Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Google Redirect problem [Solved]


  • This topic is locked This topic is locked

#1
curryjohn

curryjohn

    Member

  • Member
  • PipPip
  • 31 posts
Been wrestling with Google and Firfox redirect virus on my work computer. I have tried to follow the main instructions from Rorschact but Trend Micro will not let me download OTM. I downloaded OTM on jumpdrive at home and tried to put on work computer. Trend Micro grabbed OTM and quarantined it...saying file was infected with TROJ_HIDEFIL.BMC

I ran TDSSkiller (without OTM) and that did not work. I have tried to run Combofix but it disables after about 3 minutes while scanning. My OTL Log is below:

OTL logfile created on: 3/20/2012 4:58:21 PM - Run 1
OTL by OldTimer - Version 3.2.39.1 Folder = C:\Documents and Settings\pca.CURRIE\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1005.23 Mb Total Physical Memory | 506.21 Mb Available Physical Memory | 50.36% Memory free
2.37 Gb Paging File | 1.75 Gb Available in Paging File | 74.03% Paging File free
Paging file location(s): C:\pagefile.sys 1512 3024 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 74.52 Gb Total Space | 41.16 Gb Free Space | 55.24% Space Free | Partition Type: NTFS
Drive F: | 2000.00 Gb Total Space | 995.34 Gb Free Space | 49.77% Space Free | Partition Type: NTFS
Drive H: | 465.75 Gb Total Space | 431.18 Gb Free Space | 92.58% Space Free | Partition Type: NTFS
Drive I: | 2000.00 Gb Total Space | 995.34 Gb Free Space | 49.77% Space Free | Partition Type: NTFS

Computer Name: CJGGM169 | User Name: PCA | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user | Quick Scan
Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2012/03/20 16:58:13 | 000,594,432 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
PRC - [2011/11/07 20:31:54 | 000,557,056 | ---- | M] (BitLeader) -- C:\Program Files\lg_fwupdate\fwupdate.exe
PRC - [2011/11/07 18:44:39 | 000,020,572 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\javaw.exe
PRC - [2011/08/11 18:38:07 | 000,116,608 | ---- | M] (SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\SASCore.exe
PRC - [2011/04/20 16:34:32 | 000,435,584 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\CNTAoSMgr.exe
PRC - [2010/07/29 02:40:28 | 000,959,824 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\PccNTMon.exe
PRC - [2010/07/29 00:19:24 | 001,358,160 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\TmListen.exe
PRC - [2010/07/29 00:13:46 | 001,316,176 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\NTRtScan.exe
PRC - [2010/07/05 10:51:30 | 000,345,424 | ---- | M] () -- C:\Program Files\Trend Micro\BM\TMBMSRV.exe
PRC - [2009/07/15 17:37:18 | 000,689,416 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\TmProxy.exe
PRC - [2009/06/03 21:59:02 | 000,103,720 | ---- | M] (CyberLink) -- C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe
PRC - [2009/04/16 00:52:06 | 000,091,432 | ---- | M] (CyberLink Corp.) -- C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe
PRC - [2008/11/09 15:48:14 | 000,602,392 | ---- | M] (Yahoo! Inc.) -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
PRC - [2008/04/13 19:12:19 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2004/03/04 18:31:24 | 000,081,920 | ---- | M] () -- C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe
PRC - [2004/02/27 12:29:24 | 000,061,440 | ---- | M] (Hewlett-Packard) -- C:\Program Files\Hewlett-Packard\Toolbox\StatusClient\StatusClient.exe
PRC - [2004/01/07 14:02:26 | 000,049,152 | ---- | M] (Hewlett-Packard Company) -- C:\Program Files\Hewlett-Packard\HP Software Update\hpwuSchd2.exe


========== Modules (No Company Name) ==========

MOD - [2011/11/07 18:44:40 | 000,053,349 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\zip.dll
MOD - [2011/11/07 18:44:40 | 000,053,342 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\verify.dll
MOD - [2011/11/07 18:44:39 | 000,802,901 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\hotspot\jvm.dll
MOD - [2011/11/07 18:44:39 | 000,094,308 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\java.dll
MOD - [2011/11/07 18:44:39 | 000,032,864 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\net.dll
MOD - [2011/11/07 18:44:39 | 000,028,776 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\hpi.dll
MOD - [2011/11/07 18:44:39 | 000,020,572 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\javaw.exe
MOD - [2011/11/03 10:28:36 | 001,292,288 | ---- | M] () -- C:\WINDOWS\system32\quartz.dll
MOD - [2011/08/22 02:18:06 | 000,925,696 | ---- | M] () -- C:\Program Files\Yahoo!\Messenger\yui.dll
MOD - [2011/05/28 23:04:56 | 000,140,288 | ---- | M] () -- C:\Program Files\WinRAR\RarExt.dll
MOD - [2010/07/05 10:51:30 | 000,345,424 | ---- | M] () -- C:\Program Files\Trend Micro\BM\TMBMSRV.exe
MOD - [2009/06/03 21:59:14 | 000,013,096 | ---- | M] () -- C:\Program Files\CyberLink\Power2Go\CLMLSvcPS.dll
MOD - [2009/06/03 21:59:02 | 000,619,816 | ---- | M] () -- C:\Program Files\CyberLink\Power2Go\CLMediaLibrary.dll
MOD - [2008/04/13 19:12:03 | 000,562,176 | ---- | M] () -- C:\WINDOWS\system32\qedit.dll
MOD - [2008/04/13 19:11:59 | 000,014,336 | ---- | M] () -- C:\WINDOWS\system32\msdmo.dll
MOD - [2008/04/13 19:11:51 | 000,059,904 | ---- | M] () -- C:\WINDOWS\system32\devenum.dll
MOD - [2004/03/04 18:31:24 | 000,081,920 | ---- | M] () -- C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe
MOD - [2004/03/04 18:31:24 | 000,073,728 | ---- | M] () -- C:\WINDOWS\system32\mrsplnt.dll
MOD - [2003/06/16 16:52:48 | 000,074,752 | ---- | M] () -- C:\WINDOWS\system32\jst.dll
MOD - [2001/07/31 05:17:12 | 000,094,274 | ---- | M] () -- C:\WINDOWS\system32\HPBHEALR.DLL


========== Win32 Services (SafeList) ==========

SRV - File not found [Disabled | Stopped] -- %SystemRoot%\System32\hidserv.dll -- (HidServ)
SRV - [2011/08/11 18:38:07 | 000,116,608 | ---- | M] (SUPERAntiSpyware.com) [Auto | Running] -- C:\Program Files\SUPERAntiSpyware\SASCore.exe -- (!SASCORE)
SRV - [2010/07/29 00:19:24 | 001,358,160 | ---- | M] (Trend Micro Inc.) [Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmListen.exe -- (tmlisten)
SRV - [2010/07/29 00:13:46 | 001,316,176 | ---- | M] (Trend Micro Inc.) [Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\NTRtScan.exe -- (ntrtscan)
SRV - [2010/07/05 10:51:30 | 000,345,424 | ---- | M] () [On_Demand | Running] -- C:\Program Files\Trend Micro\BM\TMBMSRV.exe -- (TMBMServer)
SRV - [2009/07/15 17:37:18 | 000,689,416 | ---- | M] (Trend Micro Inc.) [On_Demand | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmProxy.exe -- (TmProxy)
SRV - [2008/11/09 15:48:14 | 000,602,392 | ---- | M] (Yahoo! Inc.) [Auto | Running] -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe -- (YahooAUService)
SRV - [2003/10/22 11:19:22 | 000,065,536 | ---- | M] (HP) [On_Demand | Stopped] -- C:\WINDOWS\system32\HPZipm12.exe -- (Pml Driver HPZ12)


========== Driver Services (SafeList) ==========

DRV - File not found [Kernel | On_Demand | Stopped] -- -- (WDICA)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRELI)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDCOMP)
DRV - File not found [Kernel | System | Stopped] -- -- (PCIDump)
DRV - File not found [Kernel | System | Stopped] -- -- (lbrtfdc)
DRV - File not found [Kernel | System | Stopped] -- -- (i2omgmt)
DRV - File not found [Kernel | System | Stopped] -- -- (Changer)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\DOCUME~1\PCA~1.CUR\LOCALS~1\Temp\catchme.sys -- (catchme)
DRV - [2011/07/22 11:27:02 | 000,012,880 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys -- (SASDIFSV)
DRV - [2011/07/12 16:55:22 | 000,067,664 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
DRV - [2011/07/12 10:44:10 | 000,262,416 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmXPFlt.sys -- (TmFilter)
DRV - [2011/07/12 10:43:58 | 000,036,624 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\tmpreflt.sys -- (TmPreFilter)
DRV - [2011/07/12 10:09:32 | 001,405,720 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\vsapiNT.sys -- (VSApiNt)
DRV - [2010/08/20 14:53:00 | 000,177,232 | ---- | M] () [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\tmcomm.sys -- (tmcomm)
DRV - [2010/08/20 14:53:00 | 000,067,664 | ---- | M] () [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\tmactmon.sys -- (tmactmon)
DRV - [2010/08/20 14:53:00 | 000,057,424 | ---- | M] () [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\tmevtmgr.sys -- (tmevtmgr)
DRV - [2009/07/15 17:37:40 | 000,089,872 | ---- | M] (Trend Micro Inc.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\tmtdi.sys -- (tmtdi)
DRV - [2008/03/28 12:14:02 | 000,024,064 | ---- | M] (Sonic Focus, Inc) [Kernel | Boot | Running] -- C:\WINDOWS\system32\drivers\sfaudio.sys -- (SFAUDIO)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = about:blank
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://search.live.c...ferrer:source?}

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/?ocid=iehp
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = D0 BB EC AC C8 9D CC 01 [binary data]
IE - HKCU\..\URLSearchHook: {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
IE - HKCU\..\SearchScopes,DefaultScope = {3B08C814-0451-4755-8FAE-CAEC3EF5993B}
IE - HKCU\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/...Box&FORM=IE8SRC
IE - HKCU\..\SearchScopes\{15F49772-09D1-410D-B26B-1E5A4875D73E}: "URL" = http://open-search.eu/google.php
IE - HKCU\..\SearchScopes\{3B08C814-0451-4755-8FAE-CAEC3EF5993B}: "URL" = http://www.google.co...utputEncoding?}
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========



FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\WINDOWS\system32\Macromed\Flash\NPSWF32.dll ()
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF - HKLM\Software\MozillaPlugins\@messenger.yahoo.com/YahooMessengerStatePlugin;version=1.0.0.6: C:\Program Files\Yahoo!\Shared\npYState.dll (Yahoo! Inc.)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files\Microsoft Silverlight\4.1.10111.0\npctrl.dll ( Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@videolan.org/vlc,version=1.1.11: C:\Program Files\VideoLAN\VLC\npvlc.dll (the VideoLAN Team)
FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)

FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\extensions\\{22C7F6C6-8D67-4534-92B5-529A0EC09405}: C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\FirefoxExtension [2011/11/07 20:52:51 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 10.0.2\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2012/03/08 17:48:33 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 10.0.2\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins

[2011/11/09 18:46:08 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Extensions
[2012/02/15 10:00:19 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions
[2012/01/27 11:23:54 | 000,000,000 | ---D | M] (Yahoo! Toolbar) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
[2012/02/15 10:00:19 | 000,000,000 | ---D | M] (We-Care Reminder) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions\[email protected]
[2012/01/19 18:57:03 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2011/11/11 17:14:38 | 000,000,000 | ---D | M] (Java Quick Starter) -- C:\PROGRAM FILES\JAVA\JRE6\LIB\DEPLOY\JQS\FF
[2012/03/08 17:48:33 | 000,134,104 | ---- | M] (Mozilla Foundation) -- C:\Program Files\mozilla firefox\components\browsercomps.dll
[2012/03/08 17:48:30 | 000,002,252 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\bing.xml
[2012/03/08 17:48:30 | 000,002,040 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\twitter.xml

O1 HOSTS File: ([2004/08/04 07:00:00 | 000,000,734 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (&Yahoo! Toolbar Helper) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O2 - BHO: (TmIEPlugInBHO Class) - {1CA1377B-DC1D-4A52-9585-6E06050FAC53} - C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\TmIEPlg.dll (Trend Micro Inc.)
O2 - BHO: (WeCareReminder Class) - {D824F0DE-3D60-4F57-9EB1-66033ECD8ABB} - C:\Documents and Settings\All Users\Application Data\WeCareReminder\IEHelperv2.5.0.dll (We-Care.com)
O2 - BHO: (SingleInstance Class) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\YTSingleInstance.dll (Yahoo! Inc)
O3 - HKLM\..\Toolbar: (Yahoo! Toolbar) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O4 - HKLM..\Run: [CLMLServer] C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe (CyberLink)
O4 - HKLM..\Run: [eCopy Desktop Printer Service] C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe ()
O4 - HKLM..\Run: [HP Software Update] C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe (Hewlett-Packard Company)
O4 - HKLM..\Run: [LGODDFU] C:\Program Files\lg_fwupdate\fwupdate.exe (BitLeader)
O4 - HKLM..\Run: [OE] C:\Program Files\Trend Micro\Client Server Security Agent\TMAS_OE\TMAS_OEMon.exe (Trend Micro Inc.)
O4 - HKLM..\Run: [OfficeScanNT Monitor] C:\Program Files\Trend Micro\Client Server Security Agent\pccntmon.exe (Trend Micro Inc.)
O4 - HKLM..\Run: [PDVD8LanguageShortcut] C:\Program Files\CyberLink\PowerDVD8\Language\Language.exe (CyberLink Corp.)
O4 - HKLM..\Run: [QuickFinder Scheduler] C:\Program Files\WordPerfect Office X3\Programs\QFSCHD130.EXE (Corel Corporation)
O4 - HKLM..\Run: [RemoteControl8] C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe (CyberLink Corp.)
O4 - HKLM..\Run: [StatusClient 2.6] C:\Program Files\Hewlett-Packard\Toolbox\StatusClient\StatusClient.exe (Hewlett-Packard)
O4 - HKLM..\Run: [TomcatStartup 2.5] C:\Program Files\Hewlett-Packard\Toolbox\hpbpsttp.exe (Hewlett-Packard)
O4 - HKLM..\Run: [UpdateLBPShortCut] C:\Program Files\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdateP2GoShortCut] C:\Program Files\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdatePPShortCut] C:\Program Files\CyberLink\PowerProducer\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdatePSTShortCut] C:\Program Files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKCU..\Run: [Messenger (Yahoo!)] C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe (Yahoo! Inc.)
O4 - HKCU..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe (SUPERAntiSpyware.com)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 255
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 255
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O8 - Extra context menu item: Open with WordPerfect - C:\Program Files\WordPerfect Office X3\Programs\WPLauncher.hta ()
O16 - DPF: {00134F72-5284-44F7-95A8-52A619F70751} https://fs1.curriejo...ll/WinNTChk.cab (ObjWinNTCheck Class)
O16 - DPF: {08D75BC1-D2B5-11D1-88FC-0080C859833B} https://fs1.curriejo...stall/setup.cab (OfficeScan Corp Edition Web-Deployment SetupCtrl Class)
O16 - DPF: {31435657-9980-0010-8000-00AA00389B71} http://download.micr...78f/wvc1dmo.cab (Reg Error: Key error.)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://windowsupdate...b?1320713118531 (WUWebControl Class)
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} http://www.update.mi...b?1320713169718 (MUWebControl Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {9BBB3919-F518-4D06-8209-299FC243FC44} https://fs1.curriejo...root/AtxEnc.cab (Encrypt Class)
O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.0.90 4.2.2.3 24.116.0.153
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = curriejohnson.com
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{5E11D6A2-C94D-4855-ADB1-845A8DEDB1B9}: DhcpNameServer = 192.168.0.90 4.2.2.3 24.116.0.153
O18 - Protocol\Handler\tmpx {0E526CB5-7446-41D1-A403-19BFE95E8C23} - C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\TmIEPlg.dll (Trend Micro Inc.)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\userinit.exe) - C:\WINDOWS\system32\userinit.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - (C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL) - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (SUPERAntiSpyware.com)
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2011/11/07 18:27:20 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2012/03/20 16:58:01 | 000,594,432 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
[2012/03/20 15:41:22 | 000,000,000 | RH-D | C] -- C:\Documents and Settings\pca.CURRIE\Recent
[2012/03/20 08:30:12 | 000,000,000 | --SD | C] -- C:\ComboFix
[2012/03/20 08:28:55 | 004,440,469 | R--- | C] (Swearware) -- C:\Documents and Settings\pca.CURRIE\Desktop\ComboFix.exe
[2012/03/19 13:32:02 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix Backups
[2012/03/19 13:31:13 | 000,071,398 | ---- | C] (jpshortstuff) -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix.exe
[2012/03/14 18:21:53 | 000,000,000 | RHSD | C] -- C:\cmdcons
[2012/03/14 18:20:47 | 000,518,144 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2012/03/14 18:20:47 | 000,060,416 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2012/03/14 18:20:46 | 000,406,528 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2012/03/14 18:20:46 | 000,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2012/03/14 18:20:26 | 000,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2012/03/14 18:20:02 | 000,000,000 | ---D | C] -- C:\Qoobox
[2012/03/14 18:19:58 | 000,000,000 | R--D | C] -- C:\Documents and Settings\pca.CURRIE\My Documents\My Videos
[2012/03/14 18:19:58 | 000,000,000 | R--D | C] -- C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\Administrative Tools
[2012/03/14 18:19:16 | 004,436,007 | R--- | C] (Swearware) -- C:\Documents and Settings\pca.CURRIE\My Documents\ComboFix.exe
[2012/03/14 18:05:01 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\SUPERAntiSpyware
[2012/03/14 18:04:52 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Malwarebytes' Anti-Malware
[2012/03/14 17:41:46 | 000,000,000 | ---D | C] -- C:\Config.Msi
[2012/03/13 11:46:19 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Application Data\SUPERAntiSpyware.com
[2012/03/13 11:45:57 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2012/03/13 11:45:57 | 000,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2012/03/13 11:44:38 | 015,269,088 | ---- | C] (SUPERAntiSpyware.com) -- C:\Documents and Settings\pca.CURRIE\My Documents\SUPERAntiSpyware.exe
[2012/03/11 16:06:18 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\CCleaner
[2012/03/11 15:16:24 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Application Data\Malwarebytes
[2012/03/11 15:16:14 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Malwarebytes
[2012/03/11 15:16:13 | 000,020,464 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2012/03/11 15:16:13 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2012/03/11 15:13:07 | 009,502,424 | ---- | C] (Malwarebytes Corporation ) -- C:\Documents and Settings\pca.CURRIE\Desktop\mbam--setup-1.60.1.1000.exe
[2012/03/06 15:33:58 | 000,000,000 | ---D | C] -- C:\WINDOWS\SchCache
[2012/03/01 19:11:00 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Microsoft Silverlight
[2012/03/01 19:10:55 | 000,000,000 | ---D | C] -- C:\Program Files\Microsoft Silverlight
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2012/03/20 16:58:13 | 000,594,432 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
[2012/03/20 16:14:12 | 082,436,295 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.Wil
[2012/03/20 16:12:48 | 496,393,880 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.off
[2012/03/20 16:12:33 | 342,358,922 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.wor
[2012/03/20 15:55:22 | 000,032,767 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.ski
[2012/03/20 15:19:36 | 000,063,488 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2012/03/20 13:44:13 | 000,000,366 | ---- | M] () -- C:\WINDOWS\lgfwup.ini
[2012/03/20 13:44:00 | 000,013,646 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2012/03/20 13:34:52 | 000,000,304 | ---- | M] () -- C:\WINDOWS\tasks\Fhbh.job
[2012/03/20 13:33:49 | 000,000,031 | ---- | M] () -- C:\tmuninst.ini
[2012/03/20 13:32:59 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2012/03/20 10:46:12 | 000,014,617 | ---- | M] () -- C:\WINDOWS\cfgall.ini
[2012/03/20 10:23:04 | 000,000,664 | ---- | M] () -- C:\WINDOWS\System32\d3d9caps.dat
[2012/03/20 08:33:12 | 000,102,400 | ---- | M] () -- C:\WINDOWS\RegBootClean.exe
[2012/03/20 08:29:00 | 004,440,469 | R--- | M] (Swearware) -- C:\Documents and Settings\pca.CURRIE\Desktop\ComboFix.exe
[2012/03/19 13:35:24 | 002,044,822 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\tdsskiller.zip
[2012/03/19 13:31:13 | 000,071,398 | ---- | M] (jpshortstuff) -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix.exe
[2012/03/19 13:05:36 | 000,513,320 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\erunt.zip
[2012/03/19 10:58:50 | 000,078,137 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\late fees on undisputed 2008 invoice $318.wpd
[2012/03/19 10:46:59 | 000,002,429 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\WordPerfect X3.lnk
[2012/03/14 18:22:04 | 000,000,327 | RHS- | M] () -- C:\boot.ini
[2012/03/14 18:19:22 | 004,436,007 | R--- | M] (Swearware) -- C:\Documents and Settings\pca.CURRIE\My Documents\ComboFix.exe
[2012/03/14 18:13:48 | 000,325,832 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2012/03/14 18:13:48 | 000,044,522 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2012/03/14 18:06:38 | 000,348,200 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2012/03/14 09:34:12 | 000,000,792 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Microsoft Office Outlook.lnk
[2012/03/13 11:46:02 | 000,001,678 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\SUPERAntiSpyware Free Edition.lnk
[2012/03/13 11:44:38 | 015,269,088 | ---- | M] (SUPERAntiSpyware.com) -- C:\Documents and Settings\pca.CURRIE\My Documents\SUPERAntiSpyware.exe
[2012/03/11 16:06:18 | 000,000,682 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\CCleaner.lnk
[2012/03/11 15:16:15 | 000,000,784 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes Anti-Malware.lnk
[2012/03/11 15:13:08 | 009,502,424 | ---- | M] (Malwarebytes Corporation ) -- C:\Documents and Settings\pca.CURRIE\Desktop\mbam--setup-1.60.1.1000.exe
[2012/03/10 15:23:19 | 000,147,456 | RHS- | M] () -- C:\WINDOWS\System32\qmgrprxyx.dll
[2012/03/10 14:17:06 | 000,000,862 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\.recently-used.xbel
[2012/03/01 19:20:07 | 000,037,797 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Comma Separated Values (DOS).ADR
[2012/03/01 19:03:36 | 000,002,495 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\Microsoft Office Excel 2003.lnk
[2012/03/01 18:58:02 | 000,078,684 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\GMail contacts.csv
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files Created - No Company Name ==========

[2012/03/20 08:33:12 | 000,102,400 | ---- | C] () -- C:\WINDOWS\RegBootClean.exe
[2012/03/19 13:34:39 | 002,044,822 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\tdsskiller.zip
[2012/03/19 13:05:35 | 000,513,320 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\erunt.zip
[2012/03/19 10:58:50 | 000,078,137 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\late fees on undisputed 2008 invoice $318.wpd
[2012/03/16 13:46:37 | 000,000,664 | ---- | C] () -- C:\WINDOWS\System32\d3d9caps.dat
[2012/03/14 18:22:04 | 000,000,211 | ---- | C] () -- C:\Boot.bak
[2012/03/14 18:22:00 | 000,260,272 | RHS- | C] () -- C:\cmldr
[2012/03/14 18:20:47 | 000,256,000 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2012/03/14 18:20:47 | 000,208,896 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2012/03/14 18:20:47 | 000,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2012/03/14 18:20:47 | 000,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2012/03/14 18:20:46 | 000,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2012/03/13 11:46:02 | 000,001,678 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\SUPERAntiSpyware Free Edition.lnk
[2012/03/11 15:16:15 | 000,000,784 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes Anti-Malware.lnk
[2012/03/10 15:23:19 | 000,147,456 | RHS- | C] () -- C:\WINDOWS\System32\qmgrprxyx.dll
[2012/03/10 15:23:19 | 000,000,304 | ---- | C] () -- C:\WINDOWS\tasks\Fhbh.job
[2012/03/10 14:17:06 | 000,000,862 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\.recently-used.xbel
[2012/03/01 19:20:04 | 000,037,797 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Comma Separated Values (DOS).ADR
[2012/03/01 18:57:45 | 000,078,684 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\My Documents\GMail contacts.csv
[2012/02/15 06:00:59 | 000,003,072 | ---- | C] () -- C:\WINDOWS\System32\iacenc.dll
[2012/01/10 17:51:13 | 000,155,648 | ---- | C] () -- C:\WINDOWS\agent.exe
[2011/11/12 10:59:13 | 000,063,488 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2011/11/07 23:09:49 | 000,073,728 | ---- | C] () -- C:\WINDOWS\System32\mrsplnt.dll
[2011/11/07 20:53:40 | 000,014,617 | ---- | C] () -- C:\WINDOWS\cfgall.ini
[2011/11/07 20:53:02 | 000,177,232 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmcomm.sys
[2011/11/07 20:53:02 | 000,067,664 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmactmon.sys
[2011/11/07 20:53:02 | 000,057,424 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmevtmgr.sys
[2011/11/07 20:31:00 | 000,000,366 | ---- | C] () -- C:\WINDOWS\lgfwup.ini
[2011/11/07 20:15:43 | 000,000,848 | -HS- | C] () -- C:\WINDOWS\System32\KGyGaAvL.sys
[2011/11/07 20:06:45 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2011/11/07 18:45:21 | 000,074,752 | ---- | C] () -- C:\WINDOWS\System32\jst.dll
[2011/11/07 18:45:20 | 000,061,440 | ---- | C] () -- C:\WINDOWS\System32\PMLJNI.dll
[2011/11/07 18:43:29 | 000,000,771 | ---- | C] () -- C:\WINDOWS\hpbvnstp.ini
[2011/11/07 18:43:20 | 000,192,512 | R--- | C] () -- C:\WINDOWS\System32\HPB1320V.DLL
[2011/11/07 18:43:20 | 000,000,319 | R--- | C] () -- C:\WINDOWS\System32\HPB1320V.DAT
[2011/11/07 18:42:41 | 000,012,266 | ---- | C] () -- C:\WINDOWS\hplj1320.ini
[2011/11/07 18:29:25 | 000,002,048 | --S- | C] () -- C:\WINDOWS\bootstat.dat
[2011/11/07 18:24:08 | 000,021,640 | ---- | C] () -- C:\WINDOWS\System32\emptyregdb.dat
[2011/11/07 11:44:26 | 000,004,161 | ---- | C] () -- C:\WINDOWS\ODBCINST.INI
[2011/11/07 11:43:00 | 000,348,200 | ---- | C] () -- C:\WINDOWS\System32\FNTCACHE.DAT

========== LOP Check ==========

[2012/01/10 18:11:48 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\AbleFaxTifView
[2011/11/07 20:14:17 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Borland
[2011/11/07 22:51:43 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\LightScribe
[2011/11/12 10:51:31 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\TechSmith
[2011/12/04 17:33:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Temp
[2012/01/10 17:49:51 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\WeCareReminder
[2012/01/10 18:06:03 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\AbleFaxTifView
[2011/11/14 19:41:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\Across Lite 2.0
[2012/02/05 18:02:49 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\gtk-2.0
[2012/03/20 13:34:52 | 000,000,304 | ---- | M] () -- C:\WINDOWS\Tasks\Fhbh.job

========== Purity Check ==========



< End of report >
  • 0

Advertisements


#2
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Hi there and sorry for the delay

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Be advised that when the fix commences it will shut down all running processes and you may lose the desktop and icons, they will return on reboot

If you have Malwarebytes 1.6 or better installed please disable it for the duration of this run

Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following

    :OTL
    [2012/03/20 13:34:52 | 000,000,304 | ---- | M] () -- C:\WINDOWS\Tasks\Fhbh.job

    :Files
    ipconfig /flushdns /c

    :Commands
    [purity]
    [resethosts]
    [emptytemp]
    [CREATERESTOREPOINT]
    [Reboot]

  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

THEN

Download aswMBR.exe ( 4.1mb ) to your desktop.
Double click the aswMBR.exe to run it Click the "Scan" button to start scan

Posted Image

On completion of the scan click save log, save it to your desktop and post in your next reply

Posted Image
  • 0

#3
curryjohn

curryjohn

    Member

  • Topic Starter
  • Member
  • PipPip
  • 31 posts
Thank you for assisting EssexBoy.

Unfortunately I didn't get very far. When I pasted the Custom Scan text and clicked Run Fix, I got the following error message:

Cannot create file C:\windows\system 32\drivers\etc\Hosts

All icons had disappeared as you indicated. After nothing happened for a few minutes, I clicked OK on the error message. At the bottom of the OTL box, it said:

Resetting HOSTS file: DO NOT INTERRUPT

I left it alone for 45 minutes to see if something would push through. When that did not happen, I rebooted and I am back here. I did take a look at my System Restore Tool and it appears I am blocked from going back prior to March 14, which is about three weeks after the problem started.
  • 0

#4
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Stop OTL and re-run with this script please - I will look at the host problem later. Then continue with aswMBR

:OTL
[2012/03/20 13:34:52 | 000,000,304 | ---- | M] () -- C:\WINDOWS\Tasks\Fhbh.job

:Files
ipconfig /flushdns /c

:Commands
[purity]
[emptytemp]
[CREATERESTOREPOINT]
[Reboot]

  • 0

#5
curryjohn

curryjohn

    Member

  • Topic Starter
  • Member
  • PipPip
  • 31 posts
Very good, I have three logs for you:

This log came up after you gave me the new script for OTL

All processes killed
========== OTL ==========
File C:\WINDOWS\Tasks\Fhbh.job not found.
========== FILES ==========
< ipconfig /flushdns /c >
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
C:\Documents and Settings\pca.CURRIE\Desktop\cmd.bat deleted successfully.
C:\Documents and Settings\pca.CURRIE\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========

[EMPTYTEMP]

User: All Users

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 56475 bytes

User: LocalService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: pca
->Temp folder emptied: 5463066 bytes
->Temporary Internet Files folder emptied: 768800 bytes

User: pca.CURRIE
->Temp folder emptied: 3352416 bytes
->Temporary Internet Files folder emptied: 2713638 bytes
->Java cache emptied: 1345498 bytes
->FireFox cache emptied: 49886470 bytes
->Flash cache emptied: 8189015 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 2162283 bytes
%systemroot%\System32 .tmp files removed: 2577 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 16867 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 816394240 bytes

Total Files Cleaned = 849.00 mb

Restore point Set: OTL Restore Point (0)

OTL by OldTimer - Version 3.2.39.1 log created on 03252012_142618

Files\Folders moved on Reboot...
File\Folder C:\Documents and Settings\pca.CURRIE\Local Settings\Temp\Temporary Internet Files\Content.IE5\VRNRDQRT\DNjQ2MjE0NgRjYXQDbWRiBGNkbgMEcGcDBHBsX3MDBHBscl9zA0UxTmRUaU1UMjBwakxqNzlCbE0zNDQEcmQDc3BvbnNvcmVkLm1lc3Nlbmdlci55YWhvby5jb20Ec2VjA3BiBHNpZAMEc2xrA2xkBHZpZAMyNzMwMjU3OQ--[1].gif not found!
File\Folder C:\Documents and Settings\pca.CURRIE\Local Settings\Temp\Temporary Internet Files\Content.IE5\1RE0D3UC\DNjQ2MjE0NgRjYXQDbWRiBGNkbgMEcGcDBHBsX3MDBHBscl9zA1FOUUZZejlJSWhsU2VyMDJ4OWdVRnkEcmQDc3BvbnNvcmVkLm1lc3Nlbmdlci55YWhvby5jb20Ec2VjA3BiBHNpZAMEc2xrA2xkBHZpZAMyNzIyNjI2Mg--[1].gif not found!

Registry entries deleted on Reboot...

This is the OTL log after reboot

OTL logfile created on: 3/25/2012 2:32:14 PM - Run 2
OTL by OldTimer - Version 3.2.39.1 Folder = C:\Documents and Settings\pca.CURRIE\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1005.23 Mb Total Physical Memory | 579.85 Mb Available Physical Memory | 57.68% Memory free
2.37 Gb Paging File | 2.05 Gb Available in Paging File | 86.45% Paging File free
Paging file location(s): C:\pagefile.sys 1512 3024 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 74.52 Gb Total Space | 41.83 Gb Free Space | 56.14% Space Free | Partition Type: NTFS
Drive F: | 2000.00 Gb Total Space | 994.70 Gb Free Space | 49.74% Space Free | Partition Type: NTFS
Drive H: | 465.75 Gb Total Space | 428.29 Gb Free Space | 91.96% Space Free | Partition Type: NTFS
Drive I: | 2000.00 Gb Total Space | 994.70 Gb Free Space | 49.74% Space Free | Partition Type: NTFS

Computer Name: CJGGM169 | User Name: PCA | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user | Quick Scan
Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2012/03/20 16:58:13 | 000,594,432 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
PRC - [2011/11/07 20:31:54 | 000,557,056 | ---- | M] (BitLeader) -- C:\Program Files\lg_fwupdate\fwupdate.exe
PRC - [2011/11/07 18:44:39 | 000,020,572 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\javaw.exe
PRC - [2011/08/11 18:38:07 | 000,116,608 | ---- | M] (SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\SASCore.exe
PRC - [2011/04/20 16:34:32 | 000,435,584 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\CNTAoSMgr.exe
PRC - [2010/07/29 02:40:28 | 000,959,824 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\PccNTMon.exe
PRC - [2010/07/29 00:19:24 | 001,358,160 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\TmListen.exe
PRC - [2010/07/29 00:13:46 | 001,316,176 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\NTRtScan.exe
PRC - [2010/07/05 10:51:30 | 000,345,424 | ---- | M] () -- C:\Program Files\Trend Micro\BM\TMBMSRV.exe
PRC - [2009/07/15 17:37:18 | 000,689,416 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\TmProxy.exe
PRC - [2009/06/03 21:59:02 | 000,103,720 | ---- | M] (CyberLink) -- C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe
PRC - [2009/04/16 00:52:06 | 000,091,432 | ---- | M] (CyberLink Corp.) -- C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe
PRC - [2008/11/09 15:48:14 | 000,602,392 | ---- | M] (Yahoo! Inc.) -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
PRC - [2008/04/13 19:12:19 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2004/03/04 18:31:24 | 000,081,920 | ---- | M] () -- C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe
PRC - [2004/02/27 12:29:24 | 000,061,440 | ---- | M] (Hewlett-Packard) -- C:\Program Files\Hewlett-Packard\Toolbox\StatusClient\StatusClient.exe
PRC - [2004/01/07 14:02:26 | 000,049,152 | ---- | M] (Hewlett-Packard Company) -- C:\Program Files\Hewlett-Packard\HP Software Update\hpwuSchd2.exe


========== Modules (No Company Name) ==========

MOD - [2011/11/07 18:44:40 | 000,053,349 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\zip.dll
MOD - [2011/11/07 18:44:40 | 000,053,342 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\verify.dll
MOD - [2011/11/07 18:44:39 | 000,802,901 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\hotspot\jvm.dll
MOD - [2011/11/07 18:44:39 | 000,094,308 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\java.dll
MOD - [2011/11/07 18:44:39 | 000,032,864 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\net.dll
MOD - [2011/11/07 18:44:39 | 000,028,776 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\hpi.dll
MOD - [2011/11/07 18:44:39 | 000,020,572 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\javaw.exe
MOD - [2011/08/22 02:18:06 | 000,925,696 | ---- | M] () -- C:\Program Files\Yahoo!\Messenger\yui.dll
MOD - [2010/07/05 10:51:30 | 000,345,424 | ---- | M] () -- C:\Program Files\Trend Micro\BM\TMBMSRV.exe
MOD - [2009/06/03 21:59:14 | 000,013,096 | ---- | M] () -- C:\Program Files\CyberLink\Power2Go\CLMLSvcPS.dll
MOD - [2009/06/03 21:59:02 | 000,619,816 | ---- | M] () -- C:\Program Files\CyberLink\Power2Go\CLMediaLibrary.dll
MOD - [2004/03/04 18:31:24 | 000,081,920 | ---- | M] () -- C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe
MOD - [2004/03/04 18:31:24 | 000,073,728 | ---- | M] () -- C:\WINDOWS\system32\mrsplnt.dll
MOD - [2003/06/16 16:52:48 | 000,074,752 | ---- | M] () -- C:\WINDOWS\system32\jst.dll
MOD - [2001/07/31 05:17:12 | 000,094,274 | ---- | M] () -- C:\WINDOWS\system32\HPBHEALR.DLL


========== Win32 Services (SafeList) ==========

SRV - File not found [Disabled | Stopped] -- %SystemRoot%\System32\hidserv.dll -- (HidServ)
SRV - [2011/08/11 18:38:07 | 000,116,608 | ---- | M] (SUPERAntiSpyware.com) [Auto | Running] -- C:\Program Files\SUPERAntiSpyware\SASCore.exe -- (!SASCORE)
SRV - [2010/07/29 00:19:24 | 001,358,160 | ---- | M] (Trend Micro Inc.) [Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmListen.exe -- (tmlisten)
SRV - [2010/07/29 00:13:46 | 001,316,176 | ---- | M] (Trend Micro Inc.) [Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\NTRtScan.exe -- (ntrtscan)
SRV - [2010/07/05 10:51:30 | 000,345,424 | ---- | M] () [On_Demand | Running] -- C:\Program Files\Trend Micro\BM\TMBMSRV.exe -- (TMBMServer)
SRV - [2009/07/15 17:37:18 | 000,689,416 | ---- | M] (Trend Micro Inc.) [On_Demand | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmProxy.exe -- (TmProxy)
SRV - [2008/11/09 15:48:14 | 000,602,392 | ---- | M] (Yahoo! Inc.) [Auto | Running] -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe -- (YahooAUService)
SRV - [2003/10/22 11:19:22 | 000,065,536 | ---- | M] (HP) [On_Demand | Stopped] -- C:\WINDOWS\system32\HPZipm12.exe -- (Pml Driver HPZ12)


========== Driver Services (SafeList) ==========

DRV - File not found [Kernel | On_Demand | Stopped] -- -- (WDICA)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRELI)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDCOMP)
DRV - File not found [Kernel | System | Stopped] -- -- (PCIDump)
DRV - File not found [Kernel | System | Stopped] -- -- (lbrtfdc)
DRV - File not found [Kernel | System | Stopped] -- -- (i2omgmt)
DRV - File not found [Kernel | System | Stopped] -- -- (Changer)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\DOCUME~1\PCA~1.CUR\LOCALS~1\Temp\catchme.sys -- (catchme)
DRV - [2011/07/22 11:27:02 | 000,012,880 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys -- (SASDIFSV)
DRV - [2011/07/12 16:55:22 | 000,067,664 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
DRV - [2011/07/12 10:44:10 | 000,262,416 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmXPFlt.sys -- (TmFilter)
DRV - [2011/07/12 10:43:58 | 000,036,624 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\tmpreflt.sys -- (TmPreFilter)
DRV - [2011/07/12 10:09:32 | 001,405,720 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\vsapiNT.sys -- (VSApiNt)
DRV - [2010/08/20 14:53:00 | 000,177,232 | ---- | M] () [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\tmcomm.sys -- (tmcomm)
DRV - [2010/08/20 14:53:00 | 000,067,664 | ---- | M] () [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\tmactmon.sys -- (tmactmon)
DRV - [2010/08/20 14:53:00 | 000,057,424 | ---- | M] () [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\tmevtmgr.sys -- (tmevtmgr)
DRV - [2009/07/15 17:37:40 | 000,089,872 | ---- | M] (Trend Micro Inc.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\tmtdi.sys -- (tmtdi)
DRV - [2008/03/28 12:14:02 | 000,024,064 | ---- | M] (Sonic Focus, Inc) [Kernel | Boot | Running] -- C:\WINDOWS\system32\drivers\sfaudio.sys -- (SFAUDIO)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = about:blank
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://search.live.c...ferrer:source?}

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.dogpile.com/
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/?ocid=iehp
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = D0 BB EC AC C8 9D CC 01 [binary data]
IE - HKCU\..\URLSearchHook: {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
IE - HKCU\..\SearchScopes,DefaultScope = {3B08C814-0451-4755-8FAE-CAEC3EF5993B}
IE - HKCU\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/...Box&FORM=IE8SRC
IE - HKCU\..\SearchScopes\{15F49772-09D1-410D-B26B-1E5A4875D73E}: "URL" = http://open-search.eu/google.php
IE - HKCU\..\SearchScopes\{3B08C814-0451-4755-8FAE-CAEC3EF5993B}: "URL" = http://www.google.co...utputEncoding?}
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========



FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\WINDOWS\system32\Macromed\Flash\NPSWF32.dll ()
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF - HKLM\Software\MozillaPlugins\@messenger.yahoo.com/YahooMessengerStatePlugin;version=1.0.0.6: C:\Program Files\Yahoo!\Shared\npYState.dll (Yahoo! Inc.)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files\Microsoft Silverlight\4.1.10111.0\npctrl.dll ( Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@videolan.org/vlc,version=1.1.11: C:\Program Files\VideoLAN\VLC\npvlc.dll (the VideoLAN Team)
FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)

FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\extensions\\{22C7F6C6-8D67-4534-92B5-529A0EC09405}: C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\FirefoxExtension [2011/11/07 20:52:51 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 10.0.2\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2012/03/08 17:48:33 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 10.0.2\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins

[2011/11/09 18:46:08 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Extensions
[2012/02/15 10:00:19 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions
[2012/01/27 11:23:54 | 000,000,000 | ---D | M] (Yahoo! Toolbar) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
[2012/02/15 10:00:19 | 000,000,000 | ---D | M] (We-Care Reminder) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions\[email protected]
[2012/01/19 18:57:03 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2011/11/11 17:14:38 | 000,000,000 | ---D | M] (Java Quick Starter) -- C:\PROGRAM FILES\JAVA\JRE6\LIB\DEPLOY\JQS\FF
[2012/03/08 17:48:33 | 000,134,104 | ---- | M] (Mozilla Foundation) -- C:\Program Files\mozilla firefox\components\browsercomps.dll
[2012/03/08 17:48:30 | 000,002,252 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\bing.xml
[2012/03/08 17:48:30 | 000,002,040 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\twitter.xml

Hosts file not found
O2 - BHO: (&Yahoo! Toolbar Helper) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O2 - BHO: (TmIEPlugInBHO Class) - {1CA1377B-DC1D-4A52-9585-6E06050FAC53} - C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\TmIEPlg.dll (Trend Micro Inc.)
O2 - BHO: (WeCareReminder Class) - {D824F0DE-3D60-4F57-9EB1-66033ECD8ABB} - C:\Documents and Settings\All Users\Application Data\WeCareReminder\IEHelperv2.5.0.dll (We-Care.com)
O2 - BHO: (SingleInstance Class) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\YTSingleInstance.dll (Yahoo! Inc)
O3 - HKLM\..\Toolbar: (Yahoo! Toolbar) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O4 - HKLM..\Run: [CLMLServer] C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe (CyberLink)
O4 - HKLM..\Run: [eCopy Desktop Printer Service] C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe ()
O4 - HKLM..\Run: [HP Software Update] C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe (Hewlett-Packard Company)
O4 - HKLM..\Run: [LGODDFU] C:\Program Files\lg_fwupdate\fwupdate.exe (BitLeader)
O4 - HKLM..\Run: [OE] C:\Program Files\Trend Micro\Client Server Security Agent\TMAS_OE\TMAS_OEMon.exe (Trend Micro Inc.)
O4 - HKLM..\Run: [OfficeScanNT Monitor] C:\Program Files\Trend Micro\Client Server Security Agent\pccntmon.exe (Trend Micro Inc.)
O4 - HKLM..\Run: [PDVD8LanguageShortcut] C:\Program Files\CyberLink\PowerDVD8\Language\Language.exe (CyberLink Corp.)
O4 - HKLM..\Run: [QuickFinder Scheduler] C:\Program Files\WordPerfect Office X3\Programs\QFSCHD130.EXE (Corel Corporation)
O4 - HKLM..\Run: [RemoteControl8] C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe (CyberLink Corp.)
O4 - HKLM..\Run: [StatusClient 2.6] C:\Program Files\Hewlett-Packard\Toolbox\StatusClient\StatusClient.exe (Hewlett-Packard)
O4 - HKLM..\Run: [TomcatStartup 2.5] C:\Program Files\Hewlett-Packard\Toolbox\hpbpsttp.exe (Hewlett-Packard)
O4 - HKLM..\Run: [UpdateLBPShortCut] C:\Program Files\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdateP2GoShortCut] C:\Program Files\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdatePPShortCut] C:\Program Files\CyberLink\PowerProducer\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdatePSTShortCut] C:\Program Files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKCU..\Run: [Messenger (Yahoo!)] C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe (Yahoo! Inc.)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O8 - Extra context menu item: Open with WordPerfect - C:\Program Files\WordPerfect Office X3\Programs\WPLauncher.hta ()
O16 - DPF: {00134F72-5284-44F7-95A8-52A619F70751} https://fs1.curriejo...ll/WinNTChk.cab (ObjWinNTCheck Class)
O16 - DPF: {08D75BC1-D2B5-11D1-88FC-0080C859833B} https://fs1.curriejo...stall/setup.cab (OfficeScan Corp Edition Web-Deployment SetupCtrl Class)
O16 - DPF: {31435657-9980-0010-8000-00AA00389B71} http://download.micr...78f/wvc1dmo.cab (Reg Error: Key error.)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://windowsupdate...b?1320713118531 (WUWebControl Class)
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} http://www.update.mi...b?1320713169718 (MUWebControl Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {9BBB3919-F518-4D06-8209-299FC243FC44} https://fs1.curriejo...root/AtxEnc.cab (Encrypt Class)
O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.0.90 4.2.2.3 24.116.0.153
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = curriejohnson.com
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{5E11D6A2-C94D-4855-ADB1-845A8DEDB1B9}: DhcpNameServer = 192.168.0.90 4.2.2.3 24.116.0.153
O18 - Protocol\Handler\tmpx {0E526CB5-7446-41D1-A403-19BFE95E8C23} - C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\TmIEPlg.dll (Trend Micro Inc.)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\userinit.exe) - C:\WINDOWS\system32\userinit.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - (C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL) - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (SUPERAntiSpyware.com)
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2011/11/07 18:27:20 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2012/03/25 12:14:24 | 000,000,000 | ---D | C] -- C:\_OTL
[2012/03/21 11:33:39 | 000,000,000 | --SD | C] -- C:\ComboFix
[2012/03/21 08:58:45 | 004,441,864 | R--- | C] (Swearware) -- C:\Documents and Settings\pca.CURRIE\Desktop\ComboFix.exe
[2012/03/21 08:53:02 | 000,000,000 | RH-D | C] -- C:\Documents and Settings\pca.CURRIE\Recent
[2012/03/20 16:58:01 | 000,594,432 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
[2012/03/19 13:32:02 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix Backups
[2012/03/19 13:31:13 | 000,071,398 | ---- | C] (jpshortstuff) -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix.exe
[2012/03/14 18:21:53 | 000,000,000 | RHSD | C] -- C:\cmdcons
[2012/03/14 18:20:47 | 000,518,144 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2012/03/14 18:20:47 | 000,060,416 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2012/03/14 18:20:46 | 000,406,528 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2012/03/14 18:20:46 | 000,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2012/03/14 18:20:26 | 000,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2012/03/14 18:20:02 | 000,000,000 | ---D | C] -- C:\Qoobox
[2012/03/14 18:19:58 | 000,000,000 | R--D | C] -- C:\Documents and Settings\pca.CURRIE\My Documents\My Videos
[2012/03/14 18:19:58 | 000,000,000 | R--D | C] -- C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\Administrative Tools
[2012/03/14 18:05:01 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\SUPERAntiSpyware
[2012/03/14 18:04:52 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Malwarebytes' Anti-Malware
[2012/03/14 17:41:46 | 000,000,000 | ---D | C] -- C:\Config.Msi
[2012/03/13 11:46:19 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Application Data\SUPERAntiSpyware.com
[2012/03/13 11:45:57 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2012/03/13 11:45:57 | 000,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2012/03/13 11:44:38 | 015,269,088 | ---- | C] (SUPERAntiSpyware.com) -- C:\Documents and Settings\pca.CURRIE\My Documents\SUPERAntiSpyware.exe
[2012/03/11 16:06:18 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\CCleaner
[2012/03/11 15:16:24 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Application Data\Malwarebytes
[2012/03/11 15:16:14 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Malwarebytes
[2012/03/11 15:16:13 | 000,020,464 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2012/03/11 15:16:13 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2012/03/11 15:13:07 | 009,502,424 | ---- | C] (Malwarebytes Corporation ) -- C:\Documents and Settings\pca.CURRIE\Desktop\mbam--setup-1.60.1.1000.exe
[2012/03/06 15:33:58 | 000,000,000 | ---D | C] -- C:\WINDOWS\SchCache
[2012/03/01 19:11:00 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Microsoft Silverlight
[2012/03/01 19:10:55 | 000,000,000 | ---D | C] -- C:\Program Files\Microsoft Silverlight

========== Files - Modified Within 30 Days ==========

[2012/03/25 14:30:21 | 000,000,031 | ---- | M] () -- C:\tmuninst.ini
[2012/03/25 14:28:59 | 000,000,366 | ---- | M] () -- C:\WINDOWS\lgfwup.ini
[2012/03/25 14:28:38 | 000,013,646 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2012/03/25 14:28:11 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2012/03/25 14:24:26 | 000,014,617 | ---- | M] () -- C:\WINDOWS\cfgall.ini
[2012/03/25 13:27:17 | 000,000,664 | ---- | M] () -- C:\WINDOWS\System32\d3d9caps.dat
[2012/03/23 10:37:09 | 000,067,584 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2012/03/21 08:58:51 | 004,441,864 | R--- | M] (Swearware) -- C:\Documents and Settings\pca.CURRIE\Desktop\ComboFix.exe
[2012/03/20 16:58:13 | 000,594,432 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
[2012/03/20 16:14:12 | 082,436,295 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.Wil
[2012/03/20 16:12:48 | 496,393,880 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.off
[2012/03/20 16:12:33 | 342,358,922 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.wor
[2012/03/20 15:55:22 | 000,032,767 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.ski
[2012/03/20 08:33:12 | 000,102,400 | ---- | M] () -- C:\WINDOWS\RegBootClean.exe
[2012/03/19 13:35:24 | 002,044,822 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\tdsskiller.zip
[2012/03/19 13:31:13 | 000,071,398 | ---- | M] (jpshortstuff) -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix.exe
[2012/03/19 13:05:36 | 000,513,320 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\erunt.zip
[2012/03/19 10:58:50 | 000,078,137 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\late fees on undisputed 2008 invoice $318.wpd
[2012/03/19 10:46:59 | 000,002,429 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\WordPerfect X3.lnk
[2012/03/14 18:22:04 | 000,000,327 | RHS- | M] () -- C:\boot.ini
[2012/03/14 18:13:48 | 000,325,832 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2012/03/14 18:13:48 | 000,044,522 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2012/03/14 18:06:38 | 000,348,200 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2012/03/14 09:34:12 | 000,000,792 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Microsoft Office Outlook.lnk
[2012/03/13 11:46:02 | 000,001,678 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\SUPERAntiSpyware Free Edition.lnk
[2012/03/13 11:44:38 | 015,269,088 | ---- | M] (SUPERAntiSpyware.com) -- C:\Documents and Settings\pca.CURRIE\My Documents\SUPERAntiSpyware.exe
[2012/03/11 16:06:18 | 000,000,682 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\CCleaner.lnk
[2012/03/11 15:16:15 | 000,000,784 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes Anti-Malware.lnk
[2012/03/11 15:13:08 | 009,502,424 | ---- | M] (Malwarebytes Corporation ) -- C:\Documents and Settings\pca.CURRIE\Desktop\mbam--setup-1.60.1.1000.exe
[2012/03/10 15:23:19 | 000,147,456 | RHS- | M] () -- C:\WINDOWS\System32\qmgrprxyx.dll
[2012/03/10 14:17:06 | 000,000,862 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\.recently-used.xbel
[2012/03/01 19:20:07 | 000,037,797 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Comma Separated Values (DOS).ADR
[2012/03/01 19:03:36 | 000,002,495 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\Microsoft Office Excel 2003.lnk
[2012/03/01 18:58:02 | 000,078,684 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\GMail contacts.csv

========== Files Created - No Company Name ==========

[2012/03/20 08:33:12 | 000,102,400 | ---- | C] () -- C:\WINDOWS\RegBootClean.exe
[2012/03/19 13:34:39 | 002,044,822 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\tdsskiller.zip
[2012/03/19 13:05:35 | 000,513,320 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\erunt.zip
[2012/03/19 10:58:50 | 000,078,137 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\late fees on undisputed 2008 invoice $318.wpd
[2012/03/16 13:46:37 | 000,000,664 | ---- | C] () -- C:\WINDOWS\System32\d3d9caps.dat
[2012/03/14 18:22:04 | 000,000,211 | ---- | C] () -- C:\Boot.bak
[2012/03/14 18:22:00 | 000,260,272 | RHS- | C] () -- C:\cmldr
[2012/03/14 18:20:47 | 000,256,000 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2012/03/14 18:20:47 | 000,208,896 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2012/03/14 18:20:47 | 000,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2012/03/14 18:20:47 | 000,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2012/03/14 18:20:46 | 000,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2012/03/13 11:46:02 | 000,001,678 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\SUPERAntiSpyware Free Edition.lnk
[2012/03/11 15:16:15 | 000,000,784 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes Anti-Malware.lnk
[2012/03/10 15:23:19 | 000,147,456 | RHS- | C] () -- C:\WINDOWS\System32\qmgrprxyx.dll
[2012/03/10 14:17:06 | 000,000,862 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\.recently-used.xbel
[2012/03/01 19:20:04 | 000,037,797 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Comma Separated Values (DOS).ADR
[2012/03/01 18:57:45 | 000,078,684 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\My Documents\GMail contacts.csv
[2012/02/15 06:00:59 | 000,003,072 | ---- | C] () -- C:\WINDOWS\System32\iacenc.dll
[2012/01/10 17:51:13 | 000,155,648 | ---- | C] () -- C:\WINDOWS\agent.exe
[2011/11/12 10:59:13 | 000,067,584 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2011/11/07 23:09:49 | 000,073,728 | ---- | C] () -- C:\WINDOWS\System32\mrsplnt.dll
[2011/11/07 20:53:40 | 000,014,617 | ---- | C] () -- C:\WINDOWS\cfgall.ini
[2011/11/07 20:53:02 | 000,177,232 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmcomm.sys
[2011/11/07 20:53:02 | 000,067,664 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmactmon.sys
[2011/11/07 20:53:02 | 000,057,424 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmevtmgr.sys
[2011/11/07 20:31:00 | 000,000,366 | ---- | C] () -- C:\WINDOWS\lgfwup.ini
[2011/11/07 20:15:43 | 000,000,848 | -HS- | C] () -- C:\WINDOWS\System32\KGyGaAvL.sys
[2011/11/07 20:06:45 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2011/11/07 18:45:21 | 000,074,752 | ---- | C] () -- C:\WINDOWS\System32\jst.dll
[2011/11/07 18:45:20 | 000,061,440 | ---- | C] () -- C:\WINDOWS\System32\PMLJNI.dll
[2011/11/07 18:43:29 | 000,000,771 | ---- | C] () -- C:\WINDOWS\hpbvnstp.ini
[2011/11/07 18:43:20 | 000,192,512 | R--- | C] () -- C:\WINDOWS\System32\HPB1320V.DLL
[2011/11/07 18:43:20 | 000,000,319 | R--- | C] () -- C:\WINDOWS\System32\HPB1320V.DAT
[2011/11/07 18:42:41 | 000,012,266 | ---- | C] () -- C:\WINDOWS\hplj1320.ini
[2011/11/07 18:29:25 | 000,002,048 | --S- | C] () -- C:\WINDOWS\bootstat.dat
[2011/11/07 18:24:08 | 000,021,640 | ---- | C] () -- C:\WINDOWS\System32\emptyregdb.dat
[2011/11/07 11:44:26 | 000,004,161 | ---- | C] () -- C:\WINDOWS\ODBCINST.INI
[2011/11/07 11:43:00 | 000,348,200 | ---- | C] () -- C:\WINDOWS\System32\FNTCACHE.DAT

========== LOP Check ==========

[2012/01/10 18:11:48 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\AbleFaxTifView
[2011/11/07 20:14:17 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Borland
[2011/11/07 22:51:43 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\LightScribe
[2011/11/12 10:51:31 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\TechSmith
[2011/12/04 17:33:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Temp
[2012/01/10 17:49:51 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\WeCareReminder
[2012/01/10 18:06:03 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\AbleFaxTifView
[2011/11/14 19:41:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\Across Lite 2.0
[2012/02/05 18:02:49 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\gtk-2.0

========== Purity Check ==========



< End of report >

Finally, this is the aswMBR log

aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-03-25 14:40:10
-----------------------------
14:40:10.147 OS Version: Windows 5.1.2600 Service Pack 3
14:40:10.147 Number of processors: 2 586 0x1706
14:40:10.147 ComputerName: CJGGM169 UserName: PCA
14:40:11.600 Initialize success
14:40:47.822 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
14:40:47.837 Disk 0 Vendor: ST380815AS 3.CHH Size: 76319MB BusType: 3
14:40:47.853 Disk 0 MBR read successfully
14:40:47.868 Disk 0 MBR scan
14:40:47.868 Disk 0 Windows XP default MBR code
14:40:47.884 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 76308 MB offset 63
14:40:47.900 Disk 0 scanning sectors +156280320
14:40:47.993 Disk 0 scanning C:\WINDOWS\system32\drivers
14:40:52.369 Service scanning
14:40:56.744 Service tmactmon C:\WINDOWS\system32\drivers\tmactmon.sys **LOCKED** 5
14:40:56.932 Service tmcomm C:\WINDOWS\system32\drivers\tmcomm.sys **LOCKED** 5
14:40:57.104 Service tmevtmgr C:\WINDOWS\system32\drivers\tmevtmgr.sys **LOCKED** 5
14:40:57.197 Service TmFilter C:\Program Files\Trend Micro\Client Server Security Agent\TmXPFlt.sys **LOCKED** 32
14:40:57.291 Service TmPreFilter C:\Program Files\Trend Micro\Client Server Security Agent\TmPreFlt.sys **LOCKED** 32
14:40:57.760 Service VSApiNt C:\Program Files\Trend Micro\Client Server Security Agent\VSApiNt.sys **LOCKED** 32
14:40:58.838 Modules scanning
14:41:01.541 Disk 0 trace - called modules:
14:41:01.573 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS
14:41:01.620 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x86376ab8]
14:41:01.651 3 CLASSPNP.SYS[f75f4fd7] -> nt!IofCallDriver -> \Device\0000006a[0x863ca258]
14:41:01.682 5 ACPI.sys[f748b620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x86320d98]
14:41:01.713 Scan finished successfully
14:41:33.044 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\pca.CURRIE\Desktop\MBR.dat"
14:41:33.059 The log file has been saved successfully to "C:\Documents and Settings\pca.CURRIE\Desktop\aswMBR.txt"
  • 0

#6
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
OK lets now try this, on completion of the OTL run could you retry combofix, from safe mode iif necessary

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Be advised that when the fix commences it will shut down all running processes and you may lose the desktop and icons, they will return on reboot

If you have Malwarebytes 1.6 or better installed please disable it for the duration of this run

Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following

    :OTL
    [2012/03/10 15:23:19 | 000,147,456 | RHS- | M] () -- C:\WINDOWS\System32\qmgrprxyx.dll

    :Files
    ipconfig /flushdns /c

    :Commands
    [emptytemp]
    [CREATERESTOREPOINT]
    [Reboot]

  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

  • 0

#7
curryjohn

curryjohn

    Member

  • Topic Starter
  • Member
  • PipPip
  • 31 posts
Thanks for the fast, steady assisitance. This is the latest OTL log. I tried to do a Combofix in Safe Mode but I could not find my Combofix icon or file folder in that mode.


OTL logfile created on: 3/25/2012 3:17:22 PM - Run 3
OTL by OldTimer - Version 3.2.39.1 Folder = C:\Documents and Settings\pca.CURRIE\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1005.23 Mb Total Physical Memory | 638.07 Mb Available Physical Memory | 63.48% Memory free
2.37 Gb Paging File | 2.11 Gb Available in Paging File | 89.11% Paging File free
Paging file location(s): C:\pagefile.sys 1512 3024 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 74.52 Gb Total Space | 41.81 Gb Free Space | 56.10% Space Free | Partition Type: NTFS
Drive F: | 2000.00 Gb Total Space | 994.70 Gb Free Space | 49.74% Space Free | Partition Type: NTFS
Drive H: | 465.75 Gb Total Space | 428.29 Gb Free Space | 91.96% Space Free | Partition Type: NTFS
Drive I: | 2000.00 Gb Total Space | 994.70 Gb Free Space | 49.74% Space Free | Partition Type: NTFS

Computer Name: CJGGM169 | User Name: PCA | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user | Quick Scan
Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2012/03/20 16:58:13 | 000,594,432 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
PRC - [2012/01/03 08:10:46 | 000,035,736 | ---- | M] (Adobe Systems Incorporated) -- C:\Program Files\Adobe\Reader 10.0\Reader\reader_sl.exe
PRC - [2011/11/07 20:31:54 | 000,557,056 | ---- | M] (BitLeader) -- C:\Program Files\lg_fwupdate\fwupdate.exe
PRC - [2011/11/07 18:44:39 | 000,020,572 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\javaw.exe
PRC - [2011/08/11 18:38:07 | 000,116,608 | ---- | M] (SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\SASCore.exe
PRC - [2011/04/20 16:34:32 | 000,435,584 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\CNTAoSMgr.exe
PRC - [2010/07/29 02:40:28 | 000,959,824 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\PccNTMon.exe
PRC - [2010/07/29 00:19:24 | 001,358,160 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\TmListen.exe
PRC - [2010/07/29 00:13:46 | 001,316,176 | ---- | M] (Trend Micro Inc.) -- C:\Program Files\Trend Micro\Client Server Security Agent\NTRtScan.exe
PRC - [2009/06/03 21:59:02 | 000,103,720 | ---- | M] (CyberLink) -- C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe
PRC - [2009/04/16 00:52:06 | 000,091,432 | ---- | M] (CyberLink Corp.) -- C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe
PRC - [2008/11/09 15:48:14 | 000,602,392 | ---- | M] (Yahoo! Inc.) -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
PRC - [2008/04/13 19:12:19 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2004/03/04 18:31:24 | 000,081,920 | ---- | M] () -- C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe
PRC - [2004/02/27 12:29:24 | 000,061,440 | ---- | M] (Hewlett-Packard) -- C:\Program Files\Hewlett-Packard\Toolbox\StatusClient\StatusClient.exe
PRC - [2004/01/07 14:02:26 | 000,049,152 | ---- | M] (Hewlett-Packard Company) -- C:\Program Files\Hewlett-Packard\HP Software Update\hpwuSchd2.exe


========== Modules (No Company Name) ==========

MOD - [2011/11/07 18:44:40 | 000,053,349 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\zip.dll
MOD - [2011/11/07 18:44:40 | 000,053,342 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\verify.dll
MOD - [2011/11/07 18:44:39 | 000,802,901 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\hotspot\jvm.dll
MOD - [2011/11/07 18:44:39 | 000,094,308 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\java.dll
MOD - [2011/11/07 18:44:39 | 000,032,864 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\net.dll
MOD - [2011/11/07 18:44:39 | 000,028,776 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\hpi.dll
MOD - [2011/11/07 18:44:39 | 000,020,572 | ---- | M] () -- C:\Program Files\Hewlett-Packard\Toolbox\jre\bin\javaw.exe
MOD - [2011/08/22 02:18:06 | 000,925,696 | ---- | M] () -- C:\Program Files\Yahoo!\Messenger\yui.dll
MOD - [2009/06/03 21:59:14 | 000,013,096 | ---- | M] () -- C:\Program Files\CyberLink\Power2Go\CLMLSvcPS.dll
MOD - [2009/06/03 21:59:02 | 000,619,816 | ---- | M] () -- C:\Program Files\CyberLink\Power2Go\CLMediaLibrary.dll
MOD - [2004/03/04 18:31:24 | 000,081,920 | ---- | M] () -- C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe
MOD - [2004/03/04 18:31:24 | 000,073,728 | ---- | M] () -- C:\WINDOWS\system32\mrsplnt.dll
MOD - [2003/06/16 16:52:48 | 000,074,752 | ---- | M] () -- C:\WINDOWS\system32\jst.dll
MOD - [2001/07/31 05:17:12 | 000,094,274 | ---- | M] () -- C:\WINDOWS\system32\HPBHEALR.DLL


========== Win32 Services (SafeList) ==========

SRV - File not found [Disabled | Stopped] -- %SystemRoot%\System32\hidserv.dll -- (HidServ)
SRV - [2011/08/11 18:38:07 | 000,116,608 | ---- | M] (SUPERAntiSpyware.com) [Auto | Running] -- C:\Program Files\SUPERAntiSpyware\SASCore.exe -- (!SASCORE)
SRV - [2010/07/29 00:19:24 | 001,358,160 | ---- | M] (Trend Micro Inc.) [Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmListen.exe -- (tmlisten)
SRV - [2010/07/29 00:13:46 | 001,316,176 | ---- | M] (Trend Micro Inc.) [Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\NTRtScan.exe -- (ntrtscan)
SRV - [2010/07/05 10:51:30 | 000,345,424 | ---- | M] (Trend Micro Inc.) [On_Demand | Stopped] -- C:\Program Files\Trend Micro\BM\TMBMSRV.exe -- (TMBMServer)
SRV - [2009/07/15 17:37:18 | 000,689,416 | ---- | M] (Trend Micro Inc.) [On_Demand | Stopped] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmProxy.exe -- (TmProxy)
SRV - [2008/11/09 15:48:14 | 000,602,392 | ---- | M] (Yahoo! Inc.) [Auto | Running] -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe -- (YahooAUService)
SRV - [2003/10/22 11:19:22 | 000,065,536 | ---- | M] (HP) [On_Demand | Stopped] -- C:\WINDOWS\system32\HPZipm12.exe -- (Pml Driver HPZ12)


========== Driver Services (SafeList) ==========

DRV - File not found [Kernel | On_Demand | Stopped] -- -- (WDICA)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRELI)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDCOMP)
DRV - File not found [Kernel | System | Stopped] -- -- (PCIDump)
DRV - File not found [Kernel | System | Stopped] -- -- (lbrtfdc)
DRV - File not found [Kernel | System | Stopped] -- -- (i2omgmt)
DRV - File not found [Kernel | System | Stopped] -- -- (Changer)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\DOCUME~1\PCA~1.CUR\LOCALS~1\Temp\catchme.sys -- (catchme)
DRV - [2011/07/22 11:27:02 | 000,012,880 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys -- (SASDIFSV)
DRV - [2011/07/12 16:55:22 | 000,067,664 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
DRV - [2011/07/12 10:44:10 | 000,262,416 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\TmXPFlt.sys -- (TmFilter)
DRV - [2011/07/12 10:43:58 | 000,036,624 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\tmpreflt.sys -- (TmPreFilter)
DRV - [2011/07/12 10:09:32 | 001,405,720 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\Program Files\Trend Micro\Client Server Security Agent\vsapiNT.sys -- (VSApiNt)
DRV - [2010/08/20 14:53:00 | 000,177,232 | ---- | M] (Trend Micro Inc.) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\tmcomm.sys -- (tmcomm)
DRV - [2010/08/20 14:53:00 | 000,067,664 | ---- | M] (Trend Micro Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\tmactmon.sys -- (tmactmon)
DRV - [2010/08/20 14:53:00 | 000,057,424 | ---- | M] (Trend Micro Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\tmevtmgr.sys -- (tmevtmgr)
DRV - [2009/07/15 17:37:40 | 000,089,872 | ---- | M] (Trend Micro Inc.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\tmtdi.sys -- (tmtdi)
DRV - [2008/03/28 12:14:02 | 000,024,064 | ---- | M] (Sonic Focus, Inc) [Kernel | Boot | Running] -- C:\WINDOWS\system32\drivers\sfaudio.sys -- (SFAUDIO)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = about:blank
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://search.live.c...ferrer:source?}

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.dogpile.com/
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/?ocid=iehp
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = D0 BB EC AC C8 9D CC 01 [binary data]
IE - HKCU\..\URLSearchHook: {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
IE - HKCU\..\SearchScopes,DefaultScope = {3B08C814-0451-4755-8FAE-CAEC3EF5993B}
IE - HKCU\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/...Box&FORM=IE8SRC
IE - HKCU\..\SearchScopes\{15F49772-09D1-410D-B26B-1E5A4875D73E}: "URL" = http://open-search.eu/google.php
IE - HKCU\..\SearchScopes\{3B08C814-0451-4755-8FAE-CAEC3EF5993B}: "URL" = http://www.google.co...utputEncoding?}
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========



FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\WINDOWS\system32\Macromed\Flash\NPSWF32.dll ()
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF - HKLM\Software\MozillaPlugins\@messenger.yahoo.com/YahooMessengerStatePlugin;version=1.0.0.6: C:\Program Files\Yahoo!\Shared\npYState.dll (Yahoo! Inc.)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files\Microsoft Silverlight\4.1.10111.0\npctrl.dll ( Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@videolan.org/vlc,version=1.1.11: C:\Program Files\VideoLAN\VLC\npvlc.dll (the VideoLAN Team)
FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)

FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\extensions\\{22C7F6C6-8D67-4534-92B5-529A0EC09405}: C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\FirefoxExtension [2011/11/07 20:52:51 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 10.0.2\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2012/03/08 17:48:33 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 10.0.2\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins

[2011/11/09 18:46:08 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Extensions
[2012/02/15 10:00:19 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions
[2012/01/27 11:23:54 | 000,000,000 | ---D | M] (Yahoo! Toolbar) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
[2012/02/15 10:00:19 | 000,000,000 | ---D | M] (We-Care Reminder) -- C:\Documents and Settings\pca.CURRIE\Application Data\Mozilla\Firefox\Profiles\mon7qohc.default\extensions\[email protected]
[2012/01/19 18:57:03 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2011/11/11 17:14:38 | 000,000,000 | ---D | M] (Java Quick Starter) -- C:\PROGRAM FILES\JAVA\JRE6\LIB\DEPLOY\JQS\FF
[2012/03/08 17:48:33 | 000,134,104 | ---- | M] (Mozilla Foundation) -- C:\Program Files\mozilla firefox\components\browsercomps.dll
[2012/03/08 17:48:30 | 000,002,252 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\bing.xml
[2012/03/08 17:48:30 | 000,002,040 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\twitter.xml

Hosts file not found
O2 - BHO: (&Yahoo! Toolbar Helper) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O2 - BHO: (TmIEPlugInBHO Class) - {1CA1377B-DC1D-4A52-9585-6E06050FAC53} - C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\TmIEPlg.dll (Trend Micro Inc.)
O2 - BHO: (WeCareReminder Class) - {D824F0DE-3D60-4F57-9EB1-66033ECD8ABB} - C:\Documents and Settings\All Users\Application Data\WeCareReminder\IEHelperv2.5.0.dll (We-Care.com)
O2 - BHO: (SingleInstance Class) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\YTSingleInstance.dll (Yahoo! Inc)
O3 - HKLM\..\Toolbar: (Yahoo! Toolbar) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (Yahoo! Inc.)
O4 - HKLM..\Run: [CLMLServer] C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe (CyberLink)
O4 - HKLM..\Run: [eCopy Desktop Printer Service] C:\Program Files\eCopy\Desktop\PCLprint\mrmlnc32.exe ()
O4 - HKLM..\Run: [HP Software Update] C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe (Hewlett-Packard Company)
O4 - HKLM..\Run: [LGODDFU] C:\Program Files\lg_fwupdate\fwupdate.exe (BitLeader)
O4 - HKLM..\Run: [OE] C:\Program Files\Trend Micro\Client Server Security Agent\TMAS_OE\TMAS_OEMon.exe (Trend Micro Inc.)
O4 - HKLM..\Run: [OfficeScanNT Monitor] C:\Program Files\Trend Micro\Client Server Security Agent\pccntmon.exe (Trend Micro Inc.)
O4 - HKLM..\Run: [PDVD8LanguageShortcut] C:\Program Files\CyberLink\PowerDVD8\Language\Language.exe (CyberLink Corp.)
O4 - HKLM..\Run: [QuickFinder Scheduler] C:\Program Files\WordPerfect Office X3\Programs\QFSCHD130.EXE (Corel Corporation)
O4 - HKLM..\Run: [RemoteControl8] C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe (CyberLink Corp.)
O4 - HKLM..\Run: [StatusClient 2.6] C:\Program Files\Hewlett-Packard\Toolbox\StatusClient\StatusClient.exe (Hewlett-Packard)
O4 - HKLM..\Run: [TomcatStartup 2.5] C:\Program Files\Hewlett-Packard\Toolbox\hpbpsttp.exe (Hewlett-Packard)
O4 - HKLM..\Run: [UpdateLBPShortCut] C:\Program Files\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdateP2GoShortCut] C:\Program Files\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdatePPShortCut] C:\Program Files\CyberLink\PowerProducer\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKLM..\Run: [UpdatePSTShortCut] C:\Program Files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
O4 - HKCU..\Run: [Messenger (Yahoo!)] C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe (Yahoo! Inc.)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O8 - Extra context menu item: Open with WordPerfect - C:\Program Files\WordPerfect Office X3\Programs\WPLauncher.hta ()
O16 - DPF: {00134F72-5284-44F7-95A8-52A619F70751} https://fs1.curriejo...ll/WinNTChk.cab (ObjWinNTCheck Class)
O16 - DPF: {08D75BC1-D2B5-11D1-88FC-0080C859833B} https://fs1.curriejo...stall/setup.cab (OfficeScan Corp Edition Web-Deployment SetupCtrl Class)
O16 - DPF: {31435657-9980-0010-8000-00AA00389B71} http://download.micr...78f/wvc1dmo.cab (Reg Error: Key error.)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://windowsupdate...b?1320713118531 (WUWebControl Class)
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} http://www.update.mi...b?1320713169718 (MUWebControl Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {9BBB3919-F518-4D06-8209-299FC243FC44} https://fs1.curriejo...root/AtxEnc.cab (Encrypt Class)
O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.0.90 4.2.2.3 24.116.0.153
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = curriejohnson.com
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{5E11D6A2-C94D-4855-ADB1-845A8DEDB1B9}: DhcpNameServer = 192.168.0.90 4.2.2.3 24.116.0.153
O18 - Protocol\Handler\tmpx {0E526CB5-7446-41D1-A403-19BFE95E8C23} - C:\Program Files\Trend Micro\Client Server Security Agent\bho\1009\TmIEPlg.dll (Trend Micro Inc.)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\userinit.exe) - C:\WINDOWS\system32\userinit.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - (C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL) - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (SUPERAntiSpyware.com)
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2011/11/07 18:27:20 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2012/03/25 14:39:22 | 004,731,392 | ---- | C] (AVAST Software) -- C:\Documents and Settings\pca.CURRIE\Desktop\aswMBR.exe
[2012/03/25 12:14:24 | 000,000,000 | ---D | C] -- C:\_OTL
[2012/03/21 11:33:39 | 000,000,000 | --SD | C] -- C:\ComboFix
[2012/03/21 08:58:45 | 004,441,864 | R--- | C] (Swearware) -- C:\Documents and Settings\pca.CURRIE\Desktop\ComboFix.exe
[2012/03/21 08:53:02 | 000,000,000 | RH-D | C] -- C:\Documents and Settings\pca.CURRIE\Recent
[2012/03/20 16:58:01 | 000,594,432 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
[2012/03/19 13:32:02 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix Backups
[2012/03/19 13:31:13 | 000,071,398 | ---- | C] (jpshortstuff) -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix.exe
[2012/03/14 18:21:53 | 000,000,000 | RHSD | C] -- C:\cmdcons
[2012/03/14 18:20:47 | 000,518,144 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2012/03/14 18:20:47 | 000,060,416 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2012/03/14 18:20:46 | 000,406,528 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2012/03/14 18:20:46 | 000,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2012/03/14 18:20:26 | 000,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2012/03/14 18:20:02 | 000,000,000 | ---D | C] -- C:\Qoobox
[2012/03/14 18:19:58 | 000,000,000 | R--D | C] -- C:\Documents and Settings\pca.CURRIE\My Documents\My Videos
[2012/03/14 18:19:58 | 000,000,000 | R--D | C] -- C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\Administrative Tools
[2012/03/14 18:05:01 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\SUPERAntiSpyware
[2012/03/14 18:04:52 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Malwarebytes' Anti-Malware
[2012/03/14 17:41:46 | 000,000,000 | ---D | C] -- C:\Config.Msi
[2012/03/13 11:46:19 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Application Data\SUPERAntiSpyware.com
[2012/03/13 11:45:57 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2012/03/13 11:45:57 | 000,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2012/03/13 11:44:38 | 015,269,088 | ---- | C] (SUPERAntiSpyware.com) -- C:\Documents and Settings\pca.CURRIE\My Documents\SUPERAntiSpyware.exe
[2012/03/11 16:06:18 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\CCleaner
[2012/03/11 15:16:24 | 000,000,000 | ---D | C] -- C:\Documents and Settings\pca.CURRIE\Application Data\Malwarebytes
[2012/03/11 15:16:14 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Malwarebytes
[2012/03/11 15:16:13 | 000,020,464 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2012/03/11 15:16:13 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2012/03/11 15:13:07 | 009,502,424 | ---- | C] (Malwarebytes Corporation ) -- C:\Documents and Settings\pca.CURRIE\Desktop\mbam--setup-1.60.1.1000.exe
[2012/03/06 15:33:58 | 000,000,000 | ---D | C] -- C:\WINDOWS\SchCache
[2012/03/01 19:11:00 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Microsoft Silverlight
[2012/03/01 19:10:55 | 000,000,000 | ---D | C] -- C:\Program Files\Microsoft Silverlight

========== Files - Modified Within 30 Days ==========

[2012/03/25 15:21:48 | 000,014,617 | ---- | M] () -- C:\WINDOWS\cfgall.ini
[2012/03/25 15:16:55 | 000,000,366 | ---- | M] () -- C:\WINDOWS\lgfwup.ini
[2012/03/25 15:16:52 | 000,000,031 | ---- | M] () -- C:\tmuninst.ini
[2012/03/25 15:16:09 | 000,013,646 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2012/03/25 15:15:39 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2012/03/25 14:41:33 | 000,000,512 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\MBR.dat
[2012/03/25 14:39:23 | 004,731,392 | ---- | M] (AVAST Software) -- C:\Documents and Settings\pca.CURRIE\Desktop\aswMBR.exe
[2012/03/25 13:27:17 | 000,000,664 | ---- | M] () -- C:\WINDOWS\System32\d3d9caps.dat
[2012/03/23 10:37:09 | 000,067,584 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2012/03/21 08:58:51 | 004,441,864 | R--- | M] (Swearware) -- C:\Documents and Settings\pca.CURRIE\Desktop\ComboFix.exe
[2012/03/20 16:58:13 | 000,594,432 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\pca.CURRIE\Desktop\OTL.com
[2012/03/20 16:14:12 | 082,436,295 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.Wil
[2012/03/20 16:12:48 | 496,393,880 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.off
[2012/03/20 16:12:33 | 342,358,922 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.wor
[2012/03/20 15:55:22 | 000,032,767 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\Untitled.ski
[2012/03/20 08:33:12 | 000,102,400 | ---- | M] () -- C:\WINDOWS\RegBootClean.exe
[2012/03/19 13:35:24 | 002,044,822 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\tdsskiller.zip
[2012/03/19 13:31:13 | 000,071,398 | ---- | M] (jpshortstuff) -- C:\Documents and Settings\pca.CURRIE\Desktop\GooredFix.exe
[2012/03/19 13:05:36 | 000,513,320 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\erunt.zip
[2012/03/19 10:46:59 | 000,002,429 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\WordPerfect X3.lnk
[2012/03/14 18:22:04 | 000,000,327 | RHS- | M] () -- C:\boot.ini
[2012/03/14 18:13:48 | 000,325,832 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2012/03/14 18:13:48 | 000,044,522 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2012/03/14 18:06:38 | 000,348,200 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2012/03/14 09:34:12 | 000,000,792 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Microsoft Office Outlook.lnk
[2012/03/13 11:46:02 | 000,001,678 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\SUPERAntiSpyware Free Edition.lnk
[2012/03/13 11:44:38 | 015,269,088 | ---- | M] (SUPERAntiSpyware.com) -- C:\Documents and Settings\pca.CURRIE\My Documents\SUPERAntiSpyware.exe
[2012/03/11 16:06:18 | 000,000,682 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\CCleaner.lnk
[2012/03/11 15:16:15 | 000,000,784 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes Anti-Malware.lnk
[2012/03/11 15:13:08 | 009,502,424 | ---- | M] (Malwarebytes Corporation ) -- C:\Documents and Settings\pca.CURRIE\Desktop\mbam--setup-1.60.1.1000.exe
[2012/03/10 14:17:06 | 000,000,862 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\.recently-used.xbel
[2012/03/01 19:20:07 | 000,037,797 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Comma Separated Values (DOS).ADR
[2012/03/01 19:03:36 | 000,002,495 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\Desktop\Microsoft Office Excel 2003.lnk
[2012/03/01 18:58:02 | 000,078,684 | ---- | M] () -- C:\Documents and Settings\pca.CURRIE\My Documents\GMail contacts.csv

========== Files Created - No Company Name ==========

[2012/03/25 14:41:33 | 000,000,512 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\MBR.dat
[2012/03/20 08:33:12 | 000,102,400 | ---- | C] () -- C:\WINDOWS\RegBootClean.exe
[2012/03/19 13:34:39 | 002,044,822 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\tdsskiller.zip
[2012/03/19 13:05:35 | 000,513,320 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\erunt.zip
[2012/03/16 13:46:37 | 000,000,664 | ---- | C] () -- C:\WINDOWS\System32\d3d9caps.dat
[2012/03/14 18:22:04 | 000,000,211 | ---- | C] () -- C:\Boot.bak
[2012/03/14 18:22:00 | 000,260,272 | RHS- | C] () -- C:\cmldr
[2012/03/14 18:20:47 | 000,256,000 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2012/03/14 18:20:47 | 000,208,896 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2012/03/14 18:20:47 | 000,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2012/03/14 18:20:47 | 000,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2012/03/14 18:20:46 | 000,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2012/03/13 11:46:02 | 000,001,678 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Desktop\SUPERAntiSpyware Free Edition.lnk
[2012/03/11 15:16:15 | 000,000,784 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes Anti-Malware.lnk
[2012/03/10 14:17:06 | 000,000,862 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\.recently-used.xbel
[2012/03/01 19:20:04 | 000,037,797 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Application Data\Comma Separated Values (DOS).ADR
[2012/03/01 18:57:45 | 000,078,684 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\My Documents\GMail contacts.csv
[2012/02/15 06:00:59 | 000,003,072 | ---- | C] () -- C:\WINDOWS\System32\iacenc.dll
[2012/01/10 17:51:13 | 000,155,648 | ---- | C] () -- C:\WINDOWS\agent.exe
[2011/11/12 10:59:13 | 000,067,584 | ---- | C] () -- C:\Documents and Settings\pca.CURRIE\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2011/11/07 23:09:49 | 000,073,728 | ---- | C] () -- C:\WINDOWS\System32\mrsplnt.dll
[2011/11/07 20:53:40 | 000,014,617 | ---- | C] () -- C:\WINDOWS\cfgall.ini
[2011/11/07 20:53:02 | 000,177,232 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmcomm.sys
[2011/11/07 20:53:02 | 000,067,664 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmactmon.sys
[2011/11/07 20:53:02 | 000,057,424 | ---- | C] () -- C:\WINDOWS\System32\drivers\tmevtmgr.sys
[2011/11/07 20:31:00 | 000,000,366 | ---- | C] () -- C:\WINDOWS\lgfwup.ini
[2011/11/07 20:15:43 | 000,000,848 | -HS- | C] () -- C:\WINDOWS\System32\KGyGaAvL.sys
[2011/11/07 20:06:45 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2011/11/07 18:45:21 | 000,074,752 | ---- | C] () -- C:\WINDOWS\System32\jst.dll
[2011/11/07 18:45:20 | 000,061,440 | ---- | C] () -- C:\WINDOWS\System32\PMLJNI.dll
[2011/11/07 18:43:29 | 000,000,771 | ---- | C] () -- C:\WINDOWS\hpbvnstp.ini
[2011/11/07 18:43:20 | 000,192,512 | R--- | C] () -- C:\WINDOWS\System32\HPB1320V.DLL
[2011/11/07 18:43:20 | 000,000,319 | R--- | C] () -- C:\WINDOWS\System32\HPB1320V.DAT
[2011/11/07 18:42:41 | 000,012,266 | ---- | C] () -- C:\WINDOWS\hplj1320.ini
[2011/11/07 18:29:25 | 000,002,048 | --S- | C] () -- C:\WINDOWS\bootstat.dat
[2011/11/07 18:24:08 | 000,021,640 | ---- | C] () -- C:\WINDOWS\System32\emptyregdb.dat
[2011/11/07 11:44:26 | 000,004,161 | ---- | C] () -- C:\WINDOWS\ODBCINST.INI
[2011/11/07 11:43:00 | 000,348,200 | ---- | C] () -- C:\WINDOWS\System32\FNTCACHE.DAT

========== LOP Check ==========

[2012/01/10 18:11:48 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\AbleFaxTifView
[2011/11/07 20:14:17 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Borland
[2011/11/07 22:51:43 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\LightScribe
[2011/11/12 10:51:31 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\TechSmith
[2011/12/04 17:33:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Temp
[2012/01/10 17:49:51 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\WeCareReminder
[2012/01/10 18:06:03 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\AbleFaxTifView
[2011/11/14 19:41:25 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\Across Lite 2.0
[2012/02/05 18:02:49 | 000,000,000 | ---D | M] -- C:\Documents and Settings\pca.CURRIE\Application Data\gtk-2.0

========== Purity Check ==========



< End of report >
  • 0

#8
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
It should now run from normal mode, I can see that it has installed part of the programme already. If it fails again I will go another route
  • 0

#9
curryjohn

curryjohn

    Member

  • Topic Starter
  • Member
  • PipPip
  • 31 posts
Still unable to run Combofix from normal mode. After the message that says it will "take 10 minutes, may double for badly infected compters" the window closes itself after 2-3 minutes.
  • 0

#10
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
OK this one may take an hour or so dependant on the size of your drive

Download AVPTool from Here to your desktop

Run the programme you have just downloaded to your desktop (it will be randomly named )

First we will run a virus scan

Click the cog in the upper right
Posted Image


Select down to and including your main drive, once done select the Automatic scan tab and press Start Scan
Posted Image

Allow AVP to delete all infections found
Once it has finished select report tab (last tab)
Select Detected threats report from the left and press Save button
Save it to your desktop and attach to your next post


Now the Analysis

Rerun AVP and select the Manual Disinfection tab and press Start Gathering System Information

Posted Image

On completion click the link to locate the zip file to upload and attach to your next post

Posted Image
  • 0

Advertisements


#11
curryjohn

curryjohn

    Member

  • Topic Starter
  • Member
  • PipPip
  • 31 posts
Running scan now...(posting from another computer)

Should take at least an hour
  • 0

#12
curryjohn

curryjohn

    Member

  • Topic Starter
  • Member
  • PipPip
  • 31 posts
Ran the Kaspersky Virus Removal Tool

No threats detected :thumbsup: ?

Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 25/03/2012; 07:57)
List of processes
File name PID Description Copyright MD5 Information
c:\progra~1\ecopy\desktop\pclprint\mrmlnc32.exe
Script: Quarantine, Delete, BC delete, Terminate 220 ?? 80.00 kb, rsAh,
created: 07.11.2011 23:09:49,
modified: 04.03.2004 18:31:24
Command line:
"C:\PROGRA~1\eCopy\Desktop\PCLprint\mrmlnc32.exe"
c:\windows\system32\spoolsv.exe
Script: Quarantine, Delete, BC delete, Terminate 1424 Spooler SubSystem App © Microsoft Corporation. All rights reserved. ?? 57.50 kb, rsAh,
created: 04.08.2004 07:00:00,
modified: 17.08.2010 08:17:06
Command line:
C:\WINDOWS\system32\spoolsv.exe
Detected:44, recognized as trusted 43
Module name Handle Description Copyright MD5 Used by processes
C:\WINDOWS\system32\EPFaxAPI.dll
Script: Quarantine, Delete, BC delete 9961472 EPFaxApi Copyright © 2003, Lincoln & Co. -- 1424
C:\WINDOWS\system32\mrsplnt.dll
Script: Quarantine, Delete, BC delete 268435456 -- 1424
Modules detected:400, recognized as trusted 398
Kernel Space Modules Viewer
Module Base address Size in memory Description Manufacturer
C:\WINDOWS\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, BC delete F5CC1000 018000 (98304)
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, BC delete F7AF0000 002000 (8192)
Modules detected - 124, recognized as trusted - 122
Services
Service Description Status File Group Dependencies
Detected - 94, recognized as trusted - 94
Drivers
Service Description Status File Group Dependencies
Abiosdsk
Driver: Unload, Delete, Disable, BC delete Abiosdsk Not started Abiosdsk.sys
Script: Quarantine, Delete, BC delete Primary disk
abp480n5
Driver: Unload, Delete, Disable, BC delete abp480n5 Not started abp480n5.sys
Script: Quarantine, Delete, BC delete SCSI miniport
adpu160m
Driver: Unload, Delete, Disable, BC delete adpu160m Not started adpu160m.sys
Script: Quarantine, Delete, BC delete SCSI miniport
Aha154x
Driver: Unload, Delete, Disable, BC delete Aha154x Not started Aha154x.sys
Script: Quarantine, Delete, BC delete SCSI miniport
aic78u2
Driver: Unload, Delete, Disable, BC delete aic78u2 Not started aic78u2.sys
Script: Quarantine, Delete, BC delete SCSI miniport
aic78xx
Driver: Unload, Delete, Disable, BC delete aic78xx Not started aic78xx.sys
Script: Quarantine, Delete, BC delete SCSI miniport
AliIde
Driver: Unload, Delete, Disable, BC delete AliIde Not started AliIde.sys
Script: Quarantine, Delete, BC delete System Bus Extender
amsint
Driver: Unload, Delete, Disable, BC delete amsint Not started amsint.sys
Script: Quarantine, Delete, BC delete SCSI miniport
asc
Driver: Unload, Delete, Disable, BC delete asc Not started asc.sys
Script: Quarantine, Delete, BC delete SCSI miniport
asc3350p
Driver: Unload, Delete, Disable, BC delete asc3350p Not started asc3350p.sys
Script: Quarantine, Delete, BC delete SCSI miniport
asc3550
Driver: Unload, Delete, Disable, BC delete asc3550 Not started asc3550.sys
Script: Quarantine, Delete, BC delete SCSI miniport
Atdisk
Driver: Unload, Delete, Disable, BC delete Atdisk Not started Atdisk.sys
Script: Quarantine, Delete, BC delete Primary disk
catchme
Driver: Unload, Delete, Disable, BC delete catchme Not started C:\DOCUME~1\PCA~1.CUR\LOCALS~1\Temp\catchme.sys
Script: Quarantine, Delete, BC delete Base
cd20xrnt
Driver: Unload, Delete, Disable, BC delete cd20xrnt Not started cd20xrnt.sys
Script: Quarantine, Delete, BC delete SCSI miniport
Changer
Driver: Unload, Delete, Disable, BC delete Changer Not started Changer.sys
Script: Quarantine, Delete, BC delete Filter
CmdIde
Driver: Unload, Delete, Disable, BC delete CmdIde Not started CmdIde.sys
Script: Quarantine, Delete, BC delete System Bus Extender
Cpqarray
Driver: Unload, Delete, Disable, BC delete Cpqarray Not started Cpqarray.sys
Script: Quarantine, Delete, BC delete SCSI miniport
dac960nt
Driver: Unload, Delete, Disable, BC delete dac960nt Not started dac960nt.sys
Script: Quarantine, Delete, BC delete SCSI miniport
dpti2o
Driver: Unload, Delete, Disable, BC delete dpti2o Not started dpti2o.sys
Script: Quarantine, Delete, BC delete SCSI miniport
hpn
Driver: Unload, Delete, Disable, BC delete hpn Not started hpn.sys
Script: Quarantine, Delete, BC delete SCSI miniport
i2omgmt
Driver: Unload, Delete, Disable, BC delete i2omgmt Not started i2omgmt.sys
Script: Quarantine, Delete, BC delete SCSI Class
i2omp
Driver: Unload, Delete, Disable, BC delete i2omp Not started i2omp.sys
Script: Quarantine, Delete, BC delete SCSI miniport
ini910u
Driver: Unload, Delete, Disable, BC delete ini910u Not started ini910u.sys
Script: Quarantine, Delete, BC delete SCSI miniport
IntelIde
Driver: Unload, Delete, Disable, BC delete IntelIde Not started IntelIde.sys
Script: Quarantine, Delete, BC delete System Bus Extender
lbrtfdc
Driver: Unload, Delete, Disable, BC delete lbrtfdc Not started lbrtfdc.sys
Script: Quarantine, Delete, BC delete System Bus Extender
mraid35x
Driver: Unload, Delete, Disable, BC delete mraid35x Not started mraid35x.sys
Script: Quarantine, Delete, BC delete SCSI miniport
PCIDump
Driver: Unload, Delete, Disable, BC delete PCIDump Not started PCIDump.sys
Script: Quarantine, Delete, BC delete PCI Configuration
PDCOMP
Driver: Unload, Delete, Disable, BC delete PDCOMP Not started PDCOMP.sys
Script: Quarantine, Delete, BC delete
PDFRAME
Driver: Unload, Delete, Disable, BC delete PDFRAME Not started PDFRAME.sys
Script: Quarantine, Delete, BC delete
PDRELI
Driver: Unload, Delete, Disable, BC delete PDRELI Not started PDRELI.sys
Script: Quarantine, Delete, BC delete
PDRFRAME
Driver: Unload, Delete, Disable, BC delete PDRFRAME Not started PDRFRAME.sys
Script: Quarantine, Delete, BC delete
perc2
Driver: Unload, Delete, Disable, BC delete perc2 Not started perc2.sys
Script: Quarantine, Delete, BC delete SCSI miniport
perc2hib
Driver: Unload, Delete, Disable, BC delete perc2hib Not started perc2hib.sys
Script: Quarantine, Delete, BC delete Filter
ql1080
Driver: Unload, Delete, Disable, BC delete ql1080 Not started ql1080.sys
Script: Quarantine, Delete, BC delete SCSI miniport
Ql10wnt
Driver: Unload, Delete, Disable, BC delete Ql10wnt Not started Ql10wnt.sys
Script: Quarantine, Delete, BC delete SCSI miniport
ql12160
Driver: Unload, Delete, Disable, BC delete ql12160 Not started ql12160.sys
Script: Quarantine, Delete, BC delete SCSI miniport
ql1240
Driver: Unload, Delete, Disable, BC delete ql1240 Not started ql1240.sys
Script: Quarantine, Delete, BC delete SCSI miniport
ql1280
Driver: Unload, Delete, Disable, BC delete ql1280 Not started ql1280.sys
Script: Quarantine, Delete, BC delete SCSI miniport
Simbad
Driver: Unload, Delete, Disable, BC delete Simbad Not started Simbad.sys
Script: Quarantine, Delete, BC delete Filter
Sparrow
Driver: Unload, Delete, Disable, BC delete Sparrow Not started Sparrow.sys
Script: Quarantine, Delete, BC delete SCSI miniport
sym_hi
Driver: Unload, Delete, Disable, BC delete sym_hi Not started sym_hi.sys
Script: Quarantine, Delete, BC delete SCSI miniport
sym_u3
Driver: Unload, Delete, Disable, BC delete sym_u3 Not started sym_u3.sys
Script: Quarantine, Delete, BC delete SCSI miniport
symc810
Driver: Unload, Delete, Disable, BC delete symc810 Not started symc810.sys
Script: Quarantine, Delete, BC delete SCSI miniport
symc8xx
Driver: Unload, Delete, Disable, BC delete symc8xx Not started symc8xx.sys
Script: Quarantine, Delete, BC delete SCSI miniport
TosIde
Driver: Unload, Delete, Disable, BC delete TosIde Not started TosIde.sys
Script: Quarantine, Delete, BC delete System Bus Extender
ultra
Driver: Unload, Delete, Disable, BC delete ultra Not started ultra.sys
Script: Quarantine, Delete, BC delete SCSI miniport
ViaIde
Driver: Unload, Delete, Disable, BC delete ViaIde Not started ViaIde.sys
Script: Quarantine, Delete, BC delete System Bus Extender
WDICA
Driver: Unload, Delete, Disable, BC delete WDICA Not started WDICA.sys
Script: Quarantine, Delete, BC delete
Detected - 177, recognized as trusted - 129
Autoruns
File name Status Startup method Description
C:\Documents and Settings\pca.CURRIE\Local Settings\Temp\_uninst_43190234.bat
Script: Quarantine, Delete, BC delete Active Shortcut in Autoruns folder C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\Startup\, C:\Documents and Settings\pca.CURRIE\Start Menu\Programs\Startup\_uninst_43190234.lnk,
C:\PROGRA~1\eCopy\Desktop\PCLprint\mrmlnc32.exe
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, eCopy Desktop Printer Service
Delete
C:\WINDOWS\System32\Drivers\AliIde.sys
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\aliide, EventMessageFile
C:\WINDOWS\System32\Drivers\CmdIde.sys
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\cmdide, EventMessageFile
C:\WINDOWS\System32\Drivers\IntelIde.sys
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\intelide, EventMessageFile
C:\WINDOWS\System32\Drivers\TosIde.sys
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\toside, EventMessageFile
C:\WINDOWS\System32\Drivers\ViaIde.sys
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\viaide, EventMessageFile
C:\WINDOWS\System32\Drivers\lbrtfdc.sys
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\lbrtfdc, EventMessageFile
C:\WINDOWS\System32\hidserv.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\HidServ\Parameters, ServiceDll
Delete
C:\WINDOWS\System32\igmpv2.dll
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
C:\WINDOWS\System32\ipbootp.dll
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
C:\WINDOWS\System32\iprip2.dll
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
C:\WINDOWS\System32\ospf.dll
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
C:\WINDOWS\System32\ospfmib.dll
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
C:\WINDOWS\System32\polagent.dll
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
C:\WINDOWS\System32\tssdis.exe
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
C:\WINDOWS\system32\KB905474\wgasetup.exe
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\WgaSetup, EventMessageFile
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\WINDOWS\system32\stisvc.exe
Script: Quarantine, Delete, BC delete -- Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
kbd101.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete Active Registry key HKEY_USERS, S-1-5-21-2617700467-1337732287-186788590-1276\Control Panel\IOProcs, MVB
Delete
vgafix.fon
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, BC delete Active Registry key HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items detected - 789, recognized as trusted - 757
Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)
File name Type Description Manufacturer CLSID
Elements detected - 14, recognized as trusted - 14
Windows Explorer extension modules
File name Destination Description Manufacturer CLSID
Display Panning CPL Extension {42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Shell extensions for file compression {764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Encryption Context Menu {853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Taskbar and Start Menu {0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
User Accounts {7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
IE User Assist {FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75}
Delete
Elements detected - 204, recognized as trusted - 198
Printing system extensions (print monitors, providers)
File name Type Name Description Manufacturer
C:\WINDOWS\system32\mrsplnt.dll
Script: Quarantine, Delete, BC delete Monitor eCopy Desktop Port
Elements detected - 10, recognized as trusted - 9
Task Scheduler jobs
File name Job name Job status Description Manufacturer
Elements detected - 0, recognized as trusted - 0
SPI/LSP settings
Namespace providers (NSP)
Provider Status EXE file Description GUID
Detected - 3, recognized as trusted - 3
Transport protocol providers (TSP, LSP)
Provider EXE file Description
Detected - 11, recognized as trusted - 11
Results of automatic SPI settings check

LSP settings checked. No errors detected

TCP/UDP ports
Port Status Remote Host Remote Port Application Notes
TCP ports
135 LISTENING 0.0.0.0 38990 [1020] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
139 LISTENING 0.0.0.0 18635 [4] System
Script: Quarantine, Delete, BC delete, Terminate
445 LISTENING 0.0.0.0 47271 [4] System
Script: Quarantine, Delete, BC delete, Terminate
1034 ESTABLISHED 192.168.0.90 445 [4] System
Script: Quarantine, Delete, BC delete, Terminate
1045 LISTENING 0.0.0.0 38926 [2368] c:\windows\system32\alg.exe
Script: Quarantine, Delete, BC delete, Terminate
1050 ESTABLISHED 192.168.2.110 139 [4] System
Script: Quarantine, Delete, BC delete, Terminate
1054 CLOSE_WAIT 127.0.0.1 5225 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
1055 CLOSE_WAIT 127.0.0.1 5225 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
1056 CLOSE_WAIT 127.0.0.1 5225 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
1057 CLOSE_WAIT 127.0.0.1 5225 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
1062 ESTABLISHED 127.0.0.1 5226 [784] c:\program files\hewlett-packard\toolbox\statusclient\statusclient.exe
Script: Quarantine, Delete, BC delete, Terminate
1085 CLOSE_WAIT 127.0.0.1 5225 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
1086 CLOSE_WAIT 127.0.0.1 5225 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
1122 TIME_WAIT 64.212.44.48 80 [0]
1123 TIME_WAIT 127.0.0.1 7005 [0]
1124 TIME_WAIT 195.27.252.18 80 [0]
1125 TIME_WAIT 64.212.44.48 80 [0]
1161 ESTABLISHED 192.168.1.102 80 [1200] c:\program files\trend micro\client server security agent\tmlisten.exe
Script: Quarantine, Delete, BC delete, Terminate
1172 SYN_SENT 192.168.2.110 135 [1020] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
5152 LISTENING 0.0.0.0 39006 [1920] c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, BC delete, Terminate
5225 LISTENING 0.0.0.0 38990 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
5225 TIME_WAIT 127.0.0.1 1112 [0]
5226 LISTENING 0.0.0.0 20524 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
5226 ESTABLISHED 127.0.0.1 1062 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
7005 LISTENING 0.0.0.0 38974 [3488] c:\program files\trend micro\client server security agent\tmproxy.exe
Script: Quarantine, Delete, BC delete, Terminate
7005 TIME_WAIT 127.0.0.1 1120 [0]
8005 LISTENING 0.0.0.0 57428 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
8008 LISTENING 0.0.0.0 8407 [2608] c:\program files\hewlett-packard\toolbox\jre\bin\javaw.exe
Script: Quarantine, Delete, BC delete, Terminate
36256 LISTENING 0.0.0.0 39038 [1200] c:\program files\trend micro\client server security agent\tmlisten.exe
Script: Quarantine, Delete, BC delete, Terminate
UDP ports
123 LISTENING -- -- [1116] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
123 LISTENING -- -- [1116] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
137 LISTENING -- -- [4] System
Script: Quarantine, Delete, BC delete, Terminate
138 LISTENING -- -- [4] System
Script: Quarantine, Delete, BC delete, Terminate
445 LISTENING -- -- [4] System
Script: Quarantine, Delete, BC delete, Terminate
500 LISTENING -- -- [740] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
1025 LISTENING -- -- [740] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
1076 LISTENING -- -- [684] \??\c:\windows\system32\winlogon.exe
Script: Quarantine, Delete, BC delete, Terminate
1900 LISTENING -- -- [1312] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
1900 LISTENING -- -- [1312] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
4500 LISTENING -- -- [740] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
Downloaded Program Files (DPF)
File name Description Manufacturer CLSID Source URL
{31435657-9980-0010-8000-00AA00389B71}
Delete http://download.micr...78f/wvc1dmo.cab
Elements detected - 9, recognized as trusted - 8
Control Panel Applets (CPL)
File name Description Manufacturer
Elements detected - 27, recognized as trusted - 27
Active Setup
File name Description Manufacturer CLSID
Elements detected - 15, recognized as trusted - 15
HOSTS file
Hosts file record
Protocols and handlers
File name Type Description Manufacturer CLSID
Elements detected - 29, recognized as trusted - 29
Suspicious objects
File Description Type
C:\WINDOWS\system32\DRIVERS\4062397drv.sys
Script: Quarantine, Delete, BC delete Suspicion for Rootkit Kernel-mode hook
\SystemRoot\system32\DRIVERS\4062397drv.sys
Script: Quarantine, Delete, BC delete Suspicion for Rootkit Kernel-mode hook

Main script of analysis
Windows version: Microsoft Windows XP, Build=2600, SP="Service Pack 3"
System Restore: enabled
1.1 Searching for user-mode API hooks
Analysis: kernel32.dll, export table found in section .text
IAT modification detected: CreateProcessA - 00B90010<>7C80236B
IAT modification detected: GetModuleFileNameA - 00B90080<>7C80B56F
IAT modification detected: FreeLibrary - 00B900F0<>7C80AC7E
IAT modification detected: GetModuleFileNameW - 00B90160<>7C80B475
IAT modification detected: CreateProcessW - 00B901D0<>7C802336
IAT modification detected: LoadLibraryW - 00B902B0<>7C80AEEB
IAT modification detected: LoadLibraryA - 00B90320<>7C801D7B
IAT modification detected: GetProcAddress - 00B90390<>7C80AE40
Analysis: ntdll.dll, export table found in section .text
Analysis: user32.dll, export table found in section .text
Analysis: advapi32.dll, export table found in section .text
Analysis: ws2_32.dll, export table found in section .text
Analysis: wininet.dll, export table found in section .text
Analysis: rasapi32.dll, export table found in section .text
Analysis: urlmon.dll, export table found in section .text
Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
Driver loaded successfully
SDT found (RVA=085700)
Kernel ntkrnlpa.exe found in memory at address 804D7000
SDT = 8055C700
KiST = 80504480 (284)
Function NtAdjustPrivilegesToken (0B) intercepted (805EC464->F46EF690), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtClose (19) intercepted (805BC530->F46EFF94), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtConnectPort (1F) intercepted (805A45D0->F46F0DC8), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateEvent (23) intercepted (8060EF4E->F46F1312), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateFile (25) intercepted (805790A8->F46F0270), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateKey (29) intercepted (806240F0->F46EE500), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateMutant (2B) intercepted (8061769E->F46F11F8), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateNamedPipeFile (2C) intercepted (805790E2->F46EF27E), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreatePort (2E) intercepted (805A50EC->F46F10CC), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateProcess (2F) intercepted (805D1230->85969240), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateProcessEx (30) intercepted (805D117A->85969500), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSection (32) intercepted (805AB3C8->F46EF426), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSemaphore (33) intercepted (8061504E->F46F1432), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSymbolicLinkObject (34) intercepted (805C39FA->8596BD20), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThread (35) intercepted (805D1018->F46EFC1C), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateWaitablePort (38) intercepted (805A5110->F46F1162), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDebugActiveProcess (39) intercepted (80643B30->F46F2B1A), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteKey (3F) intercepted (8062458C->F46EEB0A), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteValueKey (41) intercepted (8062475C->F46EEEBE), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeviceIoControlFile (42) intercepted (8057926E->F46F06F2), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDuplicateObject (44) intercepted (805BE008->F46F3D26), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtEnumerateKey (47) intercepted (8062493C->F46EF00A), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtEnumerateValueKey (49) intercepted (80624BA6->F46EF0A2), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtFsControlFile (54) intercepted (805792A2->F46F0500), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadDriver (61) intercepted (80584160->F46F2C0C), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadKey (62) intercepted (80626314->F46EE4DC), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadKey2 (63) intercepted (80625F20->F46EE4EE), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtMapViewOfSection (6C) intercepted (805B203A->F46F3374), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtNotifyChangeKey (6F) intercepted (806262DE->F46EF1CE), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenEvent (72) intercepted (8060F04E->F46F13A8), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenFile (74) intercepted (8057A1A6->F46F0016), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenKey (77) intercepted (806254CE->F46EE6C0), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenMutant (78) intercepted (80617776->F46F1288), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenProcess (7A) intercepted (805CB440->F46EF8CC), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSection (7D) intercepted (805AA3EC->F46F310E), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSemaphore (7E) intercepted (80615148->F46F14C8), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenThread (80) intercepted (805CB6CC->F46EF7BE), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryKey (A0) intercepted (80625810->F46EF13A), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryMultipleValueKey (A1) intercepted (8062323E->F46EED72), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQuerySection (A7) intercepted (805B85E0->F46F36AE), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryValueKey (B1) intercepted (80622314->F46EE99C), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueueApcThread (B4) intercepted (805D1276->F46F2FA0), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRenameKey (C0) intercepted (80623B12->F46EEC2C), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplaceKey (C1) intercepted (806261C4->F46EDF16), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyPort (C2) intercepted (805A54EC->F46F182C), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyWaitReceivePort (C3) intercepted (805A64B4->F46F16F2), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRequestWaitReplyPort (C8) intercepted (805A2D76->F46F28B4), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRestoreKey (CC) intercepted (80625AD0->F46EE28E), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtResumeThread (CE) intercepted (805D49BA->F46F3BC8), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSaveKey (CF) intercepted (80625BCC->F46EDEAE), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSecureConnectPort (D2) intercepted (805A3D64->F46F0B0E), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetContextThread (D5) intercepted (805D173A->F46EFE38), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetInformationToken (E6) intercepted (805FA7B4->F46F2154), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSecurityObject (ED) intercepted (805C062E->F46F2DAA), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSystemInformation (F0) intercepted (8060FD06->F46F37FE), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetValueKey (F7) intercepted (80622662->F46EE816), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendProcess (FD) intercepted (805D4A82->F46F38F0), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendThread (FE) intercepted (805D48F4->F46F3A2A), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSystemDebugControl (FF) intercepted (806180BA->F46F2A3E), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateProcess (101) intercepted (805D29E2->F46EFA68), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateThread (102) intercepted (805D2BDC->F46EF9C8), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtUnmapViewOfSection (10B) intercepted (805B2E48->F46F3552), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtWriteVirtualMemory (115) intercepted (805B43CC->F46EFB52), hook C:\WINDOWS\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function FsRtlCheckLockForReadAccess (804EAF84) - machine code modification Method of JmpTo. jmp F46E1FD0 \SystemRoot\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
Function IoIsOperationSynchronous (804EF912) - machine code modification Method of JmpTo. jmp F46E23AC \SystemRoot\system32\DRIVERS\4062397drv.sys, driver recognized as trusted
>>> Function restored successfully !
Functions checked: 284, intercepted: 63, restored: 65
1.3 Checking IDT and SYSENTER
Analysis for CPU 1
Analysis for CPU 2
CmpCallCallBacks = 00093D84
Disable callback OK
Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking of IRP handlers
Driver loaded successfully
Checking - complete
>> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry)
>> Services: potentially dangerous service allowed: TermService (Terminal Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
>> Services: potentially dangerous service allowed: TlntSvr (Telnet)
>> Services: potentially dangerous service allowed: Messenger (Messenger)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
>> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
>> Disable HDD autorun
>> Disable autorun from network drives
>> Disable CD/DVD autorun
>> Disable removable media autorun
System Analysis in progress

System Analysis - complete


Script commands

Add commands to script:

Blocking hooks using Anti-Rootkit
Enable AVZGuard
Operations with AVZPM (true=enable,false=disable)
BootCleaner - import list of deleted files
BootCleaner - import all
Registry cleanup after deleting files
ExecuteWizard ('TSW',2,3,true) - Running Troubleshooting wizard
BootCleaner - activate
Reboot
Insert template for QuarantineFile() - quarantining file
Insert template for BC_QrFile() - quarantining file via BootCleaner
Insert template for DeleteFile() - deleting file
Insert template for DelCLSID() - deleting CLSID item from registry

Additional operations:

Performance tweaking: disable service RemoteRegistry (Remote Registry)
Performance tweaking: disable service TermService (Terminal Services)
Performance tweaking: disable service SSDPSRV (SSDP Discovery Service)
Performance tweaking: disable service TlntSvr (Telnet)
Performance tweaking: disable service Messenger (Messenger)
Performance tweaking: disable service Schedule (Task Scheduler)
Performance tweaking: disable service mnmsrvc (NetMeeting Remote Desktop Sharing)
Performance tweaking: disable service RDSessMgr (Remote Desktop Help Session Manager)
Security tweaking: disable CD autorun
Security tweaking: disable administrative shares
Security tweaking: disable anonymous user access
Security: disable sending Remote Assistant queries

:happy: I crossed my fingers and ran a Google Search--no more redirects at this time

Edited by curryjohn, 25 March 2012 - 06:20 PM.

  • 0

#13
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Could you attach the zip file please as that contains the analysis data

On completion click the link to locate the zip file to upload and attach to your next post

Posted Image
  • 0

#14
curryjohn

curryjohn

    Member

  • Topic Starter
  • Member
  • PipPip
  • 31 posts
I'm out of town today but will locate zip file and upload tomorrow. I had trouble finding the zip path so I copied the file. Thank you for spending your afternoon helping me yesterday. I will follow up tomorrow.
  • 0

#15
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
No problem pleased to assist
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP