Jump to content

IE redirects


Recommended Posts

Hi I ran scans and found and removed virus but google still get redirected. Microsoft Security Essentials found

win32/alureon.f on atapi.sys but it still keeps coming back

Hijackthis log

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 11:25:09 AM, on 5/11/2010

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v8.00 (8.00.6001.18702)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

c:\Program Files\Microsoft Security Essentials\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\acs.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\system32\svchost.exe

c:\TOSHIBA\IVP\swupdate\swupdtmr.exe

C:\Program Files\Viewpoint\Common\ViewpointService.exe

C:\WINDOWS\System32\DLA\DLACTRLW.EXE

C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

C:\Program Files\Apoint2K\Apoint.exe

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\ltmoh\Ltmoh.exe

C:\WINDOWS\AGRSMMSG.exe

C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe

C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe

C:\WINDOWS\system32\TPSMain.exe

C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe

C:\WINDOWS\system32\ZoomingHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

C:\Program Files\Toshiba\Tvs\TvsTray.exe

C:\Program Files\TOSHIBA\TouchPad\TPTray.exe

C:\WINDOWS\system32\TCtrlIOHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe

C:\Program Files\QuickTime\qttask.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\Program Files\Microsoft Security Essentials\msseces.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\Apoint2K\Apntex.exe

C:\WINDOWS\system32\TPSBattM.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\system32\wuauclt.exe

C:\Documents and Settings\Morgan\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.alot.com/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://search.alot.com/web?q=&pr=auto&...rsion=2.5.6.471

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.toshibadirect.com/dpdstart

R3 - URLSearchHook: (no name) - - (no file)

R3 - URLSearchHook: AOLSearchHook Class - {54EB34EA-E6BE-4CFD-9F4F-C4A0C2EAFA22} - C:\Program Files\AIM Search\AOLSearch.dll

F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe

O1 - Hosts: 212.95.49.214 www.google.com

O1 - Hosts: 212.95.49.214 www.google.de

O1 - Hosts: 212.95.49.214 www.google.fr

O1 - Hosts: 212.95.49.214 www.google.co.uk

O1 - Hosts: 212.95.49.214 www.google.com.br

O1 - Hosts: 212.95.49.214 www.google.it

O1 - Hosts: 212.95.49.214 www.google.es

O1 - Hosts: 212.95.49.214 www.google.co.jp

O1 - Hosts: 212.95.49.214 www.google.com.mx

O1 - Hosts: 212.95.49.214 www.google.ca

O1 - Hosts: 212.95.49.214 www.google.com.au

O1 - Hosts: 212.95.49.214 www.google.nl

O1 - Hosts: 212.95.49.214 www.google.co.za

O1 - Hosts: 212.95.49.214 www.google.be

O1 - Hosts: 212.95.49.214 www.google.gr

O1 - Hosts: 212.95.49.214 www.google.at

O1 - Hosts: 212.95.49.214 www.google.se

O1 - Hosts: 212.95.49.214 www.google.ch

O1 - Hosts: 212.95.49.214 www.google.pt

O1 - Hosts: 212.95.49.214 www.google.dk

O1 - Hosts: 212.95.49.214 www.google.fi

O1 - Hosts: 212.95.49.214 www.google.ie

O1 - Hosts: 212.95.49.214 www.google.no

O1 - Hosts: 212.95.49.214 search.yahoo.com

O1 - Hosts: 212.95.49.214 us.search.yahoo.com

O1 - Hosts: 212.95.49.214 uk.search.yahoo.com

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll

O2 - BHO: ALOT Toolbar Helper - {14CEEAFF-96DD-4101-AE37-D5ECDC23C3F6} - C:\Program Files\alot\bin\BHO\alotBHO.dll

O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)

O2 - BHO: AOL Search Enhancement - {54EB34EA-E6BE-4CFD-9F4F-C4A0C2EAFA22} - C:\Program Files\AIM Search\AOLSearch.dll

O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL

O2 - BHO: AIM Toolbar Loader - {b0cda128-b425-4eef-a174-61a11ac5dbf8} - C:\Program Files\AIM Toolbar\aimtb.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O3 - Toolbar: AIM Toolbar - {61539ecd-cc67-4437-a03c-9aaccbd14326} - C:\Program Files\AIM Toolbar\aimtb.dll

O3 - Toolbar: ALOT Toolbar - {5AA2BA46-9913-4dc7-9620-69AB0FA17AE7} - C:\Program Files\alot\bin\alot.dll

O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

O4 - HKLM\..\Run: [DLA] C:\WINDOWS\System32\DLA\DLACTRLW.EXE

O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"

O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe

O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE

O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE

O4 - HKLM\..\Run: [LtMoh] C:\Program Files\ltmoh\Ltmoh.exe

O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe

O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe

O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\TOSHIBA Applet\HWSetup.exe hwSetUP

O4 - HKLM\..\Run: [sVPWUTIL] C:\Program Files\Toshiba\Windows Utilities\SVPWUTIL.exe SVPwUTIL

O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe

O4 - HKLM\..\Run: [TPSMain] TPSMain.exe

O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe

O4 - HKLM\..\Run: [ZoomingHook] ZoomingHook.exe

O4 - HKLM\..\Run: [smoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

O4 - HKLM\..\Run: [Tvs] C:\Program Files\Toshiba\Tvs\TvsTray.exe

O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe

O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run

O4 - HKLM\..\Run: [TCtryIOHook] TCtrlIOHook.exe

O4 - HKLM\..\Run: [TFncKy] TFncKy.exe

O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Common Files\AOL\ACS\AOLDial.exe

O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe

O4 - HKLM\..\Run: [CFSServ.exe] CFSServ.exe -NoClient

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"

O4 - HKLM\..\Run: [MSKDetectorExe] C:\Program Files\McAfee\SpamKiller\MSKDetct.exe /uninstall

O4 - HKLM\..\Run: [MSSE] "c:\Program Files\Microsoft Security Essentials\msseces.exe" -hide -runkey

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "c:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "c:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')

O4 - Startup: Microsoft Office OneNote 2003 Quick Launch.lnk = C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE

O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O8 - Extra context menu item: &AIM Toolbar Search - C:\Documents and Settings\All Users\Application Data\AIM Toolbar\ieToolbar\resources\en-US\local\search.html

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: AIM Toolbar - {0b83c99c-1efa-4259-858f-bcb33e007a5b} - C:\Program Files\AIM Toolbar\aimtb.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe (file missing)

O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe (file missing)

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O14 - IERESET.INF: START_PAGE_URL=http://www.toshibadirect.com/dpdstart

O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader1006.cab

O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe

O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe

O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

O24 - Desktop Component 0: (no name) - http://pb.xanga.com/bb/b4/bbb4fb7510a97a32...95c26559297.jpg

--

End of file - 11006

first run of mbam

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4076

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

5/7/2010 12:23:15 PM

mbam-log-2010-05-07 (12-23-15).txt

Scan type: Full scan (C:\|)

Objects scanned: 207650

Time elapsed: 42 minute(s), 2 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 1

Registry Keys Infected: 1

Registry Values Infected: 3

Registry Data Items Infected: 5

Folders Infected: 1

Files Infected: 7

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

C:\WINDOWS\system32\winhelper86.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:

HKEY_CURRENT_USER\SOFTWARE\IS2010 (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.

Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdate86.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\internet security 2010 (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.

Registry Data Items Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:

C:\Program Files\InternetSecurity2010 (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.

Files Infected:

C:\WINDOWS\system32\winhelper86.dll (Trojan.FakeAlert) -> Delete on reboot.

C:\Documents and Settings\Morgan\My Documents\Downloads\ZwinkySetup2.3.50.45.ZJfox000.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.

C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\KUVWATL9\dfghfghgfj[1].dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Documents and Settings\Morgan\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Security 2010.lnk (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.

C:\Documents and Settings\Morgan\Start Menu\Internet Security 2010.lnk (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\critical_warning.html (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

DDS

DDS (Ver_10-03-17.01) - NTFSx86

Run by Morgan at 11:41:05.85 on Tue 05/11/2010

Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_20

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.446.125 [GMT -4:00]

AV: Microsoft Security Essentials *On-access scanning enabled* (Updated) {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

c:\Program Files\Microsoft Security Essentials\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\acs.exe

svchost.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

c:\TOSHIBA\IVP\swupdate\swupdtmr.exe

C:\Program Files\Viewpoint\Common\ViewpointService.exe

C:\WINDOWS\System32\DLA\DLACTRLW.EXE

C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

C:\Program Files\Apoint2K\Apoint.exe

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\ltmoh\Ltmoh.exe

C:\WINDOWS\AGRSMMSG.exe

C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe

C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe

C:\WINDOWS\system32\TPSMain.exe

C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe

C:\WINDOWS\system32\ZoomingHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

C:\Program Files\Toshiba\Tvs\TvsTray.exe

C:\Program Files\TOSHIBA\TouchPad\TPTray.exe

C:\WINDOWS\system32\TCtrlIOHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe

C:\Program Files\QuickTime\qttask.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\Program Files\Microsoft Security Essentials\msseces.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\Apoint2K\Apntex.exe

C:\WINDOWS\system32\TPSBattM.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\system32\wuauclt.exe

C:\Documents and Settings\Morgan\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://home.alot.com/

uSearch Bar = hxxp://www.google.com/ie

uSearch Page = hxxp://www.google.com

uInternet Connection Wizard,ShellNext = hxxp://www.toshibadirect.com/dpdstart

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://search.alot.com/web?q=&pr=auto&client_id=CA50392001CA6A55087D2F34&src_id=11220&camp_id=990&tb_version=2.5.6.471

mSearchAssistant = hxxp://www.google.com/ie

uURLSearchHooks: H - No File

uURLSearchHooks: AOLSearchHook Class: {54eb34ea-e6be-4cfd-9f4f-c4a0c2eafa22} - c:\program files\aim search\AOLSearch.dll

mURLSearchHooks: AIM Toolbar Search Class: {03402f96-3dc7-4285-bc50-9e81fefafe43} - c:\program files\aim toolbar\aimtb.dll

mWinlogon: Userinit=c:\windows\system32\userinit.exe

BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll

BHO: ALOT Toolbar Helper: {14ceeaff-96dd-4101-ae37-d5ecdc23c3f6} - c:\program files\alot\bin\bho\alotBHO.dll

BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll

BHO: AOLSearchHook Class: {54eb34ea-e6be-4cfd-9f4f-c4a0c2eafa22} - c:\program files\aim search\AOLSearch.dll

BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL

BHO: AIM Toolbar Loader: {b0cda128-b425-4eef-a174-61a11ac5dbf8} - c:\program files\aim toolbar\aimtb.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

TB: AIM Toolbar: {61539ecd-cc67-4437-a03c-9aaccbd14326} - c:\program files\aim toolbar\aimtb.dll

TB: ALOT Toolbar: {5aa2ba46-9913-4dc7-9620-69ab0fa17ae7} - c:\program files\alot\bin\alot.dll

TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File

EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background

mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE

mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"

mRun: [Apoint] c:\program files\apoint2k\Apoint.exe

mRun: [RTHDCPL] RTHDCPL.EXE

mRun: [Alcmtr] ALCMTR.EXE

mRun: [LtMoh] c:\program files\ltmoh\Ltmoh.exe

mRun: [AGRSMMSG] AGRSMMSG.exe

mRun: [NDSTray.exe] NDSTray.exe

mRun: [HWSetup] c:\program files\toshiba\toshiba applet\HWSetup.exe hwSetUP

mRun: [sVPWUTIL] c:\program files\toshiba\windows utilities\SVPWUTIL.exe SVPwUTIL

mRun: [CeEKEY] c:\program files\toshiba\e-key\CeEKey.exe

mRun: [<NO NAME>]

mRun: [TPSMain] TPSMain.exe

mRun: [PadTouch] c:\program files\toshiba\touch and launch\PadExe.exe

mRun: [ZoomingHook] ZoomingHook.exe

mRun: [smoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe

mRun: [Tvs] c:\program files\toshiba\tvs\TvsTray.exe

mRun: [TPNF] c:\program files\toshiba\touchpad\TPTray.exe

mRun: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run

mRun: [TCtryIOHook] TCtrlIOHook.exe

mRun: [TFncKy] TFncKy.exe

mRun: [AOLDialer] c:\program files\common files\aol\acs\AOLDial.exe

mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"

mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe

mRun: [CFSServ.exe] CFSServ.exe -NoClient

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall

mRun: [MSSE] "c:\program files\microsoft security essentials\msseces.exe" -hide -runkey

dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t

StartupFolder: c:\docume~1\morgan\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office11\ONENOTEM.EXE

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe

uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)

mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)

IE: &AIM Toolbar Search - c:\documents and settings\all users\application data\aim toolbar\ietoolbar\resources\en-us\local\search.html

IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {F4430FE8-2638-42e5-B849-800749B94EED} - c:\program files\partygaming.net\partypokernet\RunPF.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {0b83c99c-1efa-4259-858f-bcb33e007a5b} - {61539ecd-cc67-4437-a03c-9aaccbd14326} - c:\program files\aim toolbar\aimtb.dll

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL

IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll

DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - hxxp://lads.myspace.com/upload/MySpaceUploader1006.cab

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

Notify: AtiExtEvent - Ati2evxx.dll

Hosts: 212.95.49.214 www.google.com

Hosts: 212.95.49.214 www.google.de

Hosts: 212.95.49.214 www.google.fr

Hosts: 212.95.49.214 www.google.co.uk

Hosts: 212.95.49.214 www.google.com.br

Note: multiple HOSTS entries found. Please refer to Attach.txt

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\morgan\applic~1\mozilla\firefox\profiles\fi5aoyj5.default\

FF - prefs.js: browser.search.defaulturl - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrie7&query=

FF - prefs.js: browser.search.selectedEngine - AIM Search

FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com?src=toolbar

FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrab&query=

FF - component: c:\documents and settings\morgan\application data\mozilla\firefox\profiles\fi5aoyj5.default\extensions\{7affbfae-c4e2-4915-8c0f-00fa3ec610a1}\components\WinampPlayer.dll

FF - component: c:\program files\mozilla firefox\extensions\browserhighlighter@ebay.com\components\Shim.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npnul32.dll

FF - plugin: c:\program files\mozilla firefox\plugins\nppdf32.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin2.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin3.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin4.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin5.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin6.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin7.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npViewpoint.dll

FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox 3.1 beta 2\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}

FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox 3.1 beta 2\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----

FF - user.js: browser.sessionstore.resume_from_crash - false

c:\program files\mozilla firefox 3.1 beta 2\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2009-12-2 149040]

R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2009-1-2 24652]

S1 MpKsl7d251e78;MpKsl7d251e78;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{303daa1b-3f73-4054-81e0-ad3b7ec3f712}\mpksl7d251e78.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{303daa1b-3f73-4054-81e0-ad3b7ec3f712}\MpKsl7d251e78.sys [?]

=============== Created Last 30 ================

2010-05-11 13:42:39 2 ----a-w- c:\windows\msoffice.ini

2010-05-08 19:08:50 0 ----a-w- c:\documents and settings\morgan\defogger_reenable

2010-05-08 15:45:52 274288 ----a-w- c:\windows\system32\mucltui.dll

2010-05-08 15:45:52 215920 ----a-w- c:\windows\system32\muweb.dll

2010-05-08 15:45:52 16736 ----a-w- c:\windows\system32\mucltui.dll.mui

2010-05-08 14:48:39 96512 ----a-w- c:\windows\system32\drivers\ATAPI.SYS

2010-05-08 14:27:47 221568 ------w- c:\windows\system32\MpSigStub.exe

2010-05-08 14:25:21 0 d-----w- c:\program files\Microsoft Security Essentials

2010-05-08 13:11:55 96512 ----a-w- c:\windows\system32\drivers\ucflbaga.sys

2010-05-07 20:22:01 0 d-----w- c:\windows\system32\MpEngineStore

2010-05-07 20:10:57 204 ----a-w- c:\windows\system32\MRT.INI

2010-05-07 20:02:48 411368 ----a-w- c:\windows\system32\deployJava1.dll

2010-05-07 18:32:47 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll

2010-05-07 18:32:02 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe

2010-05-07 18:27:41 0 d-----w- c:\docume~1\morgan\applic~1\Malwarebytes

2010-05-07 18:27:28 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-05-07 18:27:22 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-05-07 18:27:22 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes

2010-05-07 18:27:21 0 d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-05-07 18:16:12 1409 ----a-w- c:\windows\QTFont.for

2010-05-07 18:16:11 54156 ---ha-w- c:\windows\QTFont.qfn

2010-05-07 18:15:52 0 ----a-w- c:\windows\TPTray.INI

2010-05-07 10:41:20 24576 ----a-w- c:\windows\system32\userinit.exe

==================== Find3M ====================

2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll

2010-02-25 06:24:37 916480 ----a-w- c:\windows\system32\wininet.dll

2010-02-17 16:10:28 2189952 ----a-w- c:\windows\system32\ntoskrnl.exe

2010-02-16 13:25:04 2066816 ----a-w- c:\windows\system32\ntkrnlpa.exe

2010-02-12 04:33:11 100864 ----a-w- c:\windows\system32\6to4svc.dll

2009-12-14 22:27:55 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\application data\microsoft\internet explorer\domstore\index.dat

2009-12-14 23:36:56 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009121420091215\index.dat

============= FINISH: 11:41:50.37 ===============

Gmer

GMER 1.0.15.15281 - http://www.gmer.net

Rootkit scan 2010-05-11 11:24:25

Windows 5.1.2600 Service Pack 3

Running: zrdn4n9t.exe; Driver: C:\DOCUME~1\Morgan\LOCALS~1\Temp\awkyqpob.sys

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Cdfs \Cdfs DLAIFS_M.SYS (Drive Letter Access Component/Sonic Solutions)

---- EOF - GMER 1.0.15 ----

second run of mbam

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4076

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

5/11/2010 11:37:41 AM

mbam-log-2010-05-11 (11-37-41).txt

Scan type: Quick scan

Objects scanned: 126067

Time elapsed: 11 minute(s), 32 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

I can't find the microsoft security log file

ark.zip

Link to post
Share on other sites

Hello De3rcr! Welcome to MalwareBytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.

Step 1:

Please, uninstall the following applications:

  1. Adobe Reader 7.1.0
  2. LimeWire 5.2.13

You can read, how to this in:

Step 2:

I also see you have Viewpoint installed...

Viewpoint Manager is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". This will change from what we know in 2006 read this article: http://www.clickz.com/news/article.php/3561546

I suggest you remove the program now. Go to Start > Settings > Control Panel > Add/Remove Programs and remove the following programs if present.


  • Viewpoint
  • Viewpoint Manager
  • Viewpoint Media Player

Step 3:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

In your next reply, please include these log(s) in this sequence:

  1. MalwareBytes' Anti-Malware log
  2. a new fresh DDS log only

Link to post
Share on other sites

Hi Maniac,

I uninstalled the programs

here are the new logs

mbam

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4090

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

5/11/2010 2:36:04 PM

mbam-log-2010-05-11 (14-36-04).txt

Scan type: Quick scan

Objects scanned: 126598

Time elapsed: 12 minute(s), 28 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

DDS

DDS (Ver_10-03-17.01) - NTFSx86

Run by Morgan at 14:37:01.21 on Tue 05/11/2010

Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_20

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.446.155 [GMT -4:00]

AV: Microsoft Security Essentials *On-access scanning enabled* (Updated) {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

c:\Program Files\Microsoft Security Essentials\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\acs.exe

svchost.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

c:\TOSHIBA\IVP\swupdate\swupdtmr.exe

C:\WINDOWS\System32\DLA\DLACTRLW.EXE

C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

C:\Program Files\Apoint2K\Apoint.exe

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\ltmoh\Ltmoh.exe

C:\WINDOWS\AGRSMMSG.exe

C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe

C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe

C:\WINDOWS\system32\TPSMain.exe

C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe

C:\WINDOWS\system32\ZoomingHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

C:\Program Files\Toshiba\Tvs\TvsTray.exe

C:\Program Files\TOSHIBA\TouchPad\TPTray.exe

C:\WINDOWS\system32\TCtrlIOHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe

C:\Program Files\QuickTime\qttask.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\Program Files\Microsoft Security Essentials\msseces.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\Apoint2K\Apntex.exe

C:\WINDOWS\system32\TPSBattM.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\system32\wuauclt.exe

C:\Documents and Settings\Morgan\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://home.alot.com/

uSearch Bar = hxxp://www.google.com/ie

uSearch Page = hxxp://www.google.com

uInternet Connection Wizard,ShellNext = hxxp://www.toshibadirect.com/dpdstart

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://search.alot.com/web?q=&pr=auto&client_id=CA50392001CA6A55087D2F34&src_id=11220&camp_id=990&tb_version=2.5.6.471

mSearchAssistant = hxxp://www.google.com/ie

uURLSearchHooks: H - No File

uURLSearchHooks: AOLSearchHook Class: {54eb34ea-e6be-4cfd-9f4f-c4a0c2eafa22} - c:\program files\aim search\AOLSearch.dll

mURLSearchHooks: AIM Toolbar Search Class: {03402f96-3dc7-4285-bc50-9e81fefafe43} - c:\program files\aim toolbar\aimtb.dll

mWinlogon: Userinit=c:\windows\system32\userinit.exe

BHO: ALOT Toolbar Helper: {14ceeaff-96dd-4101-ae37-d5ecdc23c3f6} - c:\program files\alot\bin\bho\alotBHO.dll

BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll

BHO: AOLSearchHook Class: {54eb34ea-e6be-4cfd-9f4f-c4a0c2eafa22} - c:\program files\aim search\AOLSearch.dll

BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL

BHO: AIM Toolbar Loader: {b0cda128-b425-4eef-a174-61a11ac5dbf8} - c:\program files\aim toolbar\aimtb.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

TB: AIM Toolbar: {61539ecd-cc67-4437-a03c-9aaccbd14326} - c:\program files\aim toolbar\aimtb.dll

TB: ALOT Toolbar: {5aa2ba46-9913-4dc7-9620-69ab0fa17ae7} - c:\program files\alot\bin\alot.dll

TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File

EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background

mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE

mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"

mRun: [Apoint] c:\program files\apoint2k\Apoint.exe

mRun: [RTHDCPL] RTHDCPL.EXE

mRun: [Alcmtr] ALCMTR.EXE

mRun: [LtMoh] c:\program files\ltmoh\Ltmoh.exe

mRun: [AGRSMMSG] AGRSMMSG.exe

mRun: [NDSTray.exe] NDSTray.exe

mRun: [HWSetup] c:\program files\toshiba\toshiba applet\HWSetup.exe hwSetUP

mRun: [sVPWUTIL] c:\program files\toshiba\windows utilities\SVPWUTIL.exe SVPwUTIL

mRun: [CeEKEY] c:\program files\toshiba\e-key\CeEKey.exe

mRun: [<NO NAME>]

mRun: [TPSMain] TPSMain.exe

mRun: [PadTouch] c:\program files\toshiba\touch and launch\PadExe.exe

mRun: [ZoomingHook] ZoomingHook.exe

mRun: [smoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe

mRun: [Tvs] c:\program files\toshiba\tvs\TvsTray.exe

mRun: [TPNF] c:\program files\toshiba\touchpad\TPTray.exe

mRun: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run

mRun: [TCtryIOHook] TCtrlIOHook.exe

mRun: [TFncKy] TFncKy.exe

mRun: [AOLDialer] c:\program files\common files\aol\acs\AOLDial.exe

mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"

mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe

mRun: [CFSServ.exe] CFSServ.exe -NoClient

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall

mRun: [MSSE] "c:\program files\microsoft security essentials\msseces.exe" -hide -runkey

dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t

StartupFolder: c:\docume~1\morgan\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office11\ONENOTEM.EXE

uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)

mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)

IE: &AIM Toolbar Search - c:\documents and settings\all users\application data\aim toolbar\ietoolbar\resources\en-us\local\search.html

IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {F4430FE8-2638-42e5-B849-800749B94EED} - c:\program files\partygaming.net\partypokernet\RunPF.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {0b83c99c-1efa-4259-858f-bcb33e007a5b} - {61539ecd-cc67-4437-a03c-9aaccbd14326} - c:\program files\aim toolbar\aimtb.dll

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL

IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll

DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - hxxp://lads.myspace.com/upload/MySpaceUploader1006.cab

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

Notify: AtiExtEvent - Ati2evxx.dll

Hosts: 212.95.49.214 www.google.com

Hosts: 212.95.49.214 www.google.de

Hosts: 212.95.49.214 www.google.fr

Hosts: 212.95.49.214 www.google.co.uk

Hosts: 212.95.49.214 www.google.com.br

Note: multiple HOSTS entries found. Please refer to Attach.txt

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\morgan\applic~1\mozilla\firefox\profiles\fi5aoyj5.default\

FF - prefs.js: browser.search.defaulturl - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrie7&query=

FF - prefs.js: browser.search.selectedEngine - AIM Search

FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com?src=toolbar

FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrab&query=

FF - component: c:\documents and settings\morgan\application data\mozilla\firefox\profiles\fi5aoyj5.default\extensions\{7affbfae-c4e2-4915-8c0f-00fa3ec610a1}\components\WinampPlayer.dll

FF - component: c:\program files\mozilla firefox\extensions\browserhighlighter@ebay.com\components\Shim.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npnul32.dll

FF - plugin: c:\program files\mozilla firefox\plugins\nppdf32.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin2.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin3.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin4.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin5.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin6.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin7.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npViewpoint.dll

FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox 3.1 beta 2\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}

FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox 3.1 beta 2\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----

FF - user.js: browser.sessionstore.resume_from_crash - false

c:\program files\mozilla firefox 3.1 beta 2\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2009-12-2 149040]

S1 MpKsl7d251e78;MpKsl7d251e78;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{303daa1b-3f73-4054-81e0-ad3b7ec3f712}\mpksl7d251e78.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{303daa1b-3f73-4054-81e0-ad3b7ec3f712}\MpKsl7d251e78.sys [?]

=============== Created Last 30 ================

2010-05-11 13:42:39 2 ----a-w- c:\windows\msoffice.ini

2010-05-08 19:08:50 0 ----a-w- c:\documents and settings\morgan\defogger_reenable

2010-05-08 15:45:52 274288 ----a-w- c:\windows\system32\mucltui.dll

2010-05-08 15:45:52 215920 ----a-w- c:\windows\system32\muweb.dll

2010-05-08 15:45:52 16736 ----a-w- c:\windows\system32\mucltui.dll.mui

2010-05-08 14:48:39 96512 ----a-w- c:\windows\system32\drivers\ATAPI.SYS

2010-05-08 14:27:47 221568 ------w- c:\windows\system32\MpSigStub.exe

2010-05-08 14:25:21 0 d-----w- c:\program files\Microsoft Security Essentials

2010-05-08 13:11:55 96512 ----a-w- c:\windows\system32\drivers\ucflbaga.sys

2010-05-07 20:22:01 0 d-----w- c:\windows\system32\MpEngineStore

2010-05-07 20:10:57 204 ----a-w- c:\windows\system32\MRT.INI

2010-05-07 20:02:48 411368 ----a-w- c:\windows\system32\deployJava1.dll

2010-05-07 18:32:47 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll

2010-05-07 18:32:02 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe

2010-05-07 18:27:41 0 d-----w- c:\docume~1\morgan\applic~1\Malwarebytes

2010-05-07 18:27:28 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-05-07 18:27:22 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-05-07 18:27:22 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes

2010-05-07 18:27:21 0 d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-05-07 18:16:12 1409 ----a-w- c:\windows\QTFont.for

2010-05-07 18:16:11 54156 ---ha-w- c:\windows\QTFont.qfn

2010-05-07 18:15:52 0 ----a-w- c:\windows\TPTray.INI

2010-05-07 10:41:20 24576 ----a-w- c:\windows\system32\userinit.exe

==================== Find3M ====================

2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll

2010-02-25 06:24:37 916480 ----a-w- c:\windows\system32\wininet.dll

2010-02-17 16:10:28 2189952 ----a-w- c:\windows\system32\ntoskrnl.exe

2010-02-16 13:25:04 2066816 ----a-w- c:\windows\system32\ntkrnlpa.exe

2010-02-12 04:33:11 100864 ----a-w- c:\windows\system32\6to4svc.dll

2009-12-14 22:27:55 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\application data\microsoft\internet explorer\domstore\index.dat

2009-12-14 23:36:56 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009121420091215\index.dat

============= FINISH: 14:38:05.40 ===============

Link to post
Share on other sites

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

Link to post
Share on other sites

Ran combofix

while it was running at stage 2 a pev.cfxxe error came up saying that it needed to close send or don't send report

i clicked don't send

here is the report

ComboFix 10-05-10.05 - Morgan 05/11/2010 15:36:44.1.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.446.149 [GMT -4:00]

Running from: c:\documents and settings\Morgan\Desktop\Combo-Fix.exe

AV: Microsoft Security Essentials *On-access scanning disabled* (Updated) {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\Morgan\Application Data\alot

c:\documents and settings\Morgan\Application Data\alot\BrowserSearch\BrowserSearch.xml

c:\documents and settings\Morgan\Application Data\alot\BrowserSearch\BrowserSearch.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_0\Button_0.xml

c:\documents and settings\Morgan\Application Data\alot\Button_0\Button_0.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_1\Button_1.xml

c:\documents and settings\Morgan\Application Data\alot\Button_1\Button_1.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_2\Button_2.xml

c:\documents and settings\Morgan\Application Data\alot\Button_2\Button_2.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_3\Button_3.xml

c:\documents and settings\Morgan\Application Data\alot\Button_3\Button_3.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_4\Button_4.xml

c:\documents and settings\Morgan\Application Data\alot\Button_4\Button_4.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_5\Button_5.xml

c:\documents and settings\Morgan\Application Data\alot\Button_5\Button_5.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_6\Button_6.xml

c:\documents and settings\Morgan\Application Data\alot\Button_6\Button_6.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_7\Button_7.xml

c:\documents and settings\Morgan\Application Data\alot\Button_7\Button_7.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Button_8\Button_8.xml

c:\documents and settings\Morgan\Application Data\alot\Button_8\Button_8.xml.backup

c:\documents and settings\Morgan\Application Data\alot\configurator\configurator.xml

c:\documents and settings\Morgan\Application Data\alot\configurator\configurator.xml.backup

c:\documents and settings\Morgan\Application Data\alot\contextMenu\contextMenu.xml

c:\documents and settings\Morgan\Application Data\alot\contextMenu\contextMenu.xml.backup

c:\documents and settings\Morgan\Application Data\alot\ErrorSearch\ErrorSearch.xml

c:\documents and settings\Morgan\Application Data\alot\ErrorSearch\ErrorSearch.xml.backup

c:\documents and settings\Morgan\Application Data\alot\postInstallLayout\postInstallLayout.xml

c:\documents and settings\Morgan\Application Data\alot\postInstallLayout\postInstallLayout.xml.backup

c:\documents and settings\Morgan\Application Data\alot\products\products.xml

c:\documents and settings\Morgan\Application Data\alot\products\products.xml.backup

c:\documents and settings\Morgan\Application Data\alot\Resources\BrowserSearch\alot_search_defend.html

c:\documents and settings\Morgan\Application Data\alot\Resources\BrowserSearch\images\favicon.ico

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_0\images\alot_logo_button.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_0\images\alot_logo_button.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_image_search.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_image_search.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_news_search.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_news_search.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_search_button.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_search_button.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_shop_search.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_shop_search.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_videos_search.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_videos_search.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_web_search.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_1\images\alot_web_search.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_2\images\alot_configure.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_2\images\alot_configure.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_3\images\default_1588_solitaire.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_3\images\default_1588_solitaire.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_4\images\default_1636_freecell2.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_4\images\default_1636_freecell2.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_5\images\default_2111_ace_spades.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_5\images\default_2111_ace_spades.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_6\images\default_1640_scorpion_solitaire.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_6\images\default_1640_scorpion_solitaire.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_7\images\default_1763_alot_generic_comment.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_7\images\default_1763_alot_generic_comment.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Button_8\images\2433_icon.png

c:\documents and settings\Morgan\Application Data\alot\Resources\contextMenu\images\alot_icon.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\contextMenu\images\alot_icon.png

c:\documents and settings\Morgan\Application Data\alot\Resources\contextMenu\images\alot_logo_button.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\contextMenu\images\alot_logo_button.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\domains.dat

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\alot_brand.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\alot_splitter.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\discover.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\intro_popup.png

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\spinner.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\widget_bottom.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\widget_btnclose0.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\widget_btnclose1.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\widget_caption.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\widget_error_bg.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\widget_error_close.bmp

c:\documents and settings\Morgan\Application Data\alot\Resources\Shared\images\widget_error_icon.bmp

c:\documents and settings\Morgan\Application Data\alot\TimerManager\TimerManager.xml

c:\documents and settings\Morgan\Application Data\alot\TimerManager\TimerManager.xml.backup

c:\documents and settings\Morgan\Application Data\alot\toolbar.xml

c:\documents and settings\Morgan\Application Data\alot\toolbar.xml.backup

c:\documents and settings\Morgan\Application Data\alot\toolbarContextMenu\toolbarContextMenu.xml

c:\documents and settings\Morgan\Application Data\alot\toolbarContextMenu\toolbarContextMenu.xml.backup

c:\documents and settings\Morgan\Application Data\alot\ToolbarSearch\ToolbarSearch.xml

c:\documents and settings\Morgan\Application Data\alot\Updater\Updater.xml

c:\documents and settings\Morgan\Application Data\alot\Updater\Updater.xml.backup

c:\program files\alot

c:\program files\alot\alotUninst.exe

c:\program files\alot\bin\alot.dll

c:\program files\alot\bin\BHO\alotBHO.dll

c:\windows\system32\11478.exe

c:\windows\system32\11942.exe

c:\windows\system32\15724.exe

c:\windows\system32\16827.exe

c:\windows\system32\18467.exe

c:\windows\system32\19169.exe

c:\windows\system32\23281.exe

c:\windows\system32\24464.exe

c:\windows\system32\26500.exe

c:\windows\system32\26962.exe

c:\windows\system32\28145.exe

c:\windows\system32\29358.exe

c:\windows\system32\2995.exe

c:\windows\system32\4827.exe

c:\windows\system32\491.exe

c:\windows\system32\5705.exe

c:\windows\system32\6334.exe

c:\windows\system32\9961.exe

c:\windows\system32\Thumbs.db

.

((((((((((((((((((((((((( Files Created from 2010-04-11 to 2010-05-11 )))))))))))))))))))))))))))))))

.

2010-05-08 17:16 . 2010-05-08 17:16 -------- d-----w- c:\documents and settings\Morgan\Local Settings\Application Data\PCHealth

2010-05-08 17:16 . 2010-05-08 17:16 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\PCHealth

2010-05-08 15:45 . 2009-08-06 23:23 274288 ----a-w- c:\windows\system32\mucltui.dll

2010-05-08 15:45 . 2009-08-06 23:23 215920 ----a-w- c:\windows\system32\muweb.dll

2010-05-08 14:48 . 2010-05-08 14:48 96512 ----a-w- c:\windows\system32\drivers\ATAPI.SYS

2010-05-08 14:27 . 2010-05-06 14:36 221568 ------w- c:\windows\system32\MpSigStub.exe

2010-05-08 14:25 . 2010-05-08 14:25 -------- d-----w- c:\program files\Microsoft Security Essentials

2010-05-08 13:11 . 2010-05-08 13:11 96512 ----a-w- c:\windows\system32\drivers\ucflbaga.sys

2010-05-07 20:22 . 2010-05-08 13:12 -------- d-----w- c:\windows\system32\MpEngineStore

2010-05-07 20:03 . 2010-05-07 20:03 -------- d-----w- c:\program files\Common Files\Java

2010-05-07 20:02 . 2010-05-07 20:02 503808 ----a-w- c:\documents and settings\Morgan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4879b984-n\msvcp71.dll

2010-05-07 20:02 . 2010-05-07 20:02 499712 ----a-w- c:\documents and settings\Morgan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4879b984-n\jmc.dll

2010-05-07 20:02 . 2010-05-07 20:02 348160 ----a-w- c:\documents and settings\Morgan\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4879b984-n\msvcr71.dll

2010-05-07 20:02 . 2010-05-07 20:02 61440 ----a-w- c:\documents and settings\Morgan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-6a0ad3e6-n\decora-sse.dll

2010-05-07 20:02 . 2010-05-07 20:02 12800 ----a-w- c:\documents and settings\Morgan\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-6a0ad3e6-n\decora-d3d.dll

2010-05-07 20:02 . 2010-04-13 00:29 411368 ----a-w- c:\windows\system32\deployJava1.dll

2010-05-07 18:32 . 2009-11-21 15:51 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll

2010-05-07 18:32 . 2009-10-23 15:28 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe

2010-05-07 18:27 . 2010-05-07 18:27 -------- d-----w- c:\documents and settings\Morgan\Application Data\Malwarebytes

2010-05-07 18:27 . 2010-04-29 22:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-05-07 18:27 . 2010-05-07 18:27 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-05-07 18:27 . 2010-04-29 22:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-05-07 18:27 . 2010-05-07 18:34 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-05-07 10:41 . 2004-08-04 00:56 24576 ----a-w- c:\windows\system32\userinit.exe

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-05-11 18:15 . 2006-04-14 21:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint

2010-05-11 13:46 . 2006-04-14 21:46 -------- d-----w- c:\program files\Common Files\AOL

2010-05-11 13:46 . 2006-04-14 21:47 -------- d-----w- c:\program files\Pure Networks

2010-05-11 13:44 . 2006-04-14 21:46 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL

2010-05-11 13:43 . 2006-08-06 05:27 -------- d-----w- c:\documents and settings\Morgan\Application Data\AOL

2010-05-11 13:23 . 2006-04-14 20:04 -------- d-----w- c:\program files\Microsoft Works

2010-05-08 16:37 . 2007-05-24 01:30 -------- d-----w- c:\documents and settings\Morgan\Application Data\LimeWire

2010-05-08 14:21 . 2009-05-04 05:43 -------- d-----w- c:\documents and settings\Morgan\Application Data\skypePM

2010-05-07 20:02 . 2006-04-14 21:35 -------- d-----w- c:\program files\Java

2010-05-07 19:41 . 2009-12-13 21:58 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9

2010-03-10 06:15 . 2006-04-14 19:30 420352 ----a-w- c:\windows\system32\vbscript.dll

2010-02-25 06:24 . 2006-04-14 19:30 916480 ----a-w- c:\windows\system32\wininet.dll

2010-02-24 13:11 . 2006-04-14 19:30 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2010-02-17 16:10 . 2006-04-14 19:30 2189952 ----a-w- c:\windows\system32\ntoskrnl.exe

2010-02-16 13:25 . 2004-08-03 22:59 2066816 ----a-w- c:\windows\system32\ntkrnlpa.exe

2010-02-12 04:33 . 2006-04-14 19:29 100864 ----a-w- c:\windows\system32\6to4svc.dll

2010-02-11 12:02 . 2006-04-14 19:30 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"CFSServ.exe"="CFSServ.exe -NoClient" [X]

"DLA"="c:\windows\System32\DLA\DLACTRLW.EXE" [2005-10-06 122940]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]

"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2004-03-24 196608]

"RTHDCPL"="RTHDCPL.EXE" [2006-01-12 15961088]

"LtMoh"="c:\program files\ltmoh\Ltmoh.exe" [2006-03-04 184320]

"AGRSMMSG"="AGRSMMSG.exe" [2006-03-04 88204]

"NDSTray.exe"="NDSTray.exe" [bU]

"HWSetup"="c:\program files\TOSHIBA\TOSHIBA Applet\HWSetup.exe" [2004-05-01 28672]

"SVPWUTIL"="c:\program files\Toshiba\Windows Utilities\SVPWUTIL.exe" [2004-05-01 65536]

"CeEKEY"="c:\program files\TOSHIBA\E-KEY\CeEKey.exe" [2006-02-17 634880]

"TPSMain"="TPSMain.exe" [2005-06-01 282624]

"PadTouch"="c:\program files\TOSHIBA\Touch and Launch\PadExe.exe" [2005-12-06 1077322]

"ZoomingHook"="ZoomingHook.exe" [2005-06-06 24576]

"SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2005-04-26 122880]

"Tvs"="c:\program files\Toshiba\Tvs\TvsTray.exe" [2006-02-02 73728]

"TPNF"="c:\program files\TOSHIBA\TouchPad\TPTray.exe" [2005-12-13 53248]

"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2005-03-18 151552]

"TCtryIOHook"="TCtrlIOHook.exe" [2006-01-03 28672]

"TFncKy"="TFncKy.exe" [bU]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-04-02 342312]

"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2009-03-26 177472]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-07 98304]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]

"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2005-08-12 1121792]

"MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-02-21 1093208]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]

c:\documents and settings\Morgan\Start Menu\Programs\Startup\

Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2005-3-17 59080]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"=

"c:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= c:\\TOSHIBA\\IVP\\ISM\\pinger.exe

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

S1 MpKsl7d251e78;MpKsl7d251e78;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{303DAA1B-3F73-4054-81E0-AD3B7EC3F712}\MpKsl7d251e78.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{303DAA1B-3F73-4054-81E0-AD3B7EC3F712}\MpKsl7d251e78.sys [?]

.

Contents of the 'Scheduled Tasks' folder

2009-09-23 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 20:34]

2010-05-08 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Microsoft Security Essentials\MpCmdRun.exe [2009-12-09 22:02]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://home.alot.com/

uInternet Connection Wizard,ShellNext = hxxp://www.toshibadirect.com/dpdstart

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://search.alot.com/web?q=&pr=auto&client_id=CA50392001CA6A55087D2F34&src_id=11220&camp_id=990&tb_version=2.5.6.471

IE: &AIM Toolbar Search - c:\documents and settings\All Users\Application Data\AIM Toolbar\ieToolbar\resources\en-US\local\search.html

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

FF - ProfilePath - c:\documents and settings\Morgan\Application Data\Mozilla\Firefox\Profiles\fi5aoyj5.default\

FF - prefs.js: browser.search.defaulturl - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrie7&query=

FF - prefs.js: browser.search.selectedEngine - AIM Search

FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com?src=toolbar

FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrab&query=

FF - component: c:\documents and settings\Morgan\Application Data\Mozilla\Firefox\Profiles\fi5aoyj5.default\extensions\{7affbfae-c4e2-4915-8c0f-00fa3ec610a1}\components\WinampPlayer.dll

FF - component: c:\program files\Mozilla Firefox\extensions\browserhighlighter@ebay.com\components\Shim.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npnul32.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin2.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin3.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin4.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin5.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin6.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npqtplugin7.dll

---- FIREFOX POLICIES ----

FF - user.js: browser.sessionstore.resume_from_crash - false

.

- - - - ORPHANS REMOVED - - - -

Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

HKLM-Run-AOLDialer - c:\program files\Common Files\AOL\ACS\AOLDial.exe

AddRemove-alotToolbar - c:\program files\alot\alotUninst.exe

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-05-11 15:51

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(564)

c:\windows\system32\Ati2evxx.dll

.

Completion time: 2010-05-11 15:58:47

ComboFix-quarantined-files.txt 2010-05-11 19:58

Pre-Run: 54,763,642,880 bytes free

Post-Run: 55,852,847,104 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - 615BC47F3ABB430876544D559915AE79

Link to post
Share on other sites

Please read the following through carefully so that you understand what to do.

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK. (If Vista, click on the Vista Orb and copy and paste the following into the Search field. (make sure you include the quotation marks) Then press Ctrl+Shift+Enter.)
    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v
  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.
  • It may ask you to reboot the computer to complete the process. Allow it to do so.
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.

Link to post
Share on other sites

Here is tdsskiller

09:19:19:109 3596 TDSS rootkit removing tool 2.2.8.1 Mar 22 2010 10:43:04

09:19:19:109 3596 ================================================================================

09:19:19:109 3596 SystemInfo:

09:19:19:109 3596 OS Version: 5.1.2600 ServicePack: 3.0

09:19:19:109 3596 Product type: Workstation

09:19:19:109 3596 ComputerName: OWNER-DEBBJU93F

09:19:19:187 3596 UserName: Morgan

09:19:19:187 3596 Windows directory: C:\WINDOWS

09:19:19:187 3596 Processor architecture: Intel x86

09:19:19:187 3596 Number of processors: 1

09:19:19:187 3596 Page size: 0x1000

09:19:19:218 3596 Boot type: Normal boot

09:19:19:218 3596 ================================================================================

09:19:19:234 3596 UnloadDriverW: NtUnloadDriver error 2

09:19:19:234 3596 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2

09:19:19:265 3596 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system

09:19:19:265 3596 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

09:19:19:265 3596 wfopen_ex: Trying to KLMD file open

09:19:19:265 3596 wfopen_ex: File opened ok (Flags 2)

09:19:19:265 3596 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software

09:19:19:265 3596 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

09:19:19:265 3596 wfopen_ex: Trying to KLMD file open

09:19:19:265 3596 wfopen_ex: File opened ok (Flags 2)

09:19:19:265 3596 Initialize success

09:19:19:265 3596

09:19:19:265 3596 Scanning Services ...

09:19:20:171 3596 Raw services enum returned 334 services

09:19:20:171 3596

09:19:20:171 3596 Scanning Kernel memory ...

09:19:20:171 3596 Devices to scan: 4

09:19:20:171 3596

09:19:20:171 3596 Driver Name: Disk

09:19:20:171 3596 IRP_MJ_CREATE : F75F6BB0

09:19:20:171 3596 IRP_MJ_CREATE_NAMED_PIPE : 804FA88E

09:19:20:171 3596 IRP_MJ_CLOSE : F75F6BB0

09:19:20:171 3596 IRP_MJ_READ : F75F0D1F

09:19:20:171 3596 IRP_MJ_WRITE : F75F0D1F

09:19:20:171 3596 IRP_MJ_QUERY_INFORMATION : 804FA88E

09:19:20:171 3596 IRP_MJ_SET_INFORMATION : 804FA88E

09:19:20:171 3596 IRP_MJ_QUERY_EA : 804FA88E

09:19:20:171 3596 IRP_MJ_SET_EA : 804FA88E

09:19:20:171 3596 IRP_MJ_FLUSH_BUFFERS : F75F12E2

09:19:20:171 3596 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FA88E

09:19:20:171 3596 IRP_MJ_SET_VOLUME_INFORMATION : 804FA88E

09:19:20:171 3596 IRP_MJ_DIRECTORY_CONTROL : 804FA88E

09:19:20:171 3596 IRP_MJ_FILE_SYSTEM_CONTROL : 804FA88E

09:19:20:171 3596 IRP_MJ_DEVICE_CONTROL : F75F13BB

09:19:20:171 3596 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F4F28

09:19:20:171 3596 IRP_MJ_SHUTDOWN : F75F12E2

09:19:20:171 3596 IRP_MJ_LOCK_CONTROL : 804FA88E

09:19:20:171 3596 IRP_MJ_CLEANUP : 804FA88E

09:19:20:171 3596 IRP_MJ_CREATE_MAILSLOT : 804FA88E

09:19:20:171 3596 IRP_MJ_QUERY_SECURITY : 804FA88E

09:19:20:171 3596 IRP_MJ_SET_SECURITY : 804FA88E

09:19:20:171 3596 IRP_MJ_POWER : F75F2C82

09:19:20:171 3596 IRP_MJ_SYSTEM_CONTROL : F75F799E

09:19:20:171 3596 IRP_MJ_DEVICE_CHANGE : 804FA88E

09:19:20:171 3596 IRP_MJ_QUERY_QUOTA : 804FA88E

09:19:20:171 3596 IRP_MJ_SET_QUOTA : 804FA88E

09:19:20:218 3596 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1

09:19:20:218 3596

09:19:20:218 3596 Driver Name: USBSTOR

09:19:20:218 3596 IRP_MJ_CREATE : EEA25218

09:19:20:218 3596 IRP_MJ_CREATE_NAMED_PIPE : 804FA88E

09:19:20:218 3596 IRP_MJ_CLOSE : EEA25218

09:19:20:218 3596 IRP_MJ_READ : EEA2523C

09:19:20:218 3596 IRP_MJ_WRITE : EEA2523C

09:19:20:218 3596 IRP_MJ_QUERY_INFORMATION : 804FA88E

09:19:20:218 3596 IRP_MJ_SET_INFORMATION : 804FA88E

09:19:20:218 3596 IRP_MJ_QUERY_EA : 804FA88E

09:19:20:218 3596 IRP_MJ_SET_EA : 804FA88E

09:19:20:218 3596 IRP_MJ_FLUSH_BUFFERS : 804FA88E

09:19:20:218 3596 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FA88E

09:19:20:218 3596 IRP_MJ_SET_VOLUME_INFORMATION : 804FA88E

09:19:20:218 3596 IRP_MJ_DIRECTORY_CONTROL : 804FA88E

09:19:20:218 3596 IRP_MJ_FILE_SYSTEM_CONTROL : 804FA88E

09:19:20:218 3596 IRP_MJ_DEVICE_CONTROL : EEA25180

09:19:20:218 3596 IRP_MJ_INTERNAL_DEVICE_CONTROL : EEA209E6

09:19:20:218 3596 IRP_MJ_SHUTDOWN : 804FA88E

09:19:20:218 3596 IRP_MJ_LOCK_CONTROL : 804FA88E

09:19:20:218 3596 IRP_MJ_CLEANUP : 804FA88E

09:19:20:218 3596 IRP_MJ_CREATE_MAILSLOT : 804FA88E

09:19:20:218 3596 IRP_MJ_QUERY_SECURITY : 804FA88E

09:19:20:218 3596 IRP_MJ_SET_SECURITY : 804FA88E

09:19:20:218 3596 IRP_MJ_POWER : EEA245F0

09:19:20:218 3596 IRP_MJ_SYSTEM_CONTROL : EEA22A6E

09:19:20:218 3596 IRP_MJ_DEVICE_CHANGE : 804FA88E

09:19:20:218 3596 IRP_MJ_QUERY_QUOTA : 804FA88E

09:19:20:218 3596 IRP_MJ_SET_QUOTA : 804FA88E

09:19:20:312 3596 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: 1

09:19:20:312 3596

09:19:20:312 3596 Driver Name: Disk

09:19:20:312 3596 IRP_MJ_CREATE : F75F6BB0

09:19:20:312 3596 IRP_MJ_CREATE_NAMED_PIPE : 804FA88E

09:19:20:312 3596 IRP_MJ_CLOSE : F75F6BB0

09:19:20:312 3596 IRP_MJ_READ : F75F0D1F

09:19:20:312 3596 IRP_MJ_WRITE : F75F0D1F

09:19:20:312 3596 IRP_MJ_QUERY_INFORMATION : 804FA88E

09:19:20:312 3596 IRP_MJ_SET_INFORMATION : 804FA88E

09:19:20:312 3596 IRP_MJ_QUERY_EA : 804FA88E

09:19:20:312 3596 IRP_MJ_SET_EA : 804FA88E

09:19:20:312 3596 IRP_MJ_FLUSH_BUFFERS : F75F12E2

09:19:20:312 3596 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FA88E

09:19:20:312 3596 IRP_MJ_SET_VOLUME_INFORMATION : 804FA88E

09:19:20:312 3596 IRP_MJ_DIRECTORY_CONTROL : 804FA88E

09:19:20:312 3596 IRP_MJ_FILE_SYSTEM_CONTROL : 804FA88E

09:19:20:312 3596 IRP_MJ_DEVICE_CONTROL : F75F13BB

09:19:20:312 3596 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F4F28

09:19:20:312 3596 IRP_MJ_SHUTDOWN : F75F12E2

09:19:20:312 3596 IRP_MJ_LOCK_CONTROL : 804FA88E

09:19:20:312 3596 IRP_MJ_CLEANUP : 804FA88E

09:19:20:312 3596 IRP_MJ_CREATE_MAILSLOT : 804FA88E

09:19:20:312 3596 IRP_MJ_QUERY_SECURITY : 804FA88E

09:19:20:312 3596 IRP_MJ_SET_SECURITY : 804FA88E

09:19:20:312 3596 IRP_MJ_POWER : F75F2C82

09:19:20:312 3596 IRP_MJ_SYSTEM_CONTROL : F75F799E

09:19:20:312 3596 IRP_MJ_DEVICE_CHANGE : 804FA88E

09:19:20:312 3596 IRP_MJ_QUERY_QUOTA : 804FA88E

09:19:20:312 3596 IRP_MJ_SET_QUOTA : 804FA88E

09:19:20:328 3596 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1

09:19:20:328 3596

09:19:20:328 3596 Driver Name: atapi

09:19:20:328 3596 IRP_MJ_CREATE : F74E56F2

09:19:20:328 3596 IRP_MJ_CREATE_NAMED_PIPE : 804FA88E

09:19:20:328 3596 IRP_MJ_CLOSE : F74E56F2

09:19:20:328 3596 IRP_MJ_READ : 804FA88E

09:19:20:328 3596 IRP_MJ_WRITE : 804FA88E

09:19:20:328 3596 IRP_MJ_QUERY_INFORMATION : 804FA88E

09:19:20:328 3596 IRP_MJ_SET_INFORMATION : 804FA88E

09:19:20:328 3596 IRP_MJ_QUERY_EA : 804FA88E

09:19:20:328 3596 IRP_MJ_SET_EA : 804FA88E

09:19:20:328 3596 IRP_MJ_FLUSH_BUFFERS : 804FA88E

09:19:20:328 3596 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FA88E

09:19:20:328 3596 IRP_MJ_SET_VOLUME_INFORMATION : 804FA88E

09:19:20:328 3596 IRP_MJ_DIRECTORY_CONTROL : 804FA88E

09:19:20:328 3596 IRP_MJ_FILE_SYSTEM_CONTROL : 804FA88E

09:19:20:328 3596 IRP_MJ_DEVICE_CONTROL : F74E5712

09:19:20:328 3596 IRP_MJ_INTERNAL_DEVICE_CONTROL : F74E1852

09:19:20:328 3596 IRP_MJ_SHUTDOWN : 804FA88E

09:19:20:328 3596 IRP_MJ_LOCK_CONTROL : 804FA88E

09:19:20:328 3596 IRP_MJ_CLEANUP : 804FA88E

09:19:20:328 3596 IRP_MJ_CREATE_MAILSLOT : 804FA88E

09:19:20:328 3596 IRP_MJ_QUERY_SECURITY : 804FA88E

09:19:20:328 3596 IRP_MJ_SET_SECURITY : 804FA88E

09:19:20:328 3596 IRP_MJ_POWER : F74E573C

09:19:20:328 3596 IRP_MJ_SYSTEM_CONTROL : F74EC336

09:19:20:328 3596 IRP_MJ_DEVICE_CHANGE : 804FA88E

09:19:20:328 3596 IRP_MJ_QUERY_QUOTA : 804FA88E

09:19:20:328 3596 IRP_MJ_SET_QUOTA : 804FA88E

09:19:20:406 3596 C:\WINDOWS\system32\DRIVERS\ATAPI.SYS - Verdict: 1

09:19:20:406 3596

09:19:20:406 3596 Completed

09:19:20:406 3596

09:19:20:406 3596 Results:

09:19:20:406 3596 Memory objects infected / cured / cured on reboot: 0 / 0 / 0

09:19:20:421 3596 Registry objects infected / cured / cured on reboot: 0 / 0 / 0

09:19:20:421 3596 File objects infected / cured / cured on reboot: 0 / 0 / 0

09:19:20:421 3596

09:19:20:421 3596 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system

09:19:20:421 3596 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software

09:19:20:421 3596 KLMD(ARK) unloaded successfully

Link to post
Share on other sites

Download RootRepeal Beta on your desktop.

  • Double click RootRepeal.exe to start the program
  • Click on the Report tab at the bottom of the program window
  • Click the Scan button
  • In the Select Scan dialog, check:

    • Drivers
    • Files
    • Processes
    • SSDT
    • Stealth Objects
    • Hidden Services

    [*]Click the OK button

    [*]In the next dialog, select all drives showing

    [*]Click OK to start the scan

    Note: The scan can take some time.
    DO NOT
    run any other programs while the scan is running

    [*]When the scan is complete, the Save Report button will become available

    [*]Click this and save the report to your Desktop as RootRepeal.txt

    [*]Go to File, then Exit to close the program

If the report is not too long, post the contents of RootRepeal.txt in your next reply. If the report is very long, it will not be complete if you post it, so please attach it to your reply instead.

Link to post
Share on other sites

Here is the root repeal log

ROOTREPEAL © AD, 2007-2010

==================================================

Report Save Time: 2010/05/12 13:20

Program Version: Version 2.0.0.0

Windows Version: Windows XP SP3

==================================================

DRIVERS

-------------------

File Invisible catchme.sys 0xee9f8000 C:\DOCUME~1\Morgan\LOCALS~1\Temp\catchme.sys, 31744 bytes

File Invisible dump_atapi.sys 0xf207e000 C:\WINDOWS\System32\Drivers\dump_atapi.sys, 98304 bytes

File Invisible dump_WMILIB.SYS 0xf7a98000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS, 8192 bytes

File Invisible hiber_WMILIB.SYS 0xf7af4000 C:\WINDOWS\System32\Drivers\hiber_WMILIB.SYS, 8192 bytes

File Invisible mbr.sys 0xf78c8000 C:\DOCUME~1\Morgan\LOCALS~1\Temp\mbr.sys, 20864 bytes

File Invisible PROCEXP113.SYS 0xf7ae4000 C:\WINDOWS\system32\Drivers\PROCEXP113.SYS, 7872 bytes

File Invisible rootrepeal.sys 0xef7de000 C:\WINDOWS\system32\drivers\rootrepeal.sys, 49152 bytes

PROCESSES

-------------------

4 - System

108 - C:\WINDOWS\system32\ZoomingHook.exe

388 - C:\Program Files\iTunes\iTunesHelper.exe

444 - C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe

456 - C:\Program Files\Microsoft Security Essentials\msseces.exe

464 - C:\Program Files\QuickTime\qttask.exe

480 - C:\WINDOWS\system32\smss.exe

508 - C:\WINDOWS\system32\TPSMain.exe

512 - C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe

536 - C:\WINDOWS\system32\csrss.exe

564 - C:\WINDOWS\system32\winlogon.exe

608 - C:\WINDOWS\system32\services.exe

620 - C:\WINDOWS\system32\lsass.exe

712 - C:\Program Files\TOSHIBA\TouchPad\TPTray.exe

720 - C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

724 - C:\Program Files\TOSHIBA\Tvs\TvsTray.exe

780 - C:\WINDOWS\system32\ati2evxx.exe

796 - C:\WINDOWS\system32\svchost.exe

872 - C:\WINDOWS\system32\svchost.exe

908 - C:\Program Files\Microsoft Security Essentials\MsMpEng.exe

948 - C:\WINDOWS\system32\svchost.exe

1040 - C:\WINDOWS\system32\TCtrlIOHook.exe

1048 - C:\WINDOWS\system32\svchost.exe

1104 - C:\WINDOWS\system32\wuauclt.exe

1200 - C:\WINDOWS\system32\ctfmon.exe

1208 - C:\Program Files\Common Files\Java\Java Update\jusched.exe

1232 - C:\WINDOWS\system32\svchost.exe

1344 - C:\WINDOWS\system32\ati2evxx.exe

1540 - C:\WINDOWS\system32\DLA\DLACTRLW.EXE

1560 - C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

1568 - C:\Program Files\Apoint2K\Apoint.exe

1640 - C:\WINDOWS\system32\spoolsv.exe

1680 - C:\WINDOWS\RTHDCPL.exe

1736 - C:\WINDOWS\system32\svchost.exe

1768 - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

1780 - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe

1840 - C:\Program Files\Java\jre6\bin\jqs.exe

1876 - C:\Program Files\ltmoh\ltmoh.exe

1888 - C:\WINDOWS\agrsmmsg.exe

1896 - C:\WINDOWS\system32\svchost.exe

1976 - C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe

2004 - C:\WINDOWS\system32\wdfmgr.exe

2116 - C:\WINDOWS\system32\wscntfy.exe

2132 - C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe

2268 - C:\Program Files\Apoint2K\ApntEx.exe

2608 - C:\WINDOWS\system32\TPSBattM.exe

2636 - C:\Documents and Settings\Morgan\Desktop\RootRepeal.exe

3164 - C:\Program Files\iPod\bin\iPodService.exe

3208 - C:\WINDOWS\system32\alg.exe

3292 - C:\WINDOWS\explorer.exe

FILES

-------------------

Mismatch C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Security Essentials\Support\Application.etl, Allocation size mismatch (API: 96811036775542912, Raw: 262144)

STEALTH CODE

-------------------

HIDDEN SERVICES

-------------------

SSDT

-------------------

SYSCALL OK, INT 0x2E OK, ServiceTable OK, Driver IAT OK

Link to post
Share on other sites

Please go to http://virustotal.com

Next to the "Browse" button, in to the blank field, please paste the following:

C:\Program Files\Common Files\Microsoft Shared\DW\dwtrig20.exe

Hit SEND FILE. Please be patient, it will take a while to get it scanned. Once all the scanners are done, post back with the results (copy & paste them here)

Link to post
Share on other sites

virustotal result

MD5: 9435c1c2d2111573111367f92f208c1f

First received: 2007.05.30 07:39:08 UTC

Date: 2010.05.05 14:39:31 UTC [>7D]

Results: 0/41

Permalink: analisis/bb49ed0292602541148c0722902b628f793b5e860249968e780cbd289e60014e-1273070371

Link to post
Share on other sites

ESET Online Scanner

Note: You can use either Internet Explorer or Mozilla FireFox for this scan. You will however may need to disable your current installed Anti-Virus, how to do so can be read here.

  • Please go here then click on: EOLS1.gif
  • Select the option YES, I accept the Terms of Use then click on: EOLS2.gif
  • When prompted allow the Add-On/Active X to install.
  • Now click on Advanced Settings and select the following:

    • Remove found threats
    • Scan archives
    • Scan for potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology

[*]Now click on: EOLS3.gif

[*]The virus signature database... will begin to download. Be patient this make take some time depending on the speed of your Internet Connection.

[*]When completed the Online Scan will begin automatically.

[*]Do not touch either the Mouse or keyboard during the scan otherwise it may stall.

[*]When completed select Uninstall application on close if you so wish, make sure you copy the logfile first!

[*]Now click on: EOLS4.gif

[*]Use notepad to open the logfile located at C:\Program Files\ESET\EsetOnlineScanner\log.txt.

[*]Copy and paste that log as a reply to this topic.

Note: Do not forget to re-enable your Anti-Virus application after running the above scan!

Link to post
Share on other sites

eset scan results

ESETSmartInstaller@High as CAB hook log:

OnlineScanner.ocx - registred OK

# version=7

# iexplore.exe=8.00.6001.18702 (longhorn_ie8_rtm(wmbla).090308-0339)

# OnlineScanner.ocx=1.0.0.6211

# api_version=3.0.2

# EOSSerial=39e424628136974195b2c8058a7fdddc

# end=finished

# remove_checked=true

# archives_checked=true

# unwanted_checked=true

# unsafe_checked=true

# antistealth_checked=true

# utc_time=2010-05-12 08:21:08

# local_time=2010-05-12 04:21:08 (-0500, Eastern Daylight Time)

# country="United States"

# lang=1033

# osver=5.1.2600 NT Service Pack 3

# compatibility_mode=512 16777215 100 0 0 0 0 0

# compatibility_mode=1024 16777215 100 0 12863446 12863446 0 0

# compatibility_mode=5891 16776869 100 100 0 13208913 0 0

# compatibility_mode=8192 67108863 100 0 0 0 0 0

# scanned=82961

# found=1

# cleaned=1

# scan_time=7923

C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Internet Explorer\Desktop.htt Win32/TrojanDownloader.FakeAlert.AED virus (deleted - quarantined) 00000000000000000000000000000000 C

Link to post
Share on other sites

Please download to your Desktop: Dr.Web CureIt

  • After the file has downloaded, disable your current Anti-Virus and disconnect from the Internet
  • Doubleclick the drweb-cureit.exe file, then click the Start button, then the OK button to perform an Express Scan.
  • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it.
  • Once the short scan has finished, Click on the Complete scan radio button.
  • Then click on the Settings menu on top, the select Change Settings or press the F9 key. You can also change the Language
  • Choose the Scanning tab and I recomend leaving the Heuristic analysis enabled (this can lead to False Positives though)
  • On the File types tab ensure you select All files
  • Click on the Actions tab and set the following:
    • Objects Infected objects = Cure, Incurable objects = Move, Suspicious objects = Report
    • Infected packages Archive = Move, E-mails = Report, Containers = Move
    • Malware Adware = Move, Dialers = Move, Jokes = Move, Riskware = Move, Hacktools = Move
    • Do not change the Rename extension - default is: #??
    • Leave the default save path for Moved files here: %USERPROFILE%\DoctorWeb\Quarantine\
    • Leave prompt on Action checked

    [*]On the Log file tab leave the Log to file checked.

    [*]Leave the log file path alone: %USERPROFILE%\DoctorWeb\CureIt.log

    [*]Log mode = Append

    [*]Encoding = ANSI

    [*]Details Leave Names of file packers and Statistics checked.

    [*]Limit log file size = 2048 KB and leave the check mark on the Maximum log file size.

    [*]On the General tab leave the Scan Priority on High

    [*]Click the Apply button at the bottom, and then the OK button.

    [*]On the right side under the Dr Web Anti-Virus Logo you will see 3 little buttons. Click the left VCR style Start button.

    [*]In this mode it will scan Boot sectors of all disks, All removable media, and all local drives

    [*]The more files and folders you have the longer the scan will take. On large drives it can take hours to complete.

    [*]When the Cure option is selected, an additional context menu will open. Select the necessary action of the program, if the curing fails.

    [*]Click 'Yes to all' if it asks if you want to cure/move the files.

    [*]This will move it to the %USERPROFILE%\DoctorWeb\Quarantine\ folder if it can't be cured. (in this case we need samples)

    [*]After selecting, in the Dr.Web CureIt menu on top, click file and choose save report list

    [*]Save the report to your Desktop. The report will be called DrWeb.csv

    [*]Close Dr.Web Cureit.

    [*]Reboot your computer!! Because it could be possible that files in use will be moved/deleted during reboot.

    [*]After reboot, post the contents of the log from Dr.Web you saved previously to your Desktop in your next reply with a new hijackthis log.

    drweb.jpg

Link to post
Share on other sites

Dr.web fixed my hosts file during the quick scan and I checked google the links don't redirect anymore

attached is dr. web scan results

new hijack this log

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 12:36:37 PM, on 5/13/2010

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v8.00 (8.00.6001.18702)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

c:\Program Files\Microsoft Security Essentials\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\acs.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\system32\svchost.exe

c:\TOSHIBA\IVP\swupdate\swupdtmr.exe

C:\WINDOWS\system32\wuauclt.exe

C:\WINDOWS\System32\DLA\DLACTRLW.EXE

C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

C:\Program Files\Apoint2K\Apoint.exe

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\ltmoh\Ltmoh.exe

C:\WINDOWS\AGRSMMSG.exe

C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe

C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe

C:\WINDOWS\system32\TPSMain.exe

C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe

C:\WINDOWS\system32\ZoomingHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

C:\Program Files\Toshiba\Tvs\TvsTray.exe

C:\Program Files\TOSHIBA\TouchPad\TPTray.exe

C:\WINDOWS\system32\TCtrlIOHook.exe

C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe

C:\Program Files\QuickTime\qttask.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\Program Files\Microsoft Security Essentials\msseces.exe

C:\Program Files\Apoint2K\Apntex.exe

C:\WINDOWS\system32\TPSBattM.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\system32\ctfmon.exe

C:\WINDOWS\system32\msiexec.exe

C:\Documents and Settings\Morgan\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.alot.com/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://search.alot.com/web?q=&pr=auto&...rsion=2.5.6.471

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.toshibadirect.com/dpdstart

R3 - URLSearchHook: (no name) - - (no file)

R3 - URLSearchHook: AOLSearchHook Class - {54EB34EA-E6BE-4CFD-9F4F-C4A0C2EAFA22} - C:\Program Files\AIM Search\AOLSearch.dll

O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)

O2 - BHO: AOL Search Enhancement - {54EB34EA-E6BE-4CFD-9F4F-C4A0C2EAFA22} - C:\Program Files\AIM Search\AOLSearch.dll

O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL

O2 - BHO: AIM Toolbar Loader - {b0cda128-b425-4eef-a174-61a11ac5dbf8} - C:\Program Files\AIM Toolbar\aimtb.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O3 - Toolbar: AIM Toolbar - {61539ecd-cc67-4437-a03c-9aaccbd14326} - C:\Program Files\AIM Toolbar\aimtb.dll

O4 - HKLM\..\Run: [DLA] C:\WINDOWS\System32\DLA\DLACTRLW.EXE

O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"

O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe

O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE

O4 - HKLM\..\Run: [LtMoh] C:\Program Files\ltmoh\Ltmoh.exe

O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe

O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe

O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\TOSHIBA Applet\HWSetup.exe hwSetUP

O4 - HKLM\..\Run: [sVPWUTIL] C:\Program Files\Toshiba\Windows Utilities\SVPWUTIL.exe SVPwUTIL

O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe

O4 - HKLM\..\Run: [TPSMain] TPSMain.exe

O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe

O4 - HKLM\..\Run: [ZoomingHook] ZoomingHook.exe

O4 - HKLM\..\Run: [smoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

O4 - HKLM\..\Run: [Tvs] C:\Program Files\Toshiba\Tvs\TvsTray.exe

O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe

O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run

O4 - HKLM\..\Run: [TCtryIOHook] TCtrlIOHook.exe

O4 - HKLM\..\Run: [TFncKy] TFncKy.exe

O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe

O4 - HKLM\..\Run: [CFSServ.exe] CFSServ.exe -NoClient

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"

O4 - HKLM\..\Run: [MSKDetectorExe] C:\Program Files\McAfee\SpamKiller\MSKDetct.exe /uninstall

O4 - HKLM\..\Run: [MSSE] "c:\Program Files\Microsoft Security Essentials\msseces.exe" -hide -runkey

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "c:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "c:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')

O4 - Startup: Microsoft Office OneNote 2003 Quick Launch.lnk = C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE

O8 - Extra context menu item: &AIM Toolbar Search - C:\Documents and Settings\All Users\Application Data\AIM Toolbar\ieToolbar\resources\en-US\local\search.html

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: AIM Toolbar - {0b83c99c-1efa-4259-858f-bcb33e007a5b} - C:\Program Files\AIM Toolbar\aimtb.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe (file missing)

O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe (file missing)

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O14 - IERESET.INF: START_PAGE_URL=http://www.toshibadirect.com/dpdstart

O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader1006.cab

O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} (OnlineScanner Control) - http://download.eset.com/special/eos/OnlineScanner.cab

O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe

O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe

O24 - Desktop Component 0: (no name) - http://pb.xanga.com/bb/b4/bbb4fb7510a97a32...95c26559297.jpg

--

End of file - 9033 bytes

Link to post
Share on other sites

Yes, you are. :)

Last steps:

Step 1:

* Go to start > run and copy and paste next command in the field:

ComboFix /uninstall

Make sure there's a space between Combofix and /

Then hit enter.

This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.

Step 2:

Please manually delete DDS, TDSSKiller, RootRepeal, Dr.Web and GMER.

Step 3:

Please download and install the latest version of Adobe Reader from:

http://www.adobe.com

Step 4:

Some malware preventions:

http://miekiemoes.blogspot.com/2008/02/how...nt-malware.html

Safe surfing! :)

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.