1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Computer freezing, Internet explorer not connecting

Discussion in 'Malware and Virus Removal Archive' started by davidhaggar, 2010/01/03.

  1. 2010/01/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please download ComboFix from [color= "Red"]Here[/color] or [color= "#FF0000"]Here[/color] to your Desktop.


    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    • Please, never rename Combofix unless instructed.
    • Close any open browsers.
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    NOTE. If Combofix asks you to install Recovery Console, please allow it.

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    • Double click on combofix.exe & follow the prompts.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!


    Download HijackThis:
    http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
    by clicking on Installer under Version 2.0.2
    [DO NOT download version 2.0.3 (beta)]
    Install, and run it.
    Post HijackTHis log.
    Do NOT attempt to fix anything!

    NOTE. If you're using Vista, right click on HijackThis, and click Run as Administrator
     
  2. 2010/01/03
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    Combofix and hyjack logs are below, many thanks so far:


    ComboFix 10-01-02.05 - David Haggar 03/01/2010 21:59:57.3.2 - x86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.44.1033.18.1023.624 [GMT 1:00]
    Running from: c:\documents and settings\David Haggar\Desktop\ComboFix.exe
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\desktop.ini
    c:\documents and settings\All Users\Application Data\2ACA5CC3-0F83-453D-A079-1076FE1A8B65
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar\About Hotbar.lnk
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar\Hotbar Customer Support Center.lnk
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar\Hotbar Games!.lnk
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar\Hotbar Uninstall Instructions.lnk
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar\Hotbar Videos!.lnk
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar\Reset Cursor.lnk
    c:\documents and settings\All Users\Start Menu\Programs\Hotbar\Weather.lnk
    c:\documents and settings\David Haggar\Application Data\Hotbar
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\history
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\Weather_XML\Default
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\Weather_XML\Genera1
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\Weather_XML\General
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\WeatherDPA\Links
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\WeatherDPA\Weather_XML\Display
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\WeatherDPA\Weather_XML\Loading
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\WeatherDPA\Weather_XML\screen2
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\WeatherDPA\WeatherPreferences
    c:\documents and settings\David Haggar\Application Data\Hotbar\Weather\WeatherStartup.xml
    c:\documents and settings\David Haggar\Application Data\WeatherDPA
    c:\program files\Hotbar
    c:\program files\Hotbar\bin\11.0.78.0\arrow.ico
    c:\program files\Hotbar\bin\11.0.78.0\CntntCntr.dll
    c:\program files\Hotbar\bin\11.0.78.0\copyright.txt
    c:\program files\Hotbar\bin\11.0.78.0\CoreSrv.dll
    c:\program files\Hotbar\bin\11.0.78.0\firefox\extensions\chrome.manifest
    c:\program files\Hotbar\bin\11.0.78.0\firefox\extensions\components\npclntax.xpt
    c:\program files\Hotbar\bin\11.0.78.0\firefox\extensions\install.rdf
    c:\program files\Hotbar\bin\11.0.78.0\firefox\extensions\plugins\npclntax_HotbarSA.dll
    c:\program files\Hotbar\bin\11.0.78.0\HostIE.dll
    c:\program files\Hotbar\bin\11.0.78.0\HostOL.dll
    c:\program files\Hotbar\bin\11.0.78.0\HotbarSA.exe
    c:\program files\Hotbar\bin\11.0.78.0\HotbarSAAX.dll
    c:\program files\Hotbar\bin\11.0.78.0\HotbarSADF.exe
    c:\program files\Hotbar\bin\11.0.78.0\HotbarSAHook.dll
    c:\program files\Hotbar\bin\11.0.78.0\HotbarUninstaller.exe
    c:\program files\Hotbar\bin\11.0.78.0\Srv.exe
    c:\program files\Hotbar\bin\11.0.78.0\Toolbar.dll
    c:\program files\Hotbar\bin\11.0.78.0\Weather.exe
    c:\program files\Hotbar\bin\11.0.78.0\WeSkin.dll
    c:\windows\EventSystem.log
    c:\windows\system32\ndisapi.dll
    c:\windows\system32\reboot.txt

    .
    original MBR restored successfully !
    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_gaopdxserv.sys
    -------\Legacy_NDISRD
    -------\Service_gaopdxserv.sys
    -------\Service_NDISRD


    ((((((((((((((((((((((((( Files Created from 2009-12-03 to 2010-01-03 )))))))))))))))))))))))))))))))
    .

    2010-01-03 19:07 . 2010-01-03 19:07 -------- d-----w- c:\documents and settings\David Haggar\Local Settings\Application Data\Mozilla
    2010-01-03 19:06 . 2010-01-03 20:54 -------- d-----w- c:\documents and settings\All Users\Application Data\HotbarSA
    2010-01-03 15:04 . 2009-10-29 07:45 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
    2010-01-03 15:04 . 2009-10-29 07:45 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
    2010-01-03 12:50 . 2010-01-03 12:50 -------- d-sh--w- c:\documents and settings\David Haggar\IETldCache
    2010-01-03 10:48 . 2010-01-03 15:08 -------- d-----w- c:\windows\ie8updates
    2010-01-03 10:45 . 2010-01-03 12:54 -------- dc-h--w- c:\windows\ie8
    2010-01-02 16:53 . 2010-01-02 16:53 -------- d-----w- c:\documents and settings\HelpAssistant\.SunDownloadManager
    2009-12-23 21:08 . 2009-12-23 21:08 -------- d-----w- c:\documents and settings\David Haggar\Application Data\AVS4YOU
    2009-12-23 21:08 . 2009-12-23 21:08 -------- d-----w- c:\documents and settings\All Users\Application Data\AVS4YOU
    2009-12-23 21:07 . 2010-01-03 14:07 -------- d-----w- c:\program files\Common Files\AVSMedia
    2009-12-23 21:07 . 2010-01-03 14:15 -------- d-----w- c:\program files\AVS4YOU
    2009-12-23 21:00 . 2009-12-23 21:01 -------- d-----w- c:\documents and settings\David Haggar\Application Data\Micrografx

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-01-03 21:19 . 2005-02-09 13:47 17408 ----a-w- c:\windows\system32\drivers\USBCRFT.SYS
    2010-01-03 20:01 . 2009-03-06 22:40 -------- d-----w- c:\program files\Trend Micro
    2010-01-03 19:39 . 2005-04-01 09:24 39538 ----a-w- c:\documents and settings\David Haggar\Application Data\wklnhst.dat
    2010-01-03 19:37 . 2009-07-03 21:51 -------- d-----w- c:\program files\Real Alternative
    2010-01-03 17:44 . 2006-02-05 23:27 -------- d-----w- c:\program files\Common Files\Symantec Shared
    2010-01-03 14:40 . 2007-04-14 19:54 -------- d-----w- c:\program files\Creative
    2009-12-30 17:41 . 2005-04-01 09:08 251952 ----a-w- c:\documents and settings\David Haggar\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-12-29 11:52 . 2009-11-15 20:12 79488 ----a-w- c:\documents and settings\David Haggar\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
    2009-12-28 12:12 . 2006-06-29 17:06 13472 ----a-w- c:\documents and settings\Jenny\Application Data\wklnhst.dat
    2009-12-24 14:57 . 2009-11-24 22:44 -------- d-----w- c:\program files\MioNet
    2009-12-20 00:44 . 2006-06-23 21:02 253216 ----a-w- c:\documents and settings\Jenny\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-11-27 08:26 . 2009-11-26 14:57 -------- d-----w- c:\documents and settings\Jenny\Application Data\MioNet
    2009-10-29 07:45 . 2005-02-09 09:37 916480 ----a-w- c:\windows\system32\wininet.dll
    2009-10-21 05:38 . 2005-02-09 09:37 75776 ----a-w- c:\windows\system32\strmfilt.dll
    2009-10-21 05:38 . 2005-02-09 09:36 25088 ----a-w- c:\windows\system32\httpapi.dll
    2009-10-20 16:20 . 2004-08-03 23:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
    2009-10-13 10:30 . 2005-02-09 09:37 270336 ----a-w- c:\windows\system32\oakley.dll
    2009-10-12 13:38 . 2005-02-09 09:37 149504 ----a-w- c:\windows\system32\rastls.dll
    2009-10-12 13:38 . 2005-02-09 09:37 79872 ----a-w- c:\windows\system32\raschap.dll
    2006-08-28 16:59 . 2006-08-28 16:59 8192 --sha-w- c:\windows\o2cLicStore.bin
    2005-02-09 14:13 . 2005-02-09 14:13 8 -csh--r- c:\windows\system32\14E4D0A500.sys
    2005-02-09 14:13 . 2005-02-09 14:13 5224 -csha-w- c:\windows\system32\KGyGaAvL.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg "= "c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-12-01 68856]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "AGRSMMSG "= "AGRSMMSG.exe" [2004-10-08 88363]
    "Dit "= "Dit.exe" [2004-07-20 90112]
    "NeroFilterCheck "= "c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
    "PinnacleDriverCheck "= "c:\windows\system32\PSDrvCheck.exe" [2004-03-10 406016]
    "HP Component Manager "= "c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
    "RemoteControl "= "c:\program files\Home Cinema\PowerDVD\PDVDServ.exe" [2004-11-02 32768]
    "PCMService "= "c:\program files\Home Cinema\PowerCinema\PCMService.exe" [2005-02-04 118926]
    "SunJavaUpdateSched "= "c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]
    "QuickTime Task "= "c:\program files\QuickTime\qttask.exe" [2008-05-27 413696]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE "= "c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^BlueSoleil.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\BlueSoleil.lnk
    backup=c:\windows\pss\BlueSoleil.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
    backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Image Zone Fast Start.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Image Zone Fast Start.lnk
    backup=c:\windows\pss\HP Image Zone Fast Start.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Find Fast.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Find Fast.lnk
    backup=c:\windows\pss\Microsoft Find Fast.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Office Startup.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Office Startup.lnk
    backup=c:\windows\pss\Office Startup.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATIPTA]
    2005-01-12 21:05 344064 ----a-w- c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
    2004-02-12 12:38 49152 ----a-w- c:\program files\HP\HP Software Update\hpwuSchd2.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IW_Drop_Icon]
    2004-07-30 14:10 1123840 ----a-w- c:\program files\Pinnacle\InstantCDDVD\InstantWrite\iwctrl.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Keyboard Status]
    2005-01-25 11:03 411648 ----a-w- c:\progra~1\Medion Tools\KeyStat\KeyStat.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\WINDOWS\\system32\\sessmgr.exe "=
    "c:\\Program Files\\Messenger\\msmsgs.exe "=
    "c:\\Program Files\\MSN Messenger\\msnmsgr.exe "=
    "c:\\Program Files\\AOL 9.0\\AOL.exe "=
    "c:\\Program Files\\AOL 9.0\\WAOL.exe "=
    "c:\\WINDOWS\\system32\\fxsclnt.exe "=
    "c:\\Program Files\\IVT Corporation\\BlueSoleil\\BlueSoleil.exe "=
    "c:\\Program Files\\Home Cinema\\PowerCinema\\PowerCinema.exe "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "%windir%\\system32\\sessmgr.exe "=
    "c:\\Program Files\\Sony\\Media Manager for WALKMAN\\MediaManager.exe "=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "3389:TCP "= 3389:TCP:mad:xpsp2res.dll,-22009
    "1700:TCP "= 1700:TCP:MioNet Remote Drive Access 0
    "1701:TCP "= 1701:TCP:MioNet Remote Drive Access 1
    "1702:TCP "= 1702:TCP:MioNet Remote Drive Access 2
    "1703:TCP "= 1703:TCP:MioNet Remote Drive Access 3
    "1704:TCP "= 1704:TCP:MioNet Remote Drive Access 4
    "1705:TCP "= 1705:TCP:MioNet Remote Drive Access 5
    "1706:TCP "= 1706:TCP:MioNet Remote Drive Access 6
    "1707:TCP "= 1707:TCP:MioNet Remote Drive Access 7
    "1708:TCP "= 1708:TCP:MioNet Remote Drive Access 8
    "1709:TCP "= 1709:TCP:MioNet Remote Drive Access 9
    "1641:TCP "= 1641:TCP:MioNet Remote Drive Verification
    "1647:TCP "= 1647:TCP:MioNet Storage Device Configuration
    "5432:UDP "= 5432:UDP:MioNet Storage Device Discovery
    "65533:TCP "= 65533:TCP:Services
    "52344:TCP "= 52344:TCP:Services
    "3246:TCP "= 3246:TCP:Services
    "2479:TCP "= 2479:TCP:Services

    R1 vobiw;vobiw;c:\windows\system32\drivers\vobIW.sys [01/09/2004 14:50 188416]
    R3 3xHybrid;3xHybrid service;c:\windows\system32\drivers\3xHybrid.sys [09/02/2005 14:22 802048]
    R3 cdrdrv;Cdrdrv;c:\windows\system32\drivers\Cdrdrv.sys [03/08/2004 11:10 62976]
    R3 cmudax;C-Media High Definition Audio Interface;c:\windows\system32\drivers\cmudax.sys [20/01/2005 15:05 1272000]
    R3 wbscr;Winbond Smartcard Reader for I/O;c:\windows\system32\drivers\wbscr.sys [09/02/2005 14:50 19928]
    S3 CardReaderFilter;Card Reader Filter;c:\windows\system32\drivers\USBCRFT.SYS [09/02/2005 14:47 17408]
    S3 ldiskl;ldiskl;\??\c:\docume~1\DAVIDH~1\LOCALS~1\Temp\ldiskl.sys --> c:\docume~1\DAVIDH~1\LOCALS~1\Temp\ldiskl.sys [?]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.hotmail.com/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    mSearch Bar = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    Trusted Zone: hmv.co.uk
    Trusted Zone: hmv.com
    DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
    FF - ProfilePath - c:\documents and settings\David Haggar\Application Data\Mozilla\Firefox\Profiles\n2kcznh0.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.hotmail.com/
    FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-01-03 22:19
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(508)
    c:\windows\system32\Ati2evxx.dll

    - - - - - - - > 'explorer.exe'(3820)
    c:\windows\system32\WININET.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\webcheck.dll
    c:\windows\system32\WPDShServiceObj.dll
    c:\windows\system32\PortableDeviceTypes.dll
    c:\windows\system32\PortableDeviceApi.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\Ati2evxx.exe
    c:\windows\System32\SCardSvr.exe
    c:\program files\IVT Corporation\BlueSoleil\BTNtService.exe
    c:\program files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    c:\windows\system32\CTsvcCDA.exe
    c:\program files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    c:\program files\CyberLink\Shared Files\CLML_NTService\CLMLService.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    c:\windows\system32\MsPMSPSv.exe
    c:\program files\Windows Media Player\WMPNetwk.exe
    c:\program files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    c:\program files\Canon\CAL\CALMAIN.exe
    c:\windows\system32\Ati2evxx.exe
    c:\windows\AGRSMMSG.exe
    c:\windows\Dit.exe
    c:\progra~1\COMMON~1\X10\Common\x10nets.exe
    .
    **************************************************************************
    .
    Completion time: 2010-01-03 22:26:54 - machine was rebooted
    ComboFix-quarantined-files.txt 2010-01-03 21:26
    ComboFix2.txt 2009-03-13 16:25

    Pre-Run: 32,647,671,808 bytes free
    Post-Run: 33,306,177,536 bytes free

    Current=1 Default=1 Failed=3 LastKnownGood=5 Sets=1,3,4,5
    - - End Of File - - 755BC05AE5A0E14F2814B9F55E9E3491
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 22:31:38, on 03/01/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    C:\WINDOWS\system32\CTsvcCDA.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLService.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    C:\Program Files\Canon\CAL\CALMAIN.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\Dit.exe
    C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
    C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe
    C:\Program Files\Home Cinema\PowerCinema\PCMService.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\system32\msiexec.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.hotmail.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/...b/*http://uk.docs.yahoo.com/info/bt_side.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Dit] Dit.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
    O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe "
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe "
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Home Cinema\PowerCinema\PCMService.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    O9 - Extra button: (no name) - {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - C:\Program Files\Common Files\Microsoft Shared\Encarta Search Bar\ENCSBAR.DLL
    O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.aldi.com/
    O15 - Trusted Zone: http://*.hmv.co.uk
    O15 - Trusted Zone: http://*.hmv.com
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
    O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
    O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: Pinnacle Systems Media Service (PinnacleSys.MediaServer) - Pinnacle Systems - c:\program files\pinnacle\shared files\programs\mediaserver\pmshost.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: X10 Device Network Service (x10nets) - X10 - C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    O24 - Desktop Component 0: (no name) - file:///C:/DOCUME~1/DAVIDH~1/LOCALS~1/Temp/msohtml1/01/clip_image002.jpg

    --
    End of file - 7110 bytes
     

  3. to hide this advert.

  4. 2010/01/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Wow! You did have a rootkit and a bunch of other ****...

    1. Please open Notepad
    • Click Start , then Run
    • Type notepad .exe in the Run Box.

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    File::
    c:\documents and settings\Jenny\Application Data\wklnhst.dat
    c:\windows\system32\14E4D0A500.sys
    c:\docume~1\DAVIDH~1\LOCALS~1\Temp\ldiskl.sys
    
    
    Folder::
    
    Driver::
    ldiskl
    
    Registry::
    
    RegLockDel::
    
    

    3. Save the above as CFScript.txt

    4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
    • A new HijackThis log.
     
  5. 2010/01/03
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    Here goes two new logs are below:

    ComboFix 10-01-03.01 - David Haggar 03/01/2010 22:56:02.4.2 - x86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.44.1033.18.1023.470 [GMT 1:00]
    Running from: c:\documents and settings\David Haggar\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\David Haggar\Desktop\CFScript.txt

    FILE ::
    "c:\docume~1\DAVIDH~1\LOCALS~1\Temp\ldiskl.sys "
    "c:\documents and settings\Jenny\Application Data\wklnhst.dat "
    "c:\windows\system32\14E4D0A500.sys "
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\documents and settings\Jenny\Application Data\wklnhst.dat
    c:\windows\system32\14E4D0A500.sys

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_LDISKL
    -------\Service_ldiskl


    ((((((((((((((((((((((((( Files Created from 2009-12-03 to 2010-01-03 )))))))))))))))))))))))))))))))
    .

    2010-01-03 19:07 . 2010-01-03 19:07 -------- d-----w- c:\documents and settings\David Haggar\Local Settings\Application Data\Mozilla
    2010-01-03 19:06 . 2010-01-03 20:54 -------- d-----w- c:\documents and settings\All Users\Application Data\HotbarSA
    2010-01-03 15:04 . 2009-10-29 07:45 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
    2010-01-03 15:04 . 2009-10-29 07:45 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
    2010-01-03 12:50 . 2010-01-03 12:50 -------- d-sh--w- c:\documents and settings\David Haggar\IETldCache
    2010-01-03 10:48 . 2010-01-03 15:08 -------- d-----w- c:\windows\ie8updates
    2010-01-03 10:45 . 2010-01-03 12:54 -------- dc-h--w- c:\windows\ie8
    2010-01-02 16:53 . 2010-01-02 16:53 -------- d-----w- c:\documents and settings\HelpAssistant\.SunDownloadManager
    2009-12-23 21:08 . 2009-12-23 21:08 -------- d-----w- c:\documents and settings\David Haggar\Application Data\AVS4YOU
    2009-12-23 21:08 . 2009-12-23 21:08 -------- d-----w- c:\documents and settings\All Users\Application Data\AVS4YOU
    2009-12-23 21:07 . 2010-01-03 14:07 -------- d-----w- c:\program files\Common Files\AVSMedia
    2009-12-23 21:07 . 2010-01-03 14:15 -------- d-----w- c:\program files\AVS4YOU
    2009-12-23 21:00 . 2009-12-23 21:01 -------- d-----w- c:\documents and settings\David Haggar\Application Data\Micrografx

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-01-03 22:09 . 2005-02-09 13:47 17408 ----a-w- c:\windows\system32\drivers\USBCRFT.SYS
    2010-01-03 21:31 . 2009-03-06 22:40 -------- d-----w- c:\program files\Trend Micro
    2010-01-03 19:39 . 2005-04-01 09:24 39538 ----a-w- c:\documents and settings\David Haggar\Application Data\wklnhst.dat
    2010-01-03 19:37 . 2009-07-03 21:51 -------- d-----w- c:\program files\Real Alternative
    2010-01-03 17:44 . 2006-02-05 23:27 -------- d-----w- c:\program files\Common Files\Symantec Shared
    2010-01-03 14:40 . 2007-04-14 19:54 -------- d-----w- c:\program files\Creative
    2009-12-30 17:41 . 2005-04-01 09:08 251952 ----a-w- c:\documents and settings\David Haggar\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-12-29 11:52 . 2009-11-15 20:12 79488 ----a-w- c:\documents and settings\David Haggar\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
    2009-12-24 14:57 . 2009-11-24 22:44 -------- d-----w- c:\program files\MioNet
    2009-12-20 00:44 . 2006-06-23 21:02 253216 ----a-w- c:\documents and settings\Jenny\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-11-27 08:26 . 2009-11-26 14:57 -------- d-----w- c:\documents and settings\Jenny\Application Data\MioNet
    2009-10-29 07:45 . 2005-02-09 09:37 916480 ------w- c:\windows\system32\wininet.dll
    2009-10-21 05:38 . 2005-02-09 09:37 75776 ----a-w- c:\windows\system32\strmfilt.dll
    2009-10-21 05:38 . 2005-02-09 09:36 25088 ----a-w- c:\windows\system32\httpapi.dll
    2009-10-20 16:20 . 2004-08-03 23:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
    2009-10-13 10:30 . 2005-02-09 09:37 270336 ----a-w- c:\windows\system32\oakley.dll
    2009-10-12 13:38 . 2005-02-09 09:37 149504 ----a-w- c:\windows\system32\rastls.dll
    2009-10-12 13:38 . 2005-02-09 09:37 79872 ----a-w- c:\windows\system32\raschap.dll
    2006-08-28 16:59 . 2006-08-28 16:59 8192 --sha-w- c:\windows\o2cLicStore.bin
    2005-02-09 14:13 . 2005-02-09 14:13 5224 -csha-w- c:\windows\system32\KGyGaAvL.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg "= "c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-12-01 68856]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "AGRSMMSG "= "AGRSMMSG.exe" [2004-10-08 88363]
    "Dit "= "Dit.exe" [2004-07-20 90112]
    "NeroFilterCheck "= "c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
    "PinnacleDriverCheck "= "c:\windows\system32\PSDrvCheck.exe" [2004-03-10 406016]
    "HP Component Manager "= "c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
    "RemoteControl "= "c:\program files\Home Cinema\PowerDVD\PDVDServ.exe" [2004-11-02 32768]
    "PCMService "= "c:\program files\Home Cinema\PowerCinema\PCMService.exe" [2005-02-04 118926]
    "SunJavaUpdateSched "= "c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]
    "QuickTime Task "= "c:\program files\QuickTime\qttask.exe" [2008-05-27 413696]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE "= "c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^BlueSoleil.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\BlueSoleil.lnk
    backup=c:\windows\pss\BlueSoleil.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
    backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Image Zone Fast Start.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Image Zone Fast Start.lnk
    backup=c:\windows\pss\HP Image Zone Fast Start.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Find Fast.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Find Fast.lnk
    backup=c:\windows\pss\Microsoft Find Fast.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Office Startup.lnk]
    path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Office Startup.lnk
    backup=c:\windows\pss\Office Startup.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATIPTA]
    2005-01-12 21:05 344064 ----a-w- c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
    2004-02-12 12:38 49152 ----a-w- c:\program files\HP\HP Software Update\hpwuSchd2.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IW_Drop_Icon]
    2004-07-30 14:10 1123840 ----a-w- c:\program files\Pinnacle\InstantCDDVD\InstantWrite\iwctrl.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Keyboard Status]
    2005-01-25 11:03 411648 ----a-w- c:\progra~1\Medion Tools\KeyStat\KeyStat.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\WINDOWS\\system32\\sessmgr.exe "=
    "c:\\Program Files\\Messenger\\msmsgs.exe "=
    "c:\\Program Files\\MSN Messenger\\msnmsgr.exe "=
    "c:\\Program Files\\AOL 9.0\\AOL.exe "=
    "c:\\Program Files\\AOL 9.0\\WAOL.exe "=
    "c:\\WINDOWS\\system32\\fxsclnt.exe "=
    "c:\\Program Files\\IVT Corporation\\BlueSoleil\\BlueSoleil.exe "=
    "c:\\Program Files\\Home Cinema\\PowerCinema\\PowerCinema.exe "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "%windir%\\system32\\sessmgr.exe "=
    "c:\\Program Files\\Sony\\Media Manager for WALKMAN\\MediaManager.exe "=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "3389:TCP "= 3389:TCP:mad:xpsp2res.dll,-22009
    "1700:TCP "= 1700:TCP:MioNet Remote Drive Access 0
    "1701:TCP "= 1701:TCP:MioNet Remote Drive Access 1
    "1702:TCP "= 1702:TCP:MioNet Remote Drive Access 2
    "1703:TCP "= 1703:TCP:MioNet Remote Drive Access 3
    "1704:TCP "= 1704:TCP:MioNet Remote Drive Access 4
    "1705:TCP "= 1705:TCP:MioNet Remote Drive Access 5
    "1706:TCP "= 1706:TCP:MioNet Remote Drive Access 6
    "1707:TCP "= 1707:TCP:MioNet Remote Drive Access 7
    "1708:TCP "= 1708:TCP:MioNet Remote Drive Access 8
    "1709:TCP "= 1709:TCP:MioNet Remote Drive Access 9
    "1641:TCP "= 1641:TCP:MioNet Remote Drive Verification
    "1647:TCP "= 1647:TCP:MioNet Storage Device Configuration
    "5432:UDP "= 5432:UDP:MioNet Storage Device Discovery
    "65533:TCP "= 65533:TCP:Services
    "52344:TCP "= 52344:TCP:Services
    "3246:TCP "= 3246:TCP:Services
    "2479:TCP "= 2479:TCP:Services

    R1 vobiw;vobiw;c:\windows\system32\drivers\vobIW.sys [01/09/2004 14:50 188416]
    R3 3xHybrid;3xHybrid service;c:\windows\system32\drivers\3xHybrid.sys [09/02/2005 14:22 802048]
    R3 cdrdrv;Cdrdrv;c:\windows\system32\drivers\Cdrdrv.sys [03/08/2004 11:10 62976]
    R3 cmudax;C-Media High Definition Audio Interface;c:\windows\system32\drivers\cmudax.sys [20/01/2005 15:05 1272000]
    R3 wbscr;Winbond Smartcard Reader for I/O;c:\windows\system32\drivers\wbscr.sys [09/02/2005 14:50 19928]
    S3 CardReaderFilter;Card Reader Filter;c:\windows\system32\drivers\USBCRFT.SYS [09/02/2005 14:47 17408]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.hotmail.com/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    mSearch Bar = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    Trusted Zone: hmv.co.uk
    Trusted Zone: hmv.com
    DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
    FF - ProfilePath - c:\documents and settings\David Haggar\Application Data\Mozilla\Firefox\Profiles\n2kcznh0.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.hotmail.com/
    FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-01-03 23:09
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(500)
    c:\windows\system32\Ati2evxx.dll

    - - - - - - - > 'explorer.exe'(3728)
    c:\windows\system32\WININET.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\webcheck.dll
    c:\windows\system32\WPDShServiceObj.dll
    c:\windows\system32\PortableDeviceTypes.dll
    c:\windows\system32\PortableDeviceApi.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\Ati2evxx.exe
    c:\windows\System32\SCardSvr.exe
    c:\program files\IVT Corporation\BlueSoleil\BTNtService.exe
    c:\program files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    c:\windows\system32\CTsvcCDA.exe
    c:\program files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    c:\program files\CyberLink\Shared Files\CLML_NTService\CLMLService.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    c:\windows\system32\MsPMSPSv.exe
    c:\program files\Windows Media Player\WMPNetwk.exe
    c:\program files\Canon\CAL\CALMAIN.exe
    c:\program files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    c:\windows\system32\Ati2evxx.exe
    c:\windows\AGRSMMSG.exe
    c:\windows\Dit.exe
    c:\progra~1\COMMON~1\X10\Common\x10nets.exe
    .
    **************************************************************************
    .
    Completion time: 2010-01-03 23:17:44 - machine was rebooted
    ComboFix-quarantined-files.txt 2010-01-03 22:17
    ComboFix2.txt 2010-01-03 21:26
    ComboFix3.txt 2009-03-13 16:25

    Pre-Run: 33,242,021,888 bytes free
    Post-Run: 33,198,145,536 bytes free

    Current=1 Default=1 Failed=3 LastKnownGood=5 Sets=1,3,4,5
    - - End Of File - - 099BE31A232E515E89AEEAF3C144EAC5


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 23:19:22, on 03/01/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    C:\WINDOWS\system32\CTsvcCDA.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLService.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\Program Files\Canon\CAL\CALMAIN.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\Dit.exe
    C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
    C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe
    C:\Program Files\Home Cinema\PowerCinema\PCMService.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.hotmail.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/...b/*http://uk.docs.yahoo.com/info/bt_side.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Dit] Dit.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
    O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe "
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe "
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Home Cinema\PowerCinema\PCMService.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    O9 - Extra button: (no name) - {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - C:\Program Files\Common Files\Microsoft Shared\Encarta Search Bar\ENCSBAR.DLL
    O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.aldi.com/
    O15 - Trusted Zone: http://*.hmv.co.uk
    O15 - Trusted Zone: http://*.hmv.com
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
    O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
    O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: Pinnacle Systems Media Service (PinnacleSys.MediaServer) - Pinnacle Systems - c:\program files\pinnacle\shared files\programs\mediaserver\pmshost.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: X10 Device Network Service (x10nets) - X10 - C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    O24 - Desktop Component 0: (no name) - file:///C:/DOCUME~1/DAVIDH~1/LOCALS~1/Temp/msohtml1/01/clip_image002.jpg

    --
    End of file - 7139 bytes
     
  6. 2010/01/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Uninstall Combofix:
    Go Start > Run [Vista users, go Start> "Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall "
    Restart computer.


    Any improvement in browsers behavior?

    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Click Scan your Computer... button.
    * Click Scanning Preferences/Control Center... button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    - Close browsers before scanning.
    - Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    - Click Preferences, then click the Statistics/Logs tab.
    - Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    - If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    - Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3.
    Post fresh HijackThis log.
    NOTE. If you're using Vista, right click on HijackThis, and click Run as Administrator
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  7. 2010/01/03
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    uninstalled combofix and restarted. IE now works and hasn't stalled so far. Going to do the SUPERAntispyware step now.
     
  8. 2010/01/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Very good :)
    Firefox up too?
     
  9. 2010/01/04
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    Here is the AntiSpyware log. Sorry it has taken so long but the scan took over 10 hours.

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 01/04/2010 at 11:06 AM

    Application Version : 4.32.1000

    Core Rules Database Version : 4441
    Trace Rules Database Version: 2265

    Scan type : Complete Scan
    Total Scan Time : 11:08:11

    Memory items scanned : 240
    Memory threats detected : 0
    Registry items scanned : 8544
    Registry threats detected : 150
    File items scanned : 165267
    File threats detected : 1

    Adware.Zango/ShoppingReport
    HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}
    HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\ProxyStubClsid
    HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\ProxyStubClsid32
    HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\TypeLib
    HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\TypeLib#Version
    HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}
    HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\ProxyStubClsid
    HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\ProxyStubClsid32
    HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\TypeLib
    HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\TypeLib#Version
    HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}
    HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\ProxyStubClsid
    HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\ProxyStubClsid32
    HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\TypeLib
    HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\TypeLib#Version
    HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}
    HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\ProxyStubClsid
    HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\ProxyStubClsid32
    HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\TypeLib
    HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\TypeLib#Version
    HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}
    HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\ProxyStubClsid
    HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\ProxyStubClsid32
    HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\TypeLib
    HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\TypeLib#Version
    HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}
    HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\ProxyStubClsid
    HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\ProxyStubClsid32
    HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\TypeLib
    HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\TypeLib#Version
    HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}
    HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\ProxyStubClsid
    HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\ProxyStubClsid32
    HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\TypeLib
    HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\TypeLib#Version
    HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}
    HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\ProxyStubClsid
    HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\ProxyStubClsid32
    HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\TypeLib
    HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\TypeLib#Version
    HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}
    HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\ProxyStubClsid
    HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\ProxyStubClsid32
    HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\TypeLib
    HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\TypeLib#Version
    HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}
    HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\ProxyStubClsid
    HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\ProxyStubClsid32
    HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\TypeLib
    HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\TypeLib#Version
    HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}
    HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\ProxyStubClsid
    HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\ProxyStubClsid32
    HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\TypeLib
    HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\TypeLib#Version
    HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}
    HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\ProxyStubClsid
    HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\ProxyStubClsid32
    HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\TypeLib
    HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\TypeLib#Version
    HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}
    HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\ProxyStubClsid
    HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\ProxyStubClsid32
    HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\TypeLib
    HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\TypeLib#Version
    HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}
    HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\ProxyStubClsid
    HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\ProxyStubClsid32
    HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\TypeLib
    HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\TypeLib#Version
    HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}
    HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\ProxyStubClsid
    HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\ProxyStubClsid32
    HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\TypeLib
    HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\TypeLib#Version
    HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}
    HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\ProxyStubClsid
    HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\ProxyStubClsid32
    HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\TypeLib
    HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\TypeLib#Version
    HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}
    HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\ProxyStubClsid
    HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\ProxyStubClsid32
    HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\TypeLib
    HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\TypeLib#Version
    HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}
    HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\ProxyStubClsid
    HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\ProxyStubClsid32
    HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\TypeLib
    HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\TypeLib#Version
    HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}
    HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\ProxyStubClsid
    HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\ProxyStubClsid32
    HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\TypeLib
    HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\TypeLib#Version
    HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}
    HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\ProxyStubClsid
    HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\ProxyStubClsid32
    HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\TypeLib
    HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\TypeLib#Version
    HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}
    HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\ProxyStubClsid
    HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\ProxyStubClsid32
    HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\TypeLib
    HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\TypeLib#Version
    HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}
    HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\ProxyStubClsid
    HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\ProxyStubClsid32
    HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\TypeLib
    HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\TypeLib#Version
    HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}
    HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\ProxyStubClsid
    HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\ProxyStubClsid32
    HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\TypeLib
    HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\TypeLib#Version
    HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}
    HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\ProxyStubClsid
    HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\ProxyStubClsid32
    HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\TypeLib
    HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\TypeLib#Version
    HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}
    HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\ProxyStubClsid
    HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\ProxyStubClsid32
    HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\TypeLib
    HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\TypeLib#Version
    HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}
    HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\ProxyStubClsid
    HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\ProxyStubClsid32
    HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\TypeLib
    HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\TypeLib#Version
    HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}
    HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\ProxyStubClsid
    HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\ProxyStubClsid32
    HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\TypeLib
    HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\TypeLib#Version
    HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}
    HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\ProxyStubClsid
    HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\ProxyStubClsid32
    HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\TypeLib
    HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\TypeLib#Version
    HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}
    HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\ProxyStubClsid
    HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\ProxyStubClsid32
    HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\TypeLib
    HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\TypeLib#Version
    HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}
    HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\ProxyStubClsid
    HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\ProxyStubClsid32
    HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\TypeLib
    HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\TypeLib#Version

    Rogue.Agent/Gen-Nullo[BIN]
    C:\WINDOWS\O2CLICSTORE.BIN
     
  10. 2010/01/04
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    Here is the Anti-Malware log:

    Malwarebytes' Anti-Malware 1.43
    Database version: 3458
    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702

    04/01/2010 14:56:55
    mbam-log-2010-01-04 (14-56-55).txt

    Scan type: Full Scan (C:\|D:\|E:\|F:\|)
    Objects scanned: 306446
    Time elapsed: 59 minute(s), 55 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 1
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 8

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{eddbb5ee-bb64-4bfc-9dbe-e7c85941335b} (Adware.Zango) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Program Files\CryptLoad_1.1.6\ocr\netload.in\asmCaptcha\test.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Program Files\CryptLoad_1.1.6\router\FRITZ!Box\nc.exe (PUP.KeyLogger) -> Quarantined and deleted successfully.
    C:\Documents and Settings\HelpAssistant\Local Settings\Temp\H8SRT259f.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Documents and Settings\HelpAssistant\Local Settings\Temp\H8SRT2e1b.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Documents and Settings\HelpAssistant\Local Settings\Temp\H8SRT300f.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Documents and Settings\HelpAssistant\Local Settings\Temp\H8SRT3166.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Documents and Settings\HelpAssistant\Local Settings\Temp\H8SRT3399.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Documents and Settings\HelpAssistant\Local Settings\Temp\H8SRT5bc2.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
     
  11. 2010/01/04
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    Here is the new HijackThis log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 15:06:36, on 04/01/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    C:\WINDOWS\system32\CTsvcCDA.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLService.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\Program Files\Canon\CAL\CALMAIN.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\Dit.exe
    C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
    C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe
    C:\Program Files\Home Cinema\PowerCinema\PCMService.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.hotmail.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/...b/*http://uk.docs.yahoo.com/info/bt_side.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Dit] Dit.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
    O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe "
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe "
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Home Cinema\PowerCinema\PCMService.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    O9 - Extra button: (no name) - {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - C:\Program Files\Common Files\Microsoft Shared\Encarta Search Bar\ENCSBAR.DLL
    O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.aldi.com/
    O15 - Trusted Zone: http://*.hmv.co.uk
    O15 - Trusted Zone: http://*.hmv.com
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
    O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
    O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: Pinnacle Systems Media Service (PinnacleSys.MediaServer) - Pinnacle Systems - c:\program files\pinnacle\shared files\programs\mediaserver\pmshost.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: X10 Device Network Service (x10nets) - X10 - C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    O24 - Desktop Component 0: (no name) - file:///C:/DOCUME~1/DAVIDH~1/LOCALS~1/Temp/msohtml1/01/clip_image002.jpg

    --
    End of file - 7258 bytes
     
  12. 2010/01/04
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Download Dr.Web CureIt to the desktop:
    ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe
    • Doubleclick the drweb-cureit.exe file and click Scan to run express scan. Click OK in pop-up window to allow scan.
    • This will scan the files currently running in memory and when something is found, click the Yes button when it asks you if you want to cure it. This is only a short scan.
    • Once the short scan has finished, select Complete scan.
    • Click the green arrow [​IMG] at the right, and the scan will start.
    • Click Yes to all if it asks if you want to cure/move the file.
    • When the scan has finished, in the menu, click File and choose Save report list
    • Save the report to your desktop. The report will be called DrWeb.csv
    • Close Dr.Web Cureit.
    • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
    • Copy and paste that log in the next reply. You can use Notepad to open the DrWeb.cvs report.

    NOTE. During the scan, pop-up window will open asking for full version purchase. Simply close the window by clicking on X in upper right corner.


    Post fresh HijackThis log as well.
     
  13. 2010/01/05
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    Many thanks for al the help so far. It seems like my computer has been pretty much riddled with problems, I take it Trend Micro was haveing very little effect.

    Dr Web log is below:

    54 New Bat.exe;C:\DOCUME~1\DAVIDH~1\LOCALS~1\Temp;BackDoor.Ddoser.27;Deleted.;
    Process.exe;F:\My Documents\Desktop Recovery Mar 09\SmitfraudFix;Tool.Prockill;;
    restart.exe;F:\My Documents\Desktop Recovery Mar 09\SmitfraudFix;Tool.ShutDown.14;;
    REG.EXE;F:\My Documents\Games\Old games\wh40kfinal\Warhammer 40,000 - Final Liberation;Trojan.MulDrop.origin;Incurable.Moved.;
    firefoxsetup.exe;C:\Documents and Settings\David Haggar\Desktop\Desktop Recovery 2010;Adware.Hotbar.252;;
    194.tmp;C:\Documents and Settings\HelpAssistant\Local Settings\Temp;Trojan.Packed.18509;Deleted.;
    195.tmp;C:\Documents and Settings\HelpAssistant\Local Settings\Temp;Trojan.Packed.18509;Deleted.;
    combine[1].php;C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\39P84YL5;Probably SCRIPT.Virus;;
    glee.s01e05.hdtv.xvid-fqm.exe\54 New Bat.exe;C:\Downloads\Directlinks\Gles1_5.part1\glee.s01e05.hdtv.xvid-fqm\glee.s01e05.hdtv.xvid-fqm.exe;BackDoor.Ddoser.27;;
    glee.s01e05.hdtv.xvid-fqm.exe;C:\Downloads\Directlinks\Gles1_5.part1\glee.s01e05.hdtv.xvid-fqm;Archive contains infected objects;Moved.;
    17.tmp;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    1E8.tmp;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    58.tmp;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    61.tmp;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    F0.tmp;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    F1.tmp;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    nar.vbs;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    NAR_9cc.VIR;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    NAR_d04.VIR;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    NAR_d14.VIR;C:\Program Files\Trend Micro\Internet Security\Quarantine;Win32.HLLW.Autoruner.2851;Deleted.;
    A0041580.vbs;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP132;Win32.HLLW.Autoruner.2851;Deleted.;
    A0041581.vbs;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP132;Win32.HLLW.Autoruner.2851;Deleted.;
    A0041582.vbs;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP132;Win32.HLLW.Autoruner.2851;Deleted.;
    A0043738.bat;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP132;Probably BATCH.Virus;;
    A0043849.dll;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP132;Adware.Zango.83;;
    A0043857.exe;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP132;Adware.Hotbar.235;;
    A0043862.bat;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP132;Probably BATCH.Virus;;
    A0044950.exe\32788R22FWJFW\List-C.bat;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP134\A0044950.exe;Probably BATCH.Virus;;
    A0044950.exe;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP134;Archive contains infected objects;Moved.;
    A0044986.bat;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP134;Probably BATCH.Virus;;
    A0045051.bat;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP134;Probably BATCH.Virus;;
    A0046208.exe\32788R22FWJFW\List-C.bat;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP134\A0046208.exe;Probably BATCH.Virus;;
    A0046208.exe;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP134;Archive contains infected objects;Moved.;
    A0046244.bat;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP134;Probably BATCH.Virus;;
    A0048367.exe\54 New Bat.exe;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP135\A0048367.exe;BackDoor.Ddoser.27;;
    A0048367.exe;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP135;Archive contains infected objects;Moved.;
    A0048385.vbs;C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP135;Win32.HLLW.Autoruner.2851;Deleted.;
    Flash_Disinfector.exe/data002\nircmd.exe;F:\My Documents\Desktop Recovery Mar 09\Flash_Disinfector.exe/data002;Tool.NirCmd.1;;
    data002;F:\My Documents\Desktop Recovery Mar 09;Archive contains infected objects;;
    Flash_Disinfector.exe;F:\My Documents\Desktop Recovery Mar 09;Container contains infected objects;Moved.;
    Process.exe;F:\My Documents\Desktop Recovery Mar 09\SmitfraudFix;Tool.Prockill;;
    restart.exe;F:\My Documents\Desktop Recovery Mar 09\SmitfraudFix;Tool.ShutDown.14;;
    Warhammer 40,000 - Final Liberation.part01.exe/data002\Warhammer 40,000 - Final Liberation\REG.EXE;F:\My Documents\Games\Old games\wh40kfinal\Warhammer 40,000 - Final Liberation.part01.exe/data002;Trojan.MulDrop.origin;;
    data002;F:\My Documents\Games\Old games\wh40kfinal;Archive contains infected objects;;
    Warhammer 40,000 - Final Liberation.part01.exe;F:\My Documents\Games\Old games\wh40kfinal;Container contains infected objects;Moved.;
    Warhammer 40,000 - Final Liberation.part01.exe/data002\Warhammer 40,000 - Final Liberation\REG.EXE;O:\Games\Old games\wh40kfinal\Warhammer 40,000 - Final Liberation.part01.exe/data002;Trojan.MulDrop.origin;;
    data002;O:\Games\Old games\wh40kfinal;Archive contains infected objects;;
    Warhammer 40,000 - Final Liberation.part01.exe;O:\Games\Old games\wh40kfinal;Container contains infected objects;Moved.;
    REG.EXE;O:\Games\Old games\wh40kfinal\Warhammer 40,000 - Final Liberation;Trojan.MulDrop.origin;Incurable.Moved.;
    nc.exe;O:\Download Programmes\CryptLoad_1.1.6\router\FRITZ!Box;Tool.Netcat;;



    HyjackThis log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 18:05:35, on 05/01/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    C:\WINDOWS\system32\CTsvcCDA.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLService.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\Program Files\Canon\CAL\CALMAIN.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\Dit.exe
    C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
    C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe
    C:\Program Files\Home Cinema\PowerCinema\PCMService.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Documents and Settings\David Haggar\Desktop\drweb-cureit.exe
    C:\DOCUME~1\DAVIDH~1\LOCALS~1\Temp\RarSFX0\36fwc8.exe
    C:\DOCUME~1\DAVIDH~1\LOCALS~1\Temp\RarSFX0\5uq4nXP.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.hotmail.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/...b/*http://uk.docs.yahoo.com/info/bt_side.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Dit] Dit.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
    O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe "
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe "
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Home Cinema\PowerCinema\PCMService.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1006\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'HelpAssistant')
    O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1006\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" (User 'HelpAssistant')
    O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1006\..\Run: [OE] C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMon.exe (User 'HelpAssistant')
    O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1008\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Jenny')
    O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1008\..\Run: [OE] C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMON.EXE (User 'Jenny')
    O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1008\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe (User 'Jenny')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    O9 - Extra button: (no name) - {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - C:\Program Files\Common Files\Microsoft Shared\Encarta Search Bar\ENCSBAR.DLL
    O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.aldi.com/
    O15 - Trusted Zone: http://*.hmv.co.uk
    O15 - Trusted Zone: http://*.hmv.com
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
    O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
    O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: Pinnacle Systems Media Service (PinnacleSys.MediaServer) - Pinnacle Systems - c:\program files\pinnacle\shared files\programs\mediaserver\pmshost.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: X10 Device Network Service (x10nets) - X10 - C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    O24 - Desktop Component 0: (no name) - file:///C:/DOCUME~1/DAVIDH~1/LOCALS~1/Temp/msohtml1/01/clip_image002.jpg

    --
    End of file - 8291 bytes
     
  14. 2010/01/05
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Good chunk of bad files discovered by Dr.Web were located in TM vault and system restore point, so it wasn't that bad, but we better run one more scan.

    Go to Kaspersky website and perform an online antivirus scan.

    1. Read through the requirements and privacy statement and click on Accept button.
    2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    3. When the downloads have finished, click on Settings.
    4. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

    • Spyware, Adware, Dialers, and other potentially dangerous programs
      [*] Archives
      [*] Mail databases
    5. Click on My Computer under Scan.
    6. Once the scan is complete, it will display the results. Click on View Scan Report.
    7. You will see a list of infected items there. Click on Save Report As....
    8. Save this report to a convenient place. Change the Files of type to Text file (.txt before clicking on the Save button. Then post it here.
     
  15. 2010/01/06
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    Here is the KASPERSKY log:

    --------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER 7.0: scan report
    Wednesday, January 6, 2010
    Operating system: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
    Kaspersky Online Scanner version: 7.0.26.13
    Last database update: Wednesday, January 06, 2010 06:31:49
    Records in database: 3338388
    --------------------------------------------------------------------------------

    Scan settings:
    scan using the following database: extended
    Scan archives: yes
    Scan e-mail databases: yes

    Scan area - My Computer:
    C:\
    D:\
    E:\
    F:\
    G:\
    H:\
    J:\
    K:\
    L:\
    O:\

    Scan statistics:
    Objects scanned: 233819
    Threats found: 6
    Infected objects found: 10
    Suspicious objects found: 0
    Scan duration: 03:37:46


    File name / Threat / Threats count
    C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\13EQERVI\eHdffefe3fV0100f070006R7a67269f102T94c56a16201l0809316P000000070[1] Infected: Packed.Win32.TDSS.aa 1
    C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\IAKCMCP9\eHdffefe3fV0100f070006R7a67269f102T94c56a09201l0809318J0d000601U391c0c450[1] Infected: Trojan-Downloader.Win32.FraudLoad.wxmp 1
    C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\OMXLCHQG\oHdffefe3fV0100f070006R7a67269f102T94c56a17201l0809317[1].pdf Infected: Exploit.Win32.Pidief.cvl 1
    C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\WX241B00\oH9e89b22aV0100f070006R0195a28e102Td5b6cb6a201l0809K9dacae8a317[1].pdf Infected: Exploit.Win32.Pidief.cvl 1
    C:\Downloads\Directlinks\Gles1_5.part1.rar Infected: Trojan.Win32.Buzus.ccyu 1
    C:\Downloads\Directlinks\Gles1_5.part2.rar Infected: Trojan.Win32.Buzus.ccyu 1
    C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP136\A0048401.exe Infected: not-a-virus:AdWare.Win32.HotBar.da 1
    C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP136\A0048405.exe Infected: Trojan.Win32.Buzus.ccyu 1
    C:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP136\A0048407.exe Infected: Trojan.Win32.Buzus.ccyu 1
    O:\System Volume Information\_restore{B5CD121F-D197-4943-91FB-48C14AB76C9A}\RP136\A0048402.exe Infected: not-a-virus:RemoteAdmin.Win32.NetCat.a 1

    Selected area has been scanned.
     
  16. 2010/01/06
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Download OTL to your Desktop.

    Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.

    Under the Custom Scan box paste this in:



    • Code:
      :OTL
      
      :Services
      
      :Reg
      
      :Files
      C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\13EQERVI\eHdffefe3fV0100f070006R7a67269f102T94c56a16201l0 809316P000000070[1]
      C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\IAKCMCP9\eHdffefe3fV0100f070006R7a67269f102T94c56a09201l0 809318J0d000601U391c0c450[1]
      C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\OMXLCHQG\oHdffefe3fV0100f070006R7a67269f102T94c56a17201l0 809317[1].pdf
      C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\WX241B00\oH9e89b22aV0100f070006R0195a28e102Td5b6cb6a201l0 809K9dacae8a317[1].pdf
      C:\Downloads\Directlinks\Gles1_5.part1.rar
      C:\Downloads\Directlinks\Gles1_5.part2.rar
      
      :Commands
      [purity]
      [emptytemp]
      [resethosts]
      [Reboot]
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.
     
  17. 2010/01/06
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    That is done. I'm sorry but I deleted the folder with two of the entries in as they were files that never use. Have I caused big problem by doing that?

    All processes killed
    ========== OTL ==========
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    File\Folder C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\13EQERVI\eHdffefe3fV0100f070006R7a67269f102T94c56a16201l0 809316P000000070[1] not found.
    File\Folder C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\IAKCMCP9\eHdffefe3fV0100f070006R7a67269f102T94c56a09201l0 809318J0d000601U391c0c450[1] not found.
    File\Folder C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\OMXLCHQG\oHdffefe3fV0100f070006R7a67269f102T94c56a17201l0 809317[1].pdf not found.
    File\Folder C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\WX241B00\oH9e89b22aV0100f070006R0195a28e102Td5b6cb6a201l0 809K9dacae8a317[1].pdf not found.
    File\Folder C:\Downloads\Directlinks\Gles1_5.part1.rar not found.
    File\Folder C:\Downloads\Directlinks\Gles1_5.part2.rar not found.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: Administrator
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: All Users

    User: David Haggar
    ->Temp folder emptied: 458033199 bytes
    ->Temporary Internet Files folder emptied: 43270815 bytes
    ->Java cache emptied: 0 bytes
    ->FireFox cache emptied: 83952163 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes
    ->Java cache emptied: 0 bytes

    User: HelpAssistant
    ->Temp folder emptied: 2950554 bytes
    ->Temporary Internet Files folder emptied: 215656064 bytes
    ->Java cache emptied: 0 bytes

    User: Jenny
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 78991 bytes
    ->Java cache emptied: 0 bytes

    User: LocalService
    ->Temp folder emptied: 66016 bytes
    ->Temporary Internet Files folder emptied: 49286 bytes

    User: NetworkService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 49286 bytes

    User: Owner

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 113777 bytes
    %systemroot%\System32 .tmp files removed: 20069393 bytes
    Windows Temp folder emptied: 13819024 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 799.00 mb

    C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
    HOSTS file reset successfully

    OTL by OldTimer - Version 3.1.21.0 log created on 01062010_181702

    Files\Folders moved on Reboot...

    Registry entries deleted on Reboot...
     
  18. 2010/01/06
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Nope. They're goners anyway....

    Download and install one of these:
    - Avira free antivirus: http://www.free-av.com/en/download/1/avira_antivir_personal__free_antivirus.html
    - Avast! free antivirus: http://www.avast.com/eng/download-avast-home.html

    - free Comodo Internet Security (firewall + AV): http://www.personalfirewall.comodo.com/
    NOTE. During installation, Comodo will also allow you to install AV only, or firewall only, if you prefer to combine one Comodo product with some other product.

    If you decide to install Avast, or Avira, make sure, Windows firewall is turned on, or use Comodo firewall..
    If you decide to install Comodo Internet Security, or just Comodo firewall, make sure, Windows firewall is turned off.

    IMPORTANT! Make sure, you use only ONE antivirus, and ONE firewall.

    ================================================================

    Please download JavaRa to your desktop and unzip it to its own folder
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.
    • Open JavaRa.exe again and select Search For Updates.
    • Select Update Using Sun Java's Website then click Search and click on the Open Webpage button. Download and install the latest Java Runtime Environment (JRE) version for your computer.

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    =================================================================

    Print this post out, since you won't have an access to it, at some point.

    1. Open HijackThis.

    2. Close all windows, except for HijackThis.

    3. Put checkmarks next to the following HijackThis entries:

    - R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/c...o/bt_side.html
    - O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1006\..\Run: [OE] C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMon.exe (User 'HelpAssistant')
    - O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1008\..\Run: [OE] C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMON.EXE (User 'Jenny')
    - O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    - O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    - O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)



    4. You should also checkmark following entries (these are unnecessary startups; no actual programs will be removed):

    - O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    - O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    - O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1008\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe (User 'Jenny')
    - O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll


    5. Click on Fix checked button.

    6. Restart computer.

    7. Post new HijackThis log.
     
  19. 2010/01/07
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    All done, I installed the Comodo Internet Security (both) and here is the latest HyjackThis log. Please note that the following entries were not there to check last time I ran HyjackThis to fix them:

    - O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1006\..\Run: [OE] C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMon.exe (User 'HelpAssistant')
    - O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1008\..\Run: [OE] C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMON.EXE (User 'Jenny')
    - O4 - HKUS\S-1-5-21-1924802362-2249464258-2416375087-1008\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe (User 'Jenny')



    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:58:32, on 07/01/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    C:\WINDOWS\system32\CTsvcCDA.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLService.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\Program Files\Canon\CAL\CALMAIN.exe
    C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\Dit.exe
    C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
    C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe
    C:\Program Files\Home Cinema\PowerCinema\PCMService.exe
    C:\Program Files\COMODO\COMODO Internet Security\cfp.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.hotmail.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O1 - Hosts: ÿþ127.0.0.1 localhost
    O1 - Hosts: ::1 localhost
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Dit] Dit.exe
    O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
    O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe "
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\Home Cinema\PowerDVD\PDVDServ.exe "
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Home Cinema\PowerCinema\PCMService.exe "
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [COMODO Internet Security] "C:\Program Files\COMODO\COMODO Internet Security\cfp.exe" -h
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    O9 - Extra button: (no name) - {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - C:\Program Files\Common Files\Microsoft Shared\Encarta Search Bar\ENCSBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.aldi.com/
    O15 - Trusted Zone: http://*.hmv.co.uk
    O15 - Trusted Zone: http://*.hmv.com
    O20 - AppInit_DLLs: C:\WINDOWS\system32\guard32.dll
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: BlueSoleil Hid Service - Unknown owner - C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
    O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLCapSvc.exe
    O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Home Cinema\PowerCinema\Kernel\TV\CLSched.exe
    O23 - Service: COMODO Internet Security Helper Service (cmdAgent) - COMODO - C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
    O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\CyberLink\Shared Files\CLML_NTService\CLMLServer.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: Pinnacle Systems Media Service (PinnacleSys.MediaServer) - Pinnacle Systems - c:\program files\pinnacle\shared files\programs\mediaserver\pmshost.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: X10 Device Network Service (x10nets) - X10 - C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
    O24 - Desktop Component 0: (no name) - file:///C:/DOCUME~1/DAVIDH~1/LOCALS~1/Temp/msohtml1/01/clip_image002.jpg

    --
    End of file - 7017 bytes
     
  20. 2010/01/07
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Your computer is clean :)

    1. Download Temp File Cleaner (TFC)
    Double click on TFC.exe to run the program.
    Click on Start button to begin cleaning process.
    TFC will close all running programs, and it may ask you to restart computer.

    2. Turn off System Restore:

    - Windows XP:
    1. Click Start.
    2. Right-click the My Computer icon, and then click Properties.
    3. Click the System Restore tab.
    4. Check "Turn off System Restore ".
    5. Click Apply.
    6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
    7. Click OK.
    - Windows Vista:
    1. Click Start.
    2. Right-click the Computer icon, and then click Properties.
    3. Click on System Protection under the Tasks column on the left side
    4. Click on Continue on the "User Account Control" window that pops up
    5. Under the System Protection tab, find Available Disks
    6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C: ")
    7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
    8. Click OK

    3. Restart computer.

    4. Turn System Restore on.

    5. Make sure, Windows Updates are current.

    [SIZE= "4"]6. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately![/SIZE]

    7. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    8. Run defrag at your convenience.

    9. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    10. Please, let me know, how is your computer doing.
     
  21. 2010/01/08
    davidhaggar

    davidhaggar Inactive Thread Starter

    Joined:
    2009/03/07
    Messages:
    35
    Likes Received:
    0
    The system is running great. I am a lot more confident now that it is protected and I will be able to try and avoid problems in the future. Many thanks for all your help and time, it is much appreciated.

    One last question. I have a laptop which is in the shop for a cable to be replaced. Is it okay to go through using the Anti-Malware etc programmes that I have done on this system or will I need the logs analysed to identify any deep rooted problems? It hasn't displayed any symptoms but I have used USB pens between the two.

    Once again, thanks for the help.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.