trusted Domains: 45 domain(s) and sub-domain(s) not assigned to a zone.
O16 - DPF: {00000045-9980-0010-8000-00AA00389B71} http://codecs.micros...86/sg726acm.cab (Reg Error: Key error.)
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} http://download.macr...director/sw.cab (Shockwave ActiveX Control)
O16 - DPF: {31435657-9980-0010-8000-00AA00389B71} http://download.micr...78f/wvc1dmo.cab (Reg Error: Key error.)
O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} http://dlm.tools.aka...vex-2.2.4.1.cab (DLM Control)
O16 - DPF: {493ACF15-5CD9-4474-82A6-91670C3DD66E} http://www.linkedin....nderControl.cab (LinkedIn ContactFinderControl)
O16 - DPF: {528C14CD-CF9E-489C-A365-5999F17B69B9} http://pictures.spri...loadControl.cab (LightSurfUploadCtl Class)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://www.update.mi...b?1219021028846 (WUWebControl Class)
O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} http://upload.facebo...oUploader55.cab (Facebook Photo Uploader 5 Control)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_20)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.ma...t/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0015-0000-0012-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.5.0_12)
O16 - DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_20)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_20)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.m...ash/swflash.cab (Shockwave Flash Object)
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} https://khafra.webex...bex/ieatgpc.cab (GpcContainer Class)
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} https://secure.logme...ivex/RACtrl.cab (Performance Viewer Activex Control)
O16 - DPF: {FFBB3F3B-0A5A-4106-BE53-DFE1E2340CB1} http://dlm.tools.aka...ivex-latest.cab (DownloadManager Control)
O16 - DPF: Microsoft XML Parser for Java file:///C:/WINDOWS/Java/classes/xmldso.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 10.1.10.1
O18 - Protocol\Handler\grooveLocalGWS {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll (Microsoft Corporation)
O18 - Protocol\Handler\http\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\http\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\https\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\https\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\intu-help-qb2 {84D77A00-41B5-4b8b-8ADF-86486D72E749} - C:\Program Files\Intuit\QuickBooks 2005\HelpAsyncPluggableProtocol.dll (Intuit, Inc.)
O18 - Protocol\Handler\ipp - No CLSID value found
O18 - Protocol\Handler\ipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp - No CLSID value found
O18 - Protocol\Handler\msdaipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\ms-help {314111c7-a502-11d2-bbca-00c04f8ec294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll (Microsoft Corporation)
O18 - Protocol\Handler\ms-itss {0A9007C0-4076-11D3-8789-0000F8105754} - C:\Program Files\Common Files\Microsoft Shared\Information Retrieval\MSITSS.DLL (Microsoft Corporation)
O18 - Protocol\Filter: - text/xml - C:\Program Files\Common Files\Microsoft Shared\OFFICE11\MSOXMLMF.DLL (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\Windows\Explorer.exe (Microsoft Corporation)
O24 - Desktop Components:0 (My Current Home Page) - About:Home
O28 - HKLM ShellExecuteHooks: {56F9679E-7826-4C84-81F3-532071A8BCC5} - C:\Program Files\Windows Desktop Search\MSNLNamespaceMgr.dll (Microsoft Corporation)
O28 - HKLM ShellExecuteHooks: {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll (Microsoft Corporation)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2008/09/08 16:40:46 | 00,000,000 | ---D | M] - H:\autorun -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck) - File not found
O34 - HKLM BootExecute: (autochk) - C:\Windows\System32\autochk.exe (Microsoft Corporation)
O34 - HKLM BootExecute: (*) - File not found

========== Files/Folders - Created Within 14 Days ==========

[2010/05/14 07:38:57 | 00,000,000 | ---D | C] -- C:\Documents and Settings\David Hunter\Local Settings\Application Data\crowvotpo
[2010/05/07 09:55:21 | 00,130,839 | ---- | C] () -- C:\Documents and Settings\David Hunter\Desktop\F19182DOH09111InstallationofAutomaticStandbyGenerator[1].pdf
[2010/05/06 07:28:47 | 00,059,664 | --S- | C] (PC Tools) -- C:\Windows\System32\drivers\TfSysMon.sys
[2010/05/06 07:28:47 | 00,051,984 | --S- | C] (PC Tools) -- C:\Windows\System32\drivers\TfFsMon.sys
[2010/05/06 07:28:47 | 00,033,552 | --S- | C] (PC Tools) -- C:\Windows\System32\drivers\TfNetMon.sys
[2010/05/06 07:28:14 | 00,001,643 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Spyware Doctor.lnk

========== Files - Modified Within 14 Days ==========

[2010/05/16 19:28:14 | 00,000,300 | ---- | M] () -- C:\Windows\tasks\RealUpgradeScheduledTaskS-1-5-21-299502267-1303643608-725345543-1003.job
[2010/05/16 19:28:13 | 00,000,292 | ---- | M] () -- C:\Windows\tasks\RealUpgradeLogonTaskS-1-5-21-299502267-1303643608-725345543-1003.job
[2010/05/16 18:40:02 | 00,000,886 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineUA.job
[2010/05/16 16:23:54 | 00,514,528 | ---- | M] () -- C:\Windows\System32\perfh009.dat
[2010/05/16 16:23:54 | 00,098,038 | ---- | M] () -- C:\Windows\System32\perfc009.dat
[2010/05/16 16:23:52 | 00,625,968 | ---- | M] () -- C:\Windows\System32\PerfStringBackup.INI
[2010/05/16 16:22:20 | 00,029,204 | ---- | M] () -- C:\Windows\System32\nvapps.xml
[2010/05/16 16:21:40 | 00,013,646 | ---- | M] () -- C:\Windows\System32\wpa.dbl
[2010/05/16 16:21:40 | 00,000,882 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineCore.job
[2010/05/16 16:21:33 | 00,000,236 | ---- | M] () -- C:\Windows\tasks\OGALogon.job
[2010/05/16 16:19:29 | 00,000,012 | ---- | M] () -- C:\Windows\System32\haspaddr.dat
[2010/05/16 16:19:28 | 08,405,015 | ---- | M] () -- C:\Windows\TempFile
[2010/05/16 16:19:20 | 00,000,006 | -H-- | M] () -- C:\Windows\tasks\SA.DAT
[2010/05/16 16:19:14 | 00,002,048 | --S- | M] () -- C:\Windows\bootstat.dat
[2010/05/16 12:06:01 | 00,000,868 | ---- | M] () -- C:\Windows\tasks\Google Software Updater.job
[2010/05/15 07:33:14 | 00,000,049 | ---- | M] () -- C:\Windows\NeroDigital.ini
[2010/05/15 07:33:10 | 00,128,512 | ---- | M] () -- C:\Documents and Settings\David Hunter\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2010/05/12 07:14:07 | 00,000,284 | ---- | M] () -- C:\Windows\tasks\AppleSoftwareUpdate.job
[2010/05/11 23:56:34 | 00,000,664 | ---- | M] () -- C:\Windows\System32\d3d9caps.dat
[2010/05/07 09:55:22 | 00,130,839 | ---- | M] () -- C:\Documents and Settings\David Hunter\Desktop\F19182DOH09111InstallationofAutomaticStandbyGenerator[1].pdf
[2010/05/06 07:28:14 | 00,001,643 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Spyware Doctor.lnk

========== LOP Check ==========

[2010/04/07 07:37:59 | 00,000,000 | RH-D | M] -- C:\Documents and Settings\All Users\Application Data
[2009/05/02 13:41:36 | 00,000,000 | -H-D | M] -- C:\Documents and Settings\All Users\Application Data\{148D8B8A-8F96-4822-81EC-D510B626B7D5}
[2008/08/28 08:41:42 | 00,000,000 | -H-D | M] -- C:\Documents and Settings\All Users\Application Data\{2840BBCB-9BEC-47F6-BA0F-10D3C34BF151}
[2008/08/29 13:30:57 | 00,000,000 | -H-D | M] -- C:\Documents and Settings\All Users\Application Data\{D994735B-8DC6-4AEE-B720-704A4EC0402E}
[2009/12/31 22:51:16 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Ahead
[2009/01/06 09:54:22 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\ArcSoft
[2009/12/02 18:59:08 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Autodesk
[2009/01/19 17:12:47 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\COMMON FILES
[2008/08/28 20:51:24 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\CyberLink
[2009/08/29 00:10:07 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\DriverScanner
[2008/09/13 15:46:39 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\ESA
[2009/12/02 18:09:51 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\FLEXnet
[2009/07/06 22:14:02 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Intuit
[2010/02/01 14:14:55 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\LogiShrd
[2008/10/05 10:08:20 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\LogMeIn
[2008/08/19 01:21:12 | 00,000,000 | --SD | M] -- C:\Documents and Settings\All Users\Application Data\Memeo
[2008/10/28 11:50:24 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\PEERNET
[2009/12/31 23:39:08 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\SlySoft
[2009/01/19 18:01:28 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\SQL Anywhere 10
[2010/05/16 19:28:06 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\TEMP
[2008/09/02 12:08:32 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\WinZip
[2010/03/12 17:38:09 | 00,000,000 | -H-D | M] -- C:\Documents and Settings\David Hunter\Application Data
[2008/11/11 17:08:06 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\ACD Systems
[2010/03/12 16:28:02 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Ahead
[2009/01/06 10:00:22 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\ArcSoft
[2010/03/12 17:38:09 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Auslogics
[2010/02/10 14:26:28 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Autodesk
[2008/11/25 08:00:00 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Broderbund Software
[2008/10/28 11:57:16 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Caterpillar
[2009/06/16 07:03:49 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\com.adobe.ExMan
[2008/08/28 20:54:29 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\CyberLink
[2009/12/13 10:24:45 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\DotSoft
[2009/05/26 05:52:19 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Download Manager
[2010/04/30 23:13:14 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\dvdcss
[2009/06/25 16:10:33 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Epson
[2009/07/21 15:01:50 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\GetRightToGo
[2009/02/24 10:18:23 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Intuit
[2008/11/21 15:43:35 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Leadertech
[2010/02/21 18:52:12 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Move Networks
[2009/05/08 12:40:23 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\NewsLeecher
[2008/09/05 14:24:12 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\progeSOFT
[2008/10/29 08:36:38 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Snapfish
[2010/01/06 15:18:04 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\U3
[2008/11/14 10:04:53 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Uniblue
[2009/06/21 21:47:18 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\W Photo Studio Viewer
[2008/09/25 12:55:37 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\webex
[2008/08/18 00:24:17 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Windows Desktop Search
[2008/11/04 14:53:09 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Windows Search
[2009/02/24 10:18:24 | 00,000,000 | ---D | M] -- C:\Documents and Settings\David Hunter\Application Data\Z-Firm LLC
[2010/05/12 07:14:07 | 00,000,284 | ---- | M] () -- C:\Windows\Tasks\AppleSoftwareUpdate.job
[2003/03/31 08:00:00 | 00,000,065 | -H-- | M] () -- C:\Windows\Tasks\desktop.ini
[2010/05/16 12:06:01 | 00,000,868 | ---- | M] () -- C:\Windows\Tasks\Google Software Updater.job
[2010/05/16 16:21:40 | 00,000,882 | ---- | M] () -- C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
[2010/05/16 18:40:02 | 00,000,886 | ---- | M] () -- C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
[2008/10/29 08:41:22 | 00,000,154 | -H-- | M] () -- C:\Windows\Tasks\Microsoft_Hardware_Launch_setup_exe.job
[2010/05/16 16:21:33 | 00,000,236 | ---- | M] () -- C:\Windows\Tasks\OGALogon.job
[2010/05/16 19:28:13 | 00,000,292 | ---- | M] () -- C:\Windows\Tasks\RealUpgradeLogonTaskS-1-5-21-299502267-1303643608-725345543-1003.job
[2010/05/16 19:28:14 | 00,000,300 | ---- | M] () -- C:\Windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-299502267-1303643608-725345543-1003.job
[2010/05/16 16:19:20 | 00,000,006 | -H-- | M] () -- C:\Windows\Tasks\SA.DAT

========== Purity Check ==========



========== Alternate Data Streams ==========

@Alternate Data Stream - 167 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:1CA73D29
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:014E691E
@Alternate Data Stream - 109 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:A8ADE5D8
< End of report >
  • 0

Advertisements


#2
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Download TDSSKiller and save it to your Desktop.

  • Extract the file and run it.
  • Once completed it will create a log in your C:\ drive
  • Please post the contents of that log



Please download GooredFix from one of the locations below and save it to your Desktop
Download Mirror #1
Download Mirror #2
  • Ensure all Firefox windows are closed.
  • To run the tool, double-click it (XP), or right-click and select Run As Administrator (Vista).
  • When prompted to run the scan, click Yes.
  • GooredFix will check for infections, and then a log will appear. Please post the contents of that log in your next reply (it can also be found on your desktop, called GooredFix.txt).

  • 0

#3
alphaman

alphaman

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Good Morning!

Thank you for your help. I have run the two programs as you requested. The logs are as follows:

TD S SKILLER:

11:24:46:703 5564 TDSS rootkit removing tool 2.3.0.0 May 12 2010 18:11:17
11:24:46:703 5564 ================================================================================
11:24:46:703 5564 SystemInfo:

11:24:46:703 5564 OS Version: 5.1.2600 ServicePack: 3.0
11:24:46:703 5564 Product type: Workstation
11:24:46:703 5564 ComputerName: DHA-COMP-1
11:24:46:703 5564 UserName: David Hunter
11:24:46:703 5564 Windows directory: C:\Windows
11:24:46:703 5564 Processor architecture: Intel x86
11:24:46:703 5564 Number of processors: 2
11:24:46:703 5564 Page size: 0x1000
11:24:46:765 5564 Boot type: Normal boot
11:24:46:765 5564 ================================================================================
11:24:46:828 5564 UnloadDriverW: NtUnloadDriver error 2
11:24:46:828 5564 ForceUnloadDriverW: UnloadDriverW(klmd23) error 0
11:24:48:781 5564 wfopen_ex: Trying to open file C:\Windows\system32\config\system
11:24:48:796 5564 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
11:24:48:796 5564 wfopen_ex: Trying to KLMD file open
11:24:48:796 5564 wfopen_ex: File opened ok (Flags 2)
11:24:48:796 5564 wfopen_ex: Trying to open file C:\Windows\system32\config\software
11:24:48:796 5564 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
11:24:48:796 5564 wfopen_ex: Trying to KLMD file open
11:24:48:796 5564 wfopen_ex: File opened ok (Flags 2)
11:24:48:796 5564 KLAVA engine initialized
11:24:49:140 5564 Initialize success
11:24:49:140 5564
11:24:49:140 5564 Scanning Services ...
11:24:50:250 5564 Raw services enum returned 372 services
11:24:50:281 5564
11:24:50:281 5564 Scanning Drivers ...
11:24:51:796 5564 ACPI (8fd99680a539792a30e97944fdaecf17) C:\Windows\system32\DRIVERS\ACPI.sys
11:24:51:859 5564 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\Windows\system32\drivers\ACPIEC.sys
11:24:51:953 5564 adfs (6d7f09cd92a9fef3a8efce66231fdd79) C:\Windows\system32\drivers\adfs.sys
11:24:52:031 5564 aec (8bed39e3c35d6a489438b8141717a557) C:\Windows\system32\drivers\aec.sys
11:24:52:125 5564 Afc (fe3ea6e9afc1a78e6edca121e006afb7) C:\Windows\system32\drivers\Afc.sys
11:24:52:187 5564 AFD (7e775010ef291da96ad17ca4b17137d7) C:\Windows\System32\drivers\afd.sys
11:24:52:250 5564 agp440 (08fd04aa961bdc77fb983f328334e3d7) C:\Windows\system32\DRIVERS\agp440.sys
11:24:52:500 5564 ALCXSENS (ba88534a3ceb6161e7432438b9ea4f54) C:\Windows\system32\drivers\ALCXSENS.SYS
11:24:52:703 5564 ALCXWDM (dd8520280304b6145a6be31008748c7c) C:\Windows\system32\drivers\ALCXWDM.SYS
11:24:52:906 5564 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\Windows\system32\DRIVERS\arp1394.sys
11:24:52:953 5564 aslm75 (71356a1370739e25375a1d17b6ae318f) C:\WINDOWS\system32\drivers\aslm75.sys
11:24:52:984 5564 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\Windows\system32\DRIVERS\asyncmac.sys
11:24:53:015 5564 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\Windows\system32\DRIVERS\atapi.sys
11:24:53:078 5564 Atmarpc (9916c1225104ba14794209cfa8012159) C:\Windows\system32\DRIVERS\atmarpc.sys
11:24:53:093 5564 audstub (d9f724aa26c010a217c97606b160ed68) C:\Windows\system32\DRIVERS\audstub.sys
11:24:53:140 5564 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\Windows\system32\drivers\Beep.sys
11:24:53:187 5564 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\Windows\system32\drivers\cbidf2k.sys
11:24:53:187 5564 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\Windows\system32\DRIVERS\CCDECODE.sys
11:24:53:218 5564 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\Windows\system32\drivers\Cdaudio.sys
11:24:53:234 5564 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\Windows\system32\drivers\Cdfs.sys
11:24:53:250 5564 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\Windows\system32\DRIVERS\cdrom.sys
11:24:53:500 5564 Disk (044452051f3e02e7963599fc8f4f3e25) C:\Windows\system32\DRIVERS\disk.sys
11:24:53:609 5564 dmboot (d992fe1274bde0f84ad826acae022a41) C:\Windows\system32\drivers\dmboot.sys
11:24:53:640 5564 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\Windows\system32\drivers\dmio.sys
11:24:53:656 5564 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\Windows\system32\drivers\dmload.sys
11:24:53:687 5564 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\Windows\system32\drivers\DMusic.sys
11:24:53:750 5564 DNE (7efbafdec4f543d43296bdbdf912bdd4) C:\Windows\system32\DRIVERS\dne2000.sys
11:24:53:812 5564 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\Windows\system32\drivers\drmkaud.sys
11:24:53:859 5564 ElbyCDIO (44996a2addd2db7454f2ca40b67d8941) C:\Windows\system32\Drivers\ElbyCDIO.sys
11:24:53:875 5564 Fastfat (38d332a6d56af32635675f132548343e) C:\Windows\system32\drivers\Fastfat.sys
11:24:53:890 5564 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\Windows\system32\DRIVERS\fdc.sys
11:24:53:906 5564 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\Windows\system32\drivers\Fips.sys
11:24:53:921 5564 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\Windows\system32\DRIVERS\flpydisk.sys
11:24:53:968 5564 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\Windows\system32\drivers\fltmgr.sys
11:24:53:984 5564 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\Windows\system32\drivers\Fs_Rec.sys
11:24:54:000 5564 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\Windows\system32\DRIVERS\ftdisk.sys
11:24:54:015 5564 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\Windows\system32\DRIVERS\msgpc.sys
11:24:54:078 5564 Hardlock (c1cc0c9742b881c42f1cc628e6f9ebd1) C:\WINDOWS\system32\drivers\hardlock.sys
11:24:54:140 5564 Haspnt (2dd25f060dc9f79b5cdf33d90ed93669) C:\WINDOWS\system32\drivers\Haspnt.sys
11:24:54:203 5564 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\Windows\system32\Drivers\HTTP.sys
11:24:54:265 5564 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\Windows\system32\DRIVERS\i8042prt.sys
11:24:54:312 5564 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\Windows\system32\DRIVERS\imapi.sys
11:24:54:500 5564 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\Windows\system32\DRIVERS\intelppm.sys
11:24:54:609 5564 ip6fw (3bb22519a194418d5fec05d800a19ad0) C:\Windows\system32\drivers\ip6fw.sys
11:24:54:671 5564 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\Windows\system32\DRIVERS\ipfltdrv.sys
11:24:54:734 5564 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\Windows\system32\DRIVERS\ipinip.sys
11:24:54:781 5564 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\Windows\system32\DRIVERS\ipnat.sys
11:24:54:859 5564 IPSec (23c74d75e36e7158768dd63d92789a91) C:\Windows\system32\DRIVERS\ipsec.sys
11:24:54:906 5564 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\Windows\system32\DRIVERS\irenum.sys
11:24:54:937 5564 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\Windows\system32\DRIVERS\isapnp.sys
11:24:54:984 5564 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\Windows\system32\DRIVERS\kbdclass.sys
11:24:55:015 5564 kmixer (692bcf44383d056aed41b045a323d378) C:\Windows\system32\drivers\kmixer.sys
11:24:55:031 5564 KSecDD (b467646c54cc746128904e1654c750c1) C:\Windows\system32\drivers\KSecDD.sys
11:24:55:078 5564 L8042Kbd (0c6e346cde730cf1356dd69ad6e9bc42) C:\Windows\system32\DRIVERS\L8042Kbd.sys
11:24:55:093 5564 L8042mou (8a5993705add14352c9a279fa8338334) C:\Windows\system32\DRIVERS\L8042mou.Sys
11:24:55:125 5564 LMouKE (9837e55673818ecd8febb47f7f77521a) C:\Windows\system32\DRIVERS\LMouKE.Sys
11:24:55:171 5564 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\Windows\system32\drivers\mnmdd.sys
11:24:55:203 5564 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\Windows\system32\drivers\Modem.sys
11:24:55:218 5564 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\Windows\system32\DRIVERS\mouclass.sys
11:24:55:234 5564 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\Windows\system32\drivers\MountMgr.sys
11:24:55:250 5564 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\Windows\system32\DRIVERS\mrxdav.sys
11:24:55:296 5564 MRxSmb (f3aefb11abc521122b67095044169e98) C:\Windows\system32\DRIVERS\mrxsmb.sys
11:24:55:328 5564 Msfs (c941ea2454ba8350021d774daf0f1027) C:\Windows\system32\drivers\Msfs.sys
11:24:55:328 5564 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\Windows\system32\drivers\MSKSSRV.sys
11:24:55:343 5564 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\Windows\system32\drivers\MSPCLOCK.sys
11:24:55:359 5564 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\Windows\system32\drivers\MSPQM.sys
11:24:55:375 5564 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\Windows\system32\DRIVERS\mssmbios.sys
11:24:55:390 5564 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\Windows\system32\drivers\MSTEE.sys
11:24:55:406 5564 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\Windows\system32\drivers\Mup.sys
11:24:55:437 5564 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\Windows\system32\DRIVERS\NABTSFEC.sys
11:24:55:468 5564 NDIS (1df7f42665c94b825322fae71721130d) C:\Windows\system32\drivers\NDIS.sys
11:24:55:484 5564 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\Windows\system32\DRIVERS\NdisIP.sys
11:24:55:500 5564 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\Windows\system32\DRIVERS\ndistapi.sys
11:24:55:515 5564 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\Windows\system32\DRIVERS\ndisuio.sys
11:24:55:531 5564 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\Windows\system32\DRIVERS\ndiswan.sys
11:24:55:531 5564 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\Windows\system32\drivers\NDProxy.sys
11:24:55:546 5564 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\Windows\system32\DRIVERS\netbios.sys
11:24:55:562 5564 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\Windows\system32\DRIVERS\netbt.sys
11:24:55:593 5564 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\Windows\system32\DRIVERS\nic1394.sys
11:24:55:609 5564 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\Windows\system32\drivers\Npfs.sys
11:24:55:625 5564 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\Windows\system32\drivers\Ntfs.sys
11:24:55:671 5564 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\Windows\system32\drivers\Null.sys
11:24:55:781 5564 nv (7fe3f1721856365c882dae13f3600223) C:\Windows\system32\DRIVERS\nv4_mini.sys
11:24:55:921 5564 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\Windows\system32\DRIVERS\nwlnkflt.sys
11:24:55:921 5564 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\Windows\system32\DRIVERS\nwlnkfwd.sys
11:24:55:937 5564 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\Windows\system32\DRIVERS\ohci1394.sys
11:24:55:968 5564 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\Windows\system32\DRIVERS\parport.sys
11:24:55:984 5564 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\Windows\system32\drivers\PartMgr.sys
11:24:56:031 5564 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\Windows\system32\drivers\ParVdm.sys
11:24:56:031 5564 PCI (a219903ccf74233761d92bef471a07b1) C:\Windows\system32\DRIVERS\pci.sys
11:24:56:093 5564 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\Windows\system32\DRIVERS\pciide.sys
11:24:56:125 5564 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\Windows\system32\drivers\Pcmcia.sys
11:24:56:156 5564 PCTCore (807ff1dd6e1bdf8e7d2062fca0daecaf) C:\Windows\system32\drivers\PCTCore.sys
11:24:56:203 5564 pctgntdi (d15669bd3e1cf18f00b46a7949ea541f) C:\WINDOWS\system32\drivers\pctgntdi.sys
11:24:56:250 5564 pctplsg (30c931fcb8df713bcd2fb7ce763a0b47) C:\WINDOWS\system32\drivers\pctplsg.sys
11:24:56:312 5564 pfc (957b82ec80ad7ead64e5e47df6b0dc40) C:\Windows\system32\drivers\pfc.sys
11:24:56:328 5564 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\Windows\system32\DRIVERS\raspptp.sys
11:24:56:359 5564 PQNTDrv (4228630829c0e521c43d882a00533374) C:\Windows\system32\drivers\PQNTDrv.sys
11:24:56:375 5564 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\Windows\system32\DRIVERS\processr.sys
11:24:56:390 5564 PSched (09298ec810b07e5d582cb3a3f9255424) C:\Windows\system32\DRIVERS\psched.sys
11:24:56:421 5564 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\Windows\system32\DRIVERS\ptilink.sys
11:24:56:500 5564 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\Windows\system32\DRIVERS\rasacd.sys
11:24:56:515 5564 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\Windows\system32\DRIVERS\rasl2tp.sys
11:24:56:515 5564 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\Windows\system32\DRIVERS\raspppoe.sys
11:24:56:531 5564 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\Windows\system32\DRIVERS\raspti.sys
11:24:56:562 5564 RCFOX (8f1211a58c1bf3b63ca928878ac6deb0) C:\WINDOWS\system32\Drivers\RCFOX.sys
11:24:56:578 5564 rcvpn (bca39c96b11318cbc2797c4b842e22e4) C:\Windows\system32\DRIVERS\rcvpn.sys
11:24:56:609 5564 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\Windows\system32\DRIVERS\rdbss.sys
11:24:56:625 5564 RDPCDD (4912d5b403614ce99c28420f75353332) C:\Windows\system32\DRIVERS\RDPCDD.sys
11:24:56:640 5564 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\Windows\system32\DRIVERS\rdpdr.sys
11:24:56:656 5564 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\Windows\system32\drivers\RDPWD.sys
11:24:56:671 5564 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\Windows\system32\DRIVERS\redbook.sys
11:24:56:703 5564 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\Windows\system32\DRIVERS\secdrv.sys
11:24:56:718 5564 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\Windows\system32\DRIVERS\serenum.sys
11:24:56:734 5564 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\Windows\system32\DRIVERS\serial.sys
11:24:56:750 5564 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\Windows\system32\drivers\Sfloppy.sys
11:24:56:781 5564 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\Windows\system32\DRIVERS\SLIP.sys
11:24:56:828 5564 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\Windows\system32\drivers\splitter.sys
11:24:56:843 5564 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\Windows\system32\DRIVERS\sr.sys
11:24:56:906 5564 Srv (89220b427890aa1dffd1a02648ae51c3) C:\Windows\system32\DRIVERS\srv.sys
11:24:56:937 5564 streamip (77813007ba6265c4b6098187e6ed79d2) C:\Windows\system32\DRIVERS\StreamIP.sys
11:24:56:937 5564 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\Windows\system32\DRIVERS\swenum.sys
11:24:56:968 5564 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\Windows\system32\drivers\swmidi.sys
11:24:57:015 5564 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\Windows\system32\drivers\sysaudio.sys
11:24:57:078 5564 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\Windows\system32\DRIVERS\tcpip.sys
11:24:57:109 5564 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\Windows\system32\drivers\TDPIPE.sys
11:24:57:125 5564 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\Windows\system32\drivers\TDTCP.sys
11:24:57:140 5564 TermDD (88155247177638048422893737429d9e) C:\Windows\system32\DRIVERS\termdd.sys
11:24:57:156 5564 TfFsMon (d2a1cd31200a6c9d3dfad022503e4836) C:\Windows\system32\drivers\TfFsMon.sys
11:24:57:171 5564 TfNetMon (3e3a544d10b0ac1c4c133048f84390ac) C:\WINDOWS\system32\drivers\TfNetMon.sys
11:24:57:187 5564 TfSysMon (0bcbceadc6240074f6bd7f2d83daa1c9) C:\Windows\system32\drivers\TfSysMon.sys
11:24:57:187 5564 Suspicious file (Forged): C:\Windows\system32\drivers\TfSysMon.sys. Real md5: 0bcbceadc6240074f6bd7f2d83daa1c9, Fake md5: 706be7328a35c39dbe449e10c1ac6a38
11:24:57:187 5564 File "C:\Windows\system32\drivers\TfSysMon.sys" infected by TDSS rootkit ... 11:24:57:812 5564 Backup copy found, using it..
11:24:57:875 5564 !ttfc9 0
11:24:57:890 5564 cure failed
11:24:57:921 5564 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\Windows\system32\drivers\Udfs.sys
11:24:58:031 5564 UnlockerDriver5 (4847639d852763ee39415c929470f672) C:\Program Files\Unlocker\UnlockerDriver5.sys
11:24:58:093 5564 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\Windows\system32\DRIVERS\update.sys
11:24:58:140 5564 usbaudio (e919708db44ed8543a7c017953148330) C:\Windows\system32\drivers\usbaudio.sys
11:24:58:171 5564 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\Windows\system32\DRIVERS\usbccgp.sys
11:24:58:218 5564 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\Windows\system32\DRIVERS\usbehci.sys
11:24:58:218 5564 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\Windows\system32\DRIVERS\usbhub.sys
11:24:58:281 5564 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\Windows\system32\DRIVERS\usbscan.sys
11:24:58:296 5564 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\Windows\system32\DRIVERS\USBSTOR.SYS
11:24:58:343 5564 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\Windows\system32\DRIVERS\usbuhci.sys
11:24:58:359 5564 usb_rndisx (b6cc50279d6cd28e090a5d33244adc9a) C:\Windows\system32\DRIVERS\usb8023x.sys
11:24:58:375 5564 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\Windows\System32\drivers\vga.sys
11:24:58:406 5564 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\Windows\system32\drivers\VolSnap.sys
11:24:58:500 5564 VX3000 (13acfed0e6adca97440169dfd127ebcf) C:\Windows\system32\DRIVERS\VX3000.sys
11:24:58:625 5564 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\Windows\system32\DRIVERS\wanarp.sys
11:24:58:640 5564 wdmaud (6768acf64b18196494413695f0c3a00f) C:\Windows\system32\drivers\wdmaud.sys
11:24:58:687 5564 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\Windows\System32\drivers\ws2ifsl.sys
11:24:58:703 5564 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\Windows\system32\DRIVERS\WSTCODEC.SYS
11:24:58:734 5564 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\Windows\system32\DRIVERS\WudfPf.sys
11:24:58:750 5564 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\Windows\system32\DRIVERS\wudfrd.sys
11:24:58:781 5564 yukonwxp (4322c32ced8c4772e039616dcbf01d3f) C:\Windows\system32\DRIVERS\yk51x86.sys
11:24:58:781 5564
11:24:58:796 5564 Completed
11:24:58:796 5564
11:24:58:796 5564 Results:
11:24:58:796 5564 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
11:24:58:796 5564 File objects infected / cured / cured on reboot: 1 / 0 / 0
11:24:58:796 5564
11:24:58:796 5564 fclose_ex: Trying to close file C:\Windows\system32\config\system
11:24:58:796 5564 fclose_ex: Trying to close file C:\Windows\system32\config\software
11:24:58:796 5564 UnloadDriverW: NtUnloadDriver error 1
11:24:58:796 5564 KLMD(ARK) unloaded successfully

GooredFix:

GooredFix by jpshortstuff (08.01.10.1)
Log created at 11:27 on 17/05/2010 (David Hunter)
Firefox version [Unable to determine]

========== GooredScan ==========

Deleting HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions\\{A1012757-B292-4585-A7E5-18F2292550D2} -> Success!
Deleting C:\Documents and Settings\David Hunter\Local Settings\Application Data\{A1012757-B292-4585-A7E5-18F2292550D2} -> Success!

========== GooredLog ==========

C:\Program Files\Mozilla Firefox\extensions\
(none)

[HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions]
"{20a82645-c095-46ed-80e3-08825760534b}"="C:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\" [17:29 29/08/2008]
"{ABDE892B-13A8-4d1b-88E6-365A6E755758}"="C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext" [14:55 10/03/2010]
"[email protected]"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff" [16:54 15/05/2010]

-=E.O.F=-

Also, when I opened up my browser to make this reply, an additional browser window opened to some other site. I didn't see what site it was as I was trying to quickly closed both windows before some other virus could be downloaded to my machine. Not sure why this happened. When I opened my browser again this did not happen.
  • 0

#4
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Download ComboFix here :

Link 1
Link 2


* IMPORTANT !!! Save ComboFix.exe to your Desktop


  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Here is a guide on how to disable them

    Click me

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt log in your next reply.
  • 0

#5
alphaman

alphaman

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Here is the combofix log:

ComboFix 10-05-16.02 - David Hunter 05/17/2010 15:23:24.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.550 [GMT -4:00]
Running from: c:\documents and settings\David Hunter\Desktop\ComboFix.exe
AV: Spyware Doctor with AntiVirus *On-access scanning disabled* (Updated) {D3C23B96-C9DC-477F-8EF1-69AF17A6EFF6}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\David Hunter\g2mdlhlpx.exe
c:\documents and settings\David Hunter\Recent\Thumbs.db
c:\windows\system\VCL35.BPL

Infected copy of c:\windows\system32\drivers\TfSysMon.sys was found and disinfected
Restored copy from - Kitty had a snack :)
.
((((((((((((((((((((((((( Files Created from 2010-04-17 to 2010-05-17 )))))))))))))))))))))))))))))))
.

2010-05-15 18:24 . 2010-05-15 18:24 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple Computer
2010-05-15 16:55 . 2010-05-15 16:54 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-05-14 11:38 . 2010-05-14 11:39 -------- d-----w- c:\documents and settings\David Hunter\Local Settings\Application Data\crowvotpo
2010-05-06 11:28 . 2010-02-02 13:13 59664 --s-a-w- c:\windows\system32\drivers\TfSysMon.sys
2010-05-06 11:28 . 2010-02-02 13:13 51984 --s-a-w- c:\windows\system32\drivers\TfFsMon.sys
2010-05-06 11:28 . 2010-02-02 13:13 33552 --s---w- c:\windows\system32\drivers\TfNetMon.sys
2010-04-25 22:31 . 2010-04-25 22:31 -------- d-----w- c:\program files\Microsoft Silverlight

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-17 19:21 . 2008-09-13 19:51 12 ----a-w- c:\windows\system32\haspaddr.dat
2010-05-17 19:21 . 2008-08-28 04:25 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-05-17 19:07 . 2009-05-26 00:56 -------- d-----w- c:\program files\Spyware Doctor
2010-05-17 15:24 . 2010-05-17 15:24 59664 ----a-w- c:\windows\system32\drivers\tsk136.tmp
2010-05-15 16:54 . 2008-08-26 14:43 -------- d-----w- c:\program files\Java
2010-05-15 01:27 . 2008-08-28 02:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-05-15 01:20 . 2009-08-19 22:40 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-05-14 20:35 . 2009-10-12 15:27 -------- d-----w- c:\documents and settings\David Hunter\Application Data\vlc
2010-05-12 19:43 . 2009-01-19 22:03 2812 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\QuickBooks 2009\qbbackup.sys
2010-05-12 03:56 . 2008-09-17 04:53 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-05-02 05:50 . 2009-08-20 15:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-01 03:13 . 2009-04-19 18:12 -------- d-----w- c:\documents and settings\David Hunter\Application Data\dvdcss
2010-04-29 19:39 . 2009-08-20 15:15 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 19:39 . 2009-08-20 15:15 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-23 11:07 . 2010-02-18 04:19 838552 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2010-04-08 18:29 . 2009-05-26 00:56 63360 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2010-04-07 11:37 . 2008-08-26 14:42 -------- d-----w- c:\program files\Common Files\Java
2010-04-07 11:37 . 2010-04-07 11:37 503808 ----a-w- c:\documents and settings\David Hunter\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-3ff2e6a9-n\msvcp71.dll
2010-04-07 11:37 . 2010-04-07 11:37 499712 ----a-w- c:\documents and settings\David Hunter\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-3ff2e6a9-n\jmc.dll
2010-04-07 11:37 . 2010-04-07 11:37 61440 ----a-w- c:\documents and settings\David Hunter\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-624880bc-n\decora-sse.dll
2010-04-07 11:37 . 2010-04-07 11:37 348160 ----a-w- c:\documents and settings\David Hunter\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-3ff2e6a9-n\msvcr71.dll
2010-04-07 11:37 . 2010-04-07 11:37 12800 ----a-w- c:\documents and settings\David Hunter\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-624880bc-n\decora-d3d.dll
2010-04-07 11:21 . 2008-08-22 13:10 -------- d-----w- c:\program files\QuickTime
2010-04-07 11:20 . 2008-08-22 13:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-04-06 11:20 . 2009-06-19 04:05 1352968 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\QuickBooks 2009\Components\SyncMgr\OCD\IntuitSyncManager.exe
2010-04-06 11:20 . 2009-01-22 19:47 211720 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\QuickBooks 2009\Components\SyncMgr\OCD\IntuitSyncManagerPatch.exe
2010-03-30 18:32 . 2010-03-30 18:32 -------- d-----w- c:\program files\NETGEAR Print Server Utility
2010-03-30 15:13 . 2008-08-18 00:44 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-03-29 14:06 . 2009-05-26 00:56 218592 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2010-03-19 15:01 . 2010-03-19 15:01 -------- d-----w- c:\program files\Common Files\Apple
2010-03-19 15:00 . 2010-03-19 15:00 -------- d-----w- c:\program files\Apple Software Update
2010-03-19 15:00 . 2010-03-19 15:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-03-10 14:55 . 2010-03-10 14:55 118784 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimwmp.dll
2010-03-10 14:55 . 2010-03-10 14:55 118784 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimswf.dll
2010-03-10 14:55 . 2010-03-10 14:55 118784 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimrp.dll
2010-03-10 14:55 . 2010-03-10 14:55 118784 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimqt.dll
2010-03-10 14:55 . 2010-03-10 14:55 118784 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext\Components\nprpffbrowserrecordext.dll
2010-03-10 14:55 . 2010-03-10 14:55 300616 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Common\rpmainbrowserrecordplugin.dll
2010-03-10 14:55 . 2010-03-10 14:55 118784 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Chrome\Hook\rpchromebrowserrecordhelper.dll
2010-03-10 14:54 . 2010-03-10 14:54 329312 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
2010-03-10 06:15 . 2003-03-31 12:00 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-25 06:24 . 2003-03-31 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2008-11-12 03:40 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-21 22:50 . 2009-09-13 00:04 144160 ----a-w- c:\documents and settings\David Hunter\Application Data\Move Networks\uninstall.exe
2010-02-21 22:50 . 2009-12-07 01:22 5603776 ----a-w- c:\documents and settings\David Hunter\Application Data\Move Networks\plugins\npqmp071705000014.dll
2010-02-21 22:50 . 2010-02-21 22:49 1795704 ----a-w- c:\documents and settings\David Hunter\Application Data\Move Networks\MoveMediaPlayerWin_071705000014.exe
2010-02-19 13:11 . 2009-01-22 19:45 869664 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\QuickBooks 2009\Components\DownloadQB19\Patch\qbpatch.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NBJ"="c:\program files\Ahead\Nero BackItUp\NBJ.exe" [2004-04-27 1863680]
"PhotoShow Deluxe Media Manager"="c:\progra~1\Ahead\Ahead\data\xtras\mssysmgr.exe" [2004-05-12 196608]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-19 204288]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"nwiz"="nwiz.exe" [2005-07-21 1519616]
"NvMediaCenter"="c:\windows\System32\NvMcTray.dll" [2005-07-21 86016]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2007-08-24 33648]
"Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe" [2008-10-15 623992]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-03 32768]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-07-21 7110656]
"VX3000"="c:\windows\vVX3000.exe" [2007-04-10 709992]
"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2008-04-17 98616]
"Intuit SyncManager"="c:\program files\Common Files\Intuit\Sync\IntuitSyncManager.exe" [2009-12-22 1092872]
"SoundMan"="SOUNDMAN.EXE" [2007-04-16 577536]
"LifeCam"="c:\program files\Microsoft LifeCam\LifeExp.exe" [2007-05-17 279912]
"UnlockerAssistant"="c:\program files\Unlocker\UnlockerAssistant.exe" [2008-05-02 15872]
"AdobeCS4ServiceManager"="c:\program files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" [2008-08-14 611712]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2010-03-10 202256]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-18 421888]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-08-24 437160]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-08-24 437160]

c:\documents and settings\David Hunter\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2007-12-7 101440]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
QuickBooks Update Agent.lnk - c:\program files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe [2010-2-2 984352]
Windows Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2008-5-26 123904]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
@=""

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Intuit\\QuickBooks 2005\\QBDBMgrN.exe"=
"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"c:\\Program Files\\SonicWALL\\SonicWALL Global VPN Client\\SWGVpnClient.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"=
"c:\\Program Files\\VideoLAN\\VLC\\vlc.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"=
"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"c:\\Program Files\\Common Files\\Adobe\\CS4ServiceManager\\CS4ServiceManager.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\EXCEL.EXE"=
"c:\\Program Files\\Java\\jre6\\bin\\java.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service
"475:TCP"= 475:TCP:HASP LM 475 TCP
"475:UDP"= 475:UDP:HASP LM 475 UDP
"5353:TCP"= 5353:TCP:Adobe CSI CS4

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [5/25/2009 8:56 PM 218592]
R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [5/6/2010 7:28 AM 51984]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [5/6/2010 7:28 AM 59664]
R1 pctgntdi;pctgntdi;c:\windows\system32\drivers\pctgntdi.sys [5/25/2009 8:56 PM 233136]
R1 RCFOX;SonicWALL IPsec Driver;c:\windows\system32\drivers\RCFOX.SYS [9/12/2008 4:20 PM 86552]
R2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\Spyware Doctor\BDT\BDTUpdateService.exe [1/22/2010 11:10 AM 112592]
R2 HASP Loader;HASP Loader;c:\windows\system32\nhsrvice.exe -service --> c:\windows\system32\nhsrvice.exe -service [?]
R2 MSSQL$SIZINGMSDE;SQL Server (SIZINGMSDE);c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [2/26/2008 11:08 PM 29183504]
R2 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [5/25/2009 8:56 PM 366840]
S2 gupdate1c9f9bedd46dda2;Google Update Service (gupdate1c9f9bedd46dda2);c:\program files\Google\Update\GoogleUpdate.exe [6/30/2009 4:10 PM 133104]
S3 pctplsg;pctplsg;c:\windows\system32\drivers\pctplsg.sys [5/25/2009 8:56 PM 63360]
S3 rcvpn;SonicWALL VPN Adapter;c:\windows\system32\drivers\rcvpn.sys [9/12/2008 4:18 PM 24876]
S3 SBRE;SBRE;\??\c:\windows\system32\drivers\SBREdrv.sys --> c:\windows\system32\drivers\SBREdrv.sys [?]
S3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [5/6/2010 7:28 AM 33552]
S3 ThreatFire;ThreatFire;c:\program files\Spyware Doctor\TFEngine\TFService.exe service --> c:\program files\Spyware Doctor\TFEngine\TFService.exe service [?]
.
Contents of the 'Scheduled Tasks' folder

2010-05-12 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]

2010-05-17 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-06-30 20:10]

2010-05-17 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-30 20:10]

2010-05-17 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-30 20:10]

2010-05-17 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-299502267-1303643608-725345543-1003.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-25 03:09]

2010-05-17 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-299502267-1303643608-725345543-1003.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-25 03:09]
.
.
------- Supplementary Scan -------
.
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Append to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: {{D7F490B1-9F5D-4f27-A44B-FE5556114FDD} - c:\program files\directus\Directus\Appstart.exe
LSP: c:\program files\Common Files\PC Tools\Lsp\PCTLsp.dll
Trusted Zone: internet
Trusted Zone: intuit.com\community
Trusted Zone: mcafee.com
Handler: intu-help-qb2 - {84D77A00-41B5-4b8b-8ADF-86486D72E749} - c:\program files\Intuit\QuickBooks 2005\HelpAsyncPluggableProtocol.dll
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
.
.
------- File Associations -------
.
.scr=AutoCADScriptFile
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-SBRegRebootCleaner - c:\program files\Sunbelt Software\CounterSpy\SBRC.exe
SafeBoot-SBAMSvc
AddRemove-Adobe Flash Player ActiveX - c:\windows\system32\Macromed\Flash\uninstall_activeX.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-17 15:32
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1056)
c:\program files\Common Files\Adobe\Adobe Drive CS4\AdobeDriveCS4_NP.dll
.
Completion time: 2010-05-17 15:38:09
ComboFix-quarantined-files.txt 2010-05-17 19:38

Pre-Run: 388,040,491,008 bytes free
Post-Run: 387,968,417,792 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[Boot Loader]
timeout=2
Default=multi(0)disk(0)rdisk(0)partition(1)\Windows
[Operating Systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\Windows="Windows XP" /fastdetect

- - End Of File - - 56E8E212AD8405EDC820EDDBBF4F9C37
  • 0

#6
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Please download OTM
  • Save it to your desktop.
  • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    :Processes
    
    :Services
    
    :Reg
    
    :Files
    c:\windows\system32\haspaddr.dat
    
    :Commands
    [purity]
    [resethosts]
    [emptytemp]
    [CREATERESTOREPOINT]
    [EMPTYFLASH]
    [Reboot]
  • Return to OTM, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTM and reboot your PC.
Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.



Download TFC to your desktop
  • Open the file and close any other windows.
  • It will close all programs itself when run, make sure to let it run uninterrupted.
  • Click the Start button to begin the process. The program should not take long to finish its job
  • Once its finished it should reboot your machine, if not, do this yourself to ensure a complete clean




Please download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.






Go to Kaspersky website and perform an online antivirus scan.

  • Read through the requirements and privacy statement and click on Accept button.
  • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  • When the downloads have finished, click on Settings.
  • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
      Mail databases
  • Click on My Computer under Scan.
  • Once the scan is complete, it will display the results. Click on View Scan Report.
  • You will see a list of infected items there. Click on Save Report As....
  • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.

  • 0

#7
alphaman

alphaman

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Sorry it took me so long to get back.

OTM LOG:

All processes killed
========== PROCESSES ==========
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
c:\windows\system32\haspaddr.dat moved successfully.
========== COMMANDS ==========
C:\Windows\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully

[EMPTYTEMP]

User: All Users

User: David Hunter
->Temp folder emptied: 146834 bytes
->Temporary Internet Files folder emptied: 10333672 bytes
->Java cache emptied: 0 bytes
->Flash cache emptied: 468495 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 41044 bytes

User: LocalService
->Temp folder emptied: 65748 bytes
->Temporary Internet Files folder emptied: 33530 bytes

User: NetworkService
->Temp folder emptied: 16384 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 4054 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 59664 bytes
Windows Temp folder emptied: 16867 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 2430319 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 13.00 mb

MBAM LOG:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4110

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

5/17/2010 8:43:59 PM
mbam-log-2010-05-17 (20-43-59).txt

Scan type: Quick scan
Objects scanned: 133435
Time elapsed: 5 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

KASPERSKY LOG:

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Tuesday, May 18, 2010
Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Monday, May 17, 2010 22:29:58
Records in database: 4120271
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
A:\
C:\
D:\
E:\
F:\
H:\
J:\

Scan statistics:
Objects scanned: 296045
Threats found: 3
Infected objects found: 4
Suspicious objects found: 1
Scan duration: 10:06:04


File name / Threat / Threats count
C:\David Hunter & Associates\Outlook\archive.pst Infected: Virus.MSWord.Ethan 1
C:\Documents and Settings\David Hunter\Local Settings\Application Data\Microsoft\Outlook\archive.pst Suspicious: Trojan-Spy.HTML.Fraud.gen 1
C:\Qoobox\Quarantine\C\Windows\system32\drivers\TfSysMon.sys.vir Infected: Rootkit.Win32.TDSS.ap 1
H:\DHA Backups\20090105_000023_DHA BACKUP\C\DAVIDH~1\Outlook\archive.pst.nco Infected: Virus.MSWord.Ethan 1
H:\DHA Backups\20090108_000036_DHA BACKUP\C\DAVIDH~1\Outlook\archive.pst Infected: Virus.MSWord.Ethan 1


This morning I ran a scan with Spyware Doctor and it found some infections. The log is below:

SPYWARE DOCTOR:

5/18/2010 7:28:19 AM:906 Service Started
Spyware Doctor Service Application started
5/18/2010 7:28:19 AM:906 Anti-Malware Engine
Anti-Malware engine configuration loaded successfully.
5/18/2010 7:28:21 AM:609 Immunizer Results
The ActiveX section has been Unimmunized. No items were processed.
5/18/2010 7:28:21 AM:703 IntelliGuards status
All IntelliGuards were Enabled
5/18/2010 7:28:57 AM:703 Behavior Guard
Successfully initialized the ThreatFire engine.
5/18/2010 7:28:58 AM:859 Scan Started
Scan Type - Intelli-Scan

5/18/2010 7:29:50 AM:31 Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - geekstogo.com/ geekstogo.com

5/18/2010 7:29:50 AM:31 Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - geekstogo.com/ geekstogo.com

5/18/2010 7:29:54 AM:234 Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - www.geekstogo.com/ www.geekstogo.com

5/18/2010 7:31:19 AM:265 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME, NextInstance

5/18/2010 7:31:19 AM:265 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Service

5/18/2010 7:31:19 AM:265 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Legacy

5/18/2010 7:31:19 AM:281 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, ConfigFlags

5/18/2010 7:31:19 AM:281 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Class

5/18/2010 7:31:19 AM:281 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, ClassGUID

5/18/2010 7:31:19 AM:296 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, DeviceDesc

5/18/2010 7:31:19 AM:296 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Capabilities

5/18/2010 7:31:19 AM:296 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000\LogConf

5/18/2010 7:31:19 AM:312 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000\Control

5/18/2010 7:31:19 AM:312 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000

5/18/2010 7:31:19 AM:312 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME

5/18/2010 7:31:19 AM:421 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Type

5/18/2010 7:31:19 AM:421 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, ErrorControl

5/18/2010 7:31:19 AM:421 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Start

5/18/2010 7:31:19 AM:421 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, ImagePath

5/18/2010 7:31:19 AM:437 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Group

5/18/2010 7:31:19 AM:437 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, 0

5/18/2010 7:31:19 AM:437 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, Count

5/18/2010 7:31:19 AM:437 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, NextInstance

5/18/2010 7:31:19 AM:437 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum

5/18/2010 7:31:19 AM:437 Infection was detected on this computer
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme

5/18/2010 7:31:28 AM:468 Infection was detected on this computer
Threat Name - Trojan.Generic
Type - Registry Key
Risk Level - Medium
Infection - HKEY_USERS\S-1-5-21-299502267-1303643608-725345543-1003\Software\Wget

5/18/2010 7:39:50 AM:843 Infection was detected on this computer
Threat Name - Trojan.Generic
Type - Modified Registry Value
Risk Level - Medium
Infection - HKEY_USERS\S-1-5-21-299502267-1303643608-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState, FullPath

5/18/2010 7:39:50 AM:968 Scan Finished
Scan Type - Intelli-Scan
Items Processed - 356819
Threats Detected - 3
Infections Detected - 27

5/18/2010 7:40:56 AM:640 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme

5/18/2010 7:40:56 AM:656 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum

5/18/2010 7:40:56 AM:656 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, NextInstance

5/18/2010 7:40:56 AM:656 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, Count

5/18/2010 7:40:56 AM:671 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, 0

5/18/2010 7:40:56 AM:671 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Group

5/18/2010 7:40:56 AM:687 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, ImagePath

5/18/2010 7:40:56 AM:687 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Start

5/18/2010 7:40:56 AM:687 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, ErrorControl

5/18/2010 7:40:56 AM:703 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Type

5/18/2010 7:40:56 AM:781 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME

5/18/2010 7:40:56 AM:812 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000

5/18/2010 7:40:56 AM:828 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000\Control

5/18/2010 7:40:56 AM:843 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000\LogConf

5/18/2010 7:40:56 AM:859 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Capabilities

5/18/2010 7:40:56 AM:859 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, DeviceDesc

5/18/2010 7:40:56 AM:921 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, ClassGUID

5/18/2010 7:40:57 AM:31 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Class

5/18/2010 7:40:57 AM:46 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, ConfigFlags

5/18/2010 7:40:57 AM:62 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Legacy

5/18/2010 7:40:57 AM:62 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Service

5/18/2010 7:40:57 AM:78 Infection quarantined
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME, NextInstance

5/18/2010 7:40:57 AM:296 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme

5/18/2010 7:40:57 AM:296 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum

5/18/2010 7:40:57 AM:296 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, NextInstance

5/18/2010 7:40:57 AM:296 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, Count

5/18/2010 7:40:57 AM:312 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme\Enum, 0

5/18/2010 7:40:57 AM:312 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Group

5/18/2010 7:40:57 AM:312 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, ImagePath

5/18/2010 7:40:57 AM:312 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Start

5/18/2010 7:40:57 AM:312 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, ErrorControl

5/18/2010 7:40:57 AM:312 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\catchme, Type

5/18/2010 7:40:57 AM:328 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME

5/18/2010 7:40:57 AM:328 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000

5/18/2010 7:40:57 AM:328 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000\Control

5/18/2010 7:40:57 AM:343 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Key
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000\LogConf

5/18/2010 7:40:57 AM:343 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Capabilities

5/18/2010 7:40:57 AM:343 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, DeviceDesc

5/18/2010 7:40:57 AM:343 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, ClassGUID

5/18/2010 7:40:57 AM:343 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Class

5/18/2010 7:40:57 AM:343 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, ConfigFlags

5/18/2010 7:40:57 AM:359 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Legacy

5/18/2010 7:40:57 AM:359 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME\0000, Service

5/18/2010 7:40:57 AM:359 Infection cleaned
Threat Name - Trojan-Downloader.Murlo
Type - Registry Value
Risk Level - High
Infection - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME, NextInstance

5/18/2010 7:40:57 AM:437 Infection cleaned
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - www.geekstogo.com/ www.geekstogo.com

5/18/2010 7:40:57 AM:453 Infection cleaned
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - geekstogo.com/ geekstogo.com

5/18/2010 7:40:57 AM:468 Infection cleaned
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - geekstogo.com/ geekstogo.com

5/18/2010 7:40:57 AM:531 Infection quarantined
Threat Name - Trojan.Generic
Type - Modified Registry Value
Risk Level - Medium
Infection - HKEY_USERS\S-1-5-21-299502267-1303643608-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState, FullPath

5/18/2010 7:40:57 AM:546 Infection quarantined
Threat Name - Trojan.Generic
Type - Registry Key
Risk Level - Medium
Infection - HKEY_USERS\S-1-5-21-299502267-1303643608-725345543-1003\Software\Wget

5/18/2010 7:40:57 AM:593 Infection cleaned
Threat Name - Trojan.Generic
Type - Modified Registry Value
Risk Level - Medium
Infection - HKEY_USERS\S-1-5-21-299502267-1303643608-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState, FullPath

5/18/2010 7:40:57 AM:609 Infection cleaned
Threat Name - Trojan.Generic
Type - Registry Key
Risk Level - Medium
Infection - HKEY_USERS\S-1-5-21-299502267-1303643608-725345543-1003\Software\Wget

5/18/2010 7:41:01 AM:656 Infections Quarantined/Removed Summary
Quarantined - 24
Quarantine Failed - 0
Removed - 27
Remove Failed - 0

Thanks again for your help.
  • 0

#8
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
ignore spyware doctor its junk

Your logs are clean


Follow these steps to uninstall Combofix and tools used in the removal of malware

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between the "x" and "/")
    Posted Image
  • Please follow the prompts to uninstall Combofix.
  • You will then recieve a message saying Combofix was uninstalled successfully once it's done uninstalling itself.



  • Open OTL
  • Under the Custom Scans/Fixes box at the bottom, paste the following:
    :Commands
    [clearallrestorepoints]
  • Click the Run Fix button at the top
  • It might ask you to reboot, if so click YES



  • Open OTL to run it. (Vista users, right click on OTL and "Run as administrator")
  • Click on the CleanUp button.
  • Click Yes to begin the cleanup process and remove tools, including this application
  • You may be asked to reboot the machine to finish the cleanup process - if so, choose Yes



  • Please read my guide on how to prevent malware and about safe computing here
Thank you for your patience, and performing all of the procedures requested.
  • 0

#9
alphaman

alphaman

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Thank you for your help.

What spyware/antivirus software do you recommend?
  • 0

#10
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Avira + MBAM
  • 0

#11
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :)

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP