reoccuring problem

pompalomppompalomp New
edited July 2008 in Spyware & Virus Removal
HI,

I have a problem where popups repeatedly appear on my desktop. I ran Spybot S&D and it came up with three problems, Rightmedia, Virtumonde.dll and Bitfrose.LA. After successfully removing them (according to spybot S&D) i ran the scanner again, low and behold there their again. Nothing i seem to do can get rid of them, please help.
thanks,
pompalomp

Comments

  • edited July 2008
    Please note that all instructions given are customised for this computer only, the tools used may cause damage if used on a computer with different infections.

    If you think you have similar problems, please post a log in the HJT forum and wait for help.

    Hello and welcome to the forums

    My name is Katana and I will be helping you to remove any infection(s) that you may have.

    Please observe these rules while we work:
    1. If you don't know, stop and ask! Don't keep going on.
    2. Please reply to this thread. Do not start a new topic.
    3. Please continue to respond until I give you the "All Clear"
    (Just because you can't see a problem doesn't mean it isn't there)

    If you can do those three things, everything should go smoothly :D

    Please Note, your security programs may give warnings for some of the tools I will ask you to use.
    Be assured, any links I give are safe



    Malwarebytes' Anti-Malware

    Please download Malwarebytes' Anti-Malware to your desktop.

    • Double-click mbam-setup.exe and follow the prompts to install the program.
    • At the end, be sure a checkmark is placed next to
      • Update Malwarebytes' Anti-Malware
      • and Launch Malwarebytes' Anti-Malware
    • then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select Perform full scan, then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Be sure that everything is checked, and click Remove Selected.
    • When completed, a log will open in Notepad. please copy and paste the log into your next reply
      • If you accidently close it, the log file is saved here and will be named like this:
      • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt



    Click here to download HJTinstall.exe
    • Save HJTinstall.exe to your desktop.
    • Double click on the HJTinstall.exe icon on your desktop.
    • By default it will install to C:\Program Files\Trend Micro\Hijack This.
    • Click I accept
    • Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
    • Click Save to save the log file and then the log will open in notepad.
    • Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    • Come back here to this thread and Paste the log in your next reply.
    • DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.



    Installed Programs

    Please could you give me a list of the programs that are installed.
    • Start HijackThis
    • Click on the Misc Tools button
    • Click on the Open Uninstall Manager button.

    You will see a list with the programs installed in your computer.
    Click on save list button and specify where you would like to save this file.
    When you press Save button a notepad will open with the contents of that file.
    Simply copy and paste the contents of that notepad into your next post.
  • pompalomppompalomp New
    edited July 2008
    Katana wrote:
    Hello and welcome to the forums

    My name is Katana and I will be helping you to remove any infection(s) that you may have.

    Please observe these rules while we work:
    1. If you don't know, stop and ask! Don't keep going on.
    2. Please reply to this thread. Do not start a new topic.
    3. Please continue to respond until I give you the "All Clear"
    (Just because you can't see a problem doesn't mean it isn't there)

    If you can do those three things, everything should go smoothly :D

    Please Note, your security programs may give warnings for some of the tools I will ask you to use.
    Be assured, any links I give are safe



    Malwarebytes' Anti-Malware

    Please download Malwarebytes' Anti-Malware to your desktop.

    • Double-click mbam-setup.exe and follow the prompts to install the program.
    • At the end, be sure a checkmark is placed next to
      • Update Malwarebytes' Anti-Malware
      • and Launch Malwarebytes' Anti-Malware
    • then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select Perform full scan, then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Be sure that everything is checked, and click Remove Selected.
    • When completed, a log will open in Notepad. please copy and paste the log into your next reply
      • If you accidently close it, the log file is saved here and will be named like this:
      • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt



    Click here to download HJTinstall.exe
    • Save HJTinstall.exe to your desktop.
    • Double click on the HJTinstall.exe icon on your desktop.
    • By default it will install to C:\Program Files\Trend Micro\Hijack This.
    • Click I accept
    • Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
    • Click Save to save the log file and then the log will open in notepad.
    • Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    • Come back here to this thread and Paste the log in your next reply.
    • DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.



    Installed Programs

    Please could you give me a list of the programs that are installed.
    • Start HijackThis
    • Click on the Misc Tools button
    • Click on the Open Uninstall Manager button.

    You will see a list with the programs installed in your computer.
    Click on save list button and specify where you would like to save this file.
    When you press Save button a notepad will open with the contents of that file.
    Simply copy and paste the contents of that notepad into your next post.

    Hi Katana,

    I ran Malwarebytes and removed the problems it discovered, the pop ups seemed to have stopped, but just in case, here is my HJT log.
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 20:46, on 2008-07-21
    Platform: Windows Vista SP1 (WinNT 6.00.1905)
    MSIE: Internet Explorer v7.00 (7.00.6001.18000)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\taskeng.exe
    C:\Program Files\ASUS WiFi-AP Solo\RtWLan.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Analog Devices\SoundMAX\SoundTray.exe
    D:\microsoft office 2007\Office12\GrooveMonitor.exe
    C:\Program Files\Analog Devices\Core\smax4pnp.exe
    C:\Windows\System32\rundll32.exe
    D:\Winpatrol\WinPatrol.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehtray.exe
    D:\Setpoint\SetPoint.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Program Files\Common Files\Logitech\KhalShared\KHALMNPR.EXE
    C:\Program Files\Windows Media Player\wmplayer.exe
    D:\Firefox\firefox.exe
    C:\Windows\system32\SearchFilterHost.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O1 - Hosts: ::1 localhost
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Adobe Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: cpmsky browser optimizer - {06a45b5a-a102-72ce-ae92-691604703d9b} - C:\Windows\system32\lagqykjauihwy.dll (file missing)
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - D:\Spybot\SPYBOT~1\SDHelper.dll
    O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - D:\microsoft office 2007\Office12\GrooveShellExtensions.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O3 - Toolbar: (no name) - {B1E0C6DC-BBEA-4DE1-BFCA-70362CD86579} - (no file)
    O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
    O4 - HKLM\..\Run: [SoundTray] C:\Program Files\Analog Devices\SoundMAX\SoundTray.exe
    O4 - HKLM\..\Run: [GrooveMonitor] "D:\microsoft office 2007\Office12\GrooveMonitor.exe"
    O4 - HKLM\..\Run: [MSConfig] "C:\Windows\system32\msconfig.exe" /auto
    O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [Malwarebytes Anti-Malware Reboot] "D:\Malware bytes\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
    O4 - HKLM\..\Run: [WinPatrol] D:\Winpatrol\winpatrol.exe -expressboot
    O4 - HKLM\..\RunOnce: [aswAhAScr.dll] C:\PROGRA~1\ALWILS~1\Avast4\ASWREG~1.EXE "C:\Program Files\Alwil Software\Avast4\AhAScr.dll"
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
    O4 - HKCU\..\Run: [{9B71D88C-C598-4935-C5D1-43AA4DB90836}] C:\Users\James\AppData\Roaming\system32.exe
    O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
    O4 - Global Startup: Logitech SetPoint.lnk = D:\Setpoint\SetPoint.exe
    O8 - Extra context menu item: &Search - ?p=ZK
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://D:\MICROS~1\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - D:\MICROS~1\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - D:\MICROS~1\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\MICROS~1\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\Spybot\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\Spybot\SPYBOT~1\SDHelper.dll
    O13 - Gopher Prefix:
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - D:\microsoft office 2007\Office12\GrooveSystemServices.dll
    O20 - AppInit_DLLs: D:\KASPER~1\kloehk.dll
    O20 - Winlogon Notify: !SASWinLogon - D:\Superantispyware\SASWINLO.dll
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - D:\ad aware\aawservice.exe
    O23 - Service: Andrea ADI Filters Service (AEADIFilters) - Andrea Electronics Corporation - C:\Windows\system32\AEADISRV.EXE
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: MBAMService - Malwarebytes Corporation - D:\Malware bytes\Malwarebytes' Anti-Malware\mbamservice.exe
    O23 - Service: My Web Search Service (MyWebSearchService) - Unknown owner - C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwssvc.exe (file missing)
    O23 - Service: NBService - Nero AG - D:\Nero\Nero 7\Nero BackItUp\NBService.exe
    O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
    O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - D:\Spybot\Spybot - Search & Destroy\SDWinSec.exe
    O23 - Service: StarWind AE Service (StarWindServiceAE) - Unknown owner - C:\Windows\
    O23 - Service: VNC Server (winvnc) - TightVNC Group - D:\VNC\TightVNC\WinVNC.exe

    --
    End of file - 7112 bytes
    Also here is the list of my installed programs;
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    2007 Microsoft Office Suite Service Pack 1 (SP1)
    3DMark06
    Ad-Aware
    Adobe Flash Player ActiveX
    Adobe Flash Player Plugin
    Adobe Reader 7.0
    Adobe Shockwave Player
    Apple Mobile Device Support
    Apple Software Update
    ASUS WiFi-AP Solo
    Audacity 1.2.6
    AusLogics Disk Defrag
    avast! Antivirus
    AviSynth 2.5
    Call of Duty(R) 2
    Call of Duty(R) 4 - Modern Warfare(TM)
    Call of Duty(R) 4 - Modern Warfare(TM) 1.4 Patch
    Call of Duty(R) 4 - Modern Warfare(TM) 1.5 Multiplayer Patch
    CCleaner (remove only)
    CDDRV_Installer
    Counter-Strike: Source
    CryEngine(R)2 Sandbox(TM)2
    Crysis(R)
    Dev-C++ 5 beta 9 release (4.9.9.2)
    DivX Web Player
    DVD Decrypter (Remove Only)
    DVD Shrink 3.2
    Frets On Fire
    Google Earth
    HijackThis 2.0.2
    Host OpenAL (ADI)
    iTunes
    Java(TM) 6 Update 2
    Java(TM) 6 Update 3
    KhalInstallWrapper
    LEGO® Indiana Jones™ Demo
    LimeWire 4.16.7
    Logitech SetPoint
    Malwarebytes' Anti-Malware
    Mavis Beacon Teaches Typing Platinum 20
    Microsoft .NET Framework 1.1
    Microsoft .NET Framework 1.1
    Microsoft .NET Framework 1.1 Hotfix (KB929729)
    Microsoft Age of Empires II
    Microsoft Office Access MUI (English) 2007
    Microsoft Office Access Setup Metadata MUI (English) 2007
    Microsoft Office Enterprise 2007
    Microsoft Office Enterprise 2007
    Microsoft Office Excel MUI (English) 2007
    Microsoft Office Groove MUI (English) 2007
    Microsoft Office Groove Setup Metadata MUI (English) 2007
    Microsoft Office InfoPath MUI (English) 2007
    Microsoft Office OneNote MUI (English) 2007
    Microsoft Office Outlook MUI (English) 2007
    Microsoft Office PowerPoint MUI (English) 2007
    Microsoft Office Proof (English) 2007
    Microsoft Office Proof (French) 2007
    Microsoft Office Proof (Spanish) 2007
    Microsoft Office Proofing (English) 2007
    Microsoft Office Publisher MUI (English) 2007
    Microsoft Office Shared MUI (English) 2007
    Microsoft Office Shared Setup Metadata MUI (English) 2007
    Microsoft Office Word MUI (English) 2007
    Microsoft Visual C++ 2005 Redistributable
    Microsoft Visual C++ 2005 Redistributable
    Mozilla ActiveX Control v1.7.12
    Mozilla Firefox (3.0.1)
    Napster Burn Engine
    Nero 7 Essentials
    Neverwinter Nights 2
    NVIDIA Drivers
    OpenAL
    QuickTime
    RealPlayer
    RivaTuner v2.08
    Security Update for Excel 2007 (KB946974)
    Security Update for Microsoft Office Publisher 2007 (KB950114)
    Security Update for Microsoft Office system 2007 (KB951808)
    Security Update for Microsoft Office Word 2007 (KB950113)
    Security Update for Office 2007 (KB947801)
    Security Update for Visio 2007 (KB947590)
    SoundMAX
    Spybot - Search & Destroy
    Spybot - Search & Destroy 1.5.2.20
    SUPERAntiSpyware Free Edition
    SWAT 4
    SWAT 4 Single Player Demo
    SyncToy
    System Requirements Lab
    The Great Escape
    The Movies(TM)
    TightVNC 1.3.9
    Tom Clancy's Rainbow Six Vegas
    Touchpad Media Server
    Touchpad Media Server Trial
    Unlocker 1.8.7
    Update for Microsoft Office Outlook 2007 (KB952142)
    Update for Office 2007 (KB946691)
    Update for Outlook 2007 Junk Email Filter (kb953463)
    Videora iPod Converter 3.07
    Windows Media Player Firefox Plugin
    Windows Movie Maker 2.6
    WinFF 0.42
    WinPatrol 2008
    WinRAR archiver
    WinSCP 4.1 beta

    Thanks in advance
  • pompalomppompalomp New
    edited July 2008
    Here is my Malwarebytes' Anti-Malware log

    Malwarebytes' Anti-Malware 1.20
    Database version: 962
    Windows 6.0.6001 Service Pack 1

    20:59:00 2008-07-18
    mbam-log-7-18-2008 (20-59-00).txt

    Scan type: Full Scan (C:\|D:\|E:\|)
    Objects scanned: 175504
    Time elapsed: 26 minute(s), 52 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 19
    Registry Values Infected: 4
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 5

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_CLASSES_ROOT\Interface\{367c28cf-9525-4e86-8a55-c3c14e14cb8a} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{14b8149c-a16b-429e-a48e-d00166b0b74b} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{25560540-9571-4d7b-9389-0f166788785a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{63d0ed2c-b45b-4458-8b3b-60c69bbbd83c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{98d9753d-d73b-42d5-8c85-4469cda897ab} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cpmsky (Adware.Agent) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWay) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{e55e1c86-434d-46f9-a253-2de4ab3f9734} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{17515d02-1e76-0312-fa19-0892b573dc26} (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\pntqkflv (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\qegbdmwf (Trojan.FakeAlert) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\QooBox\Quarantine\C\Windows\efbq.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Windows\System32\cbXonNhh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    D:\Firefox\plugins\NPMyWebS.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    C:\Windows\System32\lagqykjauihwy.dll (Trojan.Agent) -> Delete on reboot.
    C:\Users\James\AppData\Roaming\addon.dat (Malware.Trace) -> Quarantined and deleted successfully.
  • edited July 2008
    IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

    LimeWire 4.16.7

    I'd like you to read the Guidelines for P2P Programs where we explain why it's not a good idea to have them.

    Also available here.

    My recommendation is you go to Control Panel > Add/Remove Programs and uninstall the programs listed above (in red).
    Please note: you must NOT use this whilst we are cleaning your machine.


    Submit a File For Analysis
    We need to have the files below Scanned by Uploading them/it to Virus Total

    Please visit Virustotal
    Copy/paste the the following file path into the window
    C:\Users\James\AppData\Roaming\system32.exe
    Click Submit/Send File
    Please post back, to let me know the results.

    If Virustotal is too busy please try Jotti



    Download and Run ComboFix (by sUBs)
    Please visit this webpage for instructions for downloading and running ComboFix:

    Bleeping Computer ComboFix Tutorial

    Post the log from ComboFix when you've accomplished that, along with a new HijackThis log.

    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix on your own. This tool is not a toy and not for everyday use.
    ComboFix SHOULD NOT be used unless requested by a forum helper



    Your Java and Adobe is out of date. Older versions have vulnerabilities that malware can use to infect your system.

    Please follow these steps to remove older version Java and Adobe components and update.

    Updating Java:
    • Download the latest version of Java Runtime Environment (JRE) 6u7 from http://java.sun.com/javase/downloads/index.jsp
    • Scroll down to where it says "The Java Runtime Environment (JRE) 6 update 7 allows end-users to run Java applications".
    • Click the "Download" button to the right.
    • Check the box that says: "Accept License Agreement".
    • The page will refresh.
    • Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.


    Update Adobe Acrobat Reader
    • Please go to this link Adobe Acrobat Reader Download Link
    • Cllick Download
    • On the right Untick Adobe Phototshop Album Starter Edition if you do not wish to include this in the installation.
    • Click the Continue button
    • Click Run, and click Run again
    • Next click the Install Now button and follow the on screen prompts


    Now close all windows, including your browser.
    Double click on the Java installation that you downloaded and follow the prompts.

    Remove Programs
    Now click Start---Control Panel. Double click Add or Remove Programs. If any of the following programs are listed there,
    click on the program to highlight it, and click on remove.
    • Adobe Reader 7.0
    • Java(TM) 6 Update 2
      Java(TM) 6 Update 3
    Now close the Control Panel.

    Reboot your machine.





    Kaspersky Online Scanner .
    Your Antivirus and/or Antispyware may give a warning during the scan. This is perfectly normal
    NOTE:- This scan is best done from IE (Internet Explorer)

    NOTE:- Vista users should start IE by Start(Vista Orb) >> Internet Explorer >> Right-Click Run As Admin
    Go Here http://www.kaspersky.com/kos/eng/partner/default/kavwebscan.html

    Read the Requirements and limitations before you click Accept.
    Allow the ActiveX download if necessary and let the database download.
    Once the database has downloaded, click My Computer in the left pane
    Now go and put the kettle on !
    When the scan has completed, click Save Report As...
    Enter a name for the file in the Filename: text box and then click the down arrow to the right of Save as type: and select text file (*.txt)
    Click Save - by default the file will be saved to your Desktop, but you can change this if you wish.


    **Note**

    To optimize scanning time and produce a more sensible report for review:
    • Close any open programs.
    • Turn off the real-time scanner of all antivirus or antispyware programs while performing the online scan.

    Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.



    Logs/Information to Post in Reply
    Please post the following logs/Information in your reply
    • Virus Total Results
    • ComboFix Log
    • A Fresh HJT Log
    • Kaspersky Log
    • How are things running now ?
  • pompalomppompalomp New
    edited July 2008
    Thanks for all your help so far Katana, will have the results for you tomorrow afternoon.
  • pompalomppompalomp New
    edited July 2008
    [FONT=&quot]Ok, i submitted the file to virus total and it came up with these results;[/FONT]
    [FONT=&quot]AhnLab-V3[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]AntiVir[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]BDS/Bifrose.Gen[/FONT]
    [FONT=&quot]Authentium[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Avast[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]AVG[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]BackDoor.Bifrose.BN[/FONT]
    [FONT=&quot]BitDefender[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Trojan.Dropper.RSM[/FONT]
    [FONT=&quot]CAT-QuickHeal[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]ClamAV[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Trojan.Pakes-248[/FONT]
    [FONT=&quot]DrWeb[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]eSafe[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]eTrust-Vet[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Ewido[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]F-Prot[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]W32/Bifrost.B.gen!Eldorado[/FONT]
    [FONT=&quot]F-Secure[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]FileAdvisor[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Fortinet[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Ikarus[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]BehavesLikeWin32.ExplorerHijack[/FONT]
    [FONT=&quot]Kaspersky[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]McAfee[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]BackDoor-CEP.svr[/FONT]
    [FONT=&quot]Microsoft[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]NOD32v2[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]a variant of Win32/Packed.Themida[/FONT]
    [FONT=&quot]Norman[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Panda[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Prevx1[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Rising[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Sophos[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Sus/ComPack[/FONT]
    [FONT=&quot]Sunbelt[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Symantec[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Infostealer[/FONT]
    [FONT=&quot]TheHacker[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]VBA32[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]VirusBuster[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Packed/Themida[/FONT]
    [FONT=&quot]Webwasher-Gateway[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]-[/FONT]
    [FONT=&quot]Trojan.Backdoor.Bifrose.Gen[/FONT]
    [FONT=&quot]
    I have told Nod32 to put it in quarantine until you say otherwise[/FONT]
    [FONT=&quot]Unfortunately the adobe update feezes at 99% so I can’t update it, but I did manage to update java.[/FONT]
    [FONT=&quot]Here is my combofix log;[/FONT]
    ComboFix 08-07-20.A0 - James 2008-07-22 17:05:05.6 - NTFSx86
    Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1342 [GMT 1:00]
    Running from: C:\Users\James\Desktop\ComboFix.exe
    * Created a new restore point
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Users\James\AppData\Roaming\addon.dat

    .
    ((((((((((((((((((((((((( Files Created from 2008-06-22 to 2008-07-22 )))))))))))))))))))))))))))))))
    .

    2008-07-22 17:02 . 2008-07-22 17:02 685,056 --a
    C:\Windows\isRS-000.tmp
    2008-07-22 17:02 . 2008-07-20 20:21 38,472 --a
    C:\Windows\System32\drivers\mbamswissarmy.sys
    2008-07-21 23:56 . 2008-07-21 23:56 <DIR> d----c--- C:\Program Files\Sun
    2008-07-21 22:57 . 2008-07-21 23:50 <DIR> d
    C:\Users\James\.SunDownloadManager
    2008-07-20 23:36 . 2008-07-21 00:24 <DIR> d
    C:\Users\James\AppData\Roaming\WinFF
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\Users\James\AppData\Roaming\Broderbund
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\Users\All Users\Broderbund
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\ProgramData\Broderbund
    2008-07-18 21:17 . 2008-07-18 21:17 <DIR> d
    C:\Users\James\AppData\Roaming\WinPatrol
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\Users\James\AppData\Roaming\Malwarebytes
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\Users\All Users\Malwarebytes
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\ProgramData\Malwarebytes
    2008-07-18 20:29 . 2008-07-20 20:21 17,144 --a
    C:\Windows\System32\drivers\mbam.sys
    2008-07-14 15:16 . 2008-07-14 15:16 64,324 --a
    C:\Windows\System32\mdqosbnlopw.exe
    2008-07-14 14:44 . 2008-07-14 14:44 11 --a--c--- C:\AuResult.ini
    2008-07-13 23:02 . 2008-07-13 23:02 <DIR> d
    C:\Program Files\OpenAL
    2008-07-13 20:08 . 2008-07-13 20:08 <DIR> d
    C:\Users\All Users\McAfee
    2008-07-13 20:08 . 2008-07-13 20:08 <DIR> d
    C:\ProgramData\McAfee
    2008-07-13 18:36 . 2008-07-13 18:36 <DIR> d----c--- C:\Program Files\Google
    2008-07-13 13:01 . 2008-07-13 13:01 <DIR> d
    C:\Windows\System32\Adobe
    2008-07-11 22:51 . 2008-07-11 22:51 118 --a
    C:\Windows\System32\MRT.INI
    2008-07-11 22:49 . 2008-06-26 02:45 12,240,896 --a
    C:\Windows\System32\NlsLexicons0007.dll
    2008-07-11 22:49 . 2008-06-26 02:45 2,644,480 --a
    C:\Windows\System32\NlsLexicons0009.dll
    2008-07-11 22:49 . 2008-06-26 04:29 801,280 --a
    C:\Windows\System32\NaturalLanguage6.dll
    2008-07-07 01:23 . 2008-07-07 22:21 <DIR> d
    C:\Users\James\AppData\Roaming\gtk-2.0
    2008-07-07 01:22 . 2008-07-07 01:23 <DIR> d
    C:\Users\James\avidemux
    2008-07-03 22:56 . 2008-07-06 23:18 <DIR> d
    C:\Users\James\AppData\Roaming\vlc
    2008-07-03 22:54 . 2008-07-03 22:54 <DIR> d
    C:\Users\James\AppData\Roaming\MozillaControl
    2008-07-03 22:54 . 2008-07-13 22:59 <DIR> d
    C:\Program Files\VideoLAN
    2008-07-03 22:54 . 2008-07-03 22:54 <DIR> d
    C:\Program Files\Mozilla ActiveX Control v1.7.12
    2008-07-03 21:33 . 2008-07-03 22:24 <DIR> d
    C:\Users\James\AppData\Roaming\Orbit
    2008-07-03 19:10 . 2008-07-03 19:10 54,156 --ah
    C:\Windows\QTFont.qfn
    2008-07-03 19:10 . 2008-07-03 19:10 1,409 --a
    C:\Windows\QTFont.for
    2008-07-03 18:57 . 2008-07-03 18:57 <DIR> d
    C:\Users\James\video iphone
    2008-06-30 18:12 . 2008-06-30 18:12 <DIR> d
    C:\Users\James\AppData\Roaming\Auslogics
    2008-06-30 18:04 . 2008-06-11 14:48 188,960 --a
    C:\Windows\System32\nvapps.xml
    2008-06-24 20:13 . 2008-06-24 20:13 <DIR> d
    C:\Users\James\AppData\Roaming\Uniblue

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-07-22 16:02
    d
    w C:\Users\James\AppData\Roaming\SiteAdvisor
    2008-07-22 15:47
    d
    w C:\Program Files\Java
    2008-07-20 12:43
    dc-h--w C:\Program Files\InstallShield Installation Infor
    Here is the Hijack this log;
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 20:46, on 2008-07-21
    Platform: Windows Vista SP1 (WinNT 6.00.1905)
    MSIE: Internet Explorer v7.00 (7.00.6001.18000)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\taskeng.exe
    C:\Program Files\ASUS WiFi-AP Solo\RtWLan.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Analog Devices\SoundMAX\SoundTray.exe
    D:\microsoft office 2007\Office12\GrooveMonitor.exe
    C:\Program Files\Analog Devices\Core\smax4pnp.exe
    C:\Windows\System32\rundll32.exe
    D:\Winpatrol\WinPatrol.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehtray.exe
    D:\Setpoint\SetPoint.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Program Files\Common Files\Logitech\KhalShared\KHALMNPR.EXE
    C:\Program Files\Windows Media Player\wmplayer.exe
    D:\Firefox\firefox.exe
    C:\Windows\system32\SearchFilterHost.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O1 - Hosts: ::1 localhost
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Adobe Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: cpmsky browser optimizer - {06a45b5a-a102-72ce-ae92-691604703d9b} - C:\Windows\system32\lagqykjauihwy.dll (file missing)
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - D:\Spybot\SPYBOT~1\SDHelper.dll
    O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - D:\microsoft office 2007\Office12\GrooveShellExtensions.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O3 - Toolbar: (no name) - {B1E0C6DC-BBEA-4DE1-BFCA-70362CD86579} - (no file)
    O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
    O4 - HKLM\..\Run: [SoundTray] C:\Program Files\Analog Devices\SoundMAX\SoundTray.exe
    O4 - HKLM\..\Run: [GrooveMonitor] "D:\microsoft office 2007\Office12\GrooveMonitor.exe"
    O4 - HKLM\..\Run: [MSConfig] "C:\Windows\system32\msconfig.exe" /auto
    O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [Malwarebytes Anti-Malware Reboot] "D:\Malware bytes\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
    O4 - HKLM\..\Run: [WinPatrol] D:\Winpatrol\winpatrol.exe -expressboot
    O4 - HKLM\..\RunOnce: [aswAhAScr.dll] C:\PROGRA~1\ALWILS~1\Avast4\ASWREG~1.EXE "C:\Program Files\Alwil Software\Avast4\AhAScr.dll"
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
    O4 - HKCU\..\Run: [{9B71D88C-C598-4935-C5D1-43AA4DB90836}] C:\Users\James\AppData\Roaming\system32.exe
    O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
    O4 - Global Startup: Logitech SetPoint.lnk = D:\Setpoint\SetPoint.exe
    O8 - Extra context menu item: &Search - ?p=ZK
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://D:\MICROS~1\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - D:\MICROS~1\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - D:\MICROS~1\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\MICROS~1\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\Spybot\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\Spybot\SPYBOT~1\SDHelper.dll
    O13 - Gopher Prefix:
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - D:\microsoft office 2007\Office12\GrooveSystemServices.dll
    O20 - AppInit_DLLs: D:\KASPER~1\kloehk.dll
    O20 - Winlogon Notify: !SASWinLogon - D:\Superantispyware\SASWINLO.dll
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - D:\ad aware\aawservice.exe
    O23 - Service: Andrea ADI Filters Service (AEADIFilters) - Andrea Electronics Corporation - C:\Windows\system32\AEADISRV.EXE
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: MBAMService - Malwarebytes Corporation - D:\Malware bytes\Malwarebytes' Anti-Malware\mbamservice.exe
    O23 - Service: My Web Search Service (MyWebSearchService) - Unknown owner - C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwssvc.exe (file missing)
    O23 - Service: NBService - Nero AG - D:\Nero\Nero 7\Nero BackItUp\NBService.exe
    O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
    O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - D:\Spybot\Spybot - Search & Destroy\SDWinSec.exe
    O23 - Service: StarWind AE Service (StarWindServiceAE) - Unknown owner - C:\Windows\
    O23 - Service: VNC Server (winvnc) - TightVNC Group - D:\VNC\TightVNC\WinVNC.exe

    --
    End of file - 7112 bytes
    Kaspersky did not come up with anything, The pop ups seemed to have stopped

    Thanks again
  • edited July 2008
    Please can you post the ComboFix log again, it looks like it got cut off
    C:\Combofix.txt


    Fix With HJT

    Close all other windows and then start HiJack This
    Click Do A System Scan Only
    When it has finished scanning put a check next to the following lines IF still present
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)

    O2 - BHO: cpmsky browser optimizer - {06a45b5a-a102-72ce-ae92-691604703d9b} - C:\Windows\system32\lagqykjauihwy.dll (file missing)
    O3 - Toolbar: (no name) - {B1E0C6DC-BBEA-4DE1-BFCA-70362CD86579} - (no file)
    O4 - HKCU\..\Run: [{9B71D88C-C598-4935-C5D1-43AA4DB90836}] C:\Users\James\AppData\Roaming\system32.exe
    O8 - Extra context menu item: &Search - ?p=ZK
    O23 - Service: My Web Search Service (MyWebSearchService) - Unknown owner - C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwssvc.exe (file missing)
    O23 - Service: StarWind AE Service (StarWindServiceAE) - Unknown owner - C:\Windows\
    - Close ALL open windows (especially Internet Explorer!)-
    Now click Fix checked
    Click yes to any prompts
    Close HijackThis


    Submit a File For Analysis
    We need to have the files below Scanned by Uploading them/it to Virus Total

    Please visit Virustotal
    Copy/paste the the following file path into the window
    C:\Windows\System32\mdqosbnlopw.exe
    Click Submit/Send File
    Please post back, to let me know the results.

    If Virustotal is too busy please try Jotti
  • pompalomppompalomp New
    edited July 2008
    Ok i did what you asked with Hijackthis, Virus total 1/32 reported cloaked malware.

    Here is the combofix log;

    ComboFix 08-07-20.A0 - James 2008-07-22 21:55:01.7 - NTFSx86
    Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1270 [GMT 1:00]
    Running from: C:\Users\James\Desktop\ComboFix.exe
    * Resident AV is active

    .
    /wow section - STAGE 40
    SED: can't read MWindows.dat: No such file or directory
    The syntax of the command is incorrect.


    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Users\James\AppData\Roaming\addon.dat

    .
    ((((((((((((((((((((((((( Files Created from 2008-06-22 to 2008-07-22 )))))))))))))))))))))))))))))))
    .

    2008-07-22 19:31 . 2008-01-07 14:29 352 --ah
    C:\Windows\nod32fixtemdono.reg
    2008-07-22 19:30 . 2008-07-22 19:30 <DIR> d----c--- C:\Program Files\%temp&
    2008-07-22 18:23 . 2008-07-22 18:23 <DIR> d
    C:\Users\James\AppData\Roaming\ESET
    2008-07-22 18:22 . 2008-07-22 19:27 <DIR> d
    C:\Users\All Users\ESET
    2008-07-22 18:22 . 2008-07-22 19:27 <DIR> d
    C:\ProgramData\ESET
    2008-07-22 17:02 . 2008-07-20 20:21 38,472 --a
    C:\Windows\System32\drivers\mbamswissarmy.sys
    2008-07-21 23:56 . 2008-07-21 23:56 <DIR> d----c--- C:\Program Files\Sun
    2008-07-21 22:57 . 2008-07-21 23:50 <DIR> d
    C:\Users\James\.SunDownloadManager
    2008-07-20 23:36 . 2008-07-21 00:24 <DIR> d
    C:\Users\James\AppData\Roaming\WinFF
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\Users\James\AppData\Roaming\Broderbund
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\Users\All Users\Broderbund
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\ProgramData\Broderbund
    2008-07-18 21:17 . 2008-07-18 21:17 <DIR> d
    C:\Users\James\AppData\Roaming\WinPatrol
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\Users\James\AppData\Roaming\Malwarebytes
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\Users\All Users\Malwarebytes
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\ProgramData\Malwarebytes
    2008-07-18 20:29 . 2008-07-20 20:21 17,144 --a
    C:\Windows\System32\drivers\mbam.sys
    2008-07-14 15:16 . 2008-07-14 15:16 64,324 --a
    C:\Windows\System32\mdqosbnlopw.exe
    2008-07-14 14:44 . 2008-07-14 14:44 11 --a--c--- C:\AuResult.ini
    2008-07-13 23:02 . 2008-07-13 23:02 <DIR> d
    C:\Program Files\OpenAL
    2008-07-13 20:08 . 2008-07-13 20:08 <DIR> d
    C:\Users\All Users\McAfee
    2008-07-13 20:08 . 2008-07-13 20:08 <DIR> d
    C:\ProgramData\McAfee
    2008-07-13 18:36 . 2008-07-13 18:36 <DIR> d----c--- C:\Program Files\Google
    2008-07-13 13:01 . 2008-07-13 13:01 <DIR> d
    C:\Windows\System32\Adobe
    2008-07-11 22:51 . 2008-07-11 22:51 118 --a
    C:\Windows\System32\MRT.INI
    2008-07-11 22:49 . 2008-06-26 02:45 12,240,896 --a
    C:\Windows\System32\NlsLexicons0007.dll
    2008-07-11 22:49 . 2008-06-26 02:45 2,644,480 --a
    C:\Windows\System32\NlsLexicons0009.dll
    2008-07-11 22:49 . 2008-06-26 04:29 801,280 --a
    C:\Windows\System32\NaturalLanguage6.dll
    2008-07-07 01:23 . 2008-07-07 22:21 <DIR> d
    C:\Users\James\AppData\Roaming\gtk-2.0
    2008-07-07 01:22 . 2008-07-07 01:23 <DIR> d
    C:\Users\James\avidemux
    2008-07-03 22:56 . 2008-07-06 23:18 <DIR> d
    C:\Users\James\AppData\Roaming\vlc
    2008-07-03 22:54 . 2008-07-03 22:54 <DIR> d
    C:\Users\James\AppData\Roaming\MozillaControl
    2008-07-03 22:54 . 2008-07-13 22:59 <DIR> d
    C:\Program Files\VideoLAN
    2008-07-03 22:54 . 2008-07-03 22:54 <DIR> d
    C:\Program Files\Mozilla ActiveX Control v1.7.12
    2008-07-03 21:33 . 2008-07-03 22:24 <DIR> d
    C:\Users\James\AppData\Roaming\Orbit
    2008-07-03 19:10 . 2008-07-03 19:10 54,156 --ah
    C:\Windows\QTFont.qfn
    2008-07-03 19:10 . 2008-07-03 19:10 1,409 --a
    C:\Windows\QTFont.for
    2008-07-03 18:57 . 2008-07-03 18:57 <DIR> d
    C:\Users\James\video iphone
    2008-06-30 18:12 . 2008-06-30 18:12 <DIR> d
    C:\Users\James\AppData\Roaming\Auslogics
    2008-06-30 18:04 . 2008-06-11 14:48 188,960 --a
    C:\Windows\System32\nvapps.xml
    2008-06-24 20:13 . 2008-06-24 20:13 <DIR> d
    C:\Users\James\AppData\Roaming\Uniblue

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-07-22 20:52
    d
    w C:\Users\James\AppData\Roaming\SiteAdvisor
    2008-07-22 15:47
    d
    w C:\Program Files\Java
    2008-07-20 12:43
    dc-h--w C:\Program Files\InstallShield Installation Information
    2008-07-18 20:55
    d
    w C:\ProgramData\Spybot - Search & Destroy
    2008-07-17 16:13
    d
    w C:\Users\James\AppData\Roaming\LimeWire
    2008-07-13 22:02 409,600 ----a-w C:\Windows\System32\wrap_oal.dll
    2008-07-13 22:02 114,688 ----a-w C:\Windows\System32\OpenAL32.dll
    2008-07-13 21:58
    d
    w C:\Users\James\AppData\Roaming\uTorrent
    2008-07-11 21:52
    d
    w C:\ProgramData\Microsoft Help
    2008-07-09 22:11
    d
    w C:\Program Files\Windows Mail
    2008-07-01 20:21
    d
    w C:\ProgramData\Lavasoft
    2008-07-01 20:20
    dc----w C:\Program Files\Common Files\Wise Installation Wizard
    2008-06-30 17:46
    d
    w C:\ProgramData\NVIDIA
    2008-06-21 22:11
    d
    w C:\Users\James\AppData\Roaming\FlashGet
    2008-06-16 11:59
    dc----w C:\Program Files\Alwil Software
    2008-06-11 21:01 0 ---ha-w C:\Windows\system32\drivers\Msft_User_WpdMtpDr_01_00_00.Wdf
    2008-06-11 06:50 0 ---ha-w C:\Windows\system32\drivers\Msft_User_WpdFs_01_00_00.Wdf
    2008-06-11 06:46 174 --sha-w C:\Program Files\desktop.ini
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Sidebar
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Photo Gallery
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Journal
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Defender
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Collaboration
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Calendar
    2008-06-10 16:05 82,432 ----a-w C:\Windows\System32\axaltocm.dll
    2008-06-10 16:05 101,888 ----a-w C:\Windows\System32\ifxcardm.dll
    2008-06-08 14:09
    dc----w C:\Program Files\Common Files\Napster Shared
    2008-05-29 13:27
    d
    w C:\Users\James\AppData\Roaming\SystemRequirementsLab
    2008-05-29 13:27
    d
    w C:\Program Files\SystemRequirementsLab
    2008-05-16 10:58 12,632 ----a-w C:\Windows\System32\lsdelete.exe
    2008-05-16 10:48 446,464 ----a-w C:\Windows\System32\NVUNINST.EXE
    2008-05-13 01:53 3,596,288 ----a-w C:\Windows\System32\qt-dx331.dll
    2008-05-13 01:51 200,704 ----a-w C:\Windows\System32\ssldivx.dll
    2008-05-13 01:51 1,044,480 ----a-w C:\Windows\System32\libdivx.dll
    2008-05-13 01:50 81,920 ----a-w C:\Windows\System32\dpl100.dll
    2008-05-13 01:50 593,920 ----a-w C:\Windows\System32\dpuGUI11.dll
    2008-05-13 01:50 57,344 ----a-w C:\Windows\System32\dpv11.dll
    2008-05-13 01:50 53,248 ----a-w C:\Windows\System32\dpuGUI10.dll
    2008-05-13 01:50 344,064 ----a-w C:\Windows\System32\dpus11.dll
    2008-05-13 01:50 294,912 ----a-w C:\Windows\System32\dpu11.dll
    2008-05-13 01:50 294,912 ----a-w C:\Windows\System32\dpu10.dll
    2008-05-13 01:50 196,608 ----a-w C:\Windows\System32\dtu100.dll
    2008-05-10 03:35 564,736 ----a-w C:\Windows\System32\emdmgmt.dll
    2008-05-08 21:59 90,112 ----a-w C:\Windows\System32\wshext.dll
    2008-05-08 21:59 430,080 ----a-w C:\Windows\System32\vbscript.dll
    2008-05-08 21:59 180,224 ----a-w C:\Windows\System32\scrobj.dll
    2008-05-08 21:59 172,032 ----a-w C:\Windows\System32\scrrun.dll
    2008-05-08 21:59 155,648 ----a-w C:\Windows\System32\wscript.exe
    2008-05-08 21:58 135,168 ----a-w C:\Windows\System32\cscript.exe
    2008-05-02 21:46 795,104 ----a-w C:\Windows\System32\dpinst.exe
    2008-04-26 08:25 3,600,952 ----a-w C:\Windows\System32\ntkrnlpa.exe
    2008-04-26 08:25 3,549,240 ----a-w C:\Windows\System32\ntoskrnl.exe
    2008-04-26 08:08 1,314,816 ----a-w C:\Windows\System32\quartz.dll
    2008-04-25 04:35 826,880 ----a-w C:\Windows\System32\wininet.dll
    2008-04-23 04:42 428,544 ----a-w C:\Windows\System32\EncDec.dll
    2008-04-23 04:42 293,376 ----a-w C:\Windows\System32\psisdecd.dll
    2008-04-19 20:54 22,328 ----a-w C:\Users\James\AppData\Roaming\PnkBstrK.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [2008-01-19 08:33 1233920]
    "ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2008-01-19 08:33 125952]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SoundTray"="C:\Program Files\Analog Devices\SoundMAX\SoundTray.exe" [2007-04-01 13:44 49152]
    "GrooveMonitor"="D:\microsoft office 2007\Office12\GrooveMonitor.exe" [2007-08-24 07:00 33648]
    "MSConfig"="C:\Windows\system32\msconfig.exe" [2008-01-19 08:33 227840]
    "SoundMAXPnP"="C:\Program Files\Analog Devices\Core\smax4pnp.exe" [2007-04-02 17:32 1261568]
    "NvCplDaemon"="C:\Windows\system32\NvCpl.dll" [2008-05-16 14:01 13535776]
    "NvMediaCenter"="C:\Windows\system32\NvMcTray.dll" [2008-05-16 14:01 92704]
    "Malwarebytes Anti-Malware Reboot"="D:\Malware bytes\Malwarebytes' Anti-Malware\mbam.exe" [2008-07-20 20:21 1191544]
    "WinPatrol"="D:\Winpatrol\winpatrol.exe" [2008-07-04 17:58 333120]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 04:27 144784]
    "egui"="D:\ESET NOD32\egui.exe" [2008-03-13 16:48 1443072]
    "Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2007-04-11 16:32 56080 C:\Windows\KHALMNPR.Exe]

    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\
    Logitech SetPoint.lnk - D:\Setpoint\SetPoint.exe [2008-01-08 16:56:30 692224]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableUIADesktopToggle"= 0 (0x0)

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "D:\Superantispyware\SASSEH.DLL" [2006-12-20 12:55 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2007-04-19 12:41 294912 D:\Superantispyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=D:\KASPER~1\kloehk.dll

    [HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
    backup=C:\Windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
    backupExtension=.CommonStartup

    [HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Metacafe.lnk]
    path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Metacafe.lnk
    backup=C:\Windows\pss\Metacafe.lnk.CommonStartup
    backupExtension=.CommonStartup

    [HKLM\~\startupfolder\C:^Users^James^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Bux.to Autoclicker.lnk]
    path=C:\Users\James\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bux.to Autoclicker.lnk
    backup=C:\Windows\pss\Bux.to Autoclicker.lnk.Startup
    backupExtension=.Startup

    [HKLM\~\startupfolder\C:^Users^James^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Metacafe.lnk]
    path=C:\Users\James\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Metacafe.lnk
    backup=C:\Windows\pss\Metacafe.lnk.Startup
    backupExtension=.Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AlcoholAutomount]
    --a
    2008-03-20 17:46 217544 D:\Alcohol 120%\Alcohol 120\AxCmd.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    --a
    2007-12-11 13:10 267048 D:\iTunes\iTunesHelper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
    --a--c--- 2006-01-12 16:40 155648 C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    --a
    2007-12-11 11:56 286720 C:\Program Files\QuickTime\QTTask.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RivaTunerStartupDaemon]
    --a
    2008-03-10 09:10 24576 D:\Rivatuner\RivaTuner v2.08\RivaTunerWrapper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
    --a--c--- 2008-02-27 17:47 185896 C:\Program Files\Common Files\Real\Update_OB\realsched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UnlockerAssistant]
    --a
    2008-05-02 05:15 15872 D:\OCEANS_13\Unlocker\UnlockerAssistant.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\updateMgr]
    -ra
    2004-11-22 09:18 307200 D:\Adobe Reader\Reader\AdobeUpdateManager.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
    --a
    2008-01-19 08:38 1008184 C:\Program Files\Windows Defender\MSASCui.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinVNC]
    --a
    2007-05-07 19:28 589824 D:\VNC\TightVNC\WinVNC.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "UacDisableNotify"=dword:00000001
    "InternetSettingsDisableNotify"=dword:00000001
    "AutoUpdateDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-2539102195-3166443380-987782504-1000]
    "EnableNotificationsRef"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
    "TCP Query User{A0A74DD9-C8A2-4503-9B68-BC799F30F93F}C:\\program files\\utorrent\\utorrent.exe"= UDP:C:\program files\utorrent\utorrent.exe:uTorrent
    "UDP Query User{8CF46D2C-7393-4CAF-83E2-9BA3B2944D28}C:\\program files\\utorrent\\utorrent.exe"= TCP:C:\program files\utorrent\utorrent.exe:uTorrent
    "{845242F4-3039-4B37-82D9-1766C2BA5A3E}"= UDP:D:\iTunes\iTunes.exe:iTunes
    "{DEA556F1-A5D0-4D10-9C1B-27D45BB182A6}"= TCP:D:\iTunes\iTunes.exe:iTunes
    "{F6408DB9-FF68-485C-B2E8-0AEFEA277476}"= UDP:38676:utorrent
    "{FCC9081E-7C74-435C-B85D-E83FCCCBEFFB}"= TCP:38676:utorrent
    "{2C4398DD-69E0-4A62-A86A-E940FA3ED1D8}"= UDP:1351:utoreent
    "{BF78AC6D-B191-4E23-A614-C6F3CB0DFED6}"= UDP:D:\battlefield 2\BF2.exe:Battlefield 2
    "{6D8DEA5D-95CD-44B8-ABD5-D8E508E0FFE8}"= TCP:D:\battlefield 2\BF2.exe:Battlefield 2
    "TCP Query User{888DBE3D-44DF-4114-B2C0-D065E1B26814}C:\\users\\james\\desktop\\programs\\utorrent.exe"= UDP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "UDP Query User{A3B1B559-6235-4391-B808-6669ADE36FD1}C:\\users\\james\\desktop\\programs\\utorrent.exe"= TCP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "{F4EB5569-3087-4268-B208-5277C8E1138D}"= UDP:C:\Windows\System32\PnkBstrA.exe:PnkBstrA
    "{3BD4902D-6B11-47CB-94C0-09B9FBC4B51E}"= TCP:C:\Windows\System32\PnkBstrA.exe:PnkBstrA
    "{AADE7B35-548D-427C-B99C-892A36ED0ED0}"= UDP:C:\Windows\System32\PnkBstrB.exe:PnkBstrB
    "{E610067A-D474-4425-A70F-2BE5C094121C}"= TCP:C:\Windows\System32\PnkBstrB.exe:PnkBstrB
    "TCP Query User{28BD7300-3DF2-41A9-ADD1-31D95A95BE8D}D:\\gamespy comrade\\comrade.exe"= UDP:D:\gamespy comrade\comrade.exe:Comrade
    "UDP Query User{B42A6A6F-75E7-4B82-A1F7-DA95FFB467F9}D:\\gamespy comrade\\comrade.exe"= TCP:D:\gamespy comrade\comrade.exe:Comrade
    "TCP Query User{F4B92686-223F-414C-AFA2-C0B93A03C58D}D:\\limewire\\limewire.exe"= UDP:D:\limewire\limewire.exe:LimeWire
    "UDP Query User{5B061038-17F0-4BA6-8B78-7D60F2BA3CD2}D:\\limewire\\limewire.exe"= TCP:D:\limewire\limewire.exe:LimeWire
    "{DD443D69-C0D4-43BF-AE8A-DB91D59EBC38}"= TCP:6004|D:\microsoft office 2007\Office12\outlook.exe:Microsoft Office Outlook
    "{C68D3F1F-7741-41BC-8E46-8BA9E0949CD9}"= UDP:D:\microsoft office 2007\Office12\GROOVE.EXE:Microsoft Office Groove
    "{13A63C2D-30C1-4E2D-B084-082DC11D5E52}"= TCP:D:\microsoft office 2007\Office12\GROOVE.EXE:Microsoft Office Groove
    "{AF3C5D29-804A-460E-A2BF-697D07C57E8B}"= UDP:D:\microsoft office 2007\Office12\ONENOTE.EXE:Microsoft Office OneNote
    "{5B0E2D93-1359-48BC-9A93-D4F955E44EB2}"= TCP:D:\microsoft office 2007\Office12\ONENOTE.EXE:Microsoft Office OneNote
    "TCP Query User{CAAE9F55-19ED-42A5-8FB3-7FF8E1A9B7CC}C:\\users\\james\\desktop\\programs\\utorrent.exe"= UDP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "UDP Query User{8F8884E4-D19B-46BD-AE0F-A4C72DE117E2}C:\\users\\james\\desktop\\programs\\utorrent.exe"= TCP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "TCP Query User{1EB20656-B3FC-4744-A918-029F25901ADC}D:\\limewire\\limewire.exe"= UDP:D:\limewire\limewire.exe:LimeWire
    "UDP Query User{155E9F16-5915-444A-A344-32855313C08D}D:\\limewire\\limewire.exe"= TCP:D:\limewire\limewire.exe:LimeWire
    "TCP Query User{0262EF93-D995-455E-B085-D5D720D9004A}E:\\crysis\\bin32\\crysis.exe"= UDP:E:\crysis\bin32\crysis.exe:Crysis
    "UDP Query User{623B5C85-D6DA-4907-99D9-A1CE62B60377}E:\\crysis\\bin32\\crysis.exe"= TCP:E:\crysis\bin32\crysis.exe:Crysis
    "{A57A411D-9292-4FED-B3DA-3AB877918E96}"= UDP:D:\Program Files\DAP\DAP.exe:Download Accelerator Plus (DAP)
    "{A391F620-5109-49D9-84F0-5BFAF6507D89}"= TCP:D:\Program Files\DAP\DAP.exe:Download Accelerator Plus (DAP)
    "{38E7F030-65CD-422A-8FF7-50DDEC8A917B}"= UDP:D:\neverwinter\nwn2main.exe:Neverwinter Nights 2 Main
    "{BD0DA0A7-78BA-4776-8131-1AB2B086CE20}"= TCP:D:\neverwinter\nwn2main.exe:Neverwinter Nights 2 Main
    "{2D8A57D4-B4C9-44C9-A6AE-95830208F151}"= UDP:D:\neverwinter\nwn2main_amdxp.exe:Neverwinter Nights 2 AMD
    "{9AA496C0-9300-4C27-BEF7-79F6190AE322}"= TCP:D:\neverwinter\nwn2main_amdxp.exe:Neverwinter Nights 2 AMD
    "{3A990F55-8652-4EC1-963E-7C82F8D13683}"= UDP:D:\neverwinter\nwupdate.exe:Neverwinter Nights 2 Updater
    "{08A17C59-EAB8-44E4-8044-57856B3D67A6}"= TCP:D:\neverwinter\nwupdate.exe:Neverwinter Nights 2 Updater
    "{F0AC930D-4A56-4740-ABCD-0F61F6FACE39}"= UDP:D:\neverwinter\nwn2server.exe:Neverwinter Nights 2 Server
    "{2FE00435-DEB5-4473-B749-4E4BC7E422FD}"= TCP:D:\neverwinter\nwn2server.exe:Neverwinter Nights 2 Server
    "TCP Query User{88A2FC81-7B90-41F4-BEA7-4ADD8DBAE8D0}D:\\itunes\\itunes.exe"= UDP:D:\itunes\itunes.exe:iTunes
    "UDP Query User{FAA82599-4F3D-4D82-9EB6-5A5D78452A52}D:\\itunes\\itunes.exe"= TCP:D:\itunes\itunes.exe:iTunes
    "{B1999330-0A7B-4E47-99D4-5CCF2906D293}"= UDP:D:\tom clancy\Binaries\R6Vegas_Game.exe:Rainbow Six Vegas
    "{F853736B-D8CF-455F-BB92-D2E7C13BD9AE}"= TCP:D:\tom clancy\Binaries\R6Vegas_Game.exe:Rainbow Six Vegas
    "{450B1B3D-4836-436A-A459-D7B1963ACA01}"= UDP:D:\tom clancy\Binaries\R6Vegas_Launcher.exe:Rainbow Six Vegas Updater
    "{88ABE743-6398-47AA-B13D-A2D0BCC37266}"= TCP:D:\tom clancy\Binaries\R6Vegas_Launcher.exe:Rainbow Six Vegas Updater
    "{432F0282-861E-439A-A712-824C8512F1A4}"= UDP:D:\Call of duty\iw3mp.exe:Call of Duty(R) 4 - Modern Warfare(TM)
    "{D5C9740C-FA23-4A33-A474-DB2262E52018}"= TCP:D:\Call of duty\iw3mp.exe:Call of Duty(R) 4 - Modern Warfare(TM)
    "TCP Query User{7A5C9E81-EDC1-4AEC-A9EA-849E4D0D31FD}D:\\firefox\\firefox.exe"= UDP:D:\firefox\firefox.exe:Firefox
    "UDP Query User{235E13E0-0BED-4C22-A75D-E5F82063CD20}D:\\firefox\\firefox.exe"= TCP:D:\firefox\firefox.exe:Firefox
    "TCP Query User{EAEF867D-88BC-4E25-B918-66F80D4E34C9}C:\\users\\james\\desktop\\wow-2.0.0-enus-installer-downloader.exe"= UDP:C:\users\james\desktop\wow-2.0.0-enus-installer-downloader.exe:wow-2.0.0-enus-installer-downloader.exe
    "UDP Query User{AD29195A-C58C-405C-9E7B-D76B200E2EDB}C:\\users\\james\\desktop\\wow-2.0.0-enus-installer-downloader.exe"= TCP:C:\users\james\desktop\wow-2.0.0-enus-installer-downloader.exe:wow-2.0.0-enus-installer-downloader.exe
    "{2864A343-C5A2-43CA-A504-3977600432DC}"= UDP:D:\Limewir\LimeWire\LimeWire.exe:LimeWire
    "{238C64CF-F697-43D7-946E-4ED7D3FCA902}"= TCP:D:\Limewir\LimeWire\LimeWire.exe:LimeWire
    "TCP Query User{E7059402-E739-4A1C-AE50-66E371C46BC3}C:\\program files\\internet explorer\\iexplore.exe"= UDP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
    "UDP Query User{0019A3DF-2466-49A7-AACD-F85E7A09F133}C:\\program files\\internet explorer\\iexplore.exe"= TCP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
    "{40D2478D-F8F8-4972-A339-6E9FB4D5D5C7}"= UDP:E:\Crysis\Bin32\Crysis.exe:Crysis_32
    "{807DFD54-2C8F-4AA7-9137-442D86D6A6B2}"= TCP:E:\Crysis\Bin32\Crysis.exe:Crysis_32
    "{266094F1-7B22-4A31-A663-262686D9D270}"= UDP:E:\Crysis\Bin32\CrysisDedicatedServer.exe:CrysisDedicatedServer_32
    "{2E2AEE54-77A4-4138-A8A8-994F0DFBF6F0}"= TCP:E:\Crysis\Bin32\CrysisDedicatedServer.exe:CrysisDedicatedServer_32
    "TCP Query User{32B9CFE9-6EB5-443E-949D-E36908023DC7}D:\\anoymize\\anonymizer\\anonymizer software\\common\\anonproxy.exe"= UDP:D:\anoymize\anonymizer\anonymizer software\common\anonproxy.exe:AnonProxy
    "UDP Query User{9CE8D8A3-A5B0-4EE9-8FD1-1EB23E122971}D:\\anoymize\\anonymizer\\anonymizer software\\common\\anonproxy.exe"= TCP:D:\anoymize\anonymizer\anonymizer software\common\anonproxy.exe:AnonProxy
    "TCP Query User{C152A636-83E8-467C-9B1E-A4DC72E44EC1}D:\\css\\counter-strike source\\hl2.exe"= UDP:D:\css\counter-strike source\hl2.exe:hl2
    "UDP Query User{C41A58B6-8B13-48EA-BF88-56E80335E272}D:\\css\\counter-strike source\\hl2.exe"= TCP:D:\css\counter-strike source\hl2.exe:hl2
    "TCP Query User{33E002FE-C5C0-486B-B253-5F6FEF7524C5}D:\\css\\counter-strike source\\hl2.exe"= UDP:D:\css\counter-strike source\hl2.exe:hl2
    "UDP Query User{136DA52C-D02A-465E-BF21-ED0D9D94B76F}D:\\css\\counter-strike source\\hl2.exe"= TCP:D:\css\counter-strike source\hl2.exe:hl2
    "TCP Query User{10B96B77-94D0-4771-B0AF-33BBA5DC5008}D:\\age of empires\\empires2.icd"= UDP:D:\age of empires\empires2.icd:Age of Empires II
    "UDP Query User{069B776C-D70C-464E-A144-082AA937F47A}D:\\age of empires\\empires2.icd"= TCP:D:\age of empires\empires2.icd:Age of Empires II
    "TCP Query User{A774F65E-4DA8-4D5F-AC75-9FF49F489046}C:\\pacsteamt\\steamapps\\pompalomppompalomp\\counter-strike source\\hl2.exe"= UDP:C:\pacsteamt\steamapps\pompalomppompalomp\counter-strike source\hl2.exe:hl2
    "UDP Query User{B6C7FFF6-9AD7-4491-8F5E-F1C091FE764C}C:\\pacsteamt\\steamapps\\pompalomppompalomp\\counter-strike source\\hl2.exe"= TCP:C:\pacsteamt\steamapps\pompalomppompalomp\counter-strike source\hl2.exe:hl2
    "TCP Query User{6B3E5BB3-4346-4C15-8041-303FEC7FAAB9}D:\\vnc\\tightvnc\\winvnc.exe"= UDP:D:\vnc\tightvnc\winvnc.exe:TightVNC Win32 Server
    "UDP Query User{2F2A9DA7-432D-466A-8491-80C8A94E8315}D:\\vnc\\tightvnc\\winvnc.exe"= TCP:D:\vnc\tightvnc\winvnc.exe:TightVNC Win32 Server
    "71003e12-810d-4669-a588-73b3668f311b"= UDP:5901:VNC
    "TCP Query User{16313EF9-0417-49D6-A4F2-11A4DBF4D03C}D:\\touchpad media services\\touchpadmediaserver.exe"= UDP:D:\touchpad media services\touchpadmediaserver.exe:TouchpadMediaServer
    "UDP Query User{662CB993-94F0-4370-A075-35815B4D0486}D:\\touchpad media services\\touchpadmediaserver.exe"= TCP:D:\touchpad media services\touchpadmediaserver.exe:TouchpadMediaServer
    "TCP Query User{08D2C583-DC81-444C-9F29-72D8D5EDD30A}D:\\media server\\touchpadmediaserver.exe"= UDP:D:\media server\touchpadmediaserver.exe:TouchpadMediaServer
    "UDP Query User{72D615E5-6E2F-47B9-93EE-C9AF4E9EDEA3}D:\\media server\\touchpadmediaserver.exe"= TCP:D:\media server\touchpadmediaserver.exe:TouchpadMediaServer
    "{F8D33BB8-27D2-4C51-A39E-A9D878270CA0}"= UDP:24956:utorrent port
    "TCP Query User{424D4144-F884-4A6C-B600-E536EAF0EACD}D:\\flashget\\flashget.exe"= UDP:D:\flashget\flashget.exe:FlashGet
    "UDP Query User{9CE15170-7936-4706-A544-08CBB4AA69A4}D:\\flashget\\flashget.exe"= TCP:D:\flashget\flashget.exe:FlashGet
    "{B2774C4D-1B4A-450E-81EC-93A9B5A8E1A5}"= UDP:2:222222
    "TCP Query User{449F5AA0-5467-4DBA-83FB-607AA0337275}D:\\call of duty\\iw3mp.exe"= UDP:D:\call of duty\iw3mp.exe:iw3mp
    "UDP Query User{3A0361C4-5583-40F6-8DF7-33249042C0D5}D:\\call of duty\\iw3mp.exe"= TCP:D:\call of duty\iw3mp.exe:iw3mp
    "TCP Query User{233AB831-851A-45F9-8514-116E6826BE2D}D:\\red kawa\\orbitdownloader\\orbitnet.exe"= UDP:D:\red kawa\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader
    "UDP Query User{3EC36712-1D4F-46A3-87EB-0D235FD5245C}D:\\red kawa\\orbitdownloader\\orbitnet.exe"= TCP:D:\red kawa\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

    R1 epfwtdir;epfwtdir;C:\Windows\system32\DRIVERS\epfwtdir.sys [2008-03-13 16:52]
    R1 RtlProt;Realtke RtlProt WLAN Utility Protocol Driver;C:\Windows\system32\DRIVERS\rtlprot.sys [2007-04-02 11:57]
    R2 AEADIFilters;Andrea ADI Filters Service;C:\Windows\system32\AEADISRV.EXE [2007-02-05 23:44]
    R2 MBAMDrvService;MBAMDrvService;C:\Windows\system32\drivers\mbam.sys [2008-07-20 20:21]
    R2 MBAMService;MBAMService;D:\Malware bytes\Malwarebytes' Anti-Malware\mbamservice.exe [2008-07-20 20:21]
    R2 SBSDWSCService;SBSD Security Center Service;D:\Spybot\Spybot - Search & Destroy\SDWinSec.exe [2008-01-28 12:43]
    R3 RTL8187;Realtek RTL8187 Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter;C:\Windows\system32\DRIVERS\RTL8187.sys [2007-11-19 07:59]
    R3 yukonwlh;NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\system32\DRIVERS\yk60x86.sys [2007-12-06 10:51]
    S2 MyWebSearchService;My Web Search Service;C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwssvc.exe []

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c3eaa63c-bdb6-11dc-9843-806e6f6e6963}]
    \shell\AutoRun\command - F:\AutoRunCD.exe
    .
    Contents of the 'Scheduled Tasks' folder
    "2008-07-22 18:37:54 C:\Windows\Tasks\RtlVistaStart.job"
    - C:\Program Files\ASUS WiFi-AP Solo\RtWLan.exe
    "2008-02-28 18:09:35 C:\Windows\Tasks\Spybot - Search & Destroy - Scheduled Task.job"
    - D:\Spybot\Spybot - Search & Destroy\SpybotSD.exe
    .
    .
    Supplementary Scan
    .
    R0 -: HKCU-Main,Start Page = hxxp://www.google.co.uk/
    R0 -: HKLM-Main,Start Page = about:blank
    O8 -: E&xport to Microsoft Excel - D:\MICROS~1\Office12\EXCEL.EXE/3000


    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-22 21:57:38
    Windows 6.0.6001 Service Pack 1 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2008-07-22 21:58:53
    ComboFix-quarantined-files.txt 2008-07-22 20:58:51
    ComboFix2.txt 2008-07-22 16:09:07
    ComboFix3.txt 2008-07-01 19:16:19
    ComboFix4.txt 2008-05-28 14:05:15
    ComboFix5.txt 2008-07-22 20:54:43

    Pre-Run: 41,632,239,616 bytes free
    Post-Run: 41,660,600,320 bytes free

    323 --- E O F --- 2008-07-20 20:39:49
  • edited July 2008
    Custom CFScript
    • Please open Notepad (Start -> Run -> type notepad in the Open field -> OK) and copy and paste the text present inside the code box below:
      http://icrontic.com/forum/showthread.php?p=630939#post630939
      
      Collect::[4]
      C:\Windows\System32\mdqosbnlopw.exe
      File::
      C:\Users\James\AppData\Roaming\system32.exe
      
      Driver::
      MyWebSearchService
      
    • Save this as CFScript.txt and place it on your desktop.


      CFScript.gif
    • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
    • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
    • When finished, it will produce a log for you. Copy and paste the contents of the log in your next reply.
    • A window will open asking you to ensure you are connected to the internet, this is so a file can be submitted for analysis.
    • Click OK and follow the instructions to submit the file.


    CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.
    Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.
  • pompalomppompalomp New
    edited July 2008
    Combofix did not redirect me to the internet to analyse a file but here is the log anyway;

    ComboFix 08-07-20.A0 - James 2008-07-22 22:14:44.8 - NTFSx86
    Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1180 [GMT 1:00]
    Running from: C:\Users\James\Desktop\ComboFix.exe
    Command switches used :: C:\Users\James\Desktop\CFScript.txt
    * Created a new restore point
    * Resident AV is active


    FILE ::
    C:\Users\James\AppData\Roaming\system32.exe
    .
    /wow section - STAGE 40
    SED: can't read MWindows.dat: No such file or directory
    pv: No matching processes found
    SED: can't read MWindows.dat: No such file or directory
    The syntax of the command is incorrect.


    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Windows\System32\mdqosbnlopw.exe

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    \Service_MyWebSearchService


    ((((((((((((((((((((((((( Files Created from 2008-06-22 to 2008-07-22 )))))))))))))))))))))))))))))))
    .

    2008-07-22 19:31 . 2008-01-07 14:29 352 --ah
    C:\Windows\nod32fixtemdono.reg
    2008-07-22 19:30 . 2008-07-22 19:30 <DIR> d----c--- C:\Program Files\%temp&
    2008-07-22 18:23 . 2008-07-22 18:23 <DIR> d
    C:\Users\James\AppData\Roaming\ESET
    2008-07-22 18:22 . 2008-07-22 19:27 <DIR> d
    C:\Users\All Users\ESET
    2008-07-22 18:22 . 2008-07-22 19:27 <DIR> d
    C:\ProgramData\ESET
    2008-07-22 17:02 . 2008-07-20 20:21 38,472 --a
    C:\Windows\System32\drivers\mbamswissarmy.sys
    2008-07-21 23:56 . 2008-07-21 23:56 <DIR> d----c--- C:\Program Files\Sun
    2008-07-21 22:57 . 2008-07-21 23:50 <DIR> d
    C:\Users\James\.SunDownloadManager
    2008-07-20 23:36 . 2008-07-21 00:24 <DIR> d
    C:\Users\James\AppData\Roaming\WinFF
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\Users\James\AppData\Roaming\Broderbund
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\Users\All Users\Broderbund
    2008-07-19 23:02 . 2008-07-19 23:02 <DIR> d
    C:\ProgramData\Broderbund
    2008-07-18 21:17 . 2008-07-18 21:17 <DIR> d
    C:\Users\James\AppData\Roaming\WinPatrol
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\Users\James\AppData\Roaming\Malwarebytes
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\Users\All Users\Malwarebytes
    2008-07-18 20:29 . 2008-07-18 20:29 <DIR> d
    C:\ProgramData\Malwarebytes
    2008-07-18 20:29 . 2008-07-20 20:21 17,144 --a
    C:\Windows\System32\drivers\mbam.sys
    2008-07-14 14:44 . 2008-07-14 14:44 11 --a--c--- C:\AuResult.ini
    2008-07-13 23:02 . 2008-07-13 23:02 <DIR> d
    C:\Program Files\OpenAL
    2008-07-13 20:08 . 2008-07-13 20:08 <DIR> d
    C:\Users\All Users\McAfee
    2008-07-13 20:08 . 2008-07-13 20:08 <DIR> d
    C:\ProgramData\McAfee
    2008-07-13 18:36 . 2008-07-13 18:36 <DIR> d----c--- C:\Program Files\Google
    2008-07-13 13:01 . 2008-07-13 13:01 <DIR> d
    C:\Windows\System32\Adobe
    2008-07-11 22:51 . 2008-07-11 22:51 118 --a
    C:\Windows\System32\MRT.INI
    2008-07-11 22:49 . 2008-06-26 02:45 12,240,896 --a
    C:\Windows\System32\NlsLexicons0007.dll
    2008-07-11 22:49 . 2008-06-26 02:45 2,644,480 --a
    C:\Windows\System32\NlsLexicons0009.dll
    2008-07-11 22:49 . 2008-06-26 04:29 801,280 --a
    C:\Windows\System32\NaturalLanguage6.dll
    2008-07-07 01:23 . 2008-07-07 22:21 <DIR> d
    C:\Users\James\AppData\Roaming\gtk-2.0
    2008-07-07 01:22 . 2008-07-07 01:23 <DIR> d
    C:\Users\James\avidemux
    2008-07-03 22:56 . 2008-07-06 23:18 <DIR> d
    C:\Users\James\AppData\Roaming\vlc
    2008-07-03 22:54 . 2008-07-03 22:54 <DIR> d
    C:\Users\James\AppData\Roaming\MozillaControl
    2008-07-03 22:54 . 2008-07-13 22:59 <DIR> d
    C:\Program Files\VideoLAN
    2008-07-03 22:54 . 2008-07-03 22:54 <DIR> d
    C:\Program Files\Mozilla ActiveX Control v1.7.12
    2008-07-03 21:33 . 2008-07-03 22:24 <DIR> d
    C:\Users\James\AppData\Roaming\Orbit
    2008-07-03 19:10 . 2008-07-03 19:10 54,156 --ah
    C:\Windows\QTFont.qfn
    2008-07-03 19:10 . 2008-07-03 19:10 1,409 --a
    C:\Windows\QTFont.for
    2008-07-03 18:57 . 2008-07-03 18:57 <DIR> d
    C:\Users\James\video iphone
    2008-06-30 18:12 . 2008-06-30 18:12 <DIR> d
    C:\Users\James\AppData\Roaming\Auslogics
    2008-06-30 18:04 . 2008-06-11 14:48 188,960 --a
    C:\Windows\System32\nvapps.xml
    2008-06-24 20:13 . 2008-06-24 20:13 <DIR> d
    C:\Users\James\AppData\Roaming\Uniblue

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-07-22 21:12
    d
    w C:\Users\James\AppData\Roaming\SiteAdvisor
    2008-07-22 15:47
    d
    w C:\Program Files\Java
    2008-07-20 12:43
    dc-h--w C:\Program Files\InstallShield Installation Information
    2008-07-18 20:55
    d
    w C:\ProgramData\Spybot - Search & Destroy
    2008-07-17 16:13
    d
    w C:\Users\James\AppData\Roaming\LimeWire
    2008-07-13 21:58
    d
    w C:\Users\James\AppData\Roaming\uTorrent
    2008-07-11 21:52
    d
    w C:\ProgramData\Microsoft Help
    2008-07-09 22:11
    d
    w C:\Program Files\Windows Mail
    2008-07-01 20:21
    d
    w C:\ProgramData\Lavasoft
    2008-07-01 20:20
    dc----w C:\Program Files\Common Files\Wise Installation Wizard
    2008-06-30 17:46
    d
    w C:\ProgramData\NVIDIA
    2008-06-21 22:11
    d
    w C:\Users\James\AppData\Roaming\FlashGet
    2008-06-16 11:59
    dc----w C:\Program Files\Alwil Software
    2008-06-11 21:01 0 ---ha-w C:\Windows\system32\drivers\Msft_User_WpdMtpDr_01_00_00.Wdf
    2008-06-11 06:50 0 ---ha-w C:\Windows\system32\drivers\Msft_User_WpdFs_01_00_00.Wdf
    2008-06-11 06:46 174 --sha-w C:\Program Files\desktop.ini
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Sidebar
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Photo Gallery
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Journal
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Defender
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Collaboration
    2008-06-10 21:13
    d
    w C:\Program Files\Windows Calendar
    2008-06-08 14:09
    dc----w C:\Program Files\Common Files\Napster Shared
    2008-05-29 13:27
    d
    w C:\Users\James\AppData\Roaming\SystemRequirementsLab
    2008-05-29 13:27
    d
    w C:\Program Files\SystemRequirementsLab
    2008-04-19 20:54 22,328 ----a-w C:\Users\James\AppData\Roaming\PnkBstrK.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [2008-01-19 08:33 1233920]
    "ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2008-01-19 08:33 125952]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SoundTray"="C:\Program Files\Analog Devices\SoundMAX\SoundTray.exe" [2007-04-01 13:44 49152]
    "GrooveMonitor"="D:\microsoft office 2007\Office12\GrooveMonitor.exe" [2007-08-24 07:00 33648]
    "MSConfig"="C:\Windows\system32\msconfig.exe" [2008-01-19 08:33 227840]
    "SoundMAXPnP"="C:\Program Files\Analog Devices\Core\smax4pnp.exe" [2007-04-02 17:32 1261568]
    "NvCplDaemon"="C:\Windows\system32\NvCpl.dll" [2008-05-16 14:01 13535776]
    "NvMediaCenter"="C:\Windows\system32\NvMcTray.dll" [2008-05-16 14:01 92704]
    "Malwarebytes Anti-Malware Reboot"="D:\Malware bytes\Malwarebytes' Anti-Malware\mbam.exe" [2008-07-20 20:21 1191544]
    "WinPatrol"="D:\Winpatrol\winpatrol.exe" [2008-07-04 17:58 333120]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 04:27 144784]
    "egui"="D:\ESET NOD32\egui.exe" [2008-03-13 16:48 1443072]
    "Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2007-04-11 16:32 56080 C:\Windows\KHALMNPR.Exe]

    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\
    Logitech SetPoint.lnk - D:\Setpoint\SetPoint.exe [2008-01-08 16:56:30 692224]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableUIADesktopToggle"= 0 (0x0)

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "D:\Superantispyware\SASSEH.DLL" [2006-12-20 12:55 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2007-04-19 12:41 294912 D:\Superantispyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=D:\KASPER~1\kloehk.dll

    [HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
    backup=C:\Windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
    backupExtension=.CommonStartup

    [HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Metacafe.lnk]
    path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Metacafe.lnk
    backup=C:\Windows\pss\Metacafe.lnk.CommonStartup
    backupExtension=.CommonStartup

    [HKLM\~\startupfolder\C:^Users^James^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Bux.to Autoclicker.lnk]
    path=C:\Users\James\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bux.to Autoclicker.lnk
    backup=C:\Windows\pss\Bux.to Autoclicker.lnk.Startup
    backupExtension=.Startup

    [HKLM\~\startupfolder\C:^Users^James^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Metacafe.lnk]
    path=C:\Users\James\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Metacafe.lnk
    backup=C:\Windows\pss\Metacafe.lnk.Startup
    backupExtension=.Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AlcoholAutomount]
    --a
    2008-03-20 17:46 217544 D:\Alcohol 120%\Alcohol 120\AxCmd.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    --a
    2007-12-11 13:10 267048 D:\iTunes\iTunesHelper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
    --a--c--- 2006-01-12 16:40 155648 C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    --a
    2007-12-11 11:56 286720 C:\Program Files\QuickTime\QTTask.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RivaTunerStartupDaemon]
    --a
    2008-03-10 09:10 24576 D:\Rivatuner\RivaTuner v2.08\RivaTunerWrapper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
    --a--c--- 2008-02-27 17:47 185896 C:\Program Files\Common Files\Real\Update_OB\realsched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UnlockerAssistant]
    --a
    2008-05-02 05:15 15872 D:\OCEANS_13\Unlocker\UnlockerAssistant.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\updateMgr]
    -ra
    2004-11-22 09:18 307200 D:\Adobe Reader\Reader\AdobeUpdateManager.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
    --a
    2008-01-19 08:38 1008184 C:\Program Files\Windows Defender\MSASCui.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinVNC]
    --a
    2007-05-07 19:28 589824 D:\VNC\TightVNC\WinVNC.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "UacDisableNotify"=dword:00000001
    "InternetSettingsDisableNotify"=dword:00000001
    "AutoUpdateDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-2539102195-3166443380-987782504-1000]
    "EnableNotificationsRef"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
    "TCP Query User{A0A74DD9-C8A2-4503-9B68-BC799F30F93F}C:\\program files\\utorrent\\utorrent.exe"= UDP:C:\program files\utorrent\utorrent.exe:uTorrent
    "UDP Query User{8CF46D2C-7393-4CAF-83E2-9BA3B2944D28}C:\\program files\\utorrent\\utorrent.exe"= TCP:C:\program files\utorrent\utorrent.exe:uTorrent
    "{845242F4-3039-4B37-82D9-1766C2BA5A3E}"= UDP:D:\iTunes\iTunes.exe:iTunes
    "{DEA556F1-A5D0-4D10-9C1B-27D45BB182A6}"= TCP:D:\iTunes\iTunes.exe:iTunes
    "{F6408DB9-FF68-485C-B2E8-0AEFEA277476}"= UDP:38676:utorrent
    "{FCC9081E-7C74-435C-B85D-E83FCCCBEFFB}"= TCP:38676:utorrent
    "{2C4398DD-69E0-4A62-A86A-E940FA3ED1D8}"= UDP:1351:utoreent
    "{BF78AC6D-B191-4E23-A614-C6F3CB0DFED6}"= UDP:D:\battlefield 2\BF2.exe:Battlefield 2
    "{6D8DEA5D-95CD-44B8-ABD5-D8E508E0FFE8}"= TCP:D:\battlefield 2\BF2.exe:Battlefield 2
    "TCP Query User{888DBE3D-44DF-4114-B2C0-D065E1B26814}C:\\users\\james\\desktop\\programs\\utorrent.exe"= UDP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "UDP Query User{A3B1B559-6235-4391-B808-6669ADE36FD1}C:\\users\\james\\desktop\\programs\\utorrent.exe"= TCP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "{F4EB5569-3087-4268-B208-5277C8E1138D}"= UDP:C:\Windows\System32\PnkBstrA.exe:PnkBstrA
    "{3BD4902D-6B11-47CB-94C0-09B9FBC4B51E}"= TCP:C:\Windows\System32\PnkBstrA.exe:PnkBstrA
    "{AADE7B35-548D-427C-B99C-892A36ED0ED0}"= UDP:C:\Windows\System32\PnkBstrB.exe:PnkBstrB
    "{E610067A-D474-4425-A70F-2BE5C094121C}"= TCP:C:\Windows\System32\PnkBstrB.exe:PnkBstrB
    "TCP Query User{28BD7300-3DF2-41A9-ADD1-31D95A95BE8D}D:\\gamespy comrade\\comrade.exe"= UDP:D:\gamespy comrade\comrade.exe:Comrade
    "UDP Query User{B42A6A6F-75E7-4B82-A1F7-DA95FFB467F9}D:\\gamespy comrade\\comrade.exe"= TCP:D:\gamespy comrade\comrade.exe:Comrade
    "TCP Query User{F4B92686-223F-414C-AFA2-C0B93A03C58D}D:\\limewire\\limewire.exe"= UDP:D:\limewire\limewire.exe:LimeWire
    "UDP Query User{5B061038-17F0-4BA6-8B78-7D60F2BA3CD2}D:\\limewire\\limewire.exe"= TCP:D:\limewire\limewire.exe:LimeWire
    "{DD443D69-C0D4-43BF-AE8A-DB91D59EBC38}"= TCP:6004|D:\microsoft office 2007\Office12\outlook.exe:Microsoft Office Outlook
    "{C68D3F1F-7741-41BC-8E46-8BA9E0949CD9}"= UDP:D:\microsoft office 2007\Office12\GROOVE.EXE:Microsoft Office Groove
    "{13A63C2D-30C1-4E2D-B084-082DC11D5E52}"= TCP:D:\microsoft office 2007\Office12\GROOVE.EXE:Microsoft Office Groove
    "{AF3C5D29-804A-460E-A2BF-697D07C57E8B}"= UDP:D:\microsoft office 2007\Office12\ONENOTE.EXE:Microsoft Office OneNote
    "{5B0E2D93-1359-48BC-9A93-D4F955E44EB2}"= TCP:D:\microsoft office 2007\Office12\ONENOTE.EXE:Microsoft Office OneNote
    "TCP Query User{CAAE9F55-19ED-42A5-8FB3-7FF8E1A9B7CC}C:\\users\\james\\desktop\\programs\\utorrent.exe"= UDP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "UDP Query User{8F8884E4-D19B-46BD-AE0F-A4C72DE117E2}C:\\users\\james\\desktop\\programs\\utorrent.exe"= TCP:C:\users\james\desktop\programs\utorrent.exe:utorrent.exe
    "TCP Query User{1EB20656-B3FC-4744-A918-029F25901ADC}D:\\limewire\\limewire.exe"= UDP:D:\limewire\limewire.exe:LimeWire
    "UDP Query User{155E9F16-5915-444A-A344-32855313C08D}D:\\limewire\\limewire.exe"= TCP:D:\limewire\limewire.exe:LimeWire
    "TCP Query User{0262EF93-D995-455E-B085-D5D720D9004A}E:\\crysis\\bin32\\crysis.exe"= UDP:E:\crysis\bin32\crysis.exe:Crysis
    "UDP Query User{623B5C85-D6DA-4907-99D9-A1CE62B60377}E:\\crysis\\bin32\\crysis.exe"= TCP:E:\crysis\bin32\crysis.exe:Crysis
    "{A57A411D-9292-4FED-B3DA-3AB877918E96}"= UDP:D:\Program Files\DAP\DAP.exe:Download Accelerator Plus (DAP)
    "{A391F620-5109-49D9-84F0-5BFAF6507D89}"= TCP:D:\Program Files\DAP\DAP.exe:Download Accelerator Plus (DAP)
    "{38E7F030-65CD-422A-8FF7-50DDEC8A917B}"= UDP:D:\neverwinter\nwn2main.exe:Neverwinter Nights 2 Main
    "{BD0DA0A7-78BA-4776-8131-1AB2B086CE20}"= TCP:D:\neverwinter\nwn2main.exe:Neverwinter Nights 2 Main
    "{2D8A57D4-B4C9-44C9-A6AE-95830208F151}"= UDP:D:\neverwinter\nwn2main_amdxp.exe:Neverwinter Nights 2 AMD
    "{9AA496C0-9300-4C27-BEF7-79F6190AE322}"= TCP:D:\neverwinter\nwn2main_amdxp.exe:Neverwinter Nights 2 AMD
    "{3A990F55-8652-4EC1-963E-7C82F8D13683}"= UDP:D:\neverwinter\nwupdate.exe:Neverwinter Nights 2 Updater
    "{08A17C59-EAB8-44E4-8044-57856B3D67A6}"= TCP:D:\neverwinter\nwupdate.exe:Neverwinter Nights 2 Updater
    "{F0AC930D-4A56-4740-ABCD-0F61F6FACE39}"= UDP:D:\neverwinter\nwn2server.exe:Neverwinter Nights 2 Server
    "{2FE00435-DEB5-4473-B749-4E4BC7E422FD}"= TCP:D:\neverwinter\nwn2server.exe:Neverwinter Nights 2 Server
    "TCP Query User{88A2FC81-7B90-41F4-BEA7-4ADD8DBAE8D0}D:\\itunes\\itunes.exe"= UDP:D:\itunes\itunes.exe:iTunes
    "UDP Query User{FAA82599-4F3D-4D82-9EB6-5A5D78452A52}D:\\itunes\\itunes.exe"= TCP:D:\itunes\itunes.exe:iTunes
    "{B1999330-0A7B-4E47-99D4-5CCF2906D293}"= UDP:D:\tom clancy\Binaries\R6Vegas_Game.exe:Rainbow Six Vegas
    "{F853736B-D8CF-455F-BB92-D2E7C13BD9AE}"= TCP:D:\tom clancy\Binaries\R6Vegas_Game.exe:Rainbow Six Vegas
    "{450B1B3D-4836-436A-A459-D7B1963ACA01}"= UDP:D:\tom clancy\Binaries\R6Vegas_Launcher.exe:Rainbow Six Vegas Updater
    "{88ABE743-6398-47AA-B13D-A2D0BCC37266}"= TCP:D:\tom clancy\Binaries\R6Vegas_Launcher.exe:Rainbow Six Vegas Updater
    "{432F0282-861E-439A-A712-824C8512F1A4}"= UDP:D:\Call of duty\iw3mp.exe:Call of Duty(R) 4 - Modern Warfare(TM)
    "{D5C9740C-FA23-4A33-A474-DB2262E52018}"= TCP:D:\Call of duty\iw3mp.exe:Call of Duty(R) 4 - Modern Warfare(TM)
    "TCP Query User{7A5C9E81-EDC1-4AEC-A9EA-849E4D0D31FD}D:\\firefox\\firefox.exe"= UDP:D:\firefox\firefox.exe:Firefox
    "UDP Query User{235E13E0-0BED-4C22-A75D-E5F82063CD20}D:\\firefox\\firefox.exe"= TCP:D:\firefox\firefox.exe:Firefox
    "TCP Query User{EAEF867D-88BC-4E25-B918-66F80D4E34C9}C:\\users\\james\\desktop\\wow-2.0.0-enus-installer-downloader.exe"= UDP:C:\users\james\desktop\wow-2.0.0-enus-installer-downloader.exe:wow-2.0.0-enus-installer-downloader.exe
    "UDP Query User{AD29195A-C58C-405C-9E7B-D76B200E2EDB}C:\\users\\james\\desktop\\wow-2.0.0-enus-installer-downloader.exe"= TCP:C:\users\james\desktop\wow-2.0.0-enus-installer-downloader.exe:wow-2.0.0-enus-installer-downloader.exe
    "{2864A343-C5A2-43CA-A504-3977600432DC}"= UDP:D:\Limewir\LimeWire\LimeWire.exe:LimeWire
    "{238C64CF-F697-43D7-946E-4ED7D3FCA902}"= TCP:D:\Limewir\LimeWire\LimeWire.exe:LimeWire
    "TCP Query User{E7059402-E739-4A1C-AE50-66E371C46BC3}C:\\program files\\internet explorer\\iexplore.exe"= UDP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
    "UDP Query User{0019A3DF-2466-49A7-AACD-F85E7A09F133}C:\\program files\\internet explorer\\iexplore.exe"= TCP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
    "{40D2478D-F8F8-4972-A339-6E9FB4D5D5C7}"= UDP:E:\Crysis\Bin32\Crysis.exe:Crysis_32
    "{807DFD54-2C8F-4AA7-9137-442D86D6A6B2}"= TCP:E:\Crysis\Bin32\Crysis.exe:Crysis_32
    "{266094F1-7B22-4A31-A663-262686D9D270}"= UDP:E:\Crysis\Bin32\CrysisDedicatedServer.exe:CrysisDedicatedServer_32
    "{2E2AEE54-77A4-4138-A8A8-994F0DFBF6F0}"= TCP:E:\Crysis\Bin32\CrysisDedicatedServer.exe:CrysisDedicatedServer_32
    "TCP Query User{32B9CFE9-6EB5-443E-949D-E36908023DC7}D:\\anoymize\\anonymizer\\anonymizer software\\common\\anonproxy.exe"= UDP:D:\anoymize\anonymizer\anonymizer software\common\anonproxy.exe:AnonProxy
    "UDP Query User{9CE8D8A3-A5B0-4EE9-8FD1-1EB23E122971}D:\\anoymize\\anonymizer\\anonymizer software\\common\\anonproxy.exe"= TCP:D:\anoymize\anonymizer\anonymizer software\common\anonproxy.exe:AnonProxy
    "TCP Query User{C152A636-83E8-467C-9B1E-A4DC72E44EC1}D:\\css\\counter-strike source\\hl2.exe"= UDP:D:\css\counter-strike source\hl2.exe:hl2
    "UDP Query User{C41A58B6-8B13-48EA-BF88-56E80335E272}D:\\css\\counter-strike source\\hl2.exe"= TCP:D:\css\counter-strike source\hl2.exe:hl2
    "TCP Query User{33E002FE-C5C0-486B-B253-5F6FEF7524C5}D:\\css\\counter-strike source\\hl2.exe"= UDP:D:\css\counter-strike source\hl2.exe:hl2
    "UDP Query User{136DA52C-D02A-465E-BF21-ED0D9D94B76F}D:\\css\\counter-strike source\\hl2.exe"= TCP:D:\css\counter-strike source\hl2.exe:hl2
    "TCP Query User{10B96B77-94D0-4771-B0AF-33BBA5DC5008}D:\\age of empires\\empires2.icd"= UDP:D:\age of empires\empires2.icd:Age of Empires II
    "UDP Query User{069B776C-D70C-464E-A144-082AA937F47A}D:\\age of empires\\empires2.icd"= TCP:D:\age of empires\empires2.icd:Age of Empires II
    "TCP Query User{A774F65E-4DA8-4D5F-AC75-9FF49F489046}C:\\pacsteamt\\steamapps\\pompalomppompalomp\\counter-strike source\\hl2.exe"= UDP:C:\pacsteamt\steamapps\pompalomppompalomp\counter-strike source\hl2.exe:hl2
    "UDP Query User{B6C7FFF6-9AD7-4491-8F5E-F1C091FE764C}C:\\pacsteamt\\steamapps\\pompalomppompalomp\\counter-strike source\\hl2.exe"= TCP:C:\pacsteamt\steamapps\pompalomppompalomp\counter-strike source\hl2.exe:hl2
    "TCP Query User{6B3E5BB3-4346-4C15-8041-303FEC7FAAB9}D:\\vnc\\tightvnc\\winvnc.exe"= UDP:D:\vnc\tightvnc\winvnc.exe:TightVNC Win32 Server
    "UDP Query User{2F2A9DA7-432D-466A-8491-80C8A94E8315}D:\\vnc\\tightvnc\\winvnc.exe"= TCP:D:\vnc\tightvnc\winvnc.exe:TightVNC Win32 Server
    "71003e12-810d-4669-a588-73b3668f311b"= UDP:5901:VNC
    "TCP Query User{16313EF9-0417-49D6-A4F2-11A4DBF4D03C}D:\\touchpad media services\\touchpadmediaserver.exe"= UDP:D:\touchpad media services\touchpadmediaserver.exe:TouchpadMediaServer
    "UDP Query User{662CB993-94F0-4370-A075-35815B4D0486}D:\\touchpad media services\\touchpadmediaserver.exe"= TCP:D:\touchpad media services\touchpadmediaserver.exe:TouchpadMediaServer
    "TCP Query User{08D2C583-DC81-444C-9F29-72D8D5EDD30A}D:\\media server\\touchpadmediaserver.exe"= UDP:D:\media server\touchpadmediaserver.exe:TouchpadMediaServer
    "UDP Query User{72D615E5-6E2F-47B9-93EE-C9AF4E9EDEA3}D:\\media server\\touchpadmediaserver.exe"= TCP:D:\media server\touchpadmediaserver.exe:TouchpadMediaServer
    "{F8D33BB8-27D2-4C51-A39E-A9D878270CA0}"= UDP:24956:utorrent port
    "TCP Query User{424D4144-F884-4A6C-B600-E536EAF0EACD}D:\\flashget\\flashget.exe"= UDP:D:\flashget\flashget.exe:FlashGet
    "UDP Query User{9CE15170-7936-4706-A544-08CBB4AA69A4}D:\\flashget\\flashget.exe"= TCP:D:\flashget\flashget.exe:FlashGet
    "{B2774C4D-1B4A-450E-81EC-93A9B5A8E1A5}"= UDP:2:222222
    "TCP Query User{449F5AA0-5467-4DBA-83FB-607AA0337275}D:\\call of duty\\iw3mp.exe"= UDP:D:\call of duty\iw3mp.exe:iw3mp
    "UDP Query User{3A0361C4-5583-40F6-8DF7-33249042C0D5}D:\\call of duty\\iw3mp.exe"= TCP:D:\call of duty\iw3mp.exe:iw3mp
    "TCP Query User{233AB831-851A-45F9-8514-116E6826BE2D}D:\\red kawa\\orbitdownloader\\orbitnet.exe"= UDP:D:\red kawa\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader
    "UDP Query User{3EC36712-1D4F-46A3-87EB-0D235FD5245C}D:\\red kawa\\orbitdownloader\\orbitnet.exe"= TCP:D:\red kawa\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

    R1 epfwtdir;epfwtdir;C:\Windows\system32\DRIVERS\epfwtdir.sys [2008-03-13 16:52]
    R1 RtlProt;Realtke RtlProt WLAN Utility Protocol Driver;C:\Windows\system32\DRIVERS\rtlprot.sys [2007-04-02 11:57]
    R2 AEADIFilters;Andrea ADI Filters Service;C:\Windows\system32\AEADISRV.EXE [2007-02-05 23:44]
    R2 MBAMDrvService;MBAMDrvService;C:\Windows\system32\drivers\mbam.sys [2008-07-20 20:21]
    R2 MBAMService;MBAMService;D:\Malware bytes\Malwarebytes' Anti-Malware\mbamservice.exe [2008-07-20 20:21]
    R2 SBSDWSCService;SBSD Security Center Service;D:\Spybot\Spybot - Search & Destroy\SDWinSec.exe [2008-01-28 12:43]
    R3 RTL8187;Realtek RTL8187 Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter;C:\Windows\system32\DRIVERS\RTL8187.sys [2007-11-19 07:59]
    R3 yukonwlh;NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\system32\DRIVERS\yk60x86.sys [2007-12-06 10:51]

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c3eaa63c-bdb6-11dc-9843-806e6f6e6963}]
    \shell\AutoRun\command - F:\AutoRunCD.exe
    .
    Contents of the 'Scheduled Tasks' folder
    "2008-07-22 21:21:09 C:\Windows\Tasks\RtlVistaStart.job"
    - C:\Program Files\ASUS WiFi-AP Solo\RtWLan.exe
    "2008-02-28 18:09:35 C:\Windows\Tasks\Spybot - Search & Destroy - Scheduled Task.job"
    - D:\Spybot\Spybot - Search & Destroy\SpybotSD.exe
    .
    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-22 22:21:23
    Windows 6.0.6001 Service Pack 1 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Other Running Processes
    .
    C:\Windows\System32\nvvsvc.exe
    C:\Windows\System32\audiodg.exe
    D:\ad aware\aawservice.exe
    C:\Windows\System32\rundll32.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    D:\ESET NOD32\ekrn.exe
    D:\Alcohol 120%\Alcohol 120\StarWind\StarWindServiceAE.exe
    D:\Malware bytes\Malwarebytes' Anti-Malware\mbamtrayctrl.exe
    C:\Windows\System32\rundll32.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Program Files\Common Files\Logitech\KhalShared\KHALMNPR.exe
    C:\Windows\servicing\TrustedInstaller.exe
    .
    **************************************************************************
    .
    Completion time: 2008-07-22 22:25:03 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-07-22 21:24:47
    ComboFix2.txt 2008-07-22 20:58:55
    ComboFix3.txt 2008-07-22 16:09:07
    ComboFix4.txt 2008-07-01 19:16:19
    ComboFix5.txt 2008-07-22 21:14:02

    Pre-Run: 41,591,996,416 bytes free
    Post-Run: 41,208,827,904 bytes free

    310 --- E O F --- 2008-07-20 20:39:49
  • edited July 2008
    Please open LINK >>> THIS PAGE <<<LINK in a new window.

    In the box marked Link to topic where this file was requested: please put this text
    http://icrontic.com/forum/showthread.php?p=630946#post630946
    
    ( highlite the contents of the code box then press CTRL+C, then go to the new page click in the Topic box and press CTRL+V )

    Click the Browse to the file you want to submit: button, and browse to the new .zip fileon your desktop
    [4]-Submit_****-**-**@**.**.zip
    

    In the Largest box please put
    File Requested By Katana
    Failed CF Submit
    
    Finally click SendFile


    Active Scan
    Your Antivirus and/or Antispyware may give a warning during the scan. This is perfectly normal
    Please go to this site Link >> ActiveScan << LINK
    • Click the Scan Now button
    • Follow the prompts to install the Active X if necessary
    • Go and make a cup of tea/coffee/beverage of your choice and watch some TV :)
    • When the scan is finished, a report will be generated
    • Next to Scan Details click the small Save button and save the report to your desktop.
    • Please post the report in your reply.
  • pompalomppompalomp New
    edited July 2008
    thanks katana,

    I will have to get round to this tommorow afternoon
  • pompalomppompalomp New
    edited July 2008
    Ok, I did what you asked. Here is the Activescan results,

    ;***********************************************************************************************************************************************************************************
    ANALYSIS: 2008-07-23 19:17:00
    PROTECTIONS: 1
    MALWARE: 2
    SUSPECTS: 1
    ;***********************************************************************************************************************************************************************************
    PROTECTIONS
    Description Version Active Updated
    ;===================================================================================================================================================================================
    Windows Defender 1.1.3704.0 No No
    ;===================================================================================================================================================================================
    MALWARE
    Id Description Type Active Severity Disinfectable Disinfected Location
    ;===================================================================================================================================================================================
    01017649 Malware Generic Virus/Trojan No 0 Yes No D:\Programs\RAR recovery\PATCH.EXE
    03074964 Trj/CI.A Virus/Trojan No 0 Yes No D:\Programs\Counterstrke sourece\cod4_hacks_1.5.zip[Sibot_Public/SiBot_with_chams/SiBot.exe]
    03074964 Trj/CI.A Virus/Trojan No 0 Yes No D:\Programs\Counterstrke sourece\cod4_hacks_1.5.zip[Sibot_Public/SiBot (No D3D)_without_chams/SiBot.exe]
    03074964 Trj/CI.A Virus/Trojan No 0 Yes No D:\Call of duty\SiBot.exe
    ;===================================================================================================================================================================================
    SUSPECTS
    Sent Location d-n[���s5
    ;===================================================================================================================================================================================
    No D:\Call of duty\callofduty4Multihack.exe d-n[���s5
    ;===================================================================================================================================================================================
    VULNERABILITIES
    Id Severity Description d-n[���s5
    ;===================================================================================================================================================================================
    ;===================================================================================================================================================================================
  • edited July 2008
    The following files are flagged as being infected, now that may be because of the way they work OR they may actually be infected.
    Do you know that these are safe, or are you willing to remove them ?
    "D:\Call of duty\callofduty4Multihack.exe"
    "D:\Call of duty\SiBot.exe"
    "D:\Programs\Counterstrke sourece\cod4_hacks_1.5.zip"
    "D:\Programs\RAR recovery\PATCH.EXE"

    How are things running now ?
  • pompalomppompalomp New
    edited July 2008
    I am willing to remove them all, everything seems ok nothing unusual
  • edited July 2008
    Delete Files and Folders
    Find and delete the following Files if present
    D:\Programs\RAR recovery\PATCH.EXE << This file
    D:\D:\Programs\Counterstrke sourece\cod4_hacks_1.5.zip << This file
    D:\Call of duty\SiBot.exe << This file
    D:\Call of duty\callofduty4Multihack.exe << This file



    Congratulations your logs look clean :D

    Let's see if I can help you keep it that way

    First lets tidy up :D


    • Click START then RUN
    • Now type Combofix /u in the runbox and click OK. Note the space between the X and the /U, it needs to be there.
      • CF_Cleanup.png

    You can also delete any logs we have produced, and empty your Recycle bin.




    The following is some info to help you stay safe and clean.
    ( Vista users must ensure that any programs are Vista compatible BEFORE installing )

    You may already have some of the following programs, but I include the full list for the benefit of all the other people who will be reading this thread in the future.

    Online Scanners
    I would recommend a scan at one or more of the following sites at least once a month.

    http://www.pandasecurity.com/activescan
    http://www.kaspersky.com/kos/eng/partner/71706/kavwebscan.html

    !!! Make sure that all your programs are updated !!!
    Secunia Software Inspector does all the work for you, .... see HERE for details

    AntiSpyware
      AntiSpyware is
    not the same thing as Antivirus.
    Different AntiSpyware programs detect different things, so in this case it is recommended that you have more than one.
    You should only have one running all the time, the other/s should be used "on demand" on a regular basis.
    Most of the programs in this list have a free (for Home Users ) and paid versions,
    it is worth paying for one and having "realtime" protection, unless you intend to do a manual scan often.
    [*]Spybot - Search & Destroy <<< A must have program
    • It includes host protection and registry protection
    • A hosts file is a bit like a phone book, it points to the actual numeric address (i.e. the IP address) from the human friendly name of a website. This feature can be used to block malicious websites

    [*] MalwareBytes Anti-malware <<< A New and effective program
    [*]a-squared Free <<< A good "realtime" or "on demand" scanner
    [*]superantispyware <<< A good "realtime" or "on demand" scanner



    Prevention
      These programs don't detect malware, they help stop it getting on your machine in the first place. Each does a different job, so you can have more than one
    • Winpatrol
      • An excellent startup manager and then some !!
      • Notifies you if programs are added to startup
      • Allows delayed startup
      • A must have addition
    • SpywareBlaster 4.0
      • SpywareBlaster sets killbits in the registry to prevent known malicious activex controls from installing themselves on your computer.
    • SpywareGuard 2.2
      • SpywareGuard provides real-time protection against spyware.
      • Not required if you have other "realtime" antispyware or Winpatrol
    • ZonedOut
      • Formerly known as IE-SPYAD, adds a long list of sites and domains associated with known advertisers and marketers to the Restricted sites zone of Internet Explorer.
    • MVPS HOSTS
      • This little program packs a powerful punch as it blocks ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers.
      • For information on how to download and install, please read this tutorial by WinHelp2002.
      • Not required if you are using other host file protections


    Internet Browsers
      Microsoft has worked hard to make IE.7 a more secure browser, unfortunately whilst it is still the leading browser of choice it will always be under attack from the bad guys. Using a different web browser can help stop malware getting on your machine.
    • Make your Internet Explorer more secure - This can be done by following these simple instructions:
      1. From within Internet Explorer click on the Tools menu and then click on Options.
      2. Click once on the Security tab
      3. Click once on the Internet icon so it becomes highlighted.
      4. Click once on the Custom Level button.
        • Change the Download signed ActiveX controls to Prompt
        • Change the Download unsigned ActiveX controls to Disable
        • Change the Initialise and script ActiveX controls not marked as safe to Disable
        • Change the Installation of desktop items to Prompt
        • Change the Launching programs and files in an IFRAME to Prompt
        • Change the Navigate sub-frames across different domains to Prompt
        • When all these settings have been made, click on the OK button.
        • If it prompts you as to whether or not you want to save the settings, press the Yes button.
      5. Next press the Apply button and then the OK to exit the Internet Properties page.

    If you are still using IE6 then either update, or get one of the following.
    • FireFox
      • With many addons available that make customization easy this is a very popular choice
      • NoScript and AdBlockPlus addons are essential
    • Opera
      • Another popular alternative
    • Netscape
      • Another popular alternative
      • Also has Addons available



    Cleaning Temporary Internet Files and Tracking Cookies
      Temporary Internet Files are mainly the files that are downloaded when you open a web page. Unfortunately, if the site you visit is of a dubious nature or has been hacked, they can also be an entry point for malware. It is a good idea to empty the Temporary Internet Files folder on a regular basis. Tracking Cookies are files that websites use to monitor which sites you visit and how often. A lot of Antispyware scanners pick up these tracking cookies and flag them as unwanted. CAUTION :- If you delete all your cookies you will lose any autologin information for sites that you visit, and will need your passwords Both of these can be cleaned manually, but a quicker option is to use a program
    • ATF Cleaner
      • Free and very simple to use
    • CCleaner
      • Free and very flexible, you can chose which cookies to keep


    Also PLEASE read this article.....So How Did I Get Infected In The First Place

    The last and most important thing I can tell you is UPDATE.
    If you don't update your security programs (Antivirus, Antispyware even Windows) then you are at risk.
    Malware changes on a day to day basis. You should update every week at the very least.

    If you follow this advice then (with a bit of luck) you will never have to hear from me again :D


    If you could post back one more time to let me know everything is OK, then I can have this thread archived.

    Happy surfing K'
  • pompalomppompalomp New
    edited July 2008
    Thanks for everything Katana everything is a lot better now. If you wouldn't mine i would like to ask you 2 more questions.

    1st.) Does it matter that i couldn't update Adobe reader?

    2nd.) How did you learn so much about spyware/viruses etc

    Thanks again
  • edited July 2008
    You can ask as many questions as you like :)

    1) It would be better if you try to update Adobe again, it depends how much you use PDF documents.
    If you don't view them then you can just remove the old version of Adobe.

    2) I joined the Malware Removal University.
    Are you interested in learning and helping ?
  • pompalomppompalomp New
    edited July 2008
    Thanks Katana,

    Yes i am very interested in learning about malware as well as eventually helping out here in the forums.
  • pompalomppompalomp New
    edited July 2008
    Ok, i have visited the Malware university, but i am a little confused. I can't find any links that direct me to guides or instructions about malware removal.
    If you could point me i the right direction i would be very grateful.

    Thanks
  • edited July 2008
    You need to join the University before you can see most of the removal tutorials.
    http://www.malwareremoval.com/university.php
  • pompalomppompalomp New
    edited July 2008
    Looks very interesting, i am going to enroll tonight. If you wouldn't mind, i would be very grateful to know how long it took you. I am in my holidays right now so i would be able to give this my full attention. It says that it may take about 12 months before supervised help may be given. Also a further 6-9 months before unsupervised supervision may be given. Would this time frame be shortened if i worked constantly on it?

    Once again, thanks for all the time and effort you have put towards helping me :respect::respect:

    Pompalomp
  • edited July 2008
    It will depend on your ability, and how fast you get replies to your practice logs
    The 18 month overall time span is probably about right.

    I started in November '06, but in all honesty I have devoted a lot of time to this.
    (much to my wife's disgust :) )

    There is an awful lot to learn, and more to the point it changes on a day to day basis.
  • pompalomppompalomp New
    edited July 2008
    Sounds good to me, i enjoy a challenge :D
    Is there any age limit that you are aware of?
  • edited July 2008
    pompalomp wrote:
    Is there any age limit that you are aware of?
    The only stipulation that I know of is that you need to be alive :bigggrin:
  • pompalomppompalomp New
    edited July 2008
    lol so in other words, a cat could pass if it could use a computer :bigggrin::D:bigggrin:
  • edited July 2008
    So you already know some of the students then ? ;D
  • pompalomppompalomp New
    edited July 2008
    Ive met a few, rubbed their belly's and gave them a liver snack :bigggrin::bigggrin::bigggrin::bigggrin:

    Thanks again, i will get back to you with my progress
  • edited July 2008
    You don't need to get back to me here, you will see me at MRU often enough :)

    Glad we could be of assistance! This topic is now closed.

    If you wish to reopen your topic, please send a Private Message (PM) to Trogan with a link to your thread.

    If you are not the user who started this thread, you must start your own Thread instead :)
This discussion has been closed.