Might be infected.

V-PV-P State College, PA Member
edited July 2008 in Spyware & Virus Removal
I might have something, I don't know exactly what though. It's not really hurting my performance too much but there are a lot of random processes running in the background and I will notice the system slowing down every now and then. Here's the HiJack This log. What should I do?
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:42:05 PM, on 7/7/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WUSB54GC.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Common Files\?ssembly\?xplorer.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.windowsxlive.net
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: testCPV6 - {15421B84-3488-49A7-AD18-CBF84A3EFAF6} - C:\Program Files\Webtools\webtools.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {D8679B6D-2FFF-2423-FB3D-7CA2E2EA4BC0} - C:\WINDOWS\system32\optsg.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [VirtualCloneDrive] "C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s
O4 - HKLM\..\RunOnce: [SpybotDeletingA7838] command /c del "C:\Program Files\Outerinfo\FF\install.rdf"
O4 - HKLM\..\RunOnce: [SpybotDeletingC9393] cmd /c del "C:\Program Files\Outerinfo\FF\install.rdf"
O4 - HKLM\..\RunOnce: [SpybotDeletingA4453] command /c del "C:\Program Files\Outerinfo\FF\components\OuterinfoAds.xpt"
O4 - HKLM\..\RunOnce: [SpybotDeletingC5892] cmd /c del "C:\Program Files\Outerinfo\FF\components\OuterinfoAds.xpt"
O4 - HKLM\..\RunOnce: [SpybotDeletingA6505] command /c del "C:\WINDOWS\b103.exe_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingC296] cmd /c del "C:\WINDOWS\b103.exe_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingA5521] command /c del "C:\WINDOWS\b116.exe_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingC7213] cmd /c del "C:\WINDOWS\b116.exe_old"
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpeedRunner] C:\Documents and Settings\Vash P\Application Data\SpeedRunner\SpeedRunner.exe
O4 - HKCU\..\Run: [SfKg6wIP] C:\Documents and Settings\Vash P\Application Data\Microsoft\Windows\ehsdft.exe
O4 - HKCU\..\Run: [Rrwr] "C:\WINDOWS\ASEMBL~1\tracert.exe" -vt yazb
O4 - HKCU\..\Run: [Dlhxzy] "C:\Program Files\Common Files\?ssembly\?xplorer.exe"
O4 - HKCU\..\Run: [GetPack19] "C:\Program Files\GetPack\GetPack19.exe"
O4 - HKCU\..\Run: [uwzf] C:\PROGRA~1\COMMON~1\uwzf\uwzfm.exe
O4 - HKCU\..\RunOnce: [SpybotDeletingB1410] command /c del "C:\Program Files\Outerinfo\FF\install.rdf"
O4 - HKCU\..\RunOnce: [SpybotDeletingD8825] cmd /c del "C:\Program Files\Outerinfo\FF\install.rdf"
O4 - HKCU\..\RunOnce: [SpybotDeletingB2974] command /c del "C:\Program Files\Outerinfo\FF\components\OuterinfoAds.xpt"
O4 - HKCU\..\RunOnce: [SpybotDeletingD847] cmd /c del "C:\Program Files\Outerinfo\FF\components\OuterinfoAds.xpt"
O4 - HKCU\..\RunOnce: [SpybotDeletingB50] command /c del "C:\WINDOWS\b103.exe_old"
O4 - HKCU\..\RunOnce: [SpybotDeletingD2795] cmd /c del "C:\WINDOWS\b103.exe_old"
O4 - HKCU\..\RunOnce: [SpybotDeletingB2972] command /c del "C:\WINDOWS\b116.exe_old"
O4 - HKCU\..\RunOnce: [SpybotDeletingD6908] cmd /c del "C:\WINDOWS\b116.exe_old"
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1201559993061
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: Roxio UPnP Renderer 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe
O23 - Service: Roxio Upnp Server 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe
O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
O23 - Service: SolidWorks Licensing Service - SolidWorks - C:\Program Files\Common Files\SolidWorks Shared\Service\SolidWorksLicensing.exe
O23 - Service: WUSB54GCSVC - GEMTEKS - C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe

--
End of file - 7933 bytes

Comments

  • edited July 2008
    Hello and welcome to the forums! :)

    Disable Teatimer:

    1) Run Spybot-S&D
    2) Go to the Mode menu, and make sure "Advanced Mode" is selected
    3) On the left hand side, choose Tools -> Resident
    4) Uncheck "Resident TeaTimer" and OK any prompts
    5) Restart your computer.
    _______________

    1. Download this file - combofix.exe
    2. Double click combofix.exe & follow the prompts.
    3. When finished, it shall produce a log for you. Post that log in your next reply

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall!
    ___________

    Post:
    - A fresh HijackThis log
    - Contents of C:\ComboFix.txt
  • V-PV-P State College, PA Member
    edited July 2008
    I'm not sure why I trusted you since that was your first post, but here's the ComboFix log:
    ComboFix 08-07-07.3 - Vash P 2008-07-08 17:00:45.1 - NTFSx86
    Microsoft Windows XP Home Edition  5.1.2600.3.1252.1.1033.18.2564 [GMT -4:00]
    Running from: C:\Documents and Settings\Vash P\Desktop\ComboFix.exe
     * Created a new restore point
    
    [color=red][b]WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !![/b][/color]
    .
    
    (((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    
    C:\Documents and Settings\Vash P\Application Data\inst.exe
    C:\Documents and Settings\Vash P\Application Data\SpeedRunner
    C:\Documents and Settings\Vash P\Application Data\SpeedRunner\config.cfg
    C:\Documents and Settings\Vash P\Application Data\SpeedRunner\SpeedRunner.exe
    C:\Documents and Settings\Vash P\Application Data\SpeedRunner\SRUninstall.exe
    C:\Documents and Settings\Vash P\Local Settings\Temporary Internet Files\CPV.stt
    C:\Program Files\Common Files\ssembl~1
    C:\Program Files\Common Files\ssembl~1\?xplorer.exe
    C:\Program Files\Common Files\uwzf
    C:\Program Files\Common Files\uwzf\uwzfa.exe
    C:\Program Files\Common Files\uwzf\uwzfa.lck
    C:\Program Files\Common Files\uwzf\uwzfd\class-barrel
    C:\Program Files\Common Files\uwzf\uwzfd\uwzfc.dll
    C:\Program Files\Common Files\uwzf\uwzfd\vocabulary
    C:\Program Files\Common Files\uwzf\uwzfl.exe
    C:\Program Files\Common Files\uwzf\uwzfl.lck
    C:\Program Files\Common Files\uwzf\uwzfm.exe
    C:\Program Files\Common Files\uwzf\uwzfm.lck
    C:\Program Files\Common Files\uwzf\uwzfp.exe
    C:\Program Files\Temporary
    C:\WINDOWS\asembl~1
    C:\WINDOWS\asembl~1\a?sembly\
    C:\WINDOWS\asembl~1\tracert.exe
    C:\WINDOWS\autorun.inf
    C:\WINDOWS\b104.exe
    C:\WINDOWS\b152.exe
    C:\WINDOWS\b155.exe
    C:\WINDOWS\b156.exe
    C:\WINDOWS\mrofinu1001186.exe
    C:\WINDOWS\system\update.exe
    C:\WINDOWS\system32\MSINET.oca
    C:\WINDOWS\system32\optsg.dll
    C:\WINDOWS\system32\pskill.exe
    C:\WINDOWS\uwzf
    C:\WINDOWS\uwzf\uwzf.dat
    C:\WINDOWS\uwzf\wu
    
    .
    (((((((((((((((((((((((((   Files Created from 2008-06-08 to 2008-07-08  )))))))))))))))))))))))))))))))
    .
    
    2008-07-08 17:06 . 2008-07-08 17:06	41,984	--a------	C:\WINDOWS\mrofinu1001186.exe
    2008-07-08 00:07 . 2008-07-08 00:07	4,286	--a------	C:\WINDOWS\system32\Jamster.ico
    2008-07-07 16:41 . 2008-07-07 16:41	<DIR>	d--------	C:\Program Files\Trend Micro
    2008-07-07 16:26 . 2008-07-07 16:26	<DIR>	d--------	C:\WINDOWS\Downloaded Installations
    2008-07-07 16:11 . 2008-07-07 16:11	<DIR>	d--------	C:\Program Files\NewTek
    2008-07-07 16:10 . 2008-07-07 16:37	<DIR>	d--------	C:\Documents
    2008-07-07 15:58 . 2008-07-07 15:58	9,662	--a------	C:\WINDOWS\system32\ZoneAlarmIconUS.ico
    2008-07-07 15:53 . 2008-07-07 15:53	<DIR>	d--------	C:\Program Files\iCheck
    2008-07-07 15:53 . 2008-07-07 15:53	<DIR>	d--------	C:\Program Files\GetPack
    2008-07-07 15:32 . 2008-07-07 15:32	<DIR>	d--------	C:\Program Files\Webtools
    2008-07-07 12:29 . 2008-07-07 12:29	0	--a------	C:\Documents and Settings\Vash P\jagex_runescape_preferences.dat
    2008-07-07 12:28 . 2008-07-07 12:28	<DIR>	d--------	C:\WINDOWS\.jagex_cache_32
    2008-07-06 22:43 . 2008-07-06 22:43	<DIR>	d--------	C:\Documents and Settings\Vash P\Application Data\DAEMON Tools
    2008-07-06 22:24 . 2008-07-06 22:24	<DIR>	d--------	C:\Program Files\Elaborate Bytes
    2008-07-06 22:02 . 2008-07-06 22:02	54,156	--ah-----	C:\WINDOWS\QTFont.qfn
    2008-07-06 22:02 . 2008-07-06 22:02	1,409	--a------	C:\WINDOWS\QTFont.for
    2008-07-06 15:28 . 2007-02-20 16:04	2,463,976	--a------	C:\WINDOWS\system32\NPSWF32.dll
    2008-07-06 15:28 . 2007-02-20 16:04	370,134	--a------	C:\WINDOWS\system32\NPSWF32_FlashUtil.exe
    2008-07-06 11:10 . 2008-07-06 11:10	<DIR>	d--------	C:\Program Files\Smart Projects
    2008-07-03 19:29 . 2008-07-03 19:29	<DIR>	d--------	C:\Documents and Settings\Vash P\qlique
    2008-06-28 11:34 . 2008-06-28 11:34	<DIR>	d--------	C:\Documents and Settings\Vash P\CINEMA 4D
    2008-06-23 13:22 . 2008-06-23 13:24	<DIR>	d--------	C:\Documents and Settings\Vash P\Application Data\Digsby
    2008-06-23 13:21 . 2008-06-23 13:29	<DIR>	d--------	C:\Program Files\Digsby
    2008-06-20 23:26 . 2008-06-20 23:26	<DIR>	d--------	C:\Program Files\TOSHIBA
    2008-06-20 23:26 . 2005-03-25 19:39	495,616	--a------	C:\WINDOWS\system32\TOSCDSPD.cpl
    2008-06-20 23:18 . 2008-03-14 10:02	2,097,152	--a------	C:\Temp\autorun.bin
    2008-06-20 23:18 . 2008-03-10 13:14	966,618	--a------	C:\Temp\SFDNWIN.exe
    2008-06-18 12:21 . 2008-06-18 09:21	403,426	---------	C:\WINDOWS\b148.exe_old
    2008-06-17 22:09 . 2008-06-17 22:09	<DIR>	d--------	C:\Temp\ext18866
    2008-06-17 22:09 . 2008-06-17 22:09	<DIR>	d--------	C:\Program Files\Microsoft Silverlight
    2008-06-16 21:17 . 2005-07-06 11:52	9,600	--a------	C:\WINDOWS\system32\BUFADPT.SYS
    2008-06-16 21:16 . 2006-02-01 09:05	370,134	--a------	C:\WINDOWS\UN800114.EXE
    2008-06-16 21:16 . 2008-06-16 21:18	23,287	--a------	C:\WINDOWS\UN800114.INI
    2008-06-15 17:54 . 2008-06-15 17:54	<DIR>	d--------	C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor
    2008-06-15 17:54 . 2005-11-24 19:51	245,248	--a------	C:\WINDOWS\system32\rt73.sys
    2008-06-15 17:54 . 2008-06-15 17:54	20,747	--a------	C:\WINDOWS\system32\drivers\AegisP.sys
    2008-06-15 17:54 . 2005-12-06 04:24	7,846	--a------	C:\WINDOWS\system32\rt73.cat
    2008-06-15 17:54 . 2008-06-15 17:54	1,361	--a------	C:\WINDOWS\system32\WLAN.INI
    2008-06-15 17:43 . 2005-11-24 19:51	245,248	--a------	C:\WINDOWS\system32\drivers\rt73.sys
    2008-06-15 17:43 . 2003-10-13 15:30	94,208	--a------	C:\WINDOWS\system32\GTW32N50.dll
    2008-06-15 17:43 . 2005-11-03 17:41	32,768	--a------	C:\WINDOWS\system32\GTGina.dll
    2008-06-15 17:43 . 2003-09-25 23:28	31,930	--a------	C:\WINDOWS\system32\GTNDIS3.VXD
    2008-06-15 17:43 . 2005-02-01 18:18	17,992	--a------	C:\WINDOWS\system32\drivers\bcm42rly.sys
    2008-06-15 17:43 . 2005-02-01 18:18	17,992	--a------	C:\WINDOWS\system32\bcm42rly.sys
    2008-06-15 17:43 . 2005-02-01 18:18	17,992	--a------	C:\WINDOWS\bcm42rly.sys
    2008-06-15 17:43 . 2003-09-25 22:15	15,872	--a------	C:\WINDOWS\system32\GTNDIS5.sys
    2008-06-11 04:42 . 2008-06-13 07:05	272,128	-----c---	C:\WINDOWS\system32\dllcache\bthport.sys
    2008-06-11 04:42 . 2008-05-08 10:02	203,136	-----c---	C:\WINDOWS\system32\dllcache\rmcast.sys
    
    .
    ((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-07-08 05:30	---------	d-----w	C:\Program Files\Trillian
    2008-07-08 01:28	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\mIRC
    2008-07-08 01:21	---------	d-----w	C:\Program Files\mIRC
    2008-07-07 20:08	---------	d-----w	C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-07-07 19:22	---------	d-----w	C:\Program Files\PeerGuardian2
    2008-07-07 19:22	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\uTorrent
    2008-07-07 02:43	717,296	----a-w	C:\WINDOWS\system32\drivers\sptd.sys
    2008-07-06 19:13	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\U3
    2008-07-06 18:56	---------	d-----w	C:\Program Files\Common Files\Adobe
    2008-07-06 14:21	---------	d-----w	C:\Program Files\MagicISO
    2008-07-06 06:14	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\dvdcss
    2008-06-23 20:51	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\foobar2000
    2008-06-21 03:40	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\Azureus
    2008-06-21 03:26	---------	d--h--w	C:\Program Files\InstallShield Installation Information
    2008-06-16 14:50	256	----a-w	C:\Documents and Settings\Vash P\pool.bin
    2008-06-13 11:05	272,128	------w	C:\WINDOWS\system32\drivers\bthport.sys
    2008-06-09 19:19	---------	d-----w	C:\Documents and Settings\All Users\Application Data\Microsoft Help
    2008-06-04 01:21	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\Winamp
    2008-06-01 15:41	---------	d-----w	C:\Program Files\AssaultCube
    2008-05-30 13:22	25,344	----a-w	C:\WINDOWS\system32\drivers\VClone.sys
    2008-05-14 00:32	---------	d-----w	C:\Program Files\Microsoft Research
    2008-05-10 16:15	---------	d-----w	C:\Program Files\Hamsterball
    2008-05-10 16:14	---------	d-----w	C:\Program Files\ReflexiveArcade
    2008-05-09 20:51	---------	d-----w	C:\Program Files\Unlocker
    2008-05-09 00:47	---------	d-----w	C:\Program Files\Roxio
    2008-05-09 00:47	---------	d-----w	C:\Program Files\Common Files\Sonic Shared
    2008-05-09 00:47	---------	d-----w	C:\Program Files\Common Files\Roxio Shared
    2008-05-09 00:41	---------	d-----w	C:\Program Files\Research In Motion
    2008-05-09 00:41	---------	d-----w	C:\Program Files\Common Files\Research In Motion
    2008-05-08 23:49	---------	d-----w	C:\Program Files\De Blob
    2008-05-08 21:17	---------	d-----w	C:\Program Files\Virtools
    2008-05-08 14:02	203,136	----a-w	C:\WINDOWS\system32\drivers\rmcast.sys
    2008-04-24 23:11	211,420	----a-w	C:\WINDOWS\fire-un.exe
    2008-04-14 09:42	50,688	----a-w	C:\WINDOWS\twain_32.dll
    2008-04-14 09:42	461,270	----a-w	C:\WINDOWS\winhlp32.exe
    2008-04-14 09:42	324,064	----a-w	C:\WINDOWS\regedit.exe
    2008-04-14 09:42	246,752	----a-w	C:\WINDOWS\notepad.exe
    2008-04-14 09:42	214,492	------w	C:\WINDOWS\slrundll.exe
    2008-04-14 09:42	188,374	----a-w	C:\WINDOWS\hh.exe
    2008-04-14 09:42	1,044,480	----a-w	C:\WINDOWS\explorer.exe
    2008-03-20 20:14	47,360	----a-w	C:\Documents and Settings\Vash P\Application Data\pcouffin.sys
    2007-06-13 10:23	2,927,578	--sh--r	C:\WINDOWS\system32\kntnda.exe
    .
    
    ------- Sigcheck -------
    
    2008-04-14 05:42  1044480  a200e49c4a26e7cf587138d8b7c92dca	C:\WINDOWS\explorer.exe
    2007-06-13 07:26  1210844  5b701800b5c61d9bd1133d8ba31f09c5	C:\WINDOWS\$hf_mig$\KB938828\SP2QFE\explorer.exe
    2007-06-13 06:23  1210838  71576c2079eb4ac0c07585894cdff8f9	C:\WINDOWS\$NtServicePackUninstall$\explorer.exe
    2008-04-14 05:42  1211362  344d2cc238322fe2cdae1f22fe9db299	C:\WINDOWS\ServicePackFiles\i386\explorer.exe
    
    2004-08-04 03:56  192980  25cbe1982218a95a25060ddcf98ff4dd	C:\WINDOWS\$NtServicePackUninstall$\ctfmon.exe
    2008-04-14 05:42  192988  bcf11dec7cc8cebfc49a26b6f825e432	C:\WINDOWS\ServicePackFiles\i386\ctfmon.exe
    2008-04-14 05:42  189952  3521c0848def439c024c850321aa1c1b	C:\WINDOWS\system32\ctfmon.exe
    .
    (((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown 
    REGEDIT4
    
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Dlhxzy"="C:\Program Files\Common Files\?ssembly\?xplorer.exe" [?]
    "BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2007-06-27 19:03 333278]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2008-04-14 05:42 189952]
    "GetPack19"="C:\Program Files\GetPack\GetPack19.exe" [2008-06-17 05:56 538590]
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2007-11-11 13:51 8523776]
    "VirtualCloneDrive"="C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" [2006-04-29 09:21 284118]
    "runner1"="C:\WINDOWS\mrofinu1001186.exe" [2008-07-08 17:06 41984]
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
    "AllowLegacyWebView"= 1 (0x1)
    "AllowUnhashedWebView"= 1 (0x1)
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "msacm.ac3filter"= ac3filter.acm
    "VIDC.XFR1"= xfcodec.dll
    "vidc.ffds"= C:\PROGRA~1\COMBIN~1\Filters\FFDShow\ff_vfw.dll
    
    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride"=dword:00000001
    "FirewallOverride"=dword:00000001
    
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "C:\\Program Files\\uTorrent\\uTorrent.exe"=
    "C:\\Program Files\\BearShare\\BearShare.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "C:\\Program Files\\Azureus\\Azureus.exe"=
    "C:\\WINDOWS\\system32\\javaw.exe"=
    "C:\\Program Files\\Trillian\\trillian.exe"=
    "C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Game.exe"=
    "C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Launcher.exe"=
    "C:\\Program Files\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe"=
    "C:\\Program Files\\Electronic Arts\\Medal of Honor Airborne\\UnrealEngine3\\Binaries\\MOHA.exe"=
    "C:\\Program Files\\mIRC\\mirc.exe"=
    "C:\\Program Files\\Mozilla Firefox\\firefox.exe"=
    
    R1 BUFADPT;BUFADPT;C:\WINDOWS\system32\BUFADPT.SYS [2005-07-06 11:52]
    S3 WLIU2KG125S;BUFFALO WLI-U2-KG125S Wireless LAN Adapter Driver;C:\WINDOWS\system32\DRIVERS\usb8023.sys [2008-04-14 00:26]
    
    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{8edb9763-4a9b-11dd-b167-0013e814732f}]
    \Shell\AutoRun\command - F:\LaunchU3.exe -a
    
    .
    - - - - ORPHANS REMOVED - - - -
    
    HKCU-Run-Rrwr - C:\WINDOWS\ASEMBL~1\tracert.exe
    
    
    **************************************************************************
    
    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-08 17:06:20
    Windows 5.1.2600 Service Pack 3 NTFS
    
    detected NTDLL code modification:
    ZwOpenFile
    
    scanning hidden processes ... 
    
    scanning hidden autostart entries ...
    
    scanning hidden files ... 
    
    
    C:\WINDOWS\mrofinu1001186.exe 41984 bytes executable
    
    scan completed successfully
    hidden files: 1
    
    **************************************************************************
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\PnkBstrA.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WUSB54GC.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
    C:\WINDOWS\mrofinu1001186.exexe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\system32\rundll32.exe
    .
    **************************************************************************
    .
    Completion time: 2008-07-08 17:12:48 - machine was rebooted
    ComboFix-quarantined-files.txt  2008-07-08 21:12:26
    
    Pre-Run: 65,079,349,248 bytes free
    Post-Run: 65,049,804,800 bytes free
    
    231	--- E O F ---	2008-06-20 23:15:39
    
    

    And the new HiJackThis log:
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 5:14:36 PM, on 7/8/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16674)
    Boot mode: Normal
    
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\system32\PnkBstrA.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WUSB54GC.exe
    C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe
    C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\GetPack\GetPack19.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
    C:\WINDOWS\17PHolmes1001186.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.windowsxlive.net
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [VirtualCloneDrive] "C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [Dlhxzy] "C:\Program Files\Common Files\?ssembly\?xplorer.exe"
    O4 - HKCU\..\Run: [GetPack19] "C:\Program Files\GetPack\GetPack19.exe"
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1201559993061
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
    O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
    O23 - Service: Roxio UPnP Renderer 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe
    O23 - Service: Roxio Upnp Server 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe
    O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
    O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
    O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
    O23 - Service: SolidWorks Licensing Service - SolidWorks - C:\Program Files\Common Files\SolidWorks Shared\Service\SolidWorksLicensing.exe
    O23 - Service: WUSB54GCSVC - GEMTEKS - C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
    
    --
    End of file - 6280 bytes
    
    
  • edited July 2008
    Hello! :) I just started here and you are my first victim. ;)

    Open HijackThis, Click Do a system scan only, checkmark this/these. Then close all other windows except HijackThis and press fix checked.

    O4 - HKCU\..\Run: [Dlhxzy] "C:\Program Files\Common Files\?ssembly\?xplorer.exe"
    __________________

    Open notepad and copy/paste the text in the quotebox below into it:
    Rootkit::
    C:\WINDOWS\mrofinu1001186.exe

    File::
    C:\WINDOWS\mrofinu1001186.exe
    C:\WINDOWS\system32\kntnda.exe
    C:\WINDOWS\17PHolmes1001186.exe


    Folder::
    C:\Temp
    Save this as CFScript.txt

    Then drag the CFScript.txt into ComboFix.exe as you see in the screenshot below.

    CFScript.gif

    This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThislog.
    ______________

    Please download ATF-cleaner and save it to your desktop.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.

      If you use Firefox browser:
    • Click Firefox at the top and choose: Select All
    • Click the Empty Selected button.
    • NOTE: If you would like to keep your saved passwords, please click No at the prompt.

      If you use Opera browser:
    • Click Opera at the top and choose: Select All
    • Click the Empty Selected button.
    • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    • Click Exit on the Main menu to close the program.

    __________________

    Please download Malwarebytes Anti-Malware and save it to your desktop.
    alternate download link 1
    alternate download link 2
    • Make sure you are connected to the Internet.
    • Double-click on Download_mbam-setup.exe to install the application.
    • When the installation begins, follow the prompts and do not make any changes to default settings.
    • When installation has finished, make sure you leave both of these checked:
      • Update Malwarebytes' Anti-Malware
      • Launch Malwarebytes' Anti-Malware
    • Then click Finish.
    • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
    • On the Scanner tab:
      • Make sure the "Perform Quick Acan" option is selected.
      • Then click on the Scan button.
    • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
    • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
    • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
    • Click OK to close the message box and continue with the removal process.
    • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
    • Make sure that everything is checked, and click Remove Selected.
    • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
    • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
    • Copy and paste the contents of that report in your next reply and exit MBAM.
    Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
    ________________

    Download SDFix and save it to your Desktop.

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, the Advanced Options Menu should appear;
    • Select the first option, to run Windows in Safe Mode, then press Enter.
    • Choose your usual account.
    • Open the extracted SDFix folder and double click RunThis.bat to start the script.
    • Type Y to begin the cleanup process.
    • It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
    • Press any Key and it will restart the PC.
    • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
      (Report.txt will also be copied to Clipboard ready for posting back on the forum).
    Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
    _______________

    Post:
    - A fresh HijackThis log
    - Contents of Report.txt
    -
    MBAM report
  • V-PV-P State College, PA Member
    edited July 2008
    Wow that took a long time. Here's everything you asked for. Thanks a lot for the help!


    MBAM:
    Malwarebytes' Anti-Malware 1.20
    Database version: 935
    Windows 5.1.2600 Service Pack 3
    
    1:54:17 PM 7/9/2008
    mbam-log-7-9-2008 (13-54-17).txt
    
    Scan type: Quick Scan
    Objects scanned: 39227
    Time elapsed: 4 minute(s), 23 second(s)
    
    Memory Processes Infected: 0
    Memory Modules Infected: 7
    Registry Keys Infected: 2
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 2
    Files Infected: 30
    
    Memory Processes Infected:
    (No malicious items detected)
    
    Memory Modules Infected:
    C:\WINDOWS\Temp\yna3.tmp (BackDoor.ProRat) -> Unloaded module successfully.
    C:\WINDOWS\Temp\sna5.tmp (BackDoor.ProRat) -> Unloaded module successfully.
    C:\WINDOWS\Temp\ena1.tmp (BackDoor.ProRat) -> Unloaded module successfully.
    C:\WINDOWS\Temp\pna4.tmp (BackDoor.ProRat) -> Unloaded module successfully.
    C:\Documents and Settings\Vash P\Local Settings\Temp\haa8.tmp (BackDoor.ProRat) -> Unloaded module successfully.
    C:\WINDOWS\Temp\gpaC.tmp (BackDoor.ProRat) -> Unloaded module successfully.
    C:\Program Files\Mozilla Firefox\components\srff.dll (Adware.SurfAccuracy) -> Unloaded module successfully.
    
    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\icheck (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\GetPack (Adware.Agent) -> Quarantined and deleted successfully.
    
    Registry Values Infected:
    (No malicious items detected)
    
    Registry Data Items Infected:
    (No malicious items detected)
    
    Folders Infected:
    C:\Program Files\Webtools (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Program Files\iCheck (Trojan.Agent) -> Quarantined and deleted successfully.
    
    Files Infected:
    C:\WINDOWS\Temp\yna3.tmp (BackDoor.ProRat) -> Delete on reboot.
    C:\WINDOWS\Temp\sna5.tmp (BackDoor.ProRat) -> Delete on reboot.
    C:\WINDOWS\Temp\ena1.tmp (BackDoor.ProRat) -> Delete on reboot.
    C:\WINDOWS\Temp\pna4.tmp (BackDoor.ProRat) -> Delete on reboot.
    C:\Documents and Settings\Vash P\Local Settings\Temp\haa8.tmp (BackDoor.ProRat) -> Delete on reboot.
    C:\WINDOWS\Temp\gpaC.tmp (BackDoor.ProRat) -> Delete on reboot.
    C:\Program Files\Mozilla Firefox\components\srff.dll (Adware.SurfAccuracy) -> Delete on reboot.
    C:\WINDOWS\Temp\aub2C.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\cda22.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\eab3A.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\ema27.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\eqb35.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\fib2B.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\hka29.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\loa25.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\lra1A.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\mgb2D.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\nob38.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\psb2E.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\rba26.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\reb2F.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\swa2A.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\uya28.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\vcb37.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\yra19.tmp (BackDoor.ProRat) -> Quarantined and deleted successfully.
    C:\Program Files\Webtools\webtools.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Program Files\iCheck\iCheck.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Program Files\iCheck\Uninstall.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\b148.exe_old (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\b157.exe_old (Trojan.Downloader) -> Quarantined and deleted successfully.
    

    ComboFix
    ComboFix 08-07-08.9 - Vash P 2008-07-09 13:35:56.2 - NTFSx86
    Running from: C:\Documents and Settings\Vash P\Desktop\ComboFix.exe
    Command switches used :: C:\Documents and Settings\Vash P\Desktop\CFScript.txt
    
    [color=red][b]WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !![/b][/color]
    
    FILE ::
    C:\WINDOWS\17PHolmes1001186.exe
    C:\WINDOWS\mrofinu1001186.exe
    C:\WINDOWS\system32\kntnda.exe
    .
    
    (((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    
    C:\Program Files\GetPack
    C:\Program Files\GetPack\GetPack19.exe
    C:\Temp
    C:\Temp\autorun.bin
    C:\Temp\ext18866\install.exe
    C:\Temp\ext18866\install.res.dll
    C:\Temp\SFDNWIN.exe
    C:\WINDOWS\mrofinu1001186.exe
    C:\WINDOWS\mrofinu1001186.exe.tmp
    C:\WINDOWS\system32\kntnda.exe
    C:\WINDOWS\system32\twunk_16.exe
    
    .
    (((((((((((((((((((((((((   Files Created from 2008-06-09 to 2008-07-09  )))))))))))))))))))))))))))))))
    .
    
    2008-07-08 00:07 . 2008-07-08 00:07	4,286	--a------	C:\WINDOWS\system32\Jamster.ico
    2008-07-07 16:41 . 2008-07-07 16:41	<DIR>	d--------	C:\Program Files\Trend Micro
    2008-07-07 16:26 . 2008-07-07 16:26	<DIR>	d--------	C:\WINDOWS\Downloaded Installations
    2008-07-07 16:11 . 2008-07-07 16:11	<DIR>	d--------	C:\Program Files\NewTek
    2008-07-07 16:10 . 2008-07-07 16:37	<DIR>	d--------	C:\Documents
    2008-07-07 15:58 . 2008-07-07 15:58	9,662	--a------	C:\WINDOWS\system32\ZoneAlarmIconUS.ico
    2008-07-07 15:53 . 2008-07-07 15:53	<DIR>	d--------	C:\Program Files\iCheck
    2008-07-07 15:32 . 2008-07-07 15:32	<DIR>	d--------	C:\Program Files\Webtools
    2008-07-07 12:29 . 2008-07-07 12:29	0	--a------	C:\Documents and Settings\Vash P\jagex_runescape_preferences.dat
    2008-07-07 12:28 . 2008-07-07 12:28	<DIR>	d--------	C:\WINDOWS\.jagex_cache_32
    2008-07-06 22:43 . 2008-07-06 22:43	<DIR>	d--------	C:\Documents and Settings\Vash P\Application Data\DAEMON Tools
    2008-07-06 22:24 . 2008-07-06 22:24	<DIR>	d--------	C:\Program Files\Elaborate Bytes
    2008-07-06 22:02 . 2008-07-06 22:02	54,156	--ah-----	C:\WINDOWS\QTFont.qfn
    2008-07-06 22:02 . 2008-07-06 22:02	1,409	--a------	C:\WINDOWS\QTFont.for
    2008-07-06 15:28 . 2007-02-20 16:04	2,463,976	--a------	C:\WINDOWS\system32\NPSWF32.dll
    2008-07-06 15:28 . 2007-02-20 16:04	370,134	--a------	C:\WINDOWS\system32\NPSWF32_FlashUtil.exe
    2008-07-06 11:10 . 2008-07-06 11:10	<DIR>	d--------	C:\Program Files\Smart Projects
    2008-07-03 19:29 . 2008-07-03 19:29	<DIR>	d--------	C:\Documents and Settings\Vash P\qlique
    2008-06-28 11:34 . 2008-06-28 11:34	<DIR>	d--------	C:\Documents and Settings\Vash P\CINEMA 4D
    2008-06-23 13:22 . 2008-06-23 13:24	<DIR>	d--------	C:\Documents and Settings\Vash P\Application Data\Digsby
    2008-06-23 13:21 . 2008-06-23 13:29	<DIR>	d--------	C:\Program Files\Digsby
    2008-06-20 23:26 . 2008-06-20 23:26	<DIR>	d--------	C:\Program Files\TOSHIBA
    2008-06-20 23:26 . 2005-03-25 19:39	495,616	--a------	C:\WINDOWS\system32\TOSCDSPD.cpl
    2008-06-18 12:21 . 2008-06-18 09:21	403,426	---------	C:\WINDOWS\b148.exe_old
    2008-06-17 22:09 . 2008-06-17 22:09	<DIR>	d--------	C:\Program Files\Microsoft Silverlight
    2008-06-16 21:17 . 2005-07-06 11:52	9,600	--a------	C:\WINDOWS\system32\BUFADPT.SYS
    2008-06-16 21:16 . 2006-02-01 09:05	370,134	--a------	C:\WINDOWS\UN800114.EXE
    2008-06-16 21:16 . 2008-06-16 21:18	23,287	--a------	C:\WINDOWS\UN800114.INI
    2008-06-15 17:54 . 2008-06-15 17:54	<DIR>	d--------	C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor
    2008-06-15 17:54 . 2005-11-24 19:51	245,248	--a------	C:\WINDOWS\system32\rt73.sys
    2008-06-15 17:54 . 2008-06-15 17:54	20,747	--a------	C:\WINDOWS\system32\drivers\AegisP.sys
    2008-06-15 17:54 . 2005-12-06 04:24	7,846	--a------	C:\WINDOWS\system32\rt73.cat
    2008-06-15 17:54 . 2008-06-15 17:54	1,361	--a------	C:\WINDOWS\system32\WLAN.INI
    2008-06-15 17:43 . 2005-11-24 19:51	245,248	--a------	C:\WINDOWS\system32\drivers\rt73.sys
    2008-06-15 17:43 . 2003-10-13 15:30	94,208	--a------	C:\WINDOWS\system32\GTW32N50.dll
    2008-06-15 17:43 . 2005-11-03 17:41	32,768	--a------	C:\WINDOWS\system32\GTGina.dll
    2008-06-15 17:43 . 2003-09-25 23:28	31,930	--a------	C:\WINDOWS\system32\GTNDIS3.VXD
    2008-06-15 17:43 . 2005-02-01 18:18	17,992	--a------	C:\WINDOWS\system32\drivers\bcm42rly.sys
    2008-06-15 17:43 . 2005-02-01 18:18	17,992	--a------	C:\WINDOWS\system32\bcm42rly.sys
    2008-06-15 17:43 . 2005-02-01 18:18	17,992	--a------	C:\WINDOWS\bcm42rly.sys
    2008-06-15 17:43 . 2003-09-25 22:15	15,872	--a------	C:\WINDOWS\system32\GTNDIS5.sys
    2008-06-11 04:42 . 2008-06-13 07:05	272,128	-----c---	C:\WINDOWS\system32\dllcache\bthport.sys
    2008-06-11 04:42 . 2008-05-08 10:02	203,136	-----c---	C:\WINDOWS\system32\dllcache\rmcast.sys
    
    .
    ((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-07-09 07:24	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\uTorrent
    2008-07-09 07:07	---------	d-----w	C:\Documents and Settings\All Users\Application Data\Microsoft Help
    2008-07-09 03:05	---------	d-----w	C:\Program Files\Trillian
    2008-07-09 02:56	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\mIRC
    2008-07-09 02:42	---------	d-----w	C:\Program Files\mIRC
    2008-07-07 20:08	---------	d-----w	C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-07-07 19:22	---------	d-----w	C:\Program Files\PeerGuardian2
    2008-07-07 02:43	717,296	----a-w	C:\WINDOWS\system32\drivers\sptd.sys
    2008-07-06 19:13	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\U3
    2008-07-06 18:56	---------	d-----w	C:\Program Files\Common Files\Adobe
    2008-07-06 14:21	---------	d-----w	C:\Program Files\MagicISO
    2008-07-06 06:14	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\dvdcss
    2008-06-23 20:51	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\foobar2000
    2008-06-21 03:40	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\Azureus
    2008-06-21 03:26	---------	d--h--w	C:\Program Files\InstallShield Installation Information
    2008-06-16 14:50	256	----a-w	C:\Documents and Settings\Vash P\pool.bin
    2008-06-13 11:05	272,128	------w	C:\WINDOWS\system32\drivers\bthport.sys
    2008-06-04 01:21	---------	d-----w	C:\Documents and Settings\Vash P\Application Data\Winamp
    2008-06-01 15:41	---------	d-----w	C:\Program Files\AssaultCube
    2008-05-30 13:22	25,344	----a-w	C:\WINDOWS\system32\drivers\VClone.sys
    2008-05-14 00:32	---------	d-----w	C:\Program Files\Microsoft Research
    2008-05-10 16:15	---------	d-----w	C:\Program Files\Hamsterball
    2008-05-10 16:14	---------	d-----w	C:\Program Files\ReflexiveArcade
    2008-05-09 20:51	---------	d-----w	C:\Program Files\Unlocker
    2008-05-09 00:47	---------	d-----w	C:\Program Files\Roxio
    2008-05-09 00:47	---------	d-----w	C:\Program Files\Common Files\Sonic Shared
    2008-05-09 00:47	---------	d-----w	C:\Program Files\Common Files\Roxio Shared
    2008-05-09 00:41	---------	d-----w	C:\Program Files\Research In Motion
    2008-05-09 00:41	---------	d-----w	C:\Program Files\Common Files\Research In Motion
    2008-04-24 23:11	211,420	----a-w	C:\WINDOWS\fire-un.exe
    2008-04-14 09:42	50,688	----a-w	C:\WINDOWS\twain_32.dll
    2008-04-14 09:42	461,270	----a-w	C:\WINDOWS\winhlp32.exe
    2008-04-14 09:42	324,064	----a-w	C:\WINDOWS\regedit.exe
    2008-04-14 09:42	246,752	----a-w	C:\WINDOWS\notepad.exe
    2008-04-14 09:42	214,492	------w	C:\WINDOWS\slrundll.exe
    2008-04-14 09:42	188,374	----a-w	C:\WINDOWS\hh.exe
    2008-04-14 09:42	1,044,480	----a-w	C:\WINDOWS\explorer.exe
    2008-03-20 20:14	47,360	----a-w	C:\Documents and Settings\Vash P\Application Data\pcouffin.sys
    .
    
    ------- Sigcheck -------
    
    2008-04-14 05:42  1044480  a200e49c4a26e7cf587138d8b7c92dca	C:\WINDOWS\explorer.exe
    2007-06-13 07:26  1210844  5b701800b5c61d9bd1133d8ba31f09c5	C:\WINDOWS\$hf_mig$\KB938828\SP2QFE\explorer.exe
    2007-06-13 06:23  1210838  71576c2079eb4ac0c07585894cdff8f9	C:\WINDOWS\$NtServicePackUninstall$\explorer.exe
    2008-04-14 05:42  1211362  344d2cc238322fe2cdae1f22fe9db299	C:\WINDOWS\ServicePackFiles\i386\explorer.exe
    
    2004-08-04 03:56  192980  25cbe1982218a95a25060ddcf98ff4dd	C:\WINDOWS\$NtServicePackUninstall$\ctfmon.exe
    2008-04-14 05:42  192988  bcf11dec7cc8cebfc49a26b6f825e432	C:\WINDOWS\ServicePackFiles\i386\ctfmon.exe
    2008-04-14 05:42  367574  441bbee712ecdafc4b1922e6f4401190	C:\WINDOWS\system32\ctfmon.exe
    .
    (((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown 
    REGEDIT4
    
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2007-06-27 19:03 333278]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2008-04-14 05:42 367574]
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2007-11-11 13:51 8523776]
    "VirtualCloneDrive"="C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" [2006-04-29 09:21 284118]
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
    "AllowLegacyWebView"= 1 (0x1)
    "AllowUnhashedWebView"= 1 (0x1)
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "msacm.ac3filter"= ac3filter.acm
    "VIDC.XFR1"= xfcodec.dll
    "vidc.ffds"= C:\PROGRA~1\COMBIN~1\Filters\FFDShow\ff_vfw.dll
    
    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride"=dword:00000001
    "FirewallOverride"=dword:00000001
    
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "C:\\Program Files\\uTorrent\\uTorrent.exe"=
    "C:\\Program Files\\BearShare\\BearShare.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "C:\\Program Files\\Azureus\\Azureus.exe"=
    "C:\\WINDOWS\\system32\\javaw.exe"=
    "C:\\Program Files\\Trillian\\trillian.exe"=
    "C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Game.exe"=
    "C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Launcher.exe"=
    "C:\\Program Files\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe"=
    "C:\\Program Files\\Electronic Arts\\Medal of Honor Airborne\\UnrealEngine3\\Binaries\\MOHA.exe"=
    "C:\\Program Files\\mIRC\\mirc.exe"=
    "C:\\Program Files\\Mozilla Firefox\\firefox.exe"=
    
    
    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{8edb9763-4a9b-11dd-b167-0013e814732f}]
    \Shell\AutoRun\command - F:\LaunchU3.exe -a
    
    .
    - - - - ORPHANS REMOVED - - - -
    
    HKCU-Run-GetPack19 - C:\Program Files\GetPack\GetPack19.exe
    
    
    **************************************************************************
    
    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-09 13:40:03
    Windows 5.1.2600 Service Pack 3 NTFS
    
    detected NTDLL code modification:
    ZwOpenFile
    
    scanning hidden processes ... 
    
    scanning hidden autostart entries ...
    
    scanning hidden files ... 
    
    scan completed successfully
    hidden files: 0
    
    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------
    
    PROCESS: C:\WINDOWS\explorer.exe
    -> C:\DOCUME~1\VASHP~1\LOCALS~1\Temp\haa8.tmp
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\PnkBstrA.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WUSB54GC.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
    C:\WINDOWS\system32\cscript.exe
    C:\WINDOWS\system32\rundll32.exe
    .
    **************************************************************************
    .
    Completion time: 2008-07-09 13:45:27 - machine was rebooted
    ComboFix-quarantined-files.txt  2008-07-09 17:45:05
    ComboFix2.txt  2008-07-08 21:12:49
    
    Pre-Run: 69,637,189,632 bytes free
    Post-Run: 69,663,723,520 bytes free
    
    197	--- E O F ---	2008-07-09 07:07:42
    

    SDFix:
    [b]SDFix: Version 1.204 [/b]
    Run by Vash P on Wed 07/09/2008 at 02:13 PM
    
    Microsoft Windows XP [Version 5.1.2600]
    Running From: C:\SDFix
    
    [b]Checking Services [/b]:
    
    
    Restoring Default Security Values
    Restoring Default Hosts File
    
    Rebooting
    
    
    [b]Checking Files [/b]: 
    
    Trojan Files Found:
    
    C:\WINDOWS\mrofinu1001186.exe - Deleted
    
    
    
    
    
    Removing Temp Files
    
    [b]ADS Check [/b]:
     
    
    
                                     [b]Final Check [/b]:
    
    catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-09 14:24:23
    Windows 5.1.2600 Service Pack 3 NTFS
    
    detected NTDLL code modification:
    ZwOpenFile
    
    scanning hidden processes ...
    
    scanning hidden services & system hive ...
    
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
    "s1"=dword:2df9c43f
    "s2"=dword:110480d0
    "h0"=dword:00000001
    
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
    "h0"=dword:00000000
    "khjeh"=hex:29,b0,d4,98,a8,cb,1b,4c,55,ed,2b,b8,19,ea,6f,3d,1f,a8,d9,f8,18,..
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
    "h0"=dword:00000000
    "khjeh"=hex:29,b0,d4,98,a8,cb,1b,4c,55,ed,2b,b8,19,ea,6f,3d,1f,a8,d9,f8,18,..
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
    "p0"="C:\Program Files\DAEMON Tools\"
    "h0"=dword:00000000
    "khjeh"=hex:1b,98,eb,fd,11,05,e0,bf,21,55,ec,db,9f,70,16,6f,c0,09,52,31,b3,..
    
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
    "a0"=hex:20,01,00,00,55,80,4b,4a,a2,2c,64,cf,dd,9f,a0,c0,f3,63,37,6c,2b,..
    "khjeh"=hex:26,f9,05,d6,6e,49,4d,42,1f,6a,f3,b4,9f,31,73,4c,ae,cd,2f,aa,7d,..
    
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
    "khjeh"=hex:73,07,82,f0,06,62,c8,bb,74,43,46,cc,08,44,c9,f8,67,aa,5b,e3,c6,..
    
    scanning hidden registry entries ...
    
    scanning hidden files ...
    
    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 0
    
    
    [b]Remaining Services [/b]:
    
    
    
    
    Authorized Application Key Export:
    
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
    "C:\\Program Files\\uTorrent\\uTorrent.exe"="C:\\Program Files\\uTorrent\\uTorrent.exe:*:Enabled:æTorrent"
    "C:\\Program Files\\BearShare\\BearShare.exe"="C:\\Program Files\\BearShare\\BearShare.exe:*:Enabled:BearShare"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
    "C:\\Program Files\\Azureus\\Azureus.exe"="C:\\Program Files\\Azureus\\Azureus.exe:*:Enabled:Azureus"
    "C:\\WINDOWS\\system32\\javaw.exe"="C:\\WINDOWS\\system32\\javaw.exe:*:Enabled:Java(TM) Platform SE binary"
    "C:\\Program Files\\Trillian\\trillian.exe"="C:\\Program Files\\Trillian\\trillian.exe:*:Enabled:Trillian"
    "C:\\Program Files\\Bonjour\\mDNSResponder.exe"="C:\\Program Files\\Bonjour\\mDNSResponder.exe:*:Enabled:Bonjour"
    "C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Game.exe"="C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Game.exe:*:Enabled:Rainbow Six Vegas"
    "C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Launcher.exe"="C:\\Program Files\\Ubisoft\\Tom Clancy's Rainbow Six Vegas\\Binaries\\R6Vegas_Launcher.exe:*:Enabled:Rainbow Six Vegas Updater"
    "C:\\Program Files\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe"="C:\\Program Files\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe:*:Enabled:Call of Duty(R) 4 - Modern Warfare(TM) "
    "C:\\Program Files\\Electronic Arts\\Medal of Honor Airborne\\UnrealEngine3\\Binaries\\MOHA.exe"="C:\\Program Files\\Electronic Arts\\Medal of Honor Airborne\\UnrealEngine3\\Binaries\\MOHA.exe:*:Enabled:Medal of Honor Airborne"
    "C:\\Program Files\\mIRC\\mirc.exe"="C:\\Program Files\\mIRC\\mirc.exe:*:Enabled:mIRC"
    "C:\\Program Files\\Mozilla Firefox\\firefox.exe"="C:\\Program Files\\Mozilla Firefox\\firefox.exe:*:Enabled:Firefox"
    "C:\\WINDOWS\\explorer.exe"="C:\\WINDOWS\\explorer.exe:*:Enabled:Windows Explorer"
    
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
    
    [b]Remaining Files [/b]:
    
    
    File Backups: - C:\SDFix\backups\backups.zip
    
    [b]Files with Hidden Attributes [/b]:
    
    Tue 12 Feb 2008            24 ..SH. --- "C:\WINDOWS\S46DFB382.tmp"
    Mon 28 Jan 2008     1,582,046 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SDUpdate.exe"
    Mon 28 Jan 2008     5,324,248 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
    Mon 28 Jan 2008     2,275,294 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
    Mon 24 Mar 2008         4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
    Sat 19 Apr 2008             0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
    Mon  2 Oct 2006       228,318 ...H. --- "C:\Program Files\Common Files\Adobe\ESD\DLMCleanup.exe"
    Sat  2 Feb 2008             0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\0a67b6c406b1d7e0f5c1e6f6d44a3f6e\BIT6.tmp"
    Sat  2 Feb 2008             0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\26924cbc8132a10b438ce6e2b49d4652\BIT4.tmp"
    Sat  2 Feb 2008             0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\2769b111678c52099a3b3123b12f2325\BIT8.tmp"
    Tue  8 Jul 2008             0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\b5ceb6274f4d7fd206d6adab3df8e834\BITF.tmp"
    Sat  2 Feb 2008             0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\b69c46c5109d0f8b0dee9fab84906813\BIT7.tmp"
    Sat  2 Feb 2008             0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\d77b9b5b8fed23dd91f50d167cce60d3\BIT9.tmp"
    Sat  2 Feb 2008             0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\fa6c916bb150f8a929e7a4ffdfbc120f\BIT5.tmp"
    Fri  2 May 2008         7,123 ...HR --- "C:\Documents and Settings\Vash P\Application Data\SecuROM\UserData\securom_v7_01.bak"
    Mon 12 Feb 2007     3,274,196 A..H. --- "C:\Documents and Settings\Vash P\Application Data\U3\temp\Launchpad Removal.exe"
    
    [b]Finished![/b]
    

    HiJackThis:
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 2:37:10 PM, on 7/9/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16674)
    Boot mode: Normal
    
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\system32\PnkBstrA.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
    C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WUSB54GC.exe
    C:\WINDOWS\17PHolmes1001186.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe
    C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wuauclt.exe
    
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.windowsxlive.net
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [VirtualCloneDrive] "C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKUS\S-1-5-21-861567501-2111687655-839522115-1004\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" (User '?')
    O4 - HKUS\S-1-5-21-861567501-2111687655-839522115-1004\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User '?')
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1201559993061
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
    O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
    O23 - Service: Roxio UPnP Renderer 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe
    O23 - Service: Roxio Upnp Server 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe
    O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
    O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
    O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
    O23 - Service: SolidWorks Licensing Service - SolidWorks - C:\Program Files\Common Files\SolidWorks Shared\Service\SolidWorksLicensing.exe
    O23 - Service: WUSB54GCSVC - GEMTEKS - C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
    
    --
    End of file - 6342 bytes
    
    
  • edited July 2008
    Hello :)

    Make your hidden files visible:
    • Click start
    • Click my computer
    • Select the Tools menu and click Folder Options.
    • After the new window appears select the View tab.
    • Put a checkmark in the checkbox labeled Display the contents of system folders.
    • Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.
    • Remove the checkmark from the checkbox labeled Hide file extensions for known file types.
    • Remove the checkmark from the checkbox labeled Hide protected operating system files.
    • Press the Apply button and then the OK button and shutdown My Computer.

    ______________

    Delete this file:
    (Using windows explorer; windows key+e)

    C:\WINDOWS\b148.exe_old
    ______________

    Please do a scan with Kaspersky Online Scanner

    Note: If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.

    Click on the Accept button and install any components it needs.
    • The program will install and then begin downloading the latest definition files.
    • After the files have been downloaded on the left side of the page in the Scan section select My Computer
    • This will start the program and scan your system.
    • The scan will take a while, so be patient and let it run.
    • Once the scan is complete, click on View scan report
    • Now, click on the Save Report as button.
    • Save the file to your desktop.
    • Copy and paste that information in your next post.
    _________________

    Post:

    - A fresh HijackThis log
    - Kaspersky's report
  • V-PV-P State College, PA Member
    edited July 2008
    Well, that file doesn't exist and Kaspersky is telling me Java and JavaScript are disabled in Firefox, neither of which is true.
  • edited July 2008
    Hello :)

    Download and scan with SUPERAntiSpyware Free for Home Users
    • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    • An icon will be created on your desktop. Double-click that icon to launch the program.
    • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
    • Under "Configuration and Preferences", click the Preferences button.
    • Click the Scanning Control tab.
    • Under Scanner Options make sure the following are checked (leave all others unchecked):
      • Close browsers before scanning.
      • Scan for tracking cookies.
      • Terminate memory threats before quarantining.
    • Click the "Close" button to leave the control center screen.
    • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    • On the left, make sure you check C:\Fixed Drive.
    • On the right, under "Complete Scan", choose Perform Complete Scan.
    • Click "Next" to start the scan. Please be patient while it scans your computer.
    • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    • Make sure everything has a checkmark next to it and click "Next".
    • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    • If asked if you want to reboot, click "Yes".
    • To retrieve the removal information after reboot, launch SUPERAntispyware again.
      • Click Preferences, then click the Statistics/Logs tab.
      • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
      • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
      • Please copy and paste the Scan Log results in your next reply.
    • Click Close to exit the program.


    Post:
    - A fresh HijackThis log
    - SUPERAntiSpyware Scan Log
  • edited July 2008
    Whilst we appreciate that you may be busy, it has been 7 days or more since we heard from you. This topic is now closed.

    Infections can change and fresh instructions will now need to be given. If you wish to reopen your topic, please send a Private Message (PM) to Trogan with a link to your thread.

    If you are not the user who started this thread, you must start your own Thread instead :)
This discussion has been closed.