jkal Posted April 30, 2009 ID:77433 Share Posted April 30, 2009 Here's the log files:alwarebytes' Anti-Malware 1.36Database version: 2060Windows 5.1.2600 Service Pack 24/29/2009 11:00:43 PMmbam-log-2009-04-29 (23-00-33).txtScan type: Quick ScanObjects scanned: 80475Time elapsed: 1 minute(s), 25 second(s)Memory Processes Infected: 0Memory Modules Infected: 0Registry Keys Infected: 0Registry Values Infected: 0Registry Data Items Infected: 1Folders Infected: 0Files Infected: 1Memory Processes Infected:(No malicious items detected)Memory Modules Infected:(No malicious items detected)Registry Keys Infected:(No malicious items detected)Registry Values Infected:(No malicious items detected)Registry Data Items Infected:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\windows\system32\userinit.exe -> No action taken.Folders Infected:(No malicious items detected)Files Infected:C:\WINDOWS\system32\win32hlp.cnf (Trojan.Agent) -> No action taken.Logfile of Trend Micro HijackThis v2.0.2Scan saved at 6:06:58 AM, on 4/30/2009Platform: Windows XP SP2 (WinNT 5.01.2600)MSIE: Internet Explorer v7.00 (7.00.6000.16827)Boot mode: NormalRunning processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\system32\spoolsv.exeC:\WINDOWS\Explorer.EXEC:\PROGRA~1\Yahoo!\YOP\yop.exeC:\Program Files\CyberLink\PowerDVD\PDVDServ.exeC:\Program Files\iTunes\iTunesHelper.exeC:\WINDOWS\system32\RUNDLL32.EXEC:\Program Files\Norton Ghost\Agent\VProTray.exeC:\Program Files\Common Files\Real\Update_OB\realsched.exeC:\WINDOWS\RTHDCPL.EXEC:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exeC:\WINDOWS\system32\ctfmon.exeC:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXEC:\Program Files\Steam\Steam.exeC:\Program Files\Spybot - Search & Destroy\TeaTimer.exeC:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exeC:\PROGRA~1\Yahoo!\browser\ycommon.exeC:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeC:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exeC:\Program Files\Bonjour\mDNSResponder.exeC:\Program Files\Norton Ghost\Agent\VProSvc.exeC:\PROGRA~1\Yahoo!\YOP\SSDK02.exeC:\WINDOWS\system32\nvsvc32.exeC:\WINDOWS\system32\svchost.exeC:\Program Files\Viewpoint\Common\ViewpointService.exeC:\Program Files\Webroot\Spy Sweeper\SpySweeper.exeC:\Program Files\iPod\bin\iPodService.exeC:\WINDOWS\System32\svchost.exeC:\Program Files\Lavasoft\Ad-Aware\AAWService.exeC:\Program Files\Lavasoft\Ad-Aware\AAWTray.exeC:\WINDOWS\system32\wuauclt.exeC:\Program Files\Internet Explorer\iexplore.exeC:\Program Files\Trend Micro\HijackThis\HijackThis.exeR0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.comR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.localO2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dllO2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dllO3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll (file missing)O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dllO4 - HKLM\..\Run: [NvCplDaemon] "C:\WINDOWS\system32\RUNDLL32.EXE" C:\WINDOWS\system32\NvCpl.dll,NvStartupO4 - HKLM\..\Run: [nwiz] "C:\WINDOWS\system32\nwiz.exe" /installO4 - HKLM\..\Run: [YOP] "C:\PROGRA~1\Yahoo!\YOP\yop.exe" /autostartO4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"O4 - HKLM\..\Run: [NeroFilterCheck] "C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe"O4 - HKLM\..\Run: [EPSON Stylus CX4800 Series] "C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXE" /P26 "EPSON Stylus CX4800 Series" /O6 "USB001" /M "Stylus CX4800"O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottimeO4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"O4 - HKLM\..\Run: [MSConfig] "C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe" /autoO4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"O4 - HKLM\..\Run: [NvMediaCenter] "C:\WINDOWS\system32\RUNDLL32.EXE" C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInitO4 - HKLM\..\Run: [TomTomHOME.exe] "C:\Program Files\TomTom HOME\TomTomHOME.exe" -sO4 - HKLM\..\Run: [Norton Ghost 12.0] "C:\Program Files\Norton Ghost\Agent\VProTray.exe"O4 - HKLM\..\Run: [uSB2Check] "C:\WINDOWS\system32\RUNDLL32.EXE" "C:\WINDOWS\system32\PCLECoInst.dll",CheckUSBControllerO4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osbootO4 - HKLM\..\Run: [RTHDCPL] "C:\WINDOWS\RTHDCPL.EXE"O4 - HKLM\..\Run: [Alcmtr] "C:\WINDOWS\ALCMTR.EXE"O4 - HKLM\..\Run: [Ad-Watch] "C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe"O4 - HKLM\..\Run: [spySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintrayO4 - HKCU\..\Run: [ctfmon.exe] "C:\WINDOWS\system32\ctfmon.exe"O4 - HKCU\..\Run: [EPSON Stylus CX4800 Series] "C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXE" /P26 "EPSON Stylus CX4800 Series" /M "Stylus CX4800" /EF "HKCU"O4 - HKCU\..\Run: [TomTomHOME.exe] "C:\Program Files\TomTom HOME 2\HOMERunner.exe"O4 - HKCU\..\Run: [AdobeUpdater] "C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe"O4 - HKCU\..\Run: [steam] "C:\Program Files\Steam\Steam.exe" -silentO4 - HKCU\..\Run: [spybotSD TeaTimer] "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"O4 - HKCU\..\Run: [sUPERAntiSpyware] "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"O4 - HKUS\S-1-5-18\..\Run: [] (User 'SYSTEM')O4 - HKUS\.DEFAULT\..\Run: [] (User 'Default user')O4 - Startup: Registration .LNK = C:\Program Files\Steam\SteamApps\common\assassins creed\Register\RegistrationReminder.exeO4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exeO4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exeO4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXEO9 - Extra button: Bonjour - {7F9DB11C-E358-4ca6-A83D-ACC663939424} - C:\Program Files\Bonjour\ExplorerPlugin.dllO9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exeO9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exeO9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dllO9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dllO9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exeO9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exeO9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO16 - DPF: {1E54D648-B804-468d-BC78-4AFFED8E262E} (System Requirements Lab) - http://www.srtest.com/srl_bin/sysreqlab_srl.cabO16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cabO16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dllO16 - DPF: {37A273C2-5129-11D5-BF37-00A0CCE8754B} (TTestGenXInstallObject) - http://asp.mathxl.com/wizmodules/testgen/i...GenXInstall.cabO16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cabO16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cabO16 - DPF: {67A5F8DC-1A4B-4D66-9F24-A704AD929EEE} (System Requirements Lab) - http://www.systemrequirementslab.com/sysreqlab2.cabO16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1194645270687O16 - DPF: {95D88B35-A521-472B-A182-BB1A98356421} (Pearson Installation Assistant 2) - http://asp.mathxl.com/books/_Players/PearsonInstallAsst2.cabO16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cabO16 - DPF: {E6D23284-0E9B-417D-A782-03E4487FC947} (Pearson MathXL Player) - http://asp.mathxl.com/books/_Players/MathPlayer.cabO18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dllO20 - AppInit_DLLs: c:\windows\system32\waguzora.dll , O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dllO23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exeO23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exeO23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeO23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exeO23 - Service: Bonjour Service - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exeO23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exeO23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exeO23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exeO23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exeO23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXEO23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Norton Ghost\Agent\VProSvc.exeO23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exeO23 - Service: Symantec RemoteAssist - Symantec, Inc. - C:\Program Files\Common Files\Symantec Shared\Support Controls\ssrc.exeO23 - Service: Viewpoint Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exeO23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. (www.webroot.com) - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exeO23 - Service: Webroot Client Service (WRConsumerService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exe--End of file - 11071 bytesThanks for your help.JJK Link to post Share on other sites More sharing options...
jkal Posted April 30, 2009 Author ID:77461 Share Posted April 30, 2009 -= A newer version of service pack is available. Service packs increase the safety of your system. Visit Microsoft's windowsupdate site to download the newest version of the service pack.-= It seems that you don't use an anti-virus scanner or your scanner is not active. Only an anti-virus scanner can protect you against new viruses.-= We didn't detect any active process of a firewall on your system. Reasons maybe:(1.) You are using the windows firewall or a hardware firewall.(2.) You are using a firewall of an unknown vendor.(3.) You are using a firewall, but for unknown reasons it is disabled(4.) You don't use any firewall at all.We recommend you to use a firewall. Download and install one or activate windows xp Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 2, 2009 Root Admin ID:77963 Share Posted May 2, 2009 Please do not take advice from unauthorized people as you can potentially end up worse than when you started.You appear to potentially have an infected core Windows file. Please run the following program to see if it's able to correct or repair that.Please visit this webpage for instructions for downloading ComboFix to your DESKTOP : how-to-use-combofixPlease ensure you read this guide carefully and install the Recovery Console first.NOTE!!: You must save and run ComboFix.exe on your DESKTOP and not from any other folder.Also, DO NOT click the mouse or launch any other applications while this is running or it may stall the programAdditional links to download the tool:ComboFix.exeComboFix.exeComboFix.exeNote: The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.Once installed, you should see a blue screen prompt that says:The Recovery Console was successfully installed.Please continue as follows:Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.Click Yes to allow ComboFix to continue scanning for malware.When the tool is finished, it will produce a report for you.Please post the C:\ComboFix.txt along with a new HijackThis log so we may continue cleaning the system. Link to post Share on other sites More sharing options...
jkal Posted May 2, 2009 Author ID:78114 Share Posted May 2, 2009 Please do not take advice from unauthorized people as you can potentially end up worse than when you started.You appear to potentially have an infected core Windows file. Please run the following program to see if it's able to correct or repair that.Please visit this webpage for instructions for downloading ComboFix to your DESKTOP : how-to-use-combofixPlease ensure you read this guide carefully and install the Recovery Console first.NOTE!!: You must save and run ComboFix.exe on your DESKTOP and not from any other folder.Also, DO NOT click the mouse or launch any other applications while this is running or it may stall the programAdditional links to download the tool:ComboFix.exeComboFix.exeComboFix.exeNote: The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.Once installed, you should see a blue screen prompt that says:The Recovery Console was successfully installed.Please continue as follows:Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.Click Yes to allow ComboFix to continue scanning for malware.When the tool is finished, it will produce a report for you.Please post the C:\ComboFix.txt along with a new HijackThis log so we may continue cleaning the system.Thanks - Combofix log:ComboFix 09-05-02.4 - Jim 05/02/2009 13:41.1 - NTFSx86Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3582.2882 [GMT -5:00]Running from: c:\documents and settings\Jim\Desktop\ComboFix.exeAV: Webroot AntiVirus with AntiSpyware *On-access scanning disabled* (Updated).((((((((((((((((((((((((((((((((((((((( Other Deletions ))))))))))))))))))))))))))))))))))))))))))))))))).c:\windows\system32\_000051_.tmp.dllc:\windows\system32\_004204_.tmp.dllc:\windows\system32\_004205_.tmp.dllc:\windows\system32\_004206_.tmp.dllc:\windows\system32\_004207_.tmp.dllc:\windows\system32\_004214_.tmp.dllc:\windows\system32\_004215_.tmp.dllc:\windows\system32\_004216_.tmp.dllc:\windows\system32\_004217_.tmp.dllc:\windows\system32\_004219_.tmp.dllc:\windows\system32\_004220_.tmp.dllc:\windows\system32\_004223_.tmp.dllc:\windows\system32\_004224_.tmp.dllc:\windows\system32\_004226_.tmp.dllc:\windows\system32\_004227_.tmp.dllc:\windows\system32\_004228_.tmp.dllc:\windows\system32\_004229_.tmp.dllc:\windows\system32\_004230_.tmp.dllc:\windows\system32\_004232_.tmp.dllc:\windows\system32\_004233_.tmp.dllc:\windows\system32\_004234_.tmp.dllc:\windows\system32\_004238_.tmp.dllc:\windows\system32\_004239_.tmp.dllc:\windows\system32\_004241_.tmp.dllc:\windows\system32\_004244_.tmp.dllc:\windows\system32\_004246_.tmp.dllc:\windows\system32\_004247_.tmp.dllc:\windows\system32\_004248_.tmp.dllc:\windows\system32\_004249_.tmp.dllc:\windows\system32\_004250_.tmp.dllc:\windows\system32\_004253_.tmp.dllc:\windows\system32\_004254_.tmp.dllc:\windows\system32\_004255_.tmp.dllc:\windows\system32\_004256_.tmp.dllc:\windows\system32\_004257_.tmp.dllc:\windows\system32\_004262_.tmp.dllc:\windows\system32\_004264_.tmp.dllc:\windows\system32\_004265_.tmp.dllc:\windows\system32\_006957_.tmp.dllc:\windows\system32\_006958_.tmp.dllc:\windows\system32\_006959_.tmp.dllc:\windows\system32\_006960_.tmp.dllc:\windows\system32\_006967_.tmp.dllc:\windows\system32\_006968_.tmp.dllc:\windows\system32\_006969_.tmp.dllc:\windows\system32\_006971_.tmp.dllc:\windows\system32\_006972_.tmp.dllc:\windows\system32\_006975_.tmp.dllc:\windows\system32\_006976_.tmp.dllc:\windows\system32\_006978_.tmp.dllc:\windows\system32\_006979_.tmp.dllc:\windows\system32\_006980_.tmp.dllc:\windows\system32\_006981_.tmp.dllc:\windows\system32\_006982_.tmp.dllc:\windows\system32\_006984_.tmp.dllc:\windows\system32\_006985_.tmp.dllc:\windows\system32\_006986_.tmp.dllc:\windows\system32\_006990_.tmp.dllc:\windows\system32\_006991_.tmp.dllc:\windows\system32\_006993_.tmp.dllc:\windows\system32\_006996_.tmp.dllc:\windows\system32\_006998_.tmp.dllc:\windows\system32\_006999_.tmp.dllc:\windows\system32\_007000_.tmp.dllc:\windows\system32\_007001_.tmp.dllc:\windows\system32\_007004_.tmp.dllc:\windows\system32\_007005_.tmp.dllc:\windows\system32\_007006_.tmp.dllc:\windows\system32\_007007_.tmp.dllc:\windows\system32\_007008_.tmp.dllc:\windows\system32\_007013_.tmp.dllc:\windows\system32\_007015_.tmp.dllc:\windows\system32\mdm.exec:\windows\system32\uruzolut.ini.((((((((((((((((((((((((((((((((((((((( Drivers/Services ))))))))))))))))))))))))))))))))))))))))))))))))).-------\Legacy_SFC-------\Service_sfc((((((((((((((((((((((((( Files Created from 2009-04-02 to 2009-05-02 ))))))))))))))))))))))))))))))).2009-05-01 00:00 . 2009-05-01 00:00 -------- d-----w c:\windows\ServicePackFiles2009-04-29 23:48 . 2009-04-29 23:48 -------- d-----w c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com2009-04-29 23:48 . 2009-04-29 23:48 -------- d-----w c:\program files\SUPERAntiSpyware2009-04-29 23:48 . 2009-04-29 23:48 -------- d-----w c:\documents and settings\Jim\Application Data\SUPERAntiSpyware.com2009-04-29 02:50 . 2009-04-29 02:52 -------- d-----w c:\program files\Spybot - Search & Destroy2009-04-29 02:50 . 2009-04-29 02:52 -------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy2009-04-28 23:38 . 2009-04-28 23:30 15688 ----a-w c:\windows\system32\lsdelete.exe2009-04-28 23:30 . 2009-04-28 23:29 64160 ----a-w c:\windows\system32\drivers\Lbd.sys2009-04-28 23:26 . 2009-04-28 23:26 -------- d-----w c:\program files\Lavasoft2009-04-28 10:42 . 2009-04-28 10:42 -------- d-----w c:\program files\Trend Micro2009-04-28 09:25 . 2009-04-28 23:26 -------- dc-h--w c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}2009-04-28 02:22 . 2009-04-28 23:30 -------- d-----w c:\documents and settings\All Users\Application Data\Lavasoft2009-04-28 02:18 . 2009-04-28 02:18 -------- d-----w c:\documents and settings\Jim\DoctorWeb2009-04-27 22:41 . 2009-04-27 22:41 -------- d-----w c:\windows\system32\config\systemprofile\Application Data\Webroot2009-04-27 22:41 . 2009-04-27 22:41 -------- d-----w c:\windows\system32\config\systemprofile\Application Data\Malwarebytes2009-04-27 22:28 . 2009-04-27 22:28 -------- d-----w c:\windows\system32\config\systemprofile\Application Data\Yahoo!2009-04-27 18:35 . 2009-04-27 18:35 -------- d-----w c:\documents and settings\Jim\Application Data\Ubisoft2009-04-27 18:34 . 2009-04-27 18:34 -------- d-----w c:\documents and settings\All Users\Application Data\Ubisoft2009-04-26 20:32 . 2009-04-26 22:43 -------- d-----w c:\documents and settings\Jim\Local Settings\Application Data\HotheadGames2009-04-19 20:39 . 2009-04-19 20:40 -------- d-----w c:\documents and settings\Jim\Application Data\Braid2009-04-19 20:38 . 2009-04-19 20:38 -------- d-----w c:\program files\Braid2009-04-16 23:19 . 2009-03-06 14:22 284160 -c----w c:\windows\system32\dllcache\pdh.dll2009-04-16 23:19 . 2009-02-09 12:10 401408 -c----w c:\windows\system32\dllcache\rpcss.dll2009-04-16 23:19 . 2009-02-06 11:11 110592 -c----w c:\windows\system32\dllcache\services.exe2009-04-16 23:19 . 2009-02-09 12:10 473600 -c----w c:\windows\system32\dllcache\fastprox.dll2009-04-16 23:19 . 2009-02-06 10:10 227840 -c----w c:\windows\system32\dllcache\wmiprvse.exe2009-04-16 23:19 . 2009-02-09 12:10 453120 -c----w c:\windows\system32\dllcache\wmiprvsd.dll2009-04-16 23:19 . 2009-02-09 12:10 729088 -c----w c:\windows\system32\dllcache\lsasrv.dll2009-04-16 23:19 . 2009-02-09 12:10 617472 -c----w c:\windows\system32\dllcache\advapi32.dll2009-04-16 23:19 . 2009-02-09 12:10 714752 -c----w c:\windows\system32\dllcache\ntdll.dll2009-04-16 23:19 . 2009-02-06 11:06 2145280 -c----w c:\windows\system32\dllcache\ntkrnlmp.exe2009-04-16 23:19 . 2009-02-06 11:08 2189056 -c----w c:\windows\system32\dllcache\ntoskrnl.exe2009-04-16 23:19 . 2009-02-06 10:32 2023936 -c----w c:\windows\system32\dllcache\ntkrpamp.exe2009-04-16 23:17 . 2008-05-03 11:55 2560 ------w c:\windows\system32\xpsp4res.dll2009-04-16 23:17 . 2008-04-21 12:08 215552 -c----w c:\windows\system32\dllcache\wordpad.exe2009-04-08 16:43 . 2008-11-21 15:51 481792 ----a-w c:\windows\system32\KeyLIB32.dll2009-04-08 16:43 . 2009-04-08 16:43 -------- d-----w c:\program files\Amort32.(((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))).2009-05-02 18:45 . 2009-02-11 23:20 -------- d-----w c:\program files\Steam2009-05-02 18:44 . 2007-11-09 17:29 6 ---ha-w c:\windows\Tasks\SA.DAT2009-05-02 17:00 . 2008-08-30 06:11 1590 ----a-w c:\windows\Tasks\wrSpySweeper_L548D55D6422A459DB7410F7F0704CEAC.job2009-05-02 09:00 . 2008-12-16 14:47 1648 ----a-w c:\windows\Tasks\wrSpySweeper_L63E29B9170744532B038FB623897B076.job2009-05-01 00:17 . 2007-11-10 00:52 80304 ----a-w c:\documents and settings\Jim\Local Settings\Application Data\GDIPFONTCACHEV1.DAT2009-05-01 00:06 . 2007-11-09 17:27 76487 ----a-w c:\windows\pchealth\helpctr\OfflineCache\index.dat2009-04-29 23:48 . 2008-01-06 15:00 -------- d-----w c:\program files\Common Files\Wise Installation Wizard2009-04-29 09:00 . 2007-11-09 22:35 572 ----a-w c:\windows\Tasks\Norton Security Online - Run Full System Scan - Jim.job2009-04-28 23:30 . 2009-04-28 23:30 472 ----a-w c:\windows\Tasks\Ad-Aware Update (Weekly).job2009-04-28 02:24 . 2007-11-11 06:58 284 ----a-w c:\windows\Tasks\AppleSoftwareUpdate.job2009-04-28 00:54 . 2008-10-13 22:26 -------- d-----w c:\program files\TomTom HOME2009-04-27 22:34 . 2007-11-10 21:10 -------- d-----w c:\program files\Google2009-04-08 22:14 . 2008-12-17 04:49 -------- d-----w c:\program files\Malwarebytes' Anti-Malware2009-04-06 20:32 . 2008-12-17 04:49 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys2009-04-06 20:32 . 2008-12-17 04:50 15504 ----a-w c:\windows\system32\drivers\mbam.sys2009-03-29 21:50 . 2009-03-10 19:07 -------- d-----w c:\program files\Pinnacle2009-03-29 21:28 . 2006-07-24 09:00 44944 ------w c:\windows\system32\drivers\pxhelp20.sys2009-03-18 16:08 . 2009-03-18 16:08 164 ----a-w c:\windows\install.dat2009-03-18 16:00 . 2007-11-10 00:08 -------- d-----w c:\program files\Webroot2009-03-13 00:53 . 2009-03-13 00:53 -------- d-----w c:\program files\Common Files\xing shared2009-03-13 00:53 . 2007-11-10 21:02 -------- d-----w c:\program files\Common Files\Real2009-03-10 19:07 . 2009-03-10 19:07 -------- d-----w c:\program files\Common Files\Pinnacle2009-03-06 14:22 . 2004-08-04 12:00 284160 ----a-w c:\windows\system32\pdh.dll2009-03-05 22:10 . 2007-11-10 00:08 1553784 ----a-w c:\windows\WRSetup.dll2009-03-03 00:18 . 2004-08-04 12:00 826368 ----a-w c:\windows\system32\wininet.dll2009-02-25 20:24 . 2007-11-10 00:08 23152 ----a-w c:\windows\system32\drivers\sshrmd.sys2009-02-25 20:24 . 2007-11-10 00:08 176752 ----a-w c:\windows\system32\drivers\ssidrv.sys2009-02-25 20:24 . 2008-11-12 22:02 29808 ----a-w c:\windows\system32\drivers\ssfs0bbc.sys2009-02-20 18:09 . 2004-08-04 12:00 78336 ----a-w c:\windows\system32\ieencode.dll2009-02-16 14:51 . 2007-11-10 00:08 164 ----a-w C:\install.dat2009-02-09 12:10 . 2008-08-25 19:29 729088 ----a-w c:\windows\system32\lsasrv.dll2009-02-09 12:10 . 2008-08-25 19:29 714752 ----a-w c:\windows\system32\ntdll.dll2009-02-09 12:10 . 2008-08-25 19:29 617472 ----a-w c:\windows\system32\advapi32.dll2009-02-09 12:10 . 2004-08-04 12:00 401408 ----a-w c:\windows\system32\rpcss.dll2009-02-09 11:13 . 2008-07-23 20:40 1846784 ----a-w c:\windows\system32\win32k.sys2009-02-06 11:11 . 2008-08-25 19:29 110592 ----a-w c:\windows\system32\services.exe2009-02-06 11:06 . 2008-08-25 19:29 2145280 ----a-w c:\windows\system32\ntoskrnl.exe2009-02-06 10:39 . 2004-08-04 12:00 35328 ----a-w c:\windows\system32\sc.exe2009-02-06 10:32 . 2008-08-25 19:29 2023936 ----a-w c:\windows\system32\ntkrnlpa.exe2009-02-03 19:59 . 2004-08-04 12:00 56832 ----a-w c:\windows\system32\secur32.dll2008-10-13 23:25 . 2008-10-13 23:25 9679360 ----a-w c:\program files\TomTomHOMEwinlatest.exe2008-10-13 23:16 . 2008-10-13 23:16 19411496 ----a-w c:\program files\TomTomHOME2winlatest.exe2008-05-19 06:37 . 2008-05-19 06:37 4846342 ----a-w c:\program files\REVISED BACK ART.bmp2008-03-22 04:46 . 2008-03-22 04:47 41392 ----a-w c:\program files\coverart3xb3.jpg2008-03-22 03:59 . 2008-03-22 03:59 93218 ----a-w c:\program files\untitled444.PNG2008-03-22 03:54 . 2008-03-22 03:50 113997 ----a-w c:\program files\untitled333.PNG2008-03-22 01:47 . 2008-03-22 04:50 142749 ----a-w c:\program files\morebackcover3ix0.jpg2008-03-20 22:57 . 2008-03-20 22:57 102447 ----a-w c:\program files\untitled222.PNG2008-03-20 21:38 . 2008-03-20 21:34 129823 ----a-w c:\program files\untitled.bmp2008-03-20 21:21 . 2008-03-20 21:21 11776 --sha-w c:\program files\Thumbs.db2008-03-15 05:29 . 2008-03-15 05:26 135318 ----a-w c:\program files\cdstomperew5.png2008-03-08 08:21 . 2008-03-08 08:21 498870 ----a-w c:\program files\cd3.bmp2008-03-08 08:07 . 2008-03-08 08:07 498870 ----a-w c:\program files\cd sticker2.bmp2008-03-08 08:04 . 2008-03-08 08:04 1562706 ----a-w c:\program files\cd2.bmp2008-02-27 21:35 . 2008-02-27 21:35 26166770 ----a-w c:\program files\NAV05ENG.exe2007-12-03 11:45 . 2007-12-03 10:32 1902019901 ----a-w c:\program files\nzd_crysis_spdemo.exe2007-11-26 01:53 . 2007-11-26 01:53 9479520 ----a-w c:\program files\winzip111.exe2007-11-23 04:18 . 2007-11-23 04:18 585257 ----a-w c:\program files\tabled32.exe2007-11-21 01:03 . 2007-11-21 01:03 3469976 ----a-w c:\program files\DivXCodec.exe1998-12-09 02:53 . 1998-12-09 02:53 99840 ----a-w c:\program files\Common Files\IRAABOUT.DLL1998-12-09 02:53 . 1998-12-09 02:53 70144 ----a-w c:\program files\Common Files\IRAMDMTR.DLL1998-12-09 02:53 . 1998-12-09 02:53 48640 ----a-w c:\program files\Common Files\IRALPTTR.DLL1998-12-09 02:53 . 1998-12-09 02:53 31744 ----a-w c:\program files\Common Files\IRAWEBTR.DLL1998-12-09 02:53 . 1998-12-09 02:53 186368 ----a-w c:\program files\Common Files\IRAREG.DLL1998-12-09 02:53 . 1998-12-09 02:53 17920 ----a-w c:\program files\Common Files\IRASRIAL.DLL.((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))..*Note* empty entries & legit default entries are not shown REGEDIT4[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\BackupIconOverlayId]@="{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}"[HKEY_CLASSES_ROOT\CLSID\{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}]2009-03-05 22:02 238968 ----a-w c:\program files\Webroot\Spy Sweeper\Backup\CtxMenu_1_0_0_10.dll[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]"EPSON Stylus CX4800 Series"="c:\windows\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXE" [2005-02-02 98304]"AdobeUpdater"="c:\program files\Common Files\Adobe\Updater5\AdobeUpdater.exe" [2008-11-08 2356088]"Steam"="c:\program files\Steam\Steam.exe" [2009-02-11 1410296]"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-04-28 1830128][HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-05-16 13529088]"nwiz"="c:\windows\system32\nwiz.exe" [2008-05-16 1630208]"YOP"="c:\progra~1\Yahoo!\YOP\yop.exe" [2007-06-26 509224]"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2005-01-12 32768]"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 155648]"EPSON Stylus CX4800 Series"="c:\windows\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXE" [2005-02-02 98304]"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-12-11 286720]"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2007-12-11 267048]"MSConfig"="c:\windows\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2008-04-14 169984]"Adobe Photo Downloader"="c:\program files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe" [2007-03-09 63712]"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-05-16 86016]"TomTomHOME.exe"="c:\program files\TomTom HOME\TomTomHOME.exe" [2007-03-14 3770024]"Norton Ghost 12.0"="c:\program files\Norton Ghost\Agent\VProTray.exe" [2007-03-29 2037352]"USB2Check"="c:\windows\system32\PCLECoInst.dll" [2006-11-06 81920]"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-03-13 198160]"RTHDCPL"="c:\windows\RTHDCPL.EXE" [2007-07-05 16380416]"Ad-Watch"="c:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-04-28 516440]"SpySweeper"="c:\program files\Webroot\Spy Sweeper\SpySweeperUI.exe" [2009-03-05 6308728]c:\documents and settings\Jim\Start Menu\Programs\Startup\Registration .LNK - c:\program files\Steam\SteamApps\common\assassins creed\Register\RegistrationReminder.exe [2009-4-26 967304]c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Gamma Loader.exe.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2008-11-8 113664]Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2008-11-8 113664]Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-17 65588][HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]"NoSetActiveDesktop"= 1 (0x1)[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824][HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]2008-12-22 17:05 356352 ----a-w c:\program files\SUPERAntiSpyware\SASWINLO.dll[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]@="Service"[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WRConsumerService]@="Service"[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Kodak EasyShare software.lnk]path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Kodak EasyShare software.lnkbackup=c:\windows\pss\Kodak EasyShare software.lnkCommon Startup[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^KODAK Software Updater.lnk]path=c:\documents and settings\All Users\Start Menu\Programs\Startup\KODAK Software Updater.lnkbackup=c:\windows\pss\KODAK Software Updater.lnkCommon Startup[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Symantec Fax Starter Edition Port.lnk]path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Symantec Fax Starter Edition Port.lnkbackup=c:\windows\pss\Symantec Fax Starter Edition Port.lnkCommon Startup[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]"DisableMonitoring"=dword:00000001[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]"DisableMonitoring"=dword:00000001[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]"DisableMonitoring"=dword:00000001[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]"%windir%\\system32\\sessmgr.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe"="c:\\Program Files\\Atari\\Neverwinter Nights 2\\nwn2main.exe"="c:\\Program Files\\Atari\\Neverwinter Nights 2\\nwn2main_amdxp.exe"="c:\\Program Files\\Atari\\Neverwinter Nights 2\\nwupdate.exe"="c:\\Program Files\\Atari\\Neverwinter Nights 2\\nwn2server.exe"="c:\\Program Files\\Electronic Arts\\Crytek\\Crysis SP Demo\\Bin32\\Crysis.exe"="c:\\Program Files\\iTunes\\iTunes.exe"="c:\\Program Files\\Bonjour\\mDNSResponder.exe"="c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"="c:\\Program Files\\Mass Effect\\Binaries\\MassEffect.exe"="c:\\Program Files\\Mass Effect\\MassEffectLauncher.exe"="c:\\WINDOWS\\system32\\defrag.exe"="c:\\Program Files\\Malwarebytes' Anti-Malware\\mbam.exe"="c:\\Program Files\\WBGames\\Monolith Productions\\F.E.A.R. 2 SP Demo\\FEAR2SPDemo.exe"="c:\\Documents and Settings\\Jim\\Application Data\\Macromedia\\Flash Player\\www.macromedia.com\\bin\\octoshape\\octoshape.exe"="c:\\Program Files\\Steam\\SteamApps\\common\\fear2\\FEAR2.exe"="c:\\Program Files\\Steam\\SteamApps\\common\\assassins creed\\AssassinsCreed_Game.exe"=R3 Tmcotsqw;Tmcotsqw;c:\windows\system32\drivers\fastfat.sys [2008-04-13 143744]S0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys [2009-04-28 64160]S0 ssfs0bbc;ssfs0bbc;c:\windows\system32\DRIVERS\ssfs0bbc.sys [2009-02-25 29808]S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2009-04-28 9968]S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.sys [2009-04-28 72944]S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2009-04-28 953168]S2 Viewpoint Service;Viewpoint Service;c:\program files\Viewpoint\Common\ViewpointService.exe [2008-04-04 30152]S2 WRConsumerService;Webroot Client Service;c:\program files\Webroot\Spy Sweeper\WRConsumerService.exe [2009-03-18 1178728]S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2009-04-28 7408][HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{4e3fbe21-e7e9-11dc-9fff-001d7d954a6d}]\Shell\AutoRun\command - G:\InstallTomTomHOME.exe[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{5bdef68b-885e-11dd-a9b9-001d7d954a6d}]\Shell\AutoRun\command - H:\InstallTomTomHOME.exe.Contents of the 'Scheduled Tasks' folder2009-04-28 c:\windows\Tasks\Ad-Aware Update (Weekly).job- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-03-09 23:29]2009-04-28 c:\windows\Tasks\AppleSoftwareUpdate.job- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 20:57]2009-05-02 c:\windows\Tasks\wrSpySweeper_L548D55D6422A459DB7410F7F0704CEAC.job- c:\program files\Webroot\Spy Sweeper\SpySweeperUI.exe [2007-11-10 22:10]2009-05-02 c:\windows\Tasks\wrSpySweeper_L548D55D6422A459DB7410F7F0704CEAC.job- c:\program files\Webroot\Spy Sweeper\SpySweeperUI.exe [2007-11-10 22:10]2009-05-02 c:\windows\Tasks\wrSpySweeper_L63E29B9170744532B038FB623897B076.job- c:\program files\Webroot\Spy Sweeper\SpySweeperUI.exe [2007-11-10 22:10]2009-05-02 c:\windows\Tasks\wrSpySweeper_L63E29B9170744532B038FB623897B076.job- c:\program files\Webroot\Spy Sweeper\SpySweeperUI.exe [2007-11-10 22:10].- - - - ORPHANS REMOVED - - - -HKCU-Run-TomTomHOME.exe - c:\program files\TomTom HOME 2\HOMERunner.exe.------- Supplementary Scan -------.uStart Page = hxxp://www.yahoo.comuInternet Connection Wizard,ShellNext = iexploreuInternet Settings,ProxyOverride = *.localFilter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - c:\program files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll.**************************************************************************catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.netRootkit scan 2009-05-02 13:46Windows 5.1.2600 Service Pack 3 NTFSscanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfullyhidden files: 0**************************************************************************.--------------------- LOCKED REGISTRY KEYS ---------------------[HKEY_USERS\S-1-5-21-1935655697-602162358-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*]@Allowed: (Read) (RestrictedCode)@Allowed: (Read) (RestrictedCode)[HKEY_USERS\S-1-5-21-1935655697-602162358-839522115-1004\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]"??"=hex:1f,26,40,04,05,49,4d,e4,c0,b8,84,2a,58,16,3d,bd,94,5a,0a,df,d6,72,59, 8e,5b,3d,15,76,cb,70,32,5c,1c,77,ef,48,a0,7b,91,d7,5b,d3,31,4f,ab,24,4d,ba,\"??"=hex:cf,55,c7,95,2b,14,4d,f8,66,7b,0c,1b,19,52,fe,22[HKEY_USERS\S-1-5-21-1935655697-602162358-839522115-1004\Software\SecuROM\License information*]"datasecu"=hex:db,ba,e7,6d,f2,75,9e,4e,1f,fc,5d,4b,dc,71,61,16,ce,94,43,19,ee, 7d,55,ee,35,fc,7e,9b,8c,3e,e7,45,93,bf,7e,fd,0b,59,d9,37,d6,cf,7a,48,04,79,\"rkeysecu"=hex:cf,fd,36,ed,8f,83,8f,67,d5,d5,68,a4,04,da,e7,c7[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""cd042efbbd7f7af1647644e76e06692b"=hex:2e,e8,e1,00,eb,16,2b,de,7d,3f,51,d8,d8, 0f,04,f4,c8,28,51,af,b0,29,a3,98,c0,79,e6,92,93,4f,bb,8a,e2,63,26,f1,3f,c8,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""bca643cdc5c2726b20d2ecedcc62c59b"=hex:6a,9c,d6,61,af,45,84,18,e3,a3,62,d8,ce, 63,d5,61,71,3b,04,66,8b,46,0d,96,55,ba,ec,e9,26,9e,b7,88,6a,9c,d6,61,af,45,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""2c81e34222e8052573023a60d06dd016"=hex:25,da,ec,7e,55,20,c9,26,9a,6b,67,f5,2e, 27,c9,8a,25,da,ec,7e,55,20,c9,26,20,40,d8,47,08,8c,43,5a,ff,7c,85,e0,43,d4,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""2582ae41fb52324423be06337561aa48"=hex:3e,1e,9e,e0,57,5a,93,61,ce,a9,9f,10,fe, f2,e8,aa,3e,1e,9e,e0,57,5a,93,61,ce,51,59,55,d7,dd,ce,0c,86,8c,21,01,be,91,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""caaeda5fd7a9ed7697d9686d4b818472"=hex:cd,44,cd,b9,a6,33,6c,cd,3a,d7,07,f0,e2, 52,80,1a,cd,44,cd,b9,a6,33,6c,cd,90,c4,4d,b3,4e,2d,76,e2,f5,1d,4d,73,a8,13,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""a4a1bcf2cc2b8bc3716b74b2b4522f5d"=hex:df,20,58,62,78,6b,cf,c8,dd,08,87,e7,91, 74,59,07,b0,18,ed,a7,3f,8d,37,a4,ce,2a,65,de,6f,80,c1,db,df,20,58,62,78,6b,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""4d370831d2c43cd13623e232fed27b7b"=hex:fb,a7,78,e6,12,2f,9a,ea,c0,3b,3f,fe,c6, 22,56,8e,31,77,e1,ba,b1,f8,68,02,3d,5a,3e,dc,33,49,3e,14,fb,a7,78,e6,12,2f,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""1d68fe701cdea33e477eb204b76f993d"=hex:01,3a,48,fc,e8,04,4a,f1,89,06,c4,ec,c4, 40,5c,3d,83,6c,56,8b,a0,85,96,ab,f2,a3,97,92,80,2a,e8,5b,01,3a,48,fc,e8,04,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""1fac81b91d8e3c5aa4b0a51804d844a3"=hex:f6,0f,4e,58,98,5b,89,c9,26,35,d3,53,91, 99,72,ca,51,fa,6e,91,28,9e,14,cc,91,b7,d1,7c,3c,98,0a,62,f6,0f,4e,58,98,5b,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""f5f62a6129303efb32fbe080bb27835b"=hex:37,a4,aa,c3,a6,15,56,0a,59,fc,50,d1,bb, d9,1a,96,b1,cd,45,5a,a8,c4,f8,b9,fe,12,1f,3a,58,2a,94,ae,3d,ce,ea,26,2d,45,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""fd4e2e1a3940b94dceb5a6a021f2e3c6"=hex:2a,b7,cc,b5,b9,7f,41,e7,13,cd,94,81,b3, 9c,28,58,e3,0e,66,d5,eb,bc,2f,6b,c7,20,c7,a2,08,cc,61,d6,2a,b7,cc,b5,b9,7f,\[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32*]"ThreadingModel"="Apartment"@="c:\\WINDOWS\\system32\\OLE32.DLL""8a8aec57dd6508a385616fbc86791ec2"=hex:6c,43,2d,1e,aa,22,2f,9c,92,9d,76,2d,6d, ea,83,52,fa,ea,66,7f,d4,3b,6b,70,69,54,4b,9d,c3,b5,58,42,6c,43,2d,1e,aa,22,\.--------------------- DLLs Loaded Under Running Processes ---------------------- - - - - - - > 'winlogon.exe'(772)c:\program files\SUPERAntiSpyware\SASWINLO.dll- - - - - - - > 'explorer.exe'(2864)c:\program files\Webroot\Spy Sweeper\Backup\CtxMenu_1_0_0_10.dllc:\windows\system32\mshtml.dllc:\windows\system32\WPDShServiceObj.dllc:\program files\ArcSoft\PhotoImpression 5\share\pihook.dllc:\windows\system32\PortableDeviceTypes.dllc:\windows\system32\PortableDeviceApi.dll.------------------------ Other Running Processes ------------------------.c:\windows\system32\rundll32.exec:\program files\Common Files\ArcSoft\Connection Service\Bin\ACService.exec:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exec:\program files\Symantec\LiveUpdate\AluSchedulerSvc.exec:\progra~1\Yahoo!\browser\ycommon.exec:\program files\Bonjour\mDNSResponder.exec:\program files\Norton Ghost\Agent\VProSvc.exec:\windows\system32\nvsvc32.exec:\program files\Webroot\Spy Sweeper\SpySweeper.exec:\progra~1\Yahoo!\YOP\SSDK02.exec:\windows\system32\wbem\unsecapp.exec:\program files\iPod\bin\iPodService.exec:\program files\Webroot\Spy Sweeper\SSU.exe.**************************************************************************.Completion time: 2009-05-02 14:17 - machine was rebootedComboFix-quarantined-files.txt 2009-05-02 19:17Pre-Run: 160,689,684,480 bytes freePost-Run: 162,406,498,304 bytes freeWindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe[boot loader]timeout=2default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS[operating systems]c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdconsmulti(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect441 --- E O F --- 2009-05-02 08:00HJT Log:Logfile of Trend Micro HijackThis v2.0.2Scan saved at 2:19:44 PM, on 5/2/2009Platform: Windows XP SP3 (WinNT 5.01.2600)MSIE: Internet Explorer v7.00 (7.00.6000.16827)Boot mode: NormalRunning processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\Program Files\Lavasoft\Ad-Aware\AAWService.exeC:\WINDOWS\system32\spoolsv.exeC:\PROGRA~1\Yahoo!\YOP\yop.exeC:\Program Files\CyberLink\PowerDVD\PDVDServ.exeC:\Program Files\iTunes\iTunesHelper.exeC:\WINDOWS\system32\RUNDLL32.EXEC:\Program Files\Norton Ghost\Agent\VProTray.exeC:\Program Files\Common Files\Real\Update_OB\realsched.exeC:\WINDOWS\RTHDCPL.EXEC:\Program Files\Lavasoft\Ad-Aware\AAWTray.exeC:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exeC:\WINDOWS\system32\ctfmon.exeC:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXEC:\Program Files\Steam\Steam.exeC:\Program Files\Spybot - Search & Destroy\TeaTimer.exeC:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exeC:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeC:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exeC:\PROGRA~1\Yahoo!\browser\ycommon.exeC:\Program Files\Bonjour\mDNSResponder.exeC:\Program Files\Norton Ghost\Agent\VProSvc.exeC:\WINDOWS\system32\nvsvc32.exeC:\WINDOWS\system32\svchost.exeC:\Program Files\Viewpoint\Common\ViewpointService.exeC:\Program Files\Webroot\Spy Sweeper\SpySweeper.exeC:\PROGRA~1\Yahoo!\YOP\SSDK02.exeC:\Program Files\iPod\bin\iPodService.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\explorer.exeC:\Program Files\internet explorer\iexplore.exeC:\Program Files\Trend Micro\HijackThis\HijackThis.exeR0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.comR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.localO2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dllO2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dllO3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll (file missing)O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dllO4 - HKLM\..\Run: [NvCplDaemon] "C:\WINDOWS\system32\RUNDLL32.EXE" C:\WINDOWS\system32\NvCpl.dll,NvStartupO4 - HKLM\..\Run: [nwiz] "C:\WINDOWS\system32\nwiz.exe" /installO4 - HKLM\..\Run: [YOP] "C:\PROGRA~1\Yahoo!\YOP\yop.exe" /autostartO4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"O4 - HKLM\..\Run: [NeroFilterCheck] "C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe"O4 - HKLM\..\Run: [EPSON Stylus CX4800 Series] "C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXE" /P26 "EPSON Stylus CX4800 Series" /O6 "USB001" /M "Stylus CX4800"O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottimeO4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"O4 - HKLM\..\Run: [MSConfig] "C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe" /autoO4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"O4 - HKLM\..\Run: [NvMediaCenter] "C:\WINDOWS\system32\RUNDLL32.EXE" C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInitO4 - HKLM\..\Run: [TomTomHOME.exe] "C:\Program Files\TomTom HOME\TomTomHOME.exe" -sO4 - HKLM\..\Run: [Norton Ghost 12.0] "C:\Program Files\Norton Ghost\Agent\VProTray.exe"O4 - HKLM\..\Run: [uSB2Check] "C:\WINDOWS\system32\RUNDLL32.EXE" "C:\WINDOWS\system32\PCLECoInst.dll",CheckUSBControllerO4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osbootO4 - HKLM\..\Run: [RTHDCPL] "C:\WINDOWS\RTHDCPL.EXE"O4 - HKLM\..\Run: [Ad-Watch] "C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe"O4 - HKLM\..\Run: [spySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintrayO4 - HKCU\..\Run: [ctfmon.exe] "C:\WINDOWS\system32\ctfmon.exe"O4 - HKCU\..\Run: [EPSON Stylus CX4800 Series] "C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADA.EXE" /P26 "EPSON Stylus CX4800 Series" /M "Stylus CX4800" /EF "HKCU"O4 - HKCU\..\Run: [AdobeUpdater] "C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe"O4 - HKCU\..\Run: [steam] "C:\Program Files\Steam\Steam.exe" -silentO4 - HKCU\..\Run: [spybotSD TeaTimer] "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"O4 - HKCU\..\Run: [sUPERAntiSpyware] "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"O4 - Startup: Registration .LNK = C:\Program Files\Steam\SteamApps\common\assassins creed\Register\RegistrationReminder.exeO4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exeO4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exeO4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXEO9 - Extra button: Bonjour - {7F9DB11C-E358-4ca6-A83D-ACC663939424} - C:\Program Files\Bonjour\ExplorerPlugin.dllO9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exeO9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exeO9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dllO9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dllO9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exeO9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exeO9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO16 - DPF: {1E54D648-B804-468d-BC78-4AFFED8E262E} (System Requirements Lab) - http://www.srtest.com/srl_bin/sysreqlab_srl.cabO16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cabO16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dllO16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cabO16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cabO16 - DPF: {67A5F8DC-1A4B-4D66-9F24-A704AD929EEE} (System Requirements Lab) - http://www.systemrequirementslab.com/sysreqlab2.cabO16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1194645270687O16 - DPF: {95D88B35-A521-472B-A182-BB1A98356421} (Pearson Installation Assistant 2) - http://asp.mathxl.com/books/_Players/PearsonInstallAsst2.cabO16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cabO16 - DPF: {E6D23284-0E9B-417D-A782-03E4487FC947} (Pearson MathXL Player) - http://asp.mathxl.com/books/_Players/MathPlayer.cabO18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dllO20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dllO23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exeO23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exeO23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeO23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exeO23 - Service: Bonjour Service - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exeO23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exeO23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exeO23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exeO23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exeO23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXEO23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Norton Ghost\Agent\VProSvc.exeO23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exeO23 - Service: Symantec RemoteAssist - Symantec, Inc. - C:\Program Files\Common Files\Symantec Shared\Support Controls\ssrc.exeO23 - Service: Viewpoint Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exeO23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. (www.webroot.com) - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exeO23 - Service: Webroot Client Service (WRConsumerService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exe--End of file - 10708 bytesAppreciate the help.j Link to post Share on other sites More sharing options...
jkal Posted May 5, 2009 Author ID:78542 Share Posted May 5, 2009 Updated with logs and another comment.See below.While everything seems much better after the COMBOFIX - my Internet connection seems slower or gets hung up. Coincidence?And thanks, by the way for your help.Jk Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 5, 2009 Root Admin ID:78604 Share Posted May 5, 2009 STEP 01Download but do not yet run ComboFixIf you have a previous version of Combofix.exe, delete it and download a fresh copy.Download it to your DESKTOP - it MUST run from the Desktopdownload.bleepingcomputer.com/sUBs/ComboFix.exesubs.geekstogo.com/ComboFix.exeUsing your mouse, Highlight and then Right-click | Copy the entire contents of the Code box below, including blank linesKILLALL::AtJob::RegLock::[HKEY_USERS\S-1-5-21-1935655697-602162358-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32*]RegNull::[HKEY_USERS\S-1-5-21-1935655697-602162358-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32*]RegLock::[HKEY_USERS\S-1-5-21-1935655697-602162358-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32*][HKEY_LOCAL_MACHINE\software\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32*]Open a new Notepad session (Do not use a Word Processor or WordPad). Click "Format" and be certain that Word Wrap is not enabled. Right-click | Paste the Code box contents from above into Notepad. Click File, Save as..., and set the location to your Desktop, and enter (including quotation marks) as the filename: "CFscript.txt" .Using your mouse, drag the new file CFscript.txt and drop it on the Combo-Fix.exe icon as shown:Important: Have no other programs running. Your Task Bar should be clear of any program entries including your Browser.Disconnect from the Internet. Disable your Antivirus software. If it has Script Blocking features, please disable these as well. A window may open with a series of Disclaimers. Accept the Disclaimers to start the fix.It may identify that Recovery Console is not installed. Please accept when asked if you wish it to be installed. When the scan completes Notepad will open with with your results log open. Do a File, Exit.A caution - Do not run Combofix more than once. Do not touch your mouse/keyboard until the scan has completed, as this may cause the process to stall or your computer to lock. The scan will temporarily disable your desktop, and if interrupted may leave your desktop disabled. If this occurs, please reboot to restore the desktop. Even when ComboFix appears to be doing nothing, look at your Drive light. If it is flashing, Combofix is still at work.Post back the Combofix log on your next reply.STEP 02Download and install CCleanerCCleaner Double-click on the downloaded file "ccsetup219.exe" and install the application.Keep the default installation folder "C:\Program Files\CCleaner"Uncheck "Add CCleaner Yahoo! Toolbar and use CCleaner from your browser"Click finish when done and close ALL PROGRAMSStart the CCleaner program.Click on Registry and Uncheck Registry Integrity so that it does not run (basically the very top, uncheck it)Click on Options - Advanced and Uncheck "Only delete files in Windows Temp folders older than 48 hours"Click back to Cleaner and under SYSTEM uncheck the Memory Dumps and Windows Log FilesClick on Run Cleaner button on the bottom right side of the program.Click OK to any promptsSTEP 03Remove all but the most recent Restore Point on Windows XPYou should Create a New Restore Point to prevent possible reinfection from an old one.Some of the malware you picked up could have been saved in System Restore.Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.The easiest and safest way to do this is:Go to Start > Programs > Accessories > System Tools and click "System Restore".If the shortcut is missing you can also click on START > RUN > and type in %SystemRoot%\system32\restore\rstrui.exe and click OKChoose the radio button marked "Create a Restore Point" on the first screen then click "Next".Give the new Restore Point a name, then click "Create".The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.Then use the Disk Cleanup to remove all but the most recently created Restore Point.Go to Start > Run and type: Cleanmgr.exeSelect the drive where Windows is installed and click "Ok". Disk Cleanup will scan your files for several minutes, then open.Click the "More Options" tab, then click the "Clean up" button under System Restore.Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"Click Yes, then click Ok.Click Yes again when prompted with "Are you sure you want to perform these actions?"Disk Cleanup will remove the files and close automatically.On the Disk Cleanup tab, if the System Restore: Obsolete Data Stores entry is available remove them also.These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.Additional informationMicrosoft KB article: How to turn off and turn on System Restore in Windows XPBert Kinney's site: All about Windows System RestoreSTEP 04Please download to your Desktop: Dr.Web CureItAfter the file has downloaded, disable your current Anti-Virus and disconnect from the InternetDoubleclick the drweb-cureit.exe file, then click the Start button, then the OK button to perform an Express Scan.This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it.Once the short scan has finished, Click on the Complete scan radio button.Then click on the Settings menu on top, the select Change Settings or press the F9 key. You can also change the LanguageChoose the Scanning tab and I recomend leaving the Heuristic analysis enabled (this can lead to False Positives though)On the File types tab ensure you select All filesClick on the Actions tab and set the following:Objects Infected objects = Cure, Incurable objects = Move, Suspicious objects = ReportInfected packages Archive = Move, E-mails = Report, Containers = MoveMalware Adware = Move, Dialers = Move, Jokes = Move, Riskware = Move, Hacktools = MoveDo not change the Rename extension - default is: #??Leave the default save path for Moved files here: %USERPROFILE%\DoctorWeb\Quarantine\Leave prompt on Action checked[*]On the Log file tab leave the Log to file checked.[*]Leave the log file path alone: %USERPROFILE%\DoctorWeb\CureIt.log[*]Log mode = Append[*]Encoding = ANSI[*]Details Leave Names of file packers and Statistics checked.[*]Limit log file size = 2048 KB and leave the check mark on the Maximum log file size.[*]On the General tab leave the Scan Priority on High[*]Click the Apply button at the bottom, and then the OK button.[*]On the right side under the Dr Web Anti-Virus Logo you will see 3 little buttons. Click the left VCR style Start button.[*]In this mode it will scan Boot sectors of all disks, All removable media, and all local drives[*]The more files and folders you have the longer the scan will take. On large drives it can take hours to complete.[*]When the Cure option is selected, an additional context menu will open. Select the necessary action of the program, if the curing fails.[*]Click 'Yes to all' if it asks if you want to cure/move the files.[*]This will move it to the %USERPROFILE%\DoctorWeb\Quarantine\ folder if it can't be cured. (in this case we need samples)[*]After selecting, in the Dr.Web CureIt menu on top, click file and choose save report list[*]Save the report to your Desktop. The report will be called DrWeb.csv[*]Close Dr.Web Cureit.[*]Reboot your computer!! Because it could be possible that files in use will be moved/deleted during reboot.[*]After reboot, post the contents of the log from Dr.Web you saved previously to your Desktop in your next reply with a new hijackthis log. Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 6, 2009 Root Admin ID:78865 Share Posted May 6, 2009 Please post a status update on thisThanks Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 7, 2009 Root Admin ID:78948 Share Posted May 7, 2009 Are you still with us? Please let me know how its going.Thanks. Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 8, 2009 Root Admin ID:79194 Share Posted May 8, 2009 Please post an update or I'll be closing your post soon.Thank you. Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 8, 2009 Root Admin ID:79311 Share Posted May 8, 2009 Due to the lack of feedback this Topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks!The fixes and advice in this thread are for this machine only. Do not apply the instructions from this thread to your own machine. Please start a new thread describing your issue and someone will be along to assist you. Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 11, 2009 Root Admin ID:79856 Share Posted May 11, 2009 Topic re-opened per user request.Please run a MBAM scan as well and post back the results. Link to post Share on other sites More sharing options...
jkal Posted May 12, 2009 Author ID:79886 Share Posted May 12, 2009 Topic re-opened per user request.Please run a MBAM scan as well and post back the results.Thanks - Here's the COMBOFIX LOG, HJT, MBAM, DRWEB:Malwarebytes' Anti-Malware 1.36Database version: 2060Windows 5.1.2600 Service Pack 35/11/2009 7:31:38 PMmbam-log-2009-05-11 (19-31-38).txtScan type: Quick ScanObjects scanned: 78303Time elapsed: 2 minute(s), 18 second(s)Memory Processes Infected: 0Memory Modules Infected: 0Registry Keys Infected: 0Registry Values Infected: 0Registry Data Items Infected: 0Folders Infected: 0Files Infected: 0Memory Processes Infected:(No malicious items detected)Memory Modules Infected:(No malicious items detected)Registry Keys Infected:(No malicious items detected)Registry Values Infected:(No malicious items detected)Registry Data Items Infected:(No malicious items detected)Folders Infected:(No malicious items detected)Files Infected:(No malicious items detected)combofix_5_11_09.txthijackthis.log_5_11_09.txtcombofix_5_11_09.txthijackthis.log_5_11_09.txt Link to post Share on other sites More sharing options...
jkal Posted May 12, 2009 Author ID:79887 Share Posted May 12, 2009 Thanks - Here's the COMBOFIX LOG, HJT, MBAM, DRWEB:Malwarebytes' Anti-Malware 1.36Database version: 2060Windows 5.1.2600 Service Pack 35/11/2009 7:31:38 PMmbam-log-2009-05-11 (19-31-38).txtScan type: Quick ScanObjects scanned: 78303Time elapsed: 2 minute(s), 18 second(s)Memory Processes Infected: 0Memory Modules Infected: 0Registry Keys Infected: 0Registry Values Infected: 0Registry Data Items Infected: 0Folders Infected: 0Files Infected: 0Memory Processes Infected:(No malicious items detected)Memory Modules Infected:(No malicious items detected)Registry Keys Infected:(No malicious items detected)Registry Values Infected:(No malicious items detected)Registry Data Items Infected:(No malicious items detected)Folders Infected:(No malicious items detected)Files Infected:(No malicious items detected)wrconsumerservice.exe;c:\program files\webroot\spy sweeper;Probably DLOADER.Trojan;Incurable.Will be renamed after restart.;RegUBP2b-Jim.reg;C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Snapshots2;Trojan.StartPage.1505;Deleted.;WRConsumerService.exe;C:\Program Files\Webroot\Spy Sweeper;Probably DLOADER.Trojan;;A0075706.reg;C:\System Volume Information\_restore{F1B8E450-3EDC-476D-BD6A-7666FDE4CE87}\RP652;Trojan.StartPage.1505;Deleted.; Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 12, 2009 Root Admin ID:79951 Share Posted May 12, 2009 Are you still experiencing any Malware related issue on the box?There is an entry that is a bit odd to have.S3 Tmcotsqw;Tmcotsqw;c:\windows\system32\drivers\fastfat.sys [8/25/2008 2:29 PM 143744]Fastfat.sys is or can be a valid system driver but I rarely see this in logs so it is rarely used on most systems.However the Tmcotsqw portion of it does not have hardly any hits on Google which is odd if this is a legit entry.I don't know for sure that its bad, but if you're still having any signs of Malware then we might want to at least disable it from running. Link to post Share on other sites More sharing options...
jkal Posted May 12, 2009 Author ID:80094 Share Posted May 12, 2009 Are you still experiencing any Malware related issue on the box?There is an entry that is a bit odd to have.S3 Tmcotsqw;Tmcotsqw;c:\windows\system32\drivers\fastfat.sys [8/25/2008 2:29 PM 143744]Fastfat.sys is or can be a valid system driver but I rarely see this in logs so it is rarely used on most systems.However the Tmcotsqw portion of it does not have hardly any hits on Google which is odd if this is a legit entry.I don't know for sure that its bad, but if you're still having any signs of Malware then we might want to at least disable it from running.Ron -I don't seem to be having any issues now. Thanks again for the help. You guys saved me a lot of time and aggravation.I really appreciate the help.Jim Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 13, 2009 Root Admin ID:80164 Share Posted May 13, 2009 Please run the following to remove any tools that might have been used during the scaning and cleaning of your system.STEP AUninstall ComboFix.exeClick START then RUNNow type Combofix /u (if you renamed Combofix.exe use that name instead) in the runbox and click OK. Note the space between the X and the /U, it needs to be there.When shown the disclaimer, Select "2"Remove this folder C:\QooBox if the uninstall instructions don't work and delete Combofix.exe AND check your system time and reset if neededSTEP BUninstall GMERClick on START - RUN and type in or copy/paste %windir%\gmer_uninstall.cmd to remove GMER.STEP CUninstall other toolsPlease Download OTMoveIt3 by Old Timer and save it to your Desktop.Double-click OTMoveIt3.exe to run it.While connected to the Internet, Click on the green CleanUp! button and it will populate a list of items to clean from your system that we used or may have used.It should ask if you want to clean up, select Yes and allow the system to clean up these items.NOW please reboot your computer to finish the cleanup processGreat, all looks good now.I'll close your post soon so that other don't post into it and leave you with this information and suggestions.So how did I get infected in the first place?At this time your system appears to be clean. Nothing else in the logs indicates that you are still infected.Now that you appear to be clean, please follow these simple steps in order to keep your computer clean and secure:Remove all but the most recent Restore Point on Windows XPYou should Create a New Restore Point to prevent possible reinfection from an old one.Some of the malware you picked up could have been saved in System Restore.Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.The easiest and safest way to do this is:Go to Start > Programs > Accessories > System Tools and click "System Restore".If the shortcut is missing you can also click on START > RUN > and type in %SystemRoot%\system32\restore\rstrui.exe and click OKChoose the radio button marked "Create a Restore Point" on the first screen then click "Next".Give the new Restore Point a name, then click "Create".The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.Then use the Disk Cleanup to remove all but the most recently created Restore Point.Go to Start > Run and type: Cleanmgr.exeSelect the drive where Windows is installed and click "Ok". Disk Cleanup will scan your files for several minutes, then open.Click the "More Options" tab, then click the "Clean up" button under System Restore.Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"Click Yes, then click Ok.Click Yes again when prompted with "Are you sure you want to perform these actions?"Disk Cleanup will remove the files and close automatically.On the Disk Cleanup tab, if the System Restore: Obsolete Data Stores entry is available remove them also.These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.Additional informationMicrosoft KB article: How to turn off and turn on System Restore in Windows XPBert Kinney's site: All about Windows System RestoreHere are some free programs I recommend that could help you improve your computer's security.Install SpyWare BlasterDownload it from hereFind here the tutorial on how to use Spyware Blaster here Install WinPatrolDownload it from hereHere you can find information about how WinPatrol works hereInstall FireTrust SiteHoundYou can find information and download it from hereInstall hpHosts Download it from herehpHosts is a community managed and maintained hosts file that allows an additional layer of protection against access to ad, tracking and malicious websites. This prevents your computer from connecting to these untrusted sites by redirecting them to 127.0.0.1 which is your own local computer.hpHosts Support ForumUpdate your Antivirus programs and other security products regularly to avoid new threats that could infect your system.You can use one of these sites to check if any updates are needed for your pc.Secunia Software InspectorF-secure Health CheckVisit Microsoft often to get the latest updates for your computer.http://www.update.microsoft.comNote 1: If you are running Windows XP SP2, you should upgrade to SP3.Note 2: Users of Norton Internet Security 2008 should uninstall the software before they install Service Pack 3.The security suite can then be reinstalled afterwards.The windows firewall is not sufficient to protect your system. It doesn't monitor outgoing traffic and this is a must. I recommend Online Armor FreeA little outdated but good reading on how to prevent MalwareKeep safe online and happy surfing.Since this issue is resolved I will close the thread to prevent others from posting into it. If you need assistance please start your own topic and someone will be happy to assist you.The fixes and advice in this thread are for this machine only. Do not apply to your machine unless you Fully Understand how these programs work and what you're doing. Please start a thread of your own and someone will be happy to help you, just follow the Pre-Hijackthis instructions found here before posting Pre- HJT Post InstructionsAlso don't forget that we offer FREE assistance with General PC questions and repair here PC Help If you're pleased with the product Malwarebytes and the service provided you, please let your friends, family, and co-workers know. http://www.malwarebytes.org Link to post Share on other sites More sharing options...
Recommended Posts