Jump to content

can't remove[ says that it wll remove on reboot, but it doesn't.


Recommended Posts

Here's the log ( same as it has been repeatedly) H E L P !!!

Malwarebytes' Anti-Malware 1.36

Database version: 2067

Windows 5.1.2600 Service Pack 3

5/2/2009 1:08:30 PM

mbam-log-2009-05-02 (13-08-29).txt

Scan type: Quick Scan

Objects scanned: 87936

Time elapsed: 13 minute(s), 44 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 75

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\explore.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\iexplorer.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\services.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\comploader.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\socul.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sodahk.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\unsocul.exe (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\a.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\rundll.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winhost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\server.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winupd.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sksdrvr2.sys (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\svhost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\win32.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winsys.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winshow.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\winlogon.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\csrss.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\iexplore.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msupdate.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msmsgs.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\skybot.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\avpcc.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\ctrlpan.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\msconfd.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\olehelp.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\qttasks.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\rundll16.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\csrss.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\emesx.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\svchost32.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\0.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\windll.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\smss.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\svchost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\sistem.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\mssvr.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\voiceIP.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\2020search.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\2020search2.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\iexplorer.exe (Trojan.Downloader) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msa64chk.dll (Trojan.Perfiler) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\wintems.exe (Trojan.Spammer) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winnb57.dll (Adware.Mirar) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\filekiller.dll (Rogue.Multiple) -> Delete on reboot.

C:\winstall.exe (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\7search.dll (Adware.7FaSSt) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\klo5.sys (Stolen.Data) -> Delete on reboot.

C:\WINDOWS\xpupdate.exe (Trojan.Fakealert) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ipv6mons.dll (Spyware.Passwords) -> Delete on reboot.

C:\WINDOWS\ExeDialer.exe (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\egdial.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ia.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ieaccess2.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msegcompid.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\mseggrpid.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msklive.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\draw32.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c3.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\cm.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sdmapi.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\boot32.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\vdnt32.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\memlow.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c3.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c4.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\hm.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\wd.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winxp.exe (Backdoor.Poison) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\servises.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\msnmsgrs.exe (Trojan.Banker) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\taskgmr32.exe (Worm.Mytob) -> Delete on reboot.

Hijack this log:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 1:15:26 PM, on 5/2/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16827)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\csrss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Windows Defender\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe

C:\Program Files\Seagate\SeagateManager\Sync\FreeAgentService.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Dell Support Center\bin\sprtsvc.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\WLTRYSVC.EXE

C:\WINDOWS\System32\bcmwltry.exe

C:\Program Files\Windows Media Player\WMPNetwk.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\wscntfy.exe

C:\Program Files\Windows Defender\MSASCui.exe

C:\PROGRA~1\Verizon\SMARTB~1\MotiveSB.exe

C:\WINDOWS\Logi_MwX.Exe

C:\WINDOWS\system32\igfxpers.exe

C:\WINDOWS\system32\hkcmd.exe

C:\WINDOWS\System32\DSentry.exe

C:\WINDOWS\system32\igfxsrvc.exe

C:\Program Files\Dell\QuickSet\quickset.exe

C:\Program Files\Seagate\SeagateManager\FreeAgent Status\StxMenuMgr.exe

C:\Program Files\Dell Support Center\bin\sprtcmd.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\alg.exe

C:\Program Files\Common Files\AOL\1102861747\EE\aolsoftware.exe

C:\Program Files\Microsoft Office\OFFICE11\EXCEL.EXE

C:\Program Files\Logitech\Logitech Harmony Remote Software 7\HarmonyRemote.exe

C:\Program Files\AOL 9.1\waol.exe

C:\Program Files\AOL 9.1\shellmon.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

C:\Program Files\lotus\notes\NLNOTES.EXE

C:\Program Files\lotus\notes\ntaskldr.EXE

C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

C:\WINDOWS\system32\NOTEPAD.EXE

C:\WINDOWS\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msnbc.com/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/...rch/search.html

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost;*.local

R3 - URLSearchHook: IAOLTBSearch Class - {EA756889-2338-43DB-8F07-D1CA6FB9C90D} - C:\Program Files\AOL Toolbar\aoltb.dll

O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)

O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_printenhancer.dll

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)

O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll

O2 - BHO: AOL Toolbar Loader - {7C554162-8CB7-45A4-B8F4-8EA1C75885F9} - C:\Program Files\AOL Toolbar\aoltb.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll

O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.1.1309.3572\swg.dll

O2 - BHO: (no name) - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - (no file)

O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_219B3E1547538286.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O2 - BHO: HP Smart BHO Class - {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll

O3 - Toolbar: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll

O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL Toolbar\aoltb.dll

O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll

O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide

O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\Verizon\SMARTB~1\MotiveSB.exe

O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe

O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE

O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe

O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe

O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe

O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe

O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe

O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

O4 - HKLM\..\Run: [userFaultCheck] %systemroot%\system32\dumprep 0 -u

O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto

O4 - HKLM\..\Run: [MaxMenuMgr] "C:\Program Files\Seagate\SeagateManager\FreeAgent Status\StxMenuMgr.exe"

O4 - HKLM\..\Run: [dellsupportcenter] "C:\Program Files\Dell Support Center\bin\sprtcmd.exe" /P dellsupportcenter

O4 - HKLM\..\RunOnce: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript

O4 - HKCU\..\Run: [AOL Fast Start] "C:\Program Files\AOL 9.1\AOL.EXE" -b

O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')

O4 - HKUS\S-1-5-18\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe (User 'SYSTEM')

O4 - HKUS\S-1-5-18\..\Run: [AOL Fast Start] "C:\Program Files\AOL 9.0c\AOL.EXE" -b (User 'SYSTEM')

O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present

O8 - Extra context menu item: &AOL Toolbar Search - C:\Documents and Settings\All Users\Application Data\AOL\ieToolbar\resources\en-US\local\search.html

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll

O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL

O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll

O9 - Extra button: MUSICMATCH MX Web Player - {d81ca86b-ef63-42af-bee3-4502d9a03c2d} - http://wwws.musicmatch.com/mmz/openWebRadio.html (file missing)

O9 - Extra button: HP Smart Select - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll

O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {08BEF711-06DA-48B2-9534-802ECAA2E4F9} (PlxInstall Class) - https://www.plaxo.com/down/latest/PlaxoInstall.cab

O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204

O16 - DPF: {1B00725B-C455-4DE6-BFB6-AD540AD427CD} - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab

O16 - DPF: {1E2941E3-8E63-11D4-9D5A-00902742D6E0} (iNotes Class) - http://mail.salempartners.com/iNotes.cab

O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} - http://us.chat1.yimg.com/us.yimg.com/i/cha...v45/yacscom.cab

O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll

O16 - DPF: {3BFFE033-BF43-11D5-A271-00A024A51325} (iNotes6 Class) - http://mail.salempartners.com/iNotes6W.cab

O16 - DPF: {493ACF15-5CD9-4474-82A6-91670C3DD66E} (LinkedIn ContactFinderControl) - http://www.linkedin.com/cab/LinkedInContactFinderControl.cab

O16 - DPF: {4A3CF76B-EC7A-405D-A67D-8DC6B52AB35B} - http://aolcc.aol.com/computercheckup/qdiagcc.cab

O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg.com/eps/wl/activex/eB...l_v1-0-3-36.cab

O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcafee.com/molbin/shared/m...76/mcinsctl.cab

O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://software-dl.real.com/02a1d15ab5fe1f...ip/RdxIE601.cab

O16 - DPF: {5BDBA960-6534-11D3-97C7-00500422B550} (LotusDRSControl Class) - http://mail.salempartners.com/download/dolcontrol.cab

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1229239028041

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1229238993721

O16 - DPF: {7D1E9C49-BD6A-11D3-87A8-009027A35D73} - http://chat.yahoo.com/cab/yacsui.cab

O16 - DPF: {9184D21C-9835-42C5-A883-EA8BE7FC048D} (Downloader Class) - http://www.shop.intuit.com/commerce/accoun...bles/ie/IDA.cab

O16 - DPF: {AEF76437-F960-4EBC-97EA-7BBB4230CF38} (OcarptMain Class) - https://oca.microsoft.com/en/secure/ocarpt.CAB

O16 - DPF: {BCBC9371-595D-11D4-A96D-00105A1CEF6C} (View22RTE Class) - http://hgtv1.view22.com/view22/app/view22rte.cab

O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - http://download.mcafee.com/molbin/shared/m...,19/mcgdmgr.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab

O16 - DPF: {E008A543-CEFB-4559-912F-C27C2B89F13B} (Domino Web Access 7 Control) - http://mail.salempartners.com/dwa7W.cab

O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} - http://www.trueswitch.com/verizonyahoo/Tru...erizonYahoo.exe

O18 - Protocol: bw+0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw+0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw-0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw-0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw00 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw00s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw10 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw10s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw20 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw20s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw30 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw30s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw40 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw40s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw50 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw50s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw60 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw60s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw70 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw70s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw80 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw80s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw90 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bw90s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwa0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwa0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwb0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwb0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwc0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwc0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwd0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwd0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwe0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwe0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwf0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwf0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

O18 - Protocol: bwg0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwg0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwh0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwh0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwi0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwi0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwj0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwj0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwk0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwk0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwl0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwl0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwm0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwm0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwn0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwn0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwo0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwo0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwp0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwp0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwq0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwq0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwr0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwr0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bws0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bws0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwt0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwt0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwu0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwu0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwv0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwv0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bww0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bww0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwx0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwx0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwy0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwy0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwz0 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: bwz0s - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O18 - Protocol: offline-8876480 - {89EA8F7D-A865-4358-A15C-AB3F8EE77313} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BWPlugProtocol-8876480.dll

O20 - Winlogon Notify: jkhih - C:\WINDOWS\

O23 - Service: AOL Connectivity Service (AOL ACS) - AOL LLC - C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe

O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe

O23 - Service: Seagate Service (FreeAgentGoNext Service) - Seagate Technology LLC - C:\Program Files\Seagate\SeagateManager\Sync\FreeAgentService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: SupportSoft Sprocket Service (DellSupportCenter) (sprtsvc_DellSupportCenter) - SupportSoft, Inc. - C:\Program Files\Dell Support Center\bin\sprtsvc.exe

O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE

--

End of file - 25529 bytes

Link to post
Share on other sites

Hi and Welcome to the Malwarebytes' forum. Sorry to hear you're having trouble!

Please download ATF Cleaner by Atribune

  • Close Internet Explorer and any other open browsers
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main choose: Select All
  • Click the Empty Selected button.

If you use Firefox browser

  • Click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
  • NOTE: If you would like to keep your saved passwords, please click
  • No at the prompt.

If you use Opera browser

  • Click Opera at the top and choose: Select All
  • Click the Empty Selected button.
  • NOTE: If you would like to keep your saved passwords, please click No at the prompt.

Click Exit on the Main menu to close the program.

Reboot

Next, download this Antirootkit Program to a folder that you create such as C:\ARK, by choosing the "Download EXE" button on the webpage.

Disable the active protection component of your antivirus by following the directions that apply here:

http://www.bleepingcomputer.com/forums/topic114351.html

Next, please perform a rootkit scan:

  • Double-click the randonly name EXE located in the C:\ARK folder that you just downloaded to run the program.
  • When the program opens, it will automatically initiate a very fast scan of common rootkit hiding places.
  • When the scan is finished (a few seconds, click the Rootkit/Malware tab,and then select the Scan button.
  • Leave your system completely idle while this longer scan is in progress.
  • When the scan is done, save the scan log to the Windows clipboard
  • Open Notepad or a similar text editor
  • Paste the clipboard contents into a text file by clicking Edit | Paste or Ctl V
  • Exit the Program
  • Save the Scan log as ARK.txt and post it in your next reply. If the log is very long attach it please.

Please download Combofix from one of these locations:

HERE or HERE

I want you to rename Combofix.exe as you download it to a name of your choice such as earthday.exe

Notes:

  • It is very important that save the newly renamed EXE file to your desktop.
  • You must rename Combofixe.exe as you download it and not after it is on your computer.
    You may have to modify your browser settings if you use Firefox, so you can rename Combofix.exe as you download it. To do that:
    • Open Firefox
    • Click Tools -> Options -> Main
    • Under the downloads section check the button that says "Always ask me where to save files".
    • Click OK

    [*]For Internet Explorer:

    • Choose to save, not open the file
    • When prompted - save the file to your desktop, and rename it anything with an .exe extension on the end.

Here is a tutorial that describes how to download, install and run Combofix more thoroughly. Please review it and follow the prompts to install Recovery Console if you have not done that already:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Very Important! Temporarily disable your antivirus and antimalware real-time protection and any script blocking components of them or your firewall before performing a scan. They can interfere with ComboFix and even remove onboard components so it is rendered ineffective:

http://www.bleepingcomputer.com/forums/topic114351.html

Note: The above tutorial does not tell you to rename Combofix as I have instructed you to do in the above instructions, so make sure you complete the renaming step before launching Combofix.

Running Combofix

In the event you already have Combofix, please delete it as this is a new version.

  • Close any open browsers.
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix.

1. Double click on the renamed combofix.exe & follow the prompts.

2. When finished, it will produce a logfile located at C:\ComboFix.txt

3. Post the contents of that log in your next reply with a new hijackthis log.

Note: Do not mouseclick combofix's window while it is running. That may cause your system to stall/hang.

Rename "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" -> "C:\Program Files\Malwarebytes' Anti-Malware\newyork.exe"

  • Now, relaunch MBAM by double-clicking newyork.exe in the MBAM folder.
  • Select the Update tab -> Check for Updates
  • After MBAM updates, select the Scanner tab.
  • Select Perform quick scan, then click Scan.
  • When the scan is complete, click OK -> Show Results to view the scan results.
  • Check all items found, and then choose the 'Remove Selected' option to move the selected items to the quarantine.
  • When the scan is done, a log will open in Notepad with the scan results. Please post the results in your next reply.

NOTE: If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.

Please post back in your next reply. (in this order):

1. Your antirootkit log (ARK.txt)

2. C:\ComboFix.txt

3. A new MBAM log

Link to post
Share on other sites

Here's the information requested. Conclusion: the malware persists and hasn't been removed.

logs:

1) anti-rootkit log:

GMER 1.0.15.14972 - http://www.gmer.net

Rootkit scan 2009-05-07 08:45:29

Windows 5.1.2600 Service Pack 3

---- System - GMER 1.0.15 ----

SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwCreateKey [0xF8BB287E]

SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwSetValueKey [0xF8BB2C10]

---- Kernel code sections - GMER 1.0.15 ----

? qhog.sys The system cannot find the file specified. !

? ehsgg.sys The system cannot find the file specified. !

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device \FileSystem\Fs_Rec \FileSystem\UdfsCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\FatCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\CdfsRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\FatDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\UdfsDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

---- EOF - GMER 1.0.15 ----

2) Combofix log

ComboFix 09-05-06.02 - Jim Mullany 05/06/2009 21:23.1 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.630.367 [GMT -7:00]

Running from: c:\documents and settings\Jim Mullany\Desktop\cfixfile.exe

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\program files\data19

c:\windows\MailSwitch.ocx

c:\windows\Readme.txt

c:\windows\system32\drivers\fad.sys

c:\windows\SYSTEM32\hihkj.bak1

c:\windows\SYSTEM32\hihkj.bak2

c:\windows\system32\hihkj.ini

E:\Autorun.inf

F:\Autorun.inf

I:\Autorun.inf

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_FAD

-------\Legacy_R_SERVER

((((((((((((((((((((((((( Files Created from 2009-04-07 to 2009-05-07 )))))))))))))))))))))))))))))))

.

2009-05-06 07:45 . 2009-05-06 07:46 -------- d-----w c:\program files\ark

2009-05-02 06:28 . 2009-05-02 06:28 -------- d-----w c:\program files\Trend Micro

2009-04-27 23:50 . 2009-04-27 23:50 -------- d-----w c:\documents and settings\Jim Mullany\Application Data\Webroot

2009-04-26 04:22 . 2009-04-26 04:22 -------- d-----w c:\program files\MSECache

2009-04-21 04:27 . 2009-04-21 04:27 -------- d-----w c:\documents and settings\NetworkService\Local Settings\Application Data\SupportSoft

2009-04-19 21:19 . 2009-04-19 21:19 -------- d-----w c:\documents and settings\All Users\Application Data\Seagate

2009-04-19 21:19 . 2009-04-19 21:19 -------- d-----w c:\program files\Seagate

2009-04-17 07:55 . 2009-04-24 20:31 -------- d-----w c:\documents and settings\Jim Mullany\.beaTunes

2009-04-17 07:52 . 2009-04-17 07:52 -------- d-----w c:\program files\tagtraum industries

2009-04-16 05:26 . 2009-03-06 14:22 284160 ------w c:\windows\system32\dllcache\pdh.dll

2009-04-16 05:26 . 2009-02-09 12:10 401408 ------w c:\windows\system32\dllcache\rpcss.dll

2009-04-16 05:26 . 2009-02-06 11:11 110592 ------w c:\windows\system32\dllcache\services.exe

2009-04-16 05:26 . 2009-02-09 12:10 473600 ------w c:\windows\system32\dllcache\fastprox.dll

2009-04-16 05:26 . 2009-02-06 10:10 227840 ------w c:\windows\system32\dllcache\wmiprvse.exe

2009-04-16 05:26 . 2009-02-09 12:10 453120 ------w c:\windows\system32\dllcache\wmiprvsd.dll

2009-04-16 05:26 . 2009-02-09 12:10 729088 ------w c:\windows\system32\dllcache\lsasrv.dll

2009-04-16 05:26 . 2009-02-09 12:10 617472 ------w c:\windows\system32\dllcache\advapi32.dll

2009-04-16 05:26 . 2009-02-09 12:10 714752 ------w c:\windows\system32\dllcache\ntdll.dll

2009-04-16 05:25 . 2008-05-03 11:55 2560 ------w c:\windows\system32\xpsp4res.dll

2009-04-16 05:25 . 2008-04-21 12:08 215552 ------w c:\windows\system32\dllcache\wordpad.exe

2009-04-13 01:50 . 2009-04-13 01:50 61440 ----a-w c:\windows\system32\drivers\mqumd.sys

2009-04-07 18:07 . 2009-04-07 18:08 -------- d-----w c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-05-02 04:45 . 2009-03-15 15:30 -------- d-----w c:\program files\Malwarebytes' Anti-Malware

2009-04-27 23:47 . 2009-01-07 08:22 -------- d-----w c:\program files\Malware Immunizer

2009-04-27 00:11 . 2004-01-12 21:25 59304 -c--a-w c:\documents and settings\Jim Mullany\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2009-04-19 21:20 . 2006-12-05 01:00 -------- d--h--w c:\program files\InstallShield Installation Information

2009-04-17 13:54 . 2004-04-14 15:19 -------- d-----w c:\program files\Spybot - Search & Destroy

2009-04-14 03:58 . 2008-12-14 06:47 -------- d-----w c:\program files\SDHelper (Spybot - Search & Destroy)

2009-04-13 01:50 . 2009-04-13 01:50 8688 ----a-w c:\program files\wufg.txt

2009-04-07 21:59 . 2006-08-09 17:37 -------- d-----w c:\program files\Windows Media Connect 2

2009-04-07 18:08 . 2004-01-16 05:41 -------- d-----w c:\program files\iTunes

2009-04-07 18:07 . 2004-01-16 05:39 -------- d-----w c:\program files\iPod

2009-04-07 18:07 . 2007-07-05 17:46 -------- d-----w c:\program files\Common Files\Apple

2009-04-06 22:32 . 2009-03-15 15:30 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys

2009-04-06 22:32 . 2009-03-15 15:30 15504 ----a-w c:\windows\system32\drivers\mbam.sys

2009-04-06 06:00 . 2008-12-15 06:27 -------- d-----w c:\program files\AOL 9.1

2009-04-03 14:35 . 2008-12-14 06:45 -------- d-----w c:\program files\Dell Support Center

2009-04-03 14:20 . 2006-12-05 01:03 -------- d-----w c:\program files\CleanCenter

2009-03-24 16:58 . 2009-03-24 16:58 246 ---h--r c:\program files\fwn toolbar

2009-03-24 16:02 . 2004-01-06 14:07 -------- d-----w c:\program files\Common Files\AOL

2009-03-19 23:32 . 2006-09-19 23:44 23400 ----a-w c:\windows\system32\drivers\GEARAspiWDM.sys

2009-03-14 03:44 . 2008-12-14 06:04 410984 ----a-w c:\windows\system32\deploytk.dll

2009-03-10 06:07 . 2009-03-10 06:07 64160 ----a-w c:\windows\system32\drivers\Lbd.sys

2009-03-10 04:33 . 2009-03-15 05:42 15688 ----a-w c:\windows\system32\lsdelete.exe

2009-03-10 04:31 . 2009-03-10 04:29 -------- d-----w c:\program files\Safari

2009-03-10 04:13 . 2009-03-10 04:13 -------- d-----w c:\program files\Bonjour

2009-03-06 14:22 . 2008-12-14 17:55 284160 ----a-w c:\windows\system32\pdh.dll

2009-03-06 06:59 . 2009-03-24 06:16 1900544 ----a-w c:\windows\system32\usbaaplrc.dll

2009-03-06 06:59 . 2007-12-26 04:44 36864 ----a-w c:\windows\system32\drivers\usbaapl.sys

2009-03-03 00:18 . 2004-02-07 02:05 826368 ----a-w c:\windows\system32\wininet.dll

2009-03-02 07:38 . 2008-12-14 22:14 165044 ----a-w c:\windows\hpoins21.dat

2009-02-20 18:09 . 2008-12-14 17:57 78336 ----a-w c:\windows\system32\ieencode.dll

2009-02-09 12:10 . 2008-12-14 17:55 729088 ----a-w c:\windows\system32\lsasrv.dll

2009-02-09 12:10 . 2008-12-14 17:55 401408 ----a-w c:\windows\system32\rpcss.dll

2009-02-09 12:10 . 2008-12-14 17:55 617472 ----a-w c:\windows\system32\advapi32.dll

2009-02-09 12:10 . 2008-12-14 17:55 714752 ----a-w c:\windows\system32\ntdll.dll

2009-02-09 11:13 . 2008-12-14 17:55 1846784 ----a-w c:\windows\system32\win32k.sys

2009-02-08 02:02 . 2008-12-14 17:55 2066048 ----a-w c:\windows\system32\ntkrnlpa.exe

2009-02-06 11:11 . 2008-12-14 17:55 110592 ----a-w c:\windows\system32\services.exe

2009-02-06 11:08 . 2008-12-14 17:55 2189056 ----a-w c:\windows\system32\ntoskrnl.exe

2009-02-06 10:39 . 2002-08-29 11:00 35328 ----a-w c:\windows\system32\sc.exe

2006-12-08 07:27 . 2005-04-06 06:01 1024 ----a-w c:\program files\QW.CFG

2006-12-08 07:27 . 2006-09-26 06:10 23 ----a-w c:\program files\Q3.DIR

2006-12-08 07:27 . 2005-04-06 05:43 15360 ----a-w c:\program files\FILIST.QFI

2006-12-08 07:27 . 2003-10-02 21:08 707 ----a-w c:\program files\qreqst_vs7.dat

2006-05-12 01:16 . 2006-05-12 01:15 347 ----a-w c:\program files\ITECH.CFG

2005-12-18 01:01 . 2005-12-18 01:01 3215 -c--a-w c:\program files\ConnectivitySimple.EZHex

2005-12-10 18:20 . 2005-12-10 18:20 3263 -c--a-w c:\program files\Connectivity.EZHex

2005-04-06 06:01 . 2005-04-06 06:01 30 ----a-w c:\program files\QWRS.DAT

2005-04-06 05:40 . 2005-04-06 05:40 824 ---h--w c:\program files\q.dat

2004-05-14 17:14 . 2004-05-14 17:14 871424 -c--a-w c:\program files\tss.msi

2004-05-14 17:06 . 2004-05-14 17:06 3941376 -c--a-w c:\program files\privacymanager_setup.msi

2004-05-11 03:02 . 2004-05-11 03:02 132791 -c--a-w c:\program files\maintenance_0404.pdf

2003-10-02 21:08 . 2003-10-02 21:08 5726 ----a-w c:\program files\khash.dat

2003-10-02 21:08 . 2003-10-02 21:08 24 -c--a-w c:\program files\qif_ub.dat

2003-10-02 21:08 . 2003-10-02 21:08 1363541 ----a-w c:\program files\phash.dat

2003-10-02 21:08 . 2003-10-02 21:08 152 -c--a-w c:\program files\fri.dat

2003-10-02 21:08 . 2003-10-02 21:08 126 -c--a-w c:\program files\bgtbrwsr.dat

2003-10-02 21:07 . 2003-10-02 21:07 7168 -c--a-w c:\program files\STDOLE32.TLB

2002-10-02 16:48 . 2002-10-02 16:48 4623 -c--a-w c:\program files\ttaxexpt.dat

1995-09-18 18:31 . 1995-09-18 18:31 29696 -c--a-w c:\program files\QHI.DAT

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]

"Motive SmartBridge"="c:\progra~1\Verizon\SMARTB~1\MotiveSB.exe" [2006-06-23 438359]

"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]

"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]

"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]

"DVDSentry"="c:\windows\System32\DSentry.exe" [2002-07-17 28672]

"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2003-01-31 364544]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-01-06 413696]

"MSConfig"="c:\windows\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2008-04-14 169984]

"MaxMenuMgr"="c:\program files\Seagate\SeagateManager\FreeAgent Status\StxMenuMgr.exe" [2009-01-16 181544]

"dellsupportcenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-10-24 206064]

"Logitech Utility"="Logi_MwX.Exe" - c:\windows\LOGI_MWX.EXE [2003-12-17 19968]

"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2004-09-15 37888]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-03-13 39264]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]

"SpecifyDefaultButtons"= 0 (0x0)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]

@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Acrobat Assistant.lnk]

backup=c:\windows\pss\Acrobat Assistant.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Gamma Loader.lnk]

backup=c:\windows\pss\Adobe Gamma Loader.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^America Online 9.0 Tray Icon.lnk]

backup=c:\windows\pss\America Online 9.0 Tray Icon.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^EPSON Status Monitor 3 Environment Check 2.lnk]

backup=c:\windows\pss\EPSON Status Monitor 3 Environment Check 2.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^EPSON Status Monitor 3 Environment Check.lnk]

backup=c:\windows\pss\EPSON Status Monitor 3 Environment Check.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HotSync Manager.lnk]

backup=c:\windows\pss\HotSync Manager.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]

path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk

backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech Desktop Messenger.lnk]

backup=c:\windows\pss\Logitech Desktop Messenger.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech Harmony Remote Software 7.lnk]

backup=c:\windows\pss\Logitech Harmony Remote Software 7.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech Harmony Remote.lnk]

backup=c:\windows\pss\Logitech Harmony Remote.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech SetPoint.lnk]

backup=c:\windows\pss\Logitech SetPoint.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Broadband Networking.lnk]

backup=c:\windows\pss\Microsoft Broadband Networking.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Monitor.lnk]

backup=c:\windows\pss\Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Quicken Scheduled Updates.lnk]

backup=c:\windows\pss\Quicken Scheduled Updates.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Jim Mullany^Start Menu^Programs^Startup^TrueAssistant.lnk]

backup=c:\windows\pss\TrueAssistant.lnkStartup

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AOL Spyware Protection

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PlaxoUpdate

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Weather

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]

"Lavasoft Ad-Aware Service"=2 (0x2)

"JavaQuickStarterService"=2 (0x2)

"iPod Service"=3 (0x3)

"gusvc"=3 (0x3)

"GTCZNADTOEXFV"=3 (0x3)

"EPSONStatusAgent2"=2 (0x2)

"brmfrmps"=2 (0x2)

"Bonjour Service"=2 (0x2)

"Apple Mobile Device"=2 (0x2)

"AOLService"=2 (0x2)

"AOL TopSpeedMonitor"=2 (0x2)

"AOL ACS"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-disabled]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" -osboot

"BCMSMMSG"=BCMSMMSG.exe

"bacstray"=BacsTray.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\America Online 9.0b\\waol.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\AirPort\\AirPort Express Assistant.exe"=

"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=

"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=

"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=

"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=

"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=

"c:\\Program Files\\Common Files\\AOL\\1102861747\\EE\\AOLServiceHost.exe"=

"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=

"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\AOLSP Scheduler.exe"=

"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\asp.exe"=

"c:\\WINDOWS\\SYSTEM32\\dpvsetup.exe"=

"c:\\Program Files\\Symantec\\pcAnywhere\\winaw32.exe"=

"c:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"=

"c:\\Program Files\\America Online 9.0a\\waol.exe"=

"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\3.0\\aoltpsd3.exe"=

"c:\\Program Files\\Logitech\\Logitech Harmony Remote Software 7\\HarmonyRemote.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\WINDOWS\\SYSTEM32\\ControlSuite.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNUtil.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNCfg.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNTray.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNUpdate.exe"=

"c:\\Program Files\\Common Files\\AOL\\1102861747\\EE\\aolsoftware.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

"c:\\Program Files\\AOL 9.1\\waol.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R0 Lbd;Lbd;c:\windows\SYSTEM32\DRIVERS\Lbd.sys [3/9/2009 11:07 PM 64160]

R2 FreeAgentGoNext Service;Seagate Service;c:\program files\Seagate\SeagateManager\Sync\FreeAgentService.exe [1/16/2009 4:31 PM 161064]

R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]

S3 LLUSBFLT;LLUSBFLT;c:\windows\SYSTEM32\DRIVERS\llusbflt.sys [8/3/2005 3:59 PM 4736]

S3 PLUsbbc2;High-Speed USB Bridge Cable Driver;c:\windows\SYSTEM32\DRIVERS\usbbc2.sys [8/3/2005 3:59 PM 8960]

S3 PortAcc;Spearit Port Access;\??\c:\program files\Laplink\PCmover\PortAcc.sys --> c:\program files\Laplink\PCmover\PortAcc.sys [?]

S4 GTCZNADTOEXFV;GTCZNADTOEXFV; [x]

S4 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [1/18/2009 2:34 PM 953168]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

HPService REG_MULTI_SZ HPSLPSVC

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{40633853-ca20-11dd-9a52-00038a000015}]

\Shell\AutoRun\command - D:\Launch.exe

.

Contents of the 'Scheduled Tasks' folder

2009-05-05 c:\windows\Tasks\Ad-Aware Update (Weekly).job

- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-01-18 06:07]

2009-05-05 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 20:34]

2009-05-07 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-04 02:20]

2009-05-07 c:\windows\Tasks\RegCure Program Check.job

- c:\program files\RegCure\RegCure.exe [2007-02-20 22:42]

2009-04-30 c:\windows\Tasks\RegCure.job

- c:\program files\RegCure\RegCure.exe [2007-02-20 22:42]

.

- - - - ORPHANS REMOVED - - - -

HKU-Default-Run-swg - c:\program files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe

HKU-Default-Run-AOL Fast Start - c:\program files\AOL 9.0c\AOL.EXE

Notify-jkhih - (no file)

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.msnbc.com/

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

mSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/ymsgr/*http://www.yahoo.com/ext/search/search.html

uInternet Settings,ProxyOverride = localhost;*.local

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

IE: &AOL Toolbar Search - c:\documents and settings\All Users\Application Data\AOL\ieToolbar\resources\en-US\local\search.html

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\OFFICE11\EXCEL.EXE/3000

Trusted Zone: msn.com\www.msnbc

Trusted Zone: turbotax.com

Trusted Zone: wellsfargo.com

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab

DPF: {5BDBA960-6534-11D3-97C7-00500422B550} - hxxp://mail.salempartners.com/download/dolcontrol.cab

FF - ProfilePath - c:\documents and settings\Jim Mullany\Application Data\Mozilla\Firefox\Profiles\i4j1pgk6.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.msnbc.com/

FF - component: c:\documents and settings\Jim Mullany\Application Data\Mozilla\Firefox\Profiles\i4j1pgk6.default\extensions\piclens@cooliris.com\components\coolirisstub.dll

FF - component: c:\documents and settings\Jim Mullany\Application Data\Mozilla\Firefox\Profiles\i4j1pgk6.default\extensions\support@lastpass.com\platform\WINNT_x86-msvc\components\lpxpcom.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin8.dll

FF - plugin: c:\program files\QuickTime\Plugins\npqtplugin8.dll

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-05-06 21:36

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3676)

c:\progra~1\Verizon\SMARTB~1\SBHook.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

c:\program files\Dell Support Center\bin\sprtsvc.exe

c:\windows\SYSTEM32\WLTRYSVC.EXE

c:\windows\SYSTEM32\BCMWLTRY.EXE

c:\program files\Windows Media Player\wmpnetwk.exe

c:\windows\SYSTEM32\wscntfy.exe

c:\windows\SYSTEM32\igfxsrvc.exe

.

**************************************************************************

.

Completion time: 2009-05-07 21:45 - machine was rebooted

ComboFix-quarantined-files.txt 2009-05-07 04:45

Pre-Run: 22,005,108,736 bytes free

Post-Run: 21,966,479,360 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

325 --- E O F --- 2009-04-28 04:55

3) New malware log:

Malwarebytes' Anti-Malware 1.36

Database version: 2085

Windows 5.1.2600 Service Pack 3

5/7/2009 12:27:59 AM

mbam-log-2009-05-07 (00-27-59).txt

Scan type: Quick Scan

Objects scanned: 84714

Time elapsed: 8 minute(s), 29 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 75

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\explore.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\iexplorer.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\services.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\comploader.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\socul.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sodahk.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\unsocul.exe (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\a.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\rundll.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winhost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\server.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winupd.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sksdrvr2.sys (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\svhost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\win32.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winsys.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winshow.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\winlogon.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\csrss.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\iexplore.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msupdate.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msmsgs.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\skybot.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\avpcc.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\ctrlpan.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\msconfd.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\olehelp.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\qttasks.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\rundll16.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\csrss.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\emesx.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\svchost32.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\0.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\windll.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\smss.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\svchost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\sistem.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\mssvr.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\voiceIP.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\2020search.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\2020search2.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\iexplorer.exe (Trojan.Downloader) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msa64chk.dll (Trojan.Perfiler) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\wintems.exe (Trojan.Spammer) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winnb57.dll (Adware.Mirar) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\filekiller.dll (Rogue.Multiple) -> Delete on reboot.

C:\winstall.exe (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\7search.dll (Adware.7FaSSt) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\klo5.sys (Stolen.Data) -> Delete on reboot.

C:\WINDOWS\xpupdate.exe (Trojan.Fakealert) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ipv6mons.dll (Spyware.Passwords) -> Delete on reboot.

C:\WINDOWS\ExeDialer.exe (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\egdial.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ia.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ieaccess2.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msegcompid.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\mseggrpid.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msklive.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\draw32.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c3.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\cm.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sdmapi.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\boot32.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\vdnt32.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\memlow.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c3.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c4.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\hm.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\wd.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winxp.exe (Backdoor.Poison) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\servises.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\msnmsgrs.exe (Trojan.Banker) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\taskgmr32.exe (Worm.Mytob) -> Delete on reboot.

Hi and Welcome to the Malwarebytes' forum. Sorry to hear you're having trouble!

Please download ATF Cleaner by Atribune

  • Close Internet Explorer and any other open browsers
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main choose: Select All
  • Click the Empty Selected button.

If you use Firefox browser

  • Click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
  • NOTE: If you would like to keep your saved passwords, please click
  • No at the prompt.

If you use Opera browser

  • Click Opera at the top and choose: Select All
  • Click the Empty Selected button.
  • NOTE: If you would like to keep your saved passwords, please click No at the prompt.

Click Exit on the Main menu to close the program.

Reboot

Next, download this Antirootkit Program to a folder that you create such as C:\ARK, by choosing the "Download EXE" button on the webpage.

Disable the active protection component of your antivirus by following the directions that apply here:

http://www.bleepingcomputer.com/forums/topic114351.html

Next, please perform a rootkit scan:

  • Double-click the randonly name EXE located in the C:\ARK folder that you just downloaded to run the program.
  • When the program opens, it will automatically initiate a very fast scan of common rootkit hiding places.
  • When the scan is finished (a few seconds, click the Rootkit/Malware tab,and then select the Scan button.
  • Leave your system completely idle while this longer scan is in progress.
  • When the scan is done, save the scan log to the Windows clipboard
  • Open Notepad or a similar text editor
  • Paste the clipboard contents into a text file by clicking Edit | Paste or Ctl V
  • Exit the Program
  • Save the Scan log as ARK.txt and post it in your next reply. If the log is very long attach it please.

Please download Combofix from one of these locations:

HERE or HERE

I want you to rename Combofix.exe as you download it to a name of your choice such as earthday.exe

Notes:

  • It is very important that save the newly renamed EXE file to your desktop.
  • You must rename Combofixe.exe as you download it and not after it is on your computer.
    You may have to modify your browser settings if you use Firefox, so you can rename Combofix.exe as you download it. To do that:
    • Open Firefox
    • Click Tools -> Options -> Main
    • Under the downloads section check the button that says "Always ask me where to save files".
    • Click OK

    [*]For Internet Explorer:

    • Choose to save, not open the file
    • When prompted - save the file to your desktop, and rename it anything with an .exe extension on the end.

Here is a tutorial that describes how to download, install and run Combofix more thoroughly. Please review it and follow the prompts to install Recovery Console if you have not done that already:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Very Important! Temporarily disable your antivirus and antimalware real-time protection and any script blocking components of them or your firewall before performing a scan. They can interfere with ComboFix and even remove onboard components so it is rendered ineffective:

http://www.bleepingcomputer.com/forums/topic114351.html

Note: The above tutorial does not tell you to rename Combofix as I have instructed you to do in the above instructions, so make sure you complete the renaming step before launching Combofix.

Running Combofix

In the event you already have Combofix, please delete it as this is a new version.

  • Close any open browsers.
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix.

1. Double click on the renamed combofix.exe & follow the prompts.

2. When finished, it will produce a logfile located at C:\ComboFix.txt

3. Post the contents of that log in your next reply with a new hijackthis log.

Note: Do not mouseclick combofix's window while it is running. That may cause your system to stall/hang.

Rename "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" -> "C:\Program Files\Malwarebytes' Anti-Malware\newyork.exe"

  • Now, relaunch MBAM by double-clicking newyork.exe in the MBAM folder.
  • Select the Update tab -> Check for Updates
  • After MBAM updates, select the Scanner tab.
  • Select Perform quick scan, then click Scan.
  • When the scan is complete, click OK -> Show Results to view the scan results.
  • Check all items found, and then choose the 'Remove Selected' option to move the selected items to the quarantine.
  • When the scan is done, a log will open in Notepad with the scan results. Please post the results in your next reply.

NOTE: If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.

Please post back in your next reply. (in this order):

1. Your antirootkit log (ARK.txt)

2. C:\ComboFix.txt

3. A new MBAM log

Link to post
Share on other sites

Here's the information requested. Conclusion: the malware persists and hasn't been removed.

logs:

1) anti-rootkit log:

GMER 1.0.15.14972 - http://www.gmer.net

Rootkit scan 2009-05-07 08:45:29

Windows 5.1.2600 Service Pack 3

---- System - GMER 1.0.15 ----

SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwCreateKey [0xF8BB287E]

SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwSetValueKey [0xF8BB2C10]

---- Kernel code sections - GMER 1.0.15 ----

? qhog.sys The system cannot find the file specified. !

? ehsgg.sys The system cannot find the file specified. !

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device \FileSystem\Fs_Rec \FileSystem\UdfsCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\FatCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\CdfsRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\FatDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

Device \FileSystem\Fs_Rec \FileSystem\UdfsDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

---- EOF - GMER 1.0.15 ----

2) Combofix log

ComboFix 09-05-06.02 - Jim Mullany 05/06/2009 21:23.1 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.630.367 [GMT -7:00]

Running from: c:\documents and settings\Jim Mullany\Desktop\cfixfile.exe

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\program files\data19

c:\windows\MailSwitch.ocx

c:\windows\Readme.txt

c:\windows\system32\drivers\fad.sys

c:\windows\SYSTEM32\hihkj.bak1

c:\windows\SYSTEM32\hihkj.bak2

c:\windows\system32\hihkj.ini

E:\Autorun.inf

F:\Autorun.inf

I:\Autorun.inf

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_FAD

-------\Legacy_R_SERVER

((((((((((((((((((((((((( Files Created from 2009-04-07 to 2009-05-07 )))))))))))))))))))))))))))))))

.

2009-05-06 07:45 . 2009-05-06 07:46 -------- d-----w c:\program files\ark

2009-05-02 06:28 . 2009-05-02 06:28 -------- d-----w c:\program files\Trend Micro

2009-04-27 23:50 . 2009-04-27 23:50 -------- d-----w c:\documents and settings\Jim Mullany\Application Data\Webroot

2009-04-26 04:22 . 2009-04-26 04:22 -------- d-----w c:\program files\MSECache

2009-04-21 04:27 . 2009-04-21 04:27 -------- d-----w c:\documents and settings\NetworkService\Local Settings\Application Data\SupportSoft

2009-04-19 21:19 . 2009-04-19 21:19 -------- d-----w c:\documents and settings\All Users\Application Data\Seagate

2009-04-19 21:19 . 2009-04-19 21:19 -------- d-----w c:\program files\Seagate

2009-04-17 07:55 . 2009-04-24 20:31 -------- d-----w c:\documents and settings\Jim Mullany\.beaTunes

2009-04-17 07:52 . 2009-04-17 07:52 -------- d-----w c:\program files\tagtraum industries

2009-04-16 05:26 . 2009-03-06 14:22 284160 ------w c:\windows\system32\dllcache\pdh.dll

2009-04-16 05:26 . 2009-02-09 12:10 401408 ------w c:\windows\system32\dllcache\rpcss.dll

2009-04-16 05:26 . 2009-02-06 11:11 110592 ------w c:\windows\system32\dllcache\services.exe

2009-04-16 05:26 . 2009-02-09 12:10 473600 ------w c:\windows\system32\dllcache\fastprox.dll

2009-04-16 05:26 . 2009-02-06 10:10 227840 ------w c:\windows\system32\dllcache\wmiprvse.exe

2009-04-16 05:26 . 2009-02-09 12:10 453120 ------w c:\windows\system32\dllcache\wmiprvsd.dll

2009-04-16 05:26 . 2009-02-09 12:10 729088 ------w c:\windows\system32\dllcache\lsasrv.dll

2009-04-16 05:26 . 2009-02-09 12:10 617472 ------w c:\windows\system32\dllcache\advapi32.dll

2009-04-16 05:26 . 2009-02-09 12:10 714752 ------w c:\windows\system32\dllcache\ntdll.dll

2009-04-16 05:25 . 2008-05-03 11:55 2560 ------w c:\windows\system32\xpsp4res.dll

2009-04-16 05:25 . 2008-04-21 12:08 215552 ------w c:\windows\system32\dllcache\wordpad.exe

2009-04-13 01:50 . 2009-04-13 01:50 61440 ----a-w c:\windows\system32\drivers\mqumd.sys

2009-04-07 18:07 . 2009-04-07 18:08 -------- d-----w c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-05-02 04:45 . 2009-03-15 15:30 -------- d-----w c:\program files\Malwarebytes' Anti-Malware

2009-04-27 23:47 . 2009-01-07 08:22 -------- d-----w c:\program files\Malware Immunizer

2009-04-27 00:11 . 2004-01-12 21:25 59304 -c--a-w c:\documents and settings\Jim Mullany\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2009-04-19 21:20 . 2006-12-05 01:00 -------- d--h--w c:\program files\InstallShield Installation Information

2009-04-17 13:54 . 2004-04-14 15:19 -------- d-----w c:\program files\Spybot - Search & Destroy

2009-04-14 03:58 . 2008-12-14 06:47 -------- d-----w c:\program files\SDHelper (Spybot - Search & Destroy)

2009-04-13 01:50 . 2009-04-13 01:50 8688 ----a-w c:\program files\wufg.txt

2009-04-07 21:59 . 2006-08-09 17:37 -------- d-----w c:\program files\Windows Media Connect 2

2009-04-07 18:08 . 2004-01-16 05:41 -------- d-----w c:\program files\iTunes

2009-04-07 18:07 . 2004-01-16 05:39 -------- d-----w c:\program files\iPod

2009-04-07 18:07 . 2007-07-05 17:46 -------- d-----w c:\program files\Common Files\Apple

2009-04-06 22:32 . 2009-03-15 15:30 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys

2009-04-06 22:32 . 2009-03-15 15:30 15504 ----a-w c:\windows\system32\drivers\mbam.sys

2009-04-06 06:00 . 2008-12-15 06:27 -------- d-----w c:\program files\AOL 9.1

2009-04-03 14:35 . 2008-12-14 06:45 -------- d-----w c:\program files\Dell Support Center

2009-04-03 14:20 . 2006-12-05 01:03 -------- d-----w c:\program files\CleanCenter

2009-03-24 16:58 . 2009-03-24 16:58 246 ---h--r c:\program files\fwn toolbar

2009-03-24 16:02 . 2004-01-06 14:07 -------- d-----w c:\program files\Common Files\AOL

2009-03-19 23:32 . 2006-09-19 23:44 23400 ----a-w c:\windows\system32\drivers\GEARAspiWDM.sys

2009-03-14 03:44 . 2008-12-14 06:04 410984 ----a-w c:\windows\system32\deploytk.dll

2009-03-10 06:07 . 2009-03-10 06:07 64160 ----a-w c:\windows\system32\drivers\Lbd.sys

2009-03-10 04:33 . 2009-03-15 05:42 15688 ----a-w c:\windows\system32\lsdelete.exe

2009-03-10 04:31 . 2009-03-10 04:29 -------- d-----w c:\program files\Safari

2009-03-10 04:13 . 2009-03-10 04:13 -------- d-----w c:\program files\Bonjour

2009-03-06 14:22 . 2008-12-14 17:55 284160 ----a-w c:\windows\system32\pdh.dll

2009-03-06 06:59 . 2009-03-24 06:16 1900544 ----a-w c:\windows\system32\usbaaplrc.dll

2009-03-06 06:59 . 2007-12-26 04:44 36864 ----a-w c:\windows\system32\drivers\usbaapl.sys

2009-03-03 00:18 . 2004-02-07 02:05 826368 ----a-w c:\windows\system32\wininet.dll

2009-03-02 07:38 . 2008-12-14 22:14 165044 ----a-w c:\windows\hpoins21.dat

2009-02-20 18:09 . 2008-12-14 17:57 78336 ----a-w c:\windows\system32\ieencode.dll

2009-02-09 12:10 . 2008-12-14 17:55 729088 ----a-w c:\windows\system32\lsasrv.dll

2009-02-09 12:10 . 2008-12-14 17:55 401408 ----a-w c:\windows\system32\rpcss.dll

2009-02-09 12:10 . 2008-12-14 17:55 617472 ----a-w c:\windows\system32\advapi32.dll

2009-02-09 12:10 . 2008-12-14 17:55 714752 ----a-w c:\windows\system32\ntdll.dll

2009-02-09 11:13 . 2008-12-14 17:55 1846784 ----a-w c:\windows\system32\win32k.sys

2009-02-08 02:02 . 2008-12-14 17:55 2066048 ----a-w c:\windows\system32\ntkrnlpa.exe

2009-02-06 11:11 . 2008-12-14 17:55 110592 ----a-w c:\windows\system32\services.exe

2009-02-06 11:08 . 2008-12-14 17:55 2189056 ----a-w c:\windows\system32\ntoskrnl.exe

2009-02-06 10:39 . 2002-08-29 11:00 35328 ----a-w c:\windows\system32\sc.exe

2006-12-08 07:27 . 2005-04-06 06:01 1024 ----a-w c:\program files\QW.CFG

2006-12-08 07:27 . 2006-09-26 06:10 23 ----a-w c:\program files\Q3.DIR

2006-12-08 07:27 . 2005-04-06 05:43 15360 ----a-w c:\program files\FILIST.QFI

2006-12-08 07:27 . 2003-10-02 21:08 707 ----a-w c:\program files\qreqst_vs7.dat

2006-05-12 01:16 . 2006-05-12 01:15 347 ----a-w c:\program files\ITECH.CFG

2005-12-18 01:01 . 2005-12-18 01:01 3215 -c--a-w c:\program files\ConnectivitySimple.EZHex

2005-12-10 18:20 . 2005-12-10 18:20 3263 -c--a-w c:\program files\Connectivity.EZHex

2005-04-06 06:01 . 2005-04-06 06:01 30 ----a-w c:\program files\QWRS.DAT

2005-04-06 05:40 . 2005-04-06 05:40 824 ---h--w c:\program files\q.dat

2004-05-14 17:14 . 2004-05-14 17:14 871424 -c--a-w c:\program files\tss.msi

2004-05-14 17:06 . 2004-05-14 17:06 3941376 -c--a-w c:\program files\privacymanager_setup.msi

2004-05-11 03:02 . 2004-05-11 03:02 132791 -c--a-w c:\program files\maintenance_0404.pdf

2003-10-02 21:08 . 2003-10-02 21:08 5726 ----a-w c:\program files\khash.dat

2003-10-02 21:08 . 2003-10-02 21:08 24 -c--a-w c:\program files\qif_ub.dat

2003-10-02 21:08 . 2003-10-02 21:08 1363541 ----a-w c:\program files\phash.dat

2003-10-02 21:08 . 2003-10-02 21:08 152 -c--a-w c:\program files\fri.dat

2003-10-02 21:08 . 2003-10-02 21:08 126 -c--a-w c:\program files\bgtbrwsr.dat

2003-10-02 21:07 . 2003-10-02 21:07 7168 -c--a-w c:\program files\STDOLE32.TLB

2002-10-02 16:48 . 2002-10-02 16:48 4623 -c--a-w c:\program files\ttaxexpt.dat

1995-09-18 18:31 . 1995-09-18 18:31 29696 -c--a-w c:\program files\QHI.DAT

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]

"Motive SmartBridge"="c:\progra~1\Verizon\SMARTB~1\MotiveSB.exe" [2006-06-23 438359]

"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]

"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]

"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]

"DVDSentry"="c:\windows\System32\DSentry.exe" [2002-07-17 28672]

"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2003-01-31 364544]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-01-06 413696]

"MSConfig"="c:\windows\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2008-04-14 169984]

"MaxMenuMgr"="c:\program files\Seagate\SeagateManager\FreeAgent Status\StxMenuMgr.exe" [2009-01-16 181544]

"dellsupportcenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-10-24 206064]

"Logitech Utility"="Logi_MwX.Exe" - c:\windows\LOGI_MWX.EXE [2003-12-17 19968]

"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2004-09-15 37888]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-03-13 39264]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]

"SpecifyDefaultButtons"= 0 (0x0)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]

@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Acrobat Assistant.lnk]

backup=c:\windows\pss\Acrobat Assistant.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Gamma Loader.lnk]

backup=c:\windows\pss\Adobe Gamma Loader.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^America Online 9.0 Tray Icon.lnk]

backup=c:\windows\pss\America Online 9.0 Tray Icon.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^EPSON Status Monitor 3 Environment Check 2.lnk]

backup=c:\windows\pss\EPSON Status Monitor 3 Environment Check 2.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^EPSON Status Monitor 3 Environment Check.lnk]

backup=c:\windows\pss\EPSON Status Monitor 3 Environment Check.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HotSync Manager.lnk]

backup=c:\windows\pss\HotSync Manager.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]

path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk

backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech Desktop Messenger.lnk]

backup=c:\windows\pss\Logitech Desktop Messenger.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech Harmony Remote Software 7.lnk]

backup=c:\windows\pss\Logitech Harmony Remote Software 7.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech Harmony Remote.lnk]

backup=c:\windows\pss\Logitech Harmony Remote.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech SetPoint.lnk]

backup=c:\windows\pss\Logitech SetPoint.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Broadband Networking.lnk]

backup=c:\windows\pss\Microsoft Broadband Networking.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Monitor.lnk]

backup=c:\windows\pss\Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Quicken Scheduled Updates.lnk]

backup=c:\windows\pss\Quicken Scheduled Updates.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Jim Mullany^Start Menu^Programs^Startup^TrueAssistant.lnk]

backup=c:\windows\pss\TrueAssistant.lnkStartup

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AOL Spyware Protection

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PlaxoUpdate

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Weather

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]

"Lavasoft Ad-Aware Service"=2 (0x2)

"JavaQuickStarterService"=2 (0x2)

"iPod Service"=3 (0x3)

"gusvc"=3 (0x3)

"GTCZNADTOEXFV"=3 (0x3)

"EPSONStatusAgent2"=2 (0x2)

"brmfrmps"=2 (0x2)

"Bonjour Service"=2 (0x2)

"Apple Mobile Device"=2 (0x2)

"AOLService"=2 (0x2)

"AOL TopSpeedMonitor"=2 (0x2)

"AOL ACS"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-disabled]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" -osboot

"BCMSMMSG"=BCMSMMSG.exe

"bacstray"=BacsTray.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\America Online 9.0b\\waol.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\AirPort\\AirPort Express Assistant.exe"=

"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=

"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=

"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=

"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=

"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=

"c:\\Program Files\\Common Files\\AOL\\1102861747\\EE\\AOLServiceHost.exe"=

"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=

"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\AOLSP Scheduler.exe"=

"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\asp.exe"=

"c:\\WINDOWS\\SYSTEM32\\dpvsetup.exe"=

"c:\\Program Files\\Symantec\\pcAnywhere\\winaw32.exe"=

"c:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"=

"c:\\Program Files\\America Online 9.0a\\waol.exe"=

"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\3.0\\aoltpsd3.exe"=

"c:\\Program Files\\Logitech\\Logitech Harmony Remote Software 7\\HarmonyRemote.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\WINDOWS\\SYSTEM32\\ControlSuite.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNUtil.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNCfg.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNTray.exe"=

"c:\\Program Files\\Microsoft Broadband Networking\\MSBNUpdate.exe"=

"c:\\Program Files\\Common Files\\AOL\\1102861747\\EE\\aolsoftware.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

"c:\\Program Files\\AOL 9.1\\waol.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R0 Lbd;Lbd;c:\windows\SYSTEM32\DRIVERS\Lbd.sys [3/9/2009 11:07 PM 64160]

R2 FreeAgentGoNext Service;Seagate Service;c:\program files\Seagate\SeagateManager\Sync\FreeAgentService.exe [1/16/2009 4:31 PM 161064]

R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]

S3 LLUSBFLT;LLUSBFLT;c:\windows\SYSTEM32\DRIVERS\llusbflt.sys [8/3/2005 3:59 PM 4736]

S3 PLUsbbc2;High-Speed USB Bridge Cable Driver;c:\windows\SYSTEM32\DRIVERS\usbbc2.sys [8/3/2005 3:59 PM 8960]

S3 PortAcc;Spearit Port Access;\??\c:\program files\Laplink\PCmover\PortAcc.sys --> c:\program files\Laplink\PCmover\PortAcc.sys [?]

S4 GTCZNADTOEXFV;GTCZNADTOEXFV; [x]

S4 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [1/18/2009 2:34 PM 953168]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

HPService REG_MULTI_SZ HPSLPSVC

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{40633853-ca20-11dd-9a52-00038a000015}]

\Shell\AutoRun\command - D:\Launch.exe

.

Contents of the 'Scheduled Tasks' folder

2009-05-05 c:\windows\Tasks\Ad-Aware Update (Weekly).job

- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-01-18 06:07]

2009-05-05 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 20:34]

2009-05-07 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-04 02:20]

2009-05-07 c:\windows\Tasks\RegCure Program Check.job

- c:\program files\RegCure\RegCure.exe [2007-02-20 22:42]

2009-04-30 c:\windows\Tasks\RegCure.job

- c:\program files\RegCure\RegCure.exe [2007-02-20 22:42]

.

- - - - ORPHANS REMOVED - - - -

HKU-Default-Run-swg - c:\program files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe

HKU-Default-Run-AOL Fast Start - c:\program files\AOL 9.0c\AOL.EXE

Notify-jkhih - (no file)

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.msnbc.com/

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

mSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/ymsgr/*http://www.yahoo.com/ext/search/search.html

uInternet Settings,ProxyOverride = localhost;*.local

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

IE: &AOL Toolbar Search - c:\documents and settings\All Users\Application Data\AOL\ieToolbar\resources\en-US\local\search.html

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\OFFICE11\EXCEL.EXE/3000

Trusted Zone: msn.com\www.msnbc

Trusted Zone: turbotax.com

Trusted Zone: wellsfargo.com

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab

DPF: {5BDBA960-6534-11D3-97C7-00500422B550} - hxxp://mail.salempartners.com/download/dolcontrol.cab

FF - ProfilePath - c:\documents and settings\Jim Mullany\Application Data\Mozilla\Firefox\Profiles\i4j1pgk6.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.msnbc.com/

FF - component: c:\documents and settings\Jim Mullany\Application Data\Mozilla\Firefox\Profiles\i4j1pgk6.default\extensions\piclens@cooliris.com\components\coolirisstub.dll

FF - component: c:\documents and settings\Jim Mullany\Application Data\Mozilla\Firefox\Profiles\i4j1pgk6.default\extensions\support@lastpass.com\platform\WINNT_x86-msvc\components\lpxpcom.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin8.dll

FF - plugin: c:\program files\QuickTime\Plugins\npqtplugin8.dll

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-05-06 21:36

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3676)

c:\progra~1\Verizon\SMARTB~1\SBHook.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

c:\program files\Dell Support Center\bin\sprtsvc.exe

c:\windows\SYSTEM32\WLTRYSVC.EXE

c:\windows\SYSTEM32\BCMWLTRY.EXE

c:\program files\Windows Media Player\wmpnetwk.exe

c:\windows\SYSTEM32\wscntfy.exe

c:\windows\SYSTEM32\igfxsrvc.exe

.

**************************************************************************

.

Completion time: 2009-05-07 21:45 - machine was rebooted

ComboFix-quarantined-files.txt 2009-05-07 04:45

Pre-Run: 22,005,108,736 bytes free

Post-Run: 21,966,479,360 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

325 --- E O F --- 2009-04-28 04:55

3) New malware log:

Malwarebytes' Anti-Malware 1.36

Database version: 2085

Windows 5.1.2600 Service Pack 3

5/7/2009 12:27:59 AM

mbam-log-2009-05-07 (00-27-59).txt

Scan type: Quick Scan

Objects scanned: 84714

Time elapsed: 8 minute(s), 29 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 75

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\explore.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\iexplorer.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\services.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\comploader.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\socul.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sodahk.dll (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\unsocul.exe (Adware.BHO) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\a.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\rundll.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winhost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\server.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winupd.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sksdrvr2.sys (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\svhost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\win32.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winsys.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winshow.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\winlogon.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\csrss.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\iexplore.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msupdate.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msmsgs.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\skybot.exe (Backdoor.Bot) -> Delete on reboot.

C:\WINDOWS\avpcc.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\ctrlpan.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\msconfd.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\olehelp.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\qttasks.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\rundll16.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\csrss.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\emesx.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\svchost32.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\0.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\windll.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\smss.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\svchost.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\sistem.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\mssvr.exe (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\voiceIP.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\2020search.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\2020search2.dll (Fake.Dropped.Malware) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\iexplorer.exe (Trojan.Downloader) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msa64chk.dll (Trojan.Perfiler) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\wintems.exe (Trojan.Spammer) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winnb57.dll (Adware.Mirar) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\filekiller.dll (Rogue.Multiple) -> Delete on reboot.

C:\winstall.exe (Trojan.FakeAlert) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\7search.dll (Adware.7FaSSt) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\klo5.sys (Stolen.Data) -> Delete on reboot.

C:\WINDOWS\xpupdate.exe (Trojan.Fakealert) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ipv6mons.dll (Spyware.Passwords) -> Delete on reboot.

C:\WINDOWS\ExeDialer.exe (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\egdial.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ia.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\ieaccess2.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msegcompid.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\mseggrpid.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\msklive.dll (Adware.EGDAccess) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\draw32.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c3.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\cm.dll (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\sdmapi.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\boot32.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\vdnt32.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\memlow.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c3.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\c4.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\hm.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\wd.sys (Rootkit.Haxdor) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\winxp.exe (Backdoor.Poison) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\servises.exe (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\msnmsgrs.exe (Trojan.Banker) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\taskgmr32.exe (Worm.Mytob) -> Delete on reboot.

Link to post
Share on other sites

Hello and sorry about the delay,

There is no evidence the processes or drivers represented by those MBAM flagged files are running/loaded on your system.

They may represent "plants" that were put there by a rogue antispyware program to produce false detections. I am going to have Combofix delete a few of the files (which may really be folders to deceive and thwart removal) and see what happens.

Go to the Control Panel Add/Remove Programs and uninstall (if Present):

Fwn Toolbar

Bonjour

Logitech Desktop Messenger

Exit the Control Panel

Open Notepad. Copy all the text inside the Code box and paste it into Notepad. Make sure wordwrap is unchecked in Notepad's Format menu. Save the Notepad file to your desktop and name it CFScript.txt

KillAll::
Driver::GTCZNADTOEXFVmqumdc3c4
File::c:\windows\system32\drivers\GTCZNADTOEXFV.sysc:\windows\system32\drivers\mqumd.sysc:\program files\wufg.txtC:\WINDOWS\explore.exeC:\WINDOWS\iexplorer.exeC:\WINDOWS\services.exeC:\WINDOWS\SYSTEM32\c3.sysC:\WINDOWS\SYSTEM32\c4.sys
Folder::c:\program files\fwn toolbarC:\WINDOWS\explore.exeC:\WINDOWS\iexplorer.exeC:\WINDOWS\services.exe
Extra::

Disable the active protection components (guards/monitors) of any antimalware, antivirus or antispyware programs on your system before following the next step.

Then drag the CFScript.txt into ComboFix.exe on your desktop

This will start ComboFix again. After reboot, post the contents of Combofix.txt in your next reply together with a new HijackThis log.

Re-enable all active protection components of any antimalware, antivirus or antispyware programs you had previously disabled.

Now, rescan with an updated MBAM, and post the MBAM log back in your next reply along with the other items requested.

Link to post
Share on other sites

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.