1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Inactive Google redirects & popup surveys in IE7

Discussion in 'Malware and Virus Removal Archive' started by rantng, 2010/01/03.

  1. 2010/01/03
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    [Inactive] Google redirects & popup surveys in IE7

    Hi, I am running IE7 on a Vista machine. When I open up a google link I am redirected and I also get popup survey pages, and always when I open a new window. I currently have Norton installed and occasionally it will notify me that an attempted attack has been blocked. Any help would be greatly appreciated. Here is my DDS log:


    DDS (Ver_09-12-01.01) - NTFSx86
    Run by Owner at 12:35:26.89 on Sun 01/03/2010
    Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 1.6.0_15
    Microsoft® Windows Vistaâ„¢ Home Premium 6.0.6002.2.1252.1.1033.18.2037.769 [GMT -5:00]

    SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

    ============== Running Processes ===============

    C:\Windows\system32\wininit.exe
    C:\Windows\system32\lsm.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch
    C:\Windows\system32\svchost.exe -k rpcss
    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
    C:\Windows\system32\svchost.exe -k netsvcs
    C:\Windows\system32\svchost.exe -k GPSvcGroup
    C:\Windows\system32\SLsvc.exe
    C:\Windows\system32\svchost.exe -k LocalService
    C:\Windows\system32\svchost.exe -k NetworkService
    C:\Windows\System32\spoolsv.exe
    C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
    C:\Windows\system32\agrsmsvc.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
    C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
    C:\Acer\Empowering Technology\eNet\eNet Service.exe
    C:\Program Files\Common Files\LightScribe\LSSrvc.exe
    C:\Acer\Mobility Center\MobilityService.exe
    C:\Program Files\Google\Update\1.2.183.13\GoogleCrashHandler.exe
    C:\Windows\system32\taskeng.exe
    C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
    C:\Program Files\CyberLink\Shared Files\RichVideo.exe
    C:\Windows\Explorer.EXE
    C:\Windows\system32\svchost.exe -k imgsvc
    C:\Windows\system32\taskeng.exe
    C:\Windows\System32\svchost.exe -k WerSvcGroup
    C:\Windows\system32\SearchIndexer.exe
    C:\Program Files\Wavexpress\TVTonic\WXRSS.exe
    C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
    C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
    C:\Windows\system32\DllHost.exe
    C:\Windows\system32\wbem\wmiprvse.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Windows\RtHDVCpl.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\System32\igfxtray.exe
    C:\Windows\System32\igfxpers.exe
    C:\Program Files\Microsoft IntelliPoint\ipoint.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehtray.exe
    C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    C:\Program Files\Windows Media Player\wmpnetwk.exe
    C:\Windows\system32\igfxsrvc.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
    C:\Users\Owner\AppData\Local\Temp\RtkBtMnt.exe
    C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Windows\System32\notepad.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
    C:\Users\Owner\Desktop\dds.scr
    C:\Windows\system32\wbem\wmiprvse.exe

    ============== Pseudo HJT Report ===============

    uStart Page = about:blank
    uSEARCH PAGE = hxxp://www.google.com
    uSearch Bar = hxxp://www.google.com/ie
    uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
    uDefault_Search_URL = hxxp://www.google.com/ie
    mStart Page = hxxp://en.us.acer.yahoo.com
    mDefault_Page_URL = hxxp://en.us.acer.yahoo.com
    uInternet Settings,ProxyOverride = *.local
    uSearchAssistant = hxxp://www.google.com/ie
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
    BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
    BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
    BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton 360\engine\3.5.2.11\coIEPlg.dll
    BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\program files\norton 360\engine\3.5.2.11\IPSBHO.DLL
    BHO: {7E853D72-626A-48EC-A868-BA8D5E23E045} - No File
    BHO: ShowBarObj Class: {83a2f9b1-01a2-4aa5-87d1-45b6b8505e96} - c:\windows\system32\ActiveToolBand.dll
    BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
    BHO: Google Gears Helper: {e0fefe40-fbf9-42ae-ba58-794ca7e3fb53} - c:\program files\google\google gears\internet explorer\0.5.33.0\gears.dll
    TB: Acer eDataSecurity Management: {5cbe3b7c-1e47-477e-a7dd-396db0476e29} - c:\windows\system32\eDStoolbar.dll
    TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton 360\engine\3.5.2.11\coIEPlg.dll
    uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
    uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
    uRun: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\nero\lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020
    uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
    mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
    mRun: [RtHDVCpl] RtHDVCpl.exe
    mRun: [NWEReboot]
    mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
    mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
    mRun: [Persistence] c:\windows\system32\igfxpers.exe
    mRun: [IntelliPoint] "c:\program files\microsoft intellipoint\ipoint.exe "
    mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
    mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
    mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe "
    mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe "
    dRun: [Picasa Media Detector] c:\program files\picasa2\PicasaMediaDetector.exe
    StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
    mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
    mPolicies-system: EnableLUA = 0 (0x0)
    mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
    IE: {753BBC4B-CC73-4fb8-A5B5-CA09C804C1DD} - res://c:\program files\flashcapture\fciext.dll/FCIEXT.htm
    IE: {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - {0B4350D1-055F-47A3-B112-5F2F2B0D6F08} - c:\program files\google\google gears\internet explorer\0.5.33.0\gears.dll
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    Handler: symres - {AA1061FE-6C41-421f-9344-69640C9732AB} - c:\program files\norton 360\engine\3.5.2.11\CoIEPlg.dll
    Notify: igfxcui - igfxdev.dll
    AppInit_DLLs: eNetHook.dll

    ================= FIREFOX ===================

    FF - ProfilePath - c:\users\owner\appdata\roaming\mozilla\firefox\profiles\2036gl25.rantng\
    FF - prefs.js: network.proxy.type - 4
    FF - component: c:\program files\real\realplayer\browserrecord\components\nprpbrowserrecordplugin.dll
    FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
    FF - plugin: c:\program files\virtual earth 3d\npVE3D.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
    FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
    FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
    FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
    FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0010-ABCDEFFEDCBA}
    FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
    FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
    FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}

    ============= SERVICES / DRIVERS ===============

    R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\n360\0305020.00b\SymEFA.sys [2009-11-21 310320]
    R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\n360\0305020.00b\BHDrvx86.sys [2009-11-21 259632]
    R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\n360\0305020.00b\cchpx86.sys [2009-11-21 482432]
    R1 IDSVix86;IDSVix86;c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\ipsdefs\20091217.002\IDSvix86.sys [2009-12-26 343088]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-11-21 102448]
    R3 SYMNDISV;Symantec Network Filter Driver;c:\windows\system32\drivers\n360\0305020.00b\symndisv.sys [2009-11-21 48688]

    =============== Created Last 30 ================

    2009-12-29 03:24:58 0 d-----w- c:\users\owner\appdata\roaming\Malwarebytes
    2009-12-29 03:24:30 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-12-29 03:24:21 0 d-----w- c:\programdata\Malwarebytes
    2009-12-29 03:24:19 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-12-29 03:24:18 0 dc----w- c:\program files\Malwarebytes' Anti-Malware
    2009-12-28 06:13:59 0 d-sh--w- c:\users\owner\appdata\roaming\SystemProc
    2009-12-12 16:58:11 244 ---ha-w- C:\sqmnoopt00.sqm
    2009-12-12 16:58:11 232 ---ha-w- C:\sqmdata00.sqm
    2009-12-12 14:29:19 24064 ----a-w- c:\windows\system32\nshhttp.dll
    2009-12-12 14:29:12 411648 ----a-w- c:\windows\system32\drivers\http.sys
    2009-12-12 14:29:11 30720 ----a-w- c:\windows\system32\httpapi.dll
    2009-12-09 09:05:49 377344 ----a-w- c:\windows\system32\winhttp.dll
    2009-12-09 09:05:25 834048 ----a-w- c:\windows\system32\wininet.dll
    2009-12-09 09:05:14 78336 ----a-w- c:\windows\system32\ieencode.dll
    2009-12-09 09:03:50 243712 ----a-w- c:\windows\system32\rastls.dll

    ==================== Find3M ====================

    2010-01-02 00:54:04 51200 ----a-w- c:\windows\inf\infpub.dat
    2010-01-02 00:54:03 143360 ----a-w- c:\windows\inf\infstrng.dat
    2009-11-22 07:10:02 665600 ----a-w- c:\windows\inf\drvindex.dat
    2009-11-22 07:10:01 143360 ----a-w- c:\windows\inf\infstor.dat
    2009-11-22 06:55:55 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
    2009-11-22 06:51:51 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
    2009-11-21 20:40:12 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
    2009-11-21 20:40:12 7456 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
    2009-11-21 20:40:12 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
    2009-11-21 20:38:52 26600 ----a-r- c:\windows\system32\drivers\GEARAspiWDM.sys
    2009-11-21 20:38:52 107368 ----a-r- c:\windows\system32\GEARAspi.dll
    2009-10-29 09:17:42 2048 ----a-w- c:\windows\system32\tzres.dll
    2009-10-11 02:38:19 37665 ----a-w- c:\windows\fonts\GlobalUserInterface.CompositeFont
    2009-10-08 21:08:01 555520 ----a-w- c:\windows\system32\UIAutomationCore.dll
    2009-10-08 21:08:01 234496 ----a-w- c:\windows\system32\oleacc.dll
    2009-10-08 21:07:59 4096 ----a-w- c:\windows\system32\oleaccrc.dll
    2008-07-09 00:55:20 174 --sha-w- c:\program files\desktop.ini
    2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
    2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
    2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
    2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
    2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
    2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
    2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
    2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat

    ============= FINISH: 12:39:03.26 ===============


    Attach log:


    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT

    DDS (Ver_09-12-01.01)

    Microsoft® Windows Vistaâ„¢ Home Premium
    Boot Device: \Device\HarddiskVolume2
    Install Date: 4/15/2007 11:50:56 AM
    System Uptime: 1/1/2010 7:25:52 PM (41 hours ago)

    Motherboard: Acer, Inc. | | Prespa1
    Processor: Genuine Intel(R) CPU T2060 @ 1.60GHz | U2E1 | 800/133mhz

    ==== Disk Partitions =========================

    C: is FIXED (NTFS) - 34 GiB total, 8.357 GiB free.
    D: is FIXED (NTFS) - 33 GiB total, 9.705 GiB free.
    E: is CDROM ()
    H: is FIXED (NTFS) - 932 GiB total, 8.862 GiB free.

    ==== Disabled Device Manager Items =============

    ==== System Restore Points ===================

    No restore point in system.

    ==== Installed Programs ======================

    µTorrent
    AAC Decoder
    ACDSee Trial
    Acer Arcade Deluxe
    Acer eDataSecurity Management
    Acer eLock Management
    Acer Empowering Technology
    Acer eNet Management
    Acer ePower Management
    Acer ePresentation Management
    Acer eSettings Management
    Acer Mobility Center Plug-In
    Acer ScreenSaver
    Acer Tour
    Adobe Flash Player 10 Plugin
    Adobe Flash Player ActiveX
    Adobe Photoshop Lightroom 2
    Adobe Reader 7.1.0
    Agere Systems HDA Modem
    Amazon MP3 Downloader 1.0.5
    AOL Instant Messenger
    Apple Application Support
    Apple Mobile Device Support
    Apple Software Update
    AutoUpdate
    Avanquest update
    BlackBerry Device Software v4.5.0 for the BlackBerry 8320 smartphone
    Bonjour
    CCleaner (remove only)
    Creative MediaSource 5
    DivX Codec
    DivX Converter
    DivX Player
    DivX Plus DirectShow Filters
    DivX Version Checker
    DivX Web Player
    DVD Shrink 3.2
    Easy Screen Capture 2
    Ecko Manufacturing Security
    Flash Recovery Toolbox 1.0
    FLV Player 2.0 (build 25)
    Free PDF to Word Doc Converter v1.1
    GearDrvs
    Google Gears
    Google Update Helper
    Gtk+ Runtime Environment 2.12.9-1
    H.264 Decoder
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
    ImageShack Uploader 2.2.0
    Intel(R) Graphics Media Accelerator Driver
    iTunes
    Java(TM) 6 Update 15
    Java(TM) 6 Update 3
    Java(TM) 6 Update 5
    Java(TM) 6 Update 7
    Launch Manager
    LightScribe 1.4.136.1
    Malwarebytes' Anti-Malware
    Matrix-ks
    Microsoft .NET Framework 3.5 SP1
    Microsoft Application Error Reporting
    Microsoft IntelliPoint 6.2
    Microsoft Office 2000 Premium
    Microsoft Silverlight
    Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
    Microsoft Visual C++ 2005 Redistributable
    MKV Splitter
    Mobipocket Creator 4.2
    Motorola Driver Installation
    Motorola Phone Tools
    Mozilla Firefox (3.0.11)
    MSXML 4.0 SP2 (KB936181)
    MSXML 4.0 SP2 (KB941833)
    MSXML 4.0 SP2 (KB954430)
    MSXML 4.0 SP2 (KB973688)
    Nero 8
    neroxml
    Netflix Movie Viewer
    Norton 360
    NTI Backup NOW! 4.7
    NTI CD & DVD-Maker
    OJOsoft Total Video Converter
    PianoFX STUDIO 4.0
    Picasa 2
    PowerProducer
    QuickTime
    RapidShare Manager
    RealPlayer
    Realtek High Definition Audio Driver
    Rhapsody Player Engine
    Rosetta Stone Version 3
    Rotoscope
    Synaptics Pointing Device Driver
    Texas Instruments PCIxx21/x515/xx12 drivers.
    TIPCI
    Total Screen Recorder Gold 1.5
    TVTonic
    Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
    VC80CRTRedist - 8.0.50727.762
    Viewpoint Media Player
    Virtual Earth 3D (Beta)
    VLC media player 0.9.8a
    WD Diagnostics
    WinDirStat 1.1.2
    Windows Live Messenger
    Windows Live OneCare safety scanner
    WinRAR archiver
    Xilisoft DVD Ripper Platinum 5

    ==== Event Viewer Messages From Past Week ========

    12/30/2009 9:43:09 AM, Error: Microsoft-Windows-Dhcp-Client [1001] - Your computer was not assigned an address from the network (by the DHCP Server) for the Network Card with network address 00197E474A88. The following error occurred: The operation was canceled by the user.. Your computer will continue to try and obtain an address on its own from the network address (DHCP) server.
    12/29/2009 9:05:32 PM, Error: volsnap [36] - The shadow copies of volume C: were aborted because the shadow copy storage could not grow due to a user imposed limit.
    12/29/2009 11:58:09 PM, Error: Service Control Manager [7011] - A timeout (30000 milliseconds) was reached while waiting for a transaction response from the TrkWks service.
    1/1/2010 7:27:15 PM, Error: Service Control Manager [7000] - The Parallel port driver service failed to start due to the following error: The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.
    1/1/2010 5:35:21 PM, Error: disk [11] - The driver detected a controller error on \Device\Harddisk2\DR5.
    1/1/2010 5:18:50 PM, Error: disk [11] - The driver detected a controller error on \Device\Harddisk2\DR4.
    1/1/2010 4:18:45 PM, Error: disk [11] - The driver detected a controller error on \Device\Harddisk2\DR16.
    1/1/2010 3:50:04 PM, Error: disk [11] - The driver detected a controller error on \Device\Harddisk2\DR15.
    1/1/2010 2:23:17 PM, Error: disk [11] - The driver detected a controller error on \Device\Harddisk2\DR14.
    1/1/2010 2:08:36 PM, Error: disk [11] - The driver detected a controller error on \Device\Harddisk2\DR13.
    1/1/2010 1:53:21 PM, Error: disk [11] - The driver detected a controller error on \Device\Harddisk2\DR12.

    ==== End Of File ===========================
     
  2. 2010/01/03
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    I see you have P2P software ( Limewire, BitTorrent, uTorrent etc… ) installed on your machine. We are not here to pass judgment on file-sharing as a concept. However, we will warn you that engaging in this activity and having this kind of software installed on your machine will always make you more susceptible to re-infections. It may be contributing to your current situation. This page will give you further information.

    Please note: Even if you are using a "safe" P2P program, it is only the program that is safe. You will be sharing files from uncertified sources, and these are often infected. The bad guys use P2P filesharing as a major conduit to spread their wares and their infections.

    References for the risk of these programs are here, and here.

    I would strongly recommend that you uninstall them,

    Note: Please be advised that continued use of these programs after being warned of the danger of infections from them, may result in the discontinued help of future cleaning of your system here at WindowsBBS Malware and Virus removal.

    A Malware expert will have a look at your log in due course.
     

  3. to hide this advert.

  4. 2010/01/03
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    Thank you for the heads up. I no longer use that P2P software and I will uninstall it right away.
     
  5. 2010/01/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Click Scan your Computer... button.
    * Click Scanning Preferences/Control Center... button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Terminate memory threats before quarantining.
    * Click the Close button to leave the control center screen.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
    * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4. Download HijackThis:
    http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
    by clicking on Installer under Version 2.0.2
    [DO NOT download version 2.0.3 (beta)]
    Install, and run it.
    Post HijackThis log.
    NOTE. If you're using Vista, right click on HijackThis, and click Run as Administrator
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  6. 2010/01/06
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    Sorry for the delay, had to print the instructions out at work. Thanks again for any help you can provide.

    SAS log

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 01/05/2010 at 02:25 AM

    Application Version : 4.32.1000

    Core Rules Database Version : 4444
    Trace Rules Database Version: 2268

    Scan type : Custom Scan
    Total Scan Time : 01:30:13

    Memory items scanned : 280
    Memory threats detected : 0
    Registry items scanned : 7869
    Registry threats detected : 0
    File items scanned : 135401
    File threats detected : 287

    Adware.Tracking Cookie
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@us.sitestat[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@iacas.adbureau[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.usenext[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@chitika[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@edge.ru4[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@advertising[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@imrworldwide[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@oasn04.247realmedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@germanfriendfinder[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@sales.liveperson[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.first****teens[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@admarketplace[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@enhance[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@247realmedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ehg-viacom.hitbox[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bs.serving-sys[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@grandadsex[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@lfstmedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.icityfind[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjkyqod5abp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@questionmarket[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@list[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@stats.gamestop[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@spylog[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@track.adform[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjliwndpwbp.stats.esomniture[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.bootcampmedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@media6degrees[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.financialcontent[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@stats2.clicktracks[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tacoda[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@realmedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.ookla[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjk4sndpokp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@clicksor[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adultadworld[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@yeprevenue[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@statcounter[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@zedo[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@eas.apm.emediate[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@yadro[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@zbox.zanox[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@apmebf[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@paypal.112.2o7[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@dc.tremormedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjmywhc5ofp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wmk4cicjwcq.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adtech[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjliohd5ccp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.xapads[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@a1.interclick[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@interclick[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adserver.adtechus[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@revsci[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@at.atwola[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjkycgazcdq.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@atdmt[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@collective-media[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@trackalyzer[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@pointroll[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@linksynergy[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@rotator.adjuggler[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@content.yieldmanager[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@insightexpressai[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@whiteteensblackcocks[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adbrite[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@rambler[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tracking.quisma[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@statse.webtrendslive[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@fetish.pornbb[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@weborama[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@specificmedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@us.sitestat[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.pointroll[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.gamersmedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@casalemedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@affiliates.commissionaccount[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@stats.paypal[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tradedoubler[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wfl4cgdpacp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@overture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@xxxity[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.googleadservices[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@avl.112.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@smartadserver[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@doubleclick[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@myroitracking[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.yieldmanager[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bubblestat[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@serving-sys[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@counter.inkfrog[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@invitemedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.usenext[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@madisonsquaregarden.112.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@pro-market[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjnygic5obp.stats.esomniture[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ehg-sportingbet.hitbox[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@pornbb[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@content.yieldmanager[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@imagevenue.advertserve[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@serving.adsrevenue.clicksor[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@videoegg.adbureau[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@meetupcom.122.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.kaktuz[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www5.addfreestats[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.zanox[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.contactmusic[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@serving.xxxwebtraffic[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wnloaldjwbp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tsprotraffic[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@media.adrevolver[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.geek-tools[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@yourlustteens[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wblikidpmlp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.wsod[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.undertone[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ehg-newyorkpost.hitbox[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@counter11.sextracker[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@pornusers[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adv.exbii[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@zanox[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bridge2.admarketplace[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.3dstats[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@sexlist[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@thirteen[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.pornbb[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@login.tracking101[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjnyglcpshq.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.mycuteteens[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@sales.liveperson[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www2.online-media24[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@crackle[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ordie.adbureau[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.linktrack66[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@banner.getyourglamtone[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@media.photobucket[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@analteenangels[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.whiteteensblackcocks[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wbl4cid5iao.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adbureau[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mfeed.newzfind[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@gals.teenswantblack[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@sextracker[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@oneclickfiles[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@kleankanteen[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@universalmusic.w00tmedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mediaforgews[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.as4x.tmcs[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.adnet[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.addynamix[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@atlas.entrepreneur[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjnyejd5aeq.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@stats.gamestop[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@xiti[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@view.atdmt[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@trvlnet.adbureau[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@trafficholder[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@lynxtrack[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www7.addfreestats[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.smartwarez[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjlyujazsep.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.glamourbabe[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mmedia.t134[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@hitbox[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@livenation.122.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.****-w[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.findstuff[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wdloohd5eco.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.ad4game[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@****bookdating[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www9.addfreestats[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bizrate[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@intermundomedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@xml.trafficengine[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@entrepreneur.122.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bestbuy.122.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@beacon.dmsinsights[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@stat.onestat[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adviva[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.crakmedia[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjnycnajego.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mazebanner456[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.adultswim[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@newzfind[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wmmiejd5iho.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.xtendmedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@teamteens[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjmyqkd5mho.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@traffic.buyservices[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@feed.validclick[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.ad-srv[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wmlisjd5ibp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@backcountry[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tryteens[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@dr.findlinks[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@****-w[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wfl4kjcjofo.stats.esomniture[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.intporn[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.qksrv[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@server.iad.liveperson[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjlyskd5wap.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@kontera[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@clicktorrent[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@householdaccount[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@media303[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@d.isleadvertise[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@click.mediadome[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjnywjcpahp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@counter.marketplaceadvisor.channeladvisor[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@hunksbanner134[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tribalfusion[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjlicodzgfo.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@dmtracker[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@clickbank[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjnywmdjslp.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@2o7[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.addfreestats[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.classmedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tracking.adbobble[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@lucidmedia[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ehg-players.hitbox[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@app.insightgrit[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjkyulajibo.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@webpower[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.theteensxxx[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@teensexmovs[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjkyaid5ado.stats.esomniture[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@jcrew.112.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bravoteens[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.lycos[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@stats3.porntrack[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.etracker[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.bridgetrack[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.backcountry[6].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@msnportal.112.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.uncrate[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@theclickcheck[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@isleadvertise[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wfmiomcpsbq.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adrevolver[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@clickarrows[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mediaplex[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.backcountry[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@click.fastpartner[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adprotraffic[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.bleepingcomputer[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@server.iad.liveperson[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.backcountry[4].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@media.brandreachsys[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wdl4uodpmlo.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@microsoftwlcashback.112.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@getmoreteens[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@sexyshare[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@warezlobby[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@primetrafficsite[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.adultswimshop[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@localfindinfo[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@intporn[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads2.sleepdisorderconnect[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wakywhc5keq.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.harrenmedianetwork[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@teensbabylon[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@cdn4.specificclick[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@wsclick.infospace[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@pornload[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.track211[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjkowocpwep.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adultswim[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@brownshoe.112.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@us.sitestat[3].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adultfriendfinder[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mediatraffic[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.infinisource[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@e-2dj6wjlyamdpoep.stats.esomniture[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.backcountry[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@specificclick[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@fastclick[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adlegend[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@traffic.tcmagnet[2].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@eaeacom.112.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@buycom.122.2o7[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adserv.getyourglamtone[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@track.fuzeads[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mycounter.tinycounter[1].txt
    C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@www.backcountry[5].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@p1033.superclick[1].txt

    Trojan.Agent/Gen-Rogue[Installer]
    C:\USERS\OWNER\DOCUMENTS\VIDCROP.PRO.V1.0.0.11\VIDCROP.PRO.V1.0.0.11.BY.VICTORIOUS\VIDCROP.PRO.V1.0.0.11\VIDCROP.PRO.V1.0.0.11.EXE
    ------------------------------------------------------------------------------------

    MBAM log

    Malwarebytes' Anti-Malware 1.43
    Database version: 3495
    Windows 6.0.6002 Service Pack 2
    Internet Explorer 7.0.6002.18005

    1/5/2010 7:57:17 PM
    mbam-log-2010-01-05 (19-57-17).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 230376
    Time elapsed: 2 hour(s), 5 minute(s), 2 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 2

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Users\Owner\Desktop\Nero\keygen.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Users\Owner\Desktop\Nero\Nero 8 Keygen.exe (Trojan.Agent) -> Quarantined and deleted successfully.

    ------------------------------------------------------------------------------------

    gmer log

    GMER 1.0.15.15281 - http://www.gmer.net
    Rootkit scan 2010-01-06 07:48:19
    Windows 6.0.6002 Service Pack 2
    Running: gmer uxye3r2x.exe; Driver: C:\Users\Owner\AppData\Local\Temp\pwrcapow.sys


    ---- System - GMER 1.0.15 ----

    SSDT 86796540 ZwAlertResumeThread
    SSDT 868B2728 ZwAlertThread
    SSDT 868A8B20 ZwAllocateVirtualMemory
    SSDT 866593D0 ZwAlpcConnectPort
    SSDT 868B1390 ZwAssignProcessToJobObject
    SSDT 86888590 ZwCreateMutant
    SSDT 8688A380 ZwCreateSymbolicLinkObject
    SSDT 868BFEF0 ZwCreateThread
    SSDT 868EF050 ZwDebugActiveProcess
    SSDT 868B0928 ZwDuplicateObject
    SSDT 868B1410 ZwFreeVirtualMemory
    SSDT 868B22C0 ZwImpersonateAnonymousToken
    SSDT 868A8858 ZwImpersonateThread
    SSDT 86652C50 ZwLoadDriver
    SSDT 86B5A940 ZwMapViewOfSection
    SSDT 868A83E8 ZwOpenEvent
    SSDT 868B2E60 ZwOpenProcess
    SSDT 868A4830 ZwOpenProcessToken
    SSDT 868AFB18 ZwOpenSection
    SSDT 86892188 ZwOpenThread
    SSDT 8688AD50 ZwProtectVirtualMemory
    SSDT 868A4EB0 ZwResumeThread
    SSDT 868B1E70 ZwSetContextThread
    SSDT 868B0C58 ZwSetInformationProcess
    SSDT 86B5A108 ZwSetSystemInformation
    SSDT 868AC578 ZwSuspendProcess
    SSDT 868B1068 ZwSuspendThread
    SSDT 868B7068 ZwTerminateProcess
    SSDT 86893108 ZwTerminateThread
    SSDT 867AE150 ZwUnmapViewOfSection
    SSDT 868AC928 ZwWriteVirtualMemory
    SSDT 8688A5D8 ZwCreateThreadEx

    ---- Kernel code sections - GMER 1.0.15 ----

    .text ntkrnlpa.exe!KeSetEvent + 11D 820C1860 8 Bytes [40, 65, 79, 86, 28, 27, 8B, ...]
    .text ntkrnlpa.exe!KeSetEvent + 131 820C1874 4 Bytes [20, 8B, 8A, 86]
    .text ntkrnlpa.exe!KeSetEvent + 13D 820C1880 4 Bytes [D0, 93, 65, 86]
    .text ntkrnlpa.exe!KeSetEvent + 191 820C18D4 4 Bytes [90, 13, 8B, 86]
    .text ntkrnlpa.exe!KeSetEvent + 1F5 820C1938 4 Bytes [90, 85, 88, 86]
    .text ...
    .rsrc C:\Windows\system32\drivers\atapi.sys entry point in ".rsrc" section [0x827DF024]

    ---- User code sections - GMER 1.0.15 ----

    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] ntdll.dll!RtlEncodeSystemPointer + 873 76E3938B 10 Bytes JMP 03F1003A
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!DialogBoxParamW 758A10B0 5 Bytes JMP 6AF2BFA7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!DialogBoxIndirectParamW 758A2EF5 5 Bytes JMP 6B06B49A C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!DialogBoxParamA 758B8152 5 Bytes JMP 6B06B45F C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!DialogBoxIndirectParamA 758B847D 5 Bytes JMP 6B06B4D5 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!MessageBoxIndirectA 758CD4D9 5 Bytes JMP 6B06B41B C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!MessageBoxIndirectW 758CD5D3 1 Byte [E9]
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!MessageBoxIndirectW 758CD5D3 5 Bytes JMP 6B06B3D7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!MessageBoxExA 758CD639 5 Bytes JMP 6B06B39D C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] USER32.dll!MessageBoxExW 758CD65D 5 Bytes JMP 6B06B363 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] ole32.dll!OleLoadFromStream 76A71E12 5 Bytes JMP 6B06B697 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] ole32.dll!CoGetTreatAsClass + D2F 76A8FAB7 7 Bytes JMP 03F101A9
    .text C:\Program Files\Internet Explorer\iexplore.exe[5724] ole32.dll!CoCreateInstance + 3E 76AA9EE4 7 Bytes JMP 03F100F3

    ---- User IAT/EAT - GMER 1.0.15 ----

    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown] [73B77817] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage] [73BCA86D] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI] [73B7BB22] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode] [73B6F695] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup] [73B775E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC] [73B6E7CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM] [73BA8395] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream] [73B7DA60] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight] [73B6FFFA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth] [73B6FF61] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage] [73B671CF] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM] [73BFCAE2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFile] [73B9C8D8] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics] [73B6D968] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree] [73B66853] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc] [73B6687E] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
    IAT C:\Windows\Explorer.EXE[1048] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode] [73B72AD1] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
    AttachedDevice \Driver\tdx \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\tdx \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\tdx \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
    AttachedDevice \FileSystem\fastfat \Fat psdfilter.sys (PSD Filter Driver/HiTRUST)

    Device -> \Driver\atapi \Device\Harddisk0\DR0 85253618

    ---- Files - GMER 1.0.15 ----

    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010015.ci 36864 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010015.dir 4096 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010015.wid 65536 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010003.ci 4096 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010003.dir 4096 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010003.wid 65536 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010001.ci 4096 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010001.dir 4096 bytes
    File C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\00010001.wid 65536 bytes
    File C:\Users\Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\N6K6MONV\UCMController[1].htm 0 bytes
    File C:\Windows\system32\drivers\atapi.sys suspicious modification

    ---- EOF - GMER 1.0.15 ----
    -----------------------------------------------------------------------------------

    HJ log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:17:49 AM, on 1/6/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v7.00 (7.00.6002.18005)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Windows\RtHDVCpl.exe
    C:\Windows\System32\igfxtray.exe
    C:\Windows\System32\hkcmd.exe
    C:\Windows\System32\igfxpers.exe
    C:\Program Files\Microsoft IntelliPoint\ipoint.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehtray.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    C:\Windows\system32\igfxsrvc.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Users\Owner\AppData\Local\Temp\RtkBtMnt.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\SearchFilterHost.exe
    C:\Users\Owner\Desktop\Malware\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://en.us.acer.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.us.acer.yahoo.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O1 - Hosts: ::1 localhost
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.5.2.11\IPSBHO.DLL
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: ShowBarObj Class - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - C:\Windows\system32\ActiveToolBand.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: Google Gears Helper - {E0FEFE40-FBF9-42AE-BA58-794CA7E3FB53} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
    O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
    O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\ipoint.exe "
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
    O4 - HKCU\..\Run: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'Default user')
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O9 - Extra button: (no name) - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra 'Tools' menuitem: &Gears Settings - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra button: FlashCapture - {753BBC4B-CC73-4fb8-A5B5-CA09C804C1DD} - C:\Program Files\FlashCapture\fciext.dll (file missing)
    O13 - Gopher Prefix:
    O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O20 - AppInit_DLLs: eNetHook.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: eDataSecurity Service - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
    O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
    O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
    O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
    O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Google Update Service (gupdate1c907eac5b4ec40) (gupdate1c907eac5b4ec40) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
    O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
    O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
    O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
    O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
    O23 - Service: TVTonic RSS (WXRSS) - Wavexpress, Inc - C:\Program Files\Wavexpress\TVTonic\WXRSS.exe

    --
    End of file - 8258 bytes
     
  7. 2010/01/06
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please download ComboFix from [color= "Red"]Here[/color] or [color= "#FF0000"]Here[/color] to your Desktop.


    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    • Please, never rename Combofix unless instructed.
    • Close any open browsers.
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    NOTE. If Combofix asks you to install Recovery Console, please allow it.

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    • Double click on combofix.exe & follow the prompts.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  8. 2010/01/12
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    I've tried running Combofix several times and each time it causes the Blue Screen. I temporarily disabled Norton 360, but I'm going to go over the list of programs again just to make sure I caught everything.
     
  9. 2010/01/12
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Delete your Combofix file. Download fresh one from HERE and try again.
    I renamed the file for a reason.
     
  10. 2010/01/12
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    Combofix log

    ComboFix 10-01-04.01 - Owner 01/12/2010 23:05:51.5.2 - x86
    Microsoft® Windows Vistaâ„¢ Home Premium 6.0.6002.2.1252.1.1033.18.2037.1235 [GMT -5:00]
    Running from: c:\users\Owner\Desktop\8cdr5etf45f.exe
    SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
    SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
    .
    - REDUCED FUNCTIONALITY MODE -
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\$recycle.bin\S-1-5-21-1739707541-1351244557-1362609374-500

    .
    ((((((((((((((((((((((((( Files Created from 2009-12-13 to 2010-01-13 )))))))))))))))))))))))))))))))
    .

    2010-01-13 04:07 . 2010-01-13 04:09 -------- d-----w- c:\users\Owner\AppData\Local\temp
    2010-01-13 04:07 . 2010-01-13 04:07 -------- d-----w- c:\users\Mcx1\AppData\Local\temp
    2010-01-13 04:07 . 2010-01-13 04:07 -------- d-----w- c:\users\Default\AppData\Local\temp
    2010-01-12 18:26 . 2009-11-12 09:00 84912 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\NAVENG.SYS
    2010-01-12 18:26 . 2009-11-12 09:00 177520 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\NAVENG32.DLL
    2010-01-12 18:26 . 2009-11-12 09:00 1647984 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\NAVEX32A.DLL
    2010-01-12 18:26 . 2009-11-12 09:00 1323568 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\NAVEX15.SYS
    2010-01-12 18:26 . 2009-12-09 09:00 2747440 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\CCERASER.DLL
    2010-01-12 18:26 . 2009-11-12 09:00 371248 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\EECTRL.SYS
    2010-01-12 18:26 . 2009-11-12 09:00 259440 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\ECMSVR32.DLL
    2010-01-12 18:26 . 2009-11-12 09:00 102448 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100112.005\ERASER.SYS
    2010-01-08 19:37 . 2009-10-28 22:37 329592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSXpx86.sys
    2010-01-08 19:37 . 2009-10-28 22:37 811896 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\Scxpx86.dll
    2010-01-08 19:37 . 2009-10-28 22:37 488312 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSxpx86.dll
    2010-01-08 19:37 . 2009-10-28 22:37 343088 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSvix86.sys
    2010-01-08 19:37 . 2009-10-28 22:37 466992 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSviA64.sys
    2010-01-07 03:16 . 2010-01-07 03:16 -------- dc----w- c:\program files\DVD Identifier
    2010-01-05 12:50 . 2010-01-05 12:50 5061520 ----a-w- c:\programdata\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
    2010-01-05 05:45 . 2010-01-05 05:45 52224 ----a-w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
    2010-01-05 05:45 . 2010-01-05 05:45 117760 ----a-w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2010-01-05 05:44 . 2010-01-05 05:44 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
    2010-01-05 05:43 . 2010-01-05 05:43 -------- dc----w- c:\program files\SUPERAntiSpyware
    2010-01-05 05:43 . 2010-01-05 05:43 -------- d-----w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com
    2010-01-05 05:42 . 2010-01-05 05:42 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-01-04 21:29 . 2009-10-28 22:37 343088 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSvix86.sys
    2010-01-04 21:29 . 2009-10-28 22:37 329592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSXpx86.sys
    2010-01-04 21:29 . 2009-10-28 22:37 811896 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\Scxpx86.dll
    2010-01-04 21:29 . 2009-10-28 22:37 488312 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSxpx86.dll
    2010-01-04 21:29 . 2009-10-28 22:37 466992 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSviA64.sys
    2010-01-04 05:00 . 2010-01-04 05:00 -------- d-----w- c:\users\Owner\AppData\Roaming\adma
    2010-01-04 04:58 . 2010-01-04 04:58 -------- dc----w- c:\program files\adma
    2009-12-29 03:24 . 2009-12-29 03:24 -------- d-----w- c:\users\Owner\AppData\Roaming\Malwarebytes
    2009-12-29 03:24 . 2009-12-30 19:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-12-29 03:24 . 2009-12-29 03:24 -------- d-----w- c:\programdata\Malwarebytes
    2009-12-29 03:24 . 2009-12-30 19:54 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-12-29 03:24 . 2010-01-05 12:50 -------- dc----w- c:\program files\Malwarebytes' Anti-Malware
    2009-12-28 06:13 . 2009-12-29 01:37 -------- d-sh--w- c:\users\Owner\AppData\Roaming\SystemProc
    2009-12-19 08:36 . 2009-12-19 08:36 439816 ----a-w- c:\users\Owner\AppData\Roaming\Real\Update\setup3.09\setup.exe

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-01-02 19:15 . 2008-11-15 03:22 -------- d-----w- c:\users\Owner\AppData\Roaming\Apple Computer
    2009-12-26 04:44 . 2009-04-26 18:09 -------- d-----w- c:\users\Owner\AppData\Roaming\dvdcss
    2009-12-12 14:41 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
    2009-12-06 03:11 . 2009-12-06 03:11 658184 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
    2009-11-22 07:10 . 2009-11-22 07:10 -------- dc----w- c:\program files\Windows Portable Devices
    2009-11-22 07:10 . 2006-11-02 10:25 665600 ----a-w- c:\windows\inf\drvindex.dat
    2009-11-22 06:55 . 2009-11-22 06:55 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
    2009-11-22 06:51 . 2009-11-22 06:51 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
    2009-11-21 20:42 . 2009-11-13 01:18 -------- d-----w- c:\programdata\{7B6BA59A-FB0E-4499-8536-A7420338BF3B}
    2009-11-21 20:40 . 2009-11-13 01:17 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
    2009-11-21 20:40 . 2009-11-13 01:17 7456 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
    2009-11-21 20:40 . 2009-11-13 01:17 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
    2009-11-21 20:40 . 2009-11-13 01:17 -------- dc----w- c:\program files\Symantec
    2009-11-21 20:38 . 2009-11-21 20:42 26600 ----a-r- c:\windows\system32\drivers\GEARAspiWDM.sys
    2009-11-21 20:38 . 2009-11-13 01:18 554352 ----a-r- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\coFFPlgn\components\coFFPlgn.dll
    2009-11-21 20:38 . 2009-09-11 04:59 107368 ----a-r- c:\windows\system32\GEARAspi.dll
    2009-11-18 02:32 . 2009-11-18 02:32 -------- dc----w- c:\program files\ImageShack Uploader
    2009-11-13 01:16 . 2009-11-13 01:16 1290592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\SyKnAppS.dll
    2009-11-13 01:16 . 2009-11-13 01:16 136840 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\patch25.dll
    2009-11-13 01:16 . 2009-11-13 01:16 796016 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\CLT\cltLMSx.dll
    2009-11-09 12:31 . 2009-12-12 14:29 24064 ----a-w- c:\windows\system32\nshhttp.dll
    2009-11-09 12:30 . 2009-12-12 14:29 30720 ----a-w- c:\windows\system32\httpapi.dll
    2009-11-09 10:36 . 2009-12-12 14:29 411648 ----a-w- c:\windows\system32\drivers\http.sys
    2009-10-29 09:17 . 2009-11-29 18:35 2048 ----a-w- c:\windows\system32\tzres.dll
    2009-10-28 22:37 . 2009-10-28 22:37 343088 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSvix86.sys
    2009-10-28 22:37 . 2009-10-28 22:37 329592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSXpx86.sys
    2009-10-28 22:37 . 2009-10-28 22:37 811896 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\Scxpx86.dll
    2009-10-28 22:37 . 2009-10-28 22:37 488312 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSxpx86.dll
    2009-10-28 22:37 . 2009-10-28 22:37 466992 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSviA64.sys
    2009-10-27 14:11 . 2009-12-09 09:05 834048 ----a-w- c:\windows\system32\wininet.dll
    2009-10-27 13:16 . 2009-12-09 09:05 78336 ----a-w- c:\windows\system32\ieencode.dll
    2009-04-01 02:47 . 2008-11-16 03:07 324976 ----a-w- c:\program files\mozilla firefox\components\coFFPlgn.dll
    2009-02-24 19:34 . 2009-02-24 19:34 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
    2009-02-24 19:34 . 2009-02-24 19:34 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Sidebar "= "c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
    "ehTray.exe "= "c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
    "IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA} "= "c:\program files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" [2008-06-24 1840424]
    "WMPNSCFG "= "c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Windows Defender "= "c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
    "SynTPEnh "= "c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-11-16 815104]
    "RtHDVCpl "= "RtHDVCpl.exe" [2006-12-01 4186112]
    "IgfxTray "= "c:\windows\system32\igfxtray.exe" [2008-02-12 141848]
    "HotKeysCmds "= "c:\windows\system32\hkcmd.exe" [2008-02-12 166424]
    "Persistence "= "c:\windows\system32\igfxpers.exe" [2008-02-12 133656]
    "IntelliPoint "= "c:\program files\Microsoft IntelliPoint\ipoint.exe" [2007-08-31 1037736]
    "TkBellExe "= "c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-02-22 198160]
    "QuickTime Task "= "c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
    "iTunesHelper "= "c:\program files\iTunes\iTunesHelper.exe" [2009-09-09 305440]
    "SunJavaUpdateSched "= "c:\program files\Java\jre6\bin\jusched.exe" [2009-07-25 149280]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "Picasa Media Detector "= "c:\program files\Picasa2\PicasaMediaDetector.exe" [2007-10-23 443968]

    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
    Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableLUA "= 0 (0x0)
    "EnableUIADesktopToggle "= 0 (0x0)

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} "= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 19:21 548352 -c--a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SymEFA.sys]
    @= "FSFilter Activity Monitor "

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
    @= "Service "

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Acer Tour]
    2007-01-14 09:11 327680 ----a-w- c:\acer\AcerTour\AcerTour.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\eDataSecurity Loader]
    2007-01-03 02:58 464168 -c--a-w- c:\acer\Empowering Technology\eDataSecurity\eDSloader.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LManager]
    2007-01-11 07:47 483328 ----a-w- c:\progra~1\LAUNCH~1\QtZgAcer.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
    "VistaSp2 "=hex(b):97,d9,72,88,21,4a,ca,01

    R0 SymEFA;Symantec Extended File Attributes;c:\windows\System32\drivers\N360\0305020.00B\SymEFA.sys [11/21/2009 3:40 PM 310320]
    R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\System32\drivers\N360\0305020.00B\BHDrvx86.sys [11/21/2009 3:40 PM 259632]
    R1 ccHP;Symantec Hash Provider;c:\windows\System32\drivers\N360\0305020.00B\cchpx86.sys [11/21/2009 3:40 PM 482432]
    R1 IDSVix86;IDSVix86;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSvix86.sys [1/8/2010 2:37 PM 343088]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [12/16/2009 4:26 PM 9968]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/16/2009 4:26 PM 74480]
    R2 N360;Norton 360;c:\program files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe [11/21/2009 3:39 PM 117640]
    R2 WXRSS;TVTonic RSS;c:\program files\Wavexpress\TVTonic\WXRSS.exe [9/5/2007 4:58 PM 188416]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [11/21/2009 2:33 AM 102448]
    R3 SYMNDISV;Symantec Network Filter Driver;c:\windows\System32\drivers\N360\0305020.00B\symndisv.sys [11/21/2009 3:40 PM 48688]
    S2 gupdate1c907eac5b4ec40;Google Update Service (gupdate1c907eac5b4ec40);c:\program files\Google\Update\GoogleUpdate.exe [8/26/2008 9:15 PM 133104]
    S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [6/29/2008 1:56 PM 21504]
    S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [12/16/2009 4:27 PM 7408]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\G]
    \shell\AutoRun\command - G:\setup.exe

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{56882b05-c692-11dd-b062-001b241715c6}]
    \shell\AutoRun\command - f:\wd_windows_tools\WDSetup.exe

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{f6c1c711-0c2f-11de-801c-001b241715c6}]
    \shell\AutoRun\command - G:\setup.exe
    .
    Contents of the 'Scheduled Tasks' folder

    2010-01-13 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2008-08-27 05:00]

    2010-01-13 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2008-08-27 05:00]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = about:blank
    uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
    uDefault_Search_URL = hxxp://www.google.com/ie
    mStart Page = hxxp://en.us.acer.yahoo.com
    uInternet Settings,ProxyOverride = *.local
    uSearchAssistant = hxxp://www.google.com/ie
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    FF - ProfilePath - c:\users\Owner\AppData\Roaming\Mozilla\Firefox\Profiles\2036gl25.rantng\
    FF - prefs.js: network.proxy.type - 4
    FF - component: c:\program files\Real\RealPlayer\browserrecord\components\nprpbrowserrecordplugin.dll
    FF - component: c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\coFFPlgn\components\coFFPlgn.dll
    FF - component: c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\IPSFFPlgn\components\IPSFFPl.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
    FF - plugin: c:\program files\Virtual Earth 3D\npVE3D.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
    .
    - - - - ORPHANS REMOVED - - - -

    HKLM-Run-NWEReboot - (no file)
    MSConfigStartUp-eDSMSNfix - c:\acer\Empowering Technology\eDSMSNfix.exe



    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-01-12 23:08
    Windows 6.0.6002 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll >>UNKNOWN [0x85255618]<<
    kernel: MBR read successfully
    detected MBR rootkit hooks:
    \Driver\Disk -> CLASSPNP.SYS @ 0x881c6d24
    \Driver\ACPI -> acpi.sys @ 0x82694d68
    \Driver\atapi -> ataport.SYS @ 0x827dda2c
    IoDeviceObjectType ->\Device\Harddisk0\DR0 ->user & kernel MBR OK

    **************************************************************************

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\N360]
    "ImagePath "= "\ "c:\program files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe\" /s \ "N360\" /m \ "c:\program files\Norton 360\Engine\3.5.2.11\diMaster.dll\" /prefetch:1 "
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    "MSCurrentCountry "=dword:000000b5

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'explorer.exe'(5776)
    c:\windows\system32\eDStoolbar.dll
    c:\windows\system32\sysenv.dll
    c:\program files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    c:\windows\system32\ActiveToolBand.dll
    c:\program files\Common Files\Nero\Lib\MediaLibraryNSE.dll
    c:\windows\System32\netshell.dll
    .
    Completion time: 2010-01-12 23:14:12
    ComboFix-quarantined-files.txt 2010-01-13 04:14

    Pre-Run: 9,159,180,288 bytes free
    Post-Run: 9,274,859,520 bytes free

    - - End Of File - - E6394F7A2E2B16B95BBC746277AE396D
    -------------------------------------------------------------------------------------

    hijackthis log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:18:32 PM, on 1/12/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v7.00 (7.00.6002.18005)
    Boot mode: Normal

    Running processes:
    C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Windows\RtHDVCpl.exe
    C:\Windows\System32\igfxtray.exe
    C:\Windows\System32\hkcmd.exe
    C:\Windows\System32\igfxpers.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Program Files\Microsoft IntelliPoint\ipoint.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Windows\system32\igfxsrvc.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehtray.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
    C:\Windows\system32\wuauclt.exe
    C:\Windows\explorer.exe
    C:\Users\Owner\Desktop\Malware\HijackThis.exe
    C:\Windows\system32\DllHost.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.us.acer.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O1 - Hosts: ::1 localhost
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.5.2.11\IPSBHO.DLL
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: ShowBarObj Class - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - C:\Windows\system32\ActiveToolBand.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: Google Gears Helper - {E0FEFE40-FBF9-42AE-BA58-794CA7E3FB53} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
    O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
    O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\ipoint.exe "
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
    O4 - HKCU\..\Run: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKUS\S-1-5-18\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'Default user')
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O9 - Extra button: (no name) - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra 'Tools' menuitem: &Gears Settings - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra button: FlashCapture - {753BBC4B-CC73-4fb8-A5B5-CA09C804C1DD} - C:\Program Files\FlashCapture\fciext.dll (file missing)
    O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: eDataSecurity Service - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
    O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
    O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
    O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
    O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Google Update Service (gupdate1c907eac5b4ec40) (gupdate1c907eac5b4ec40) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
    O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
    O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
    O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
    O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
    O23 - Service: TVTonic RSS (WXRSS) - Wavexpress, Inc - C:\Program Files\Wavexpress\TVTonic\WXRSS.exe

    --
    End of file - 7649 bytes
     
  11. 2010/01/13
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Combofix reported:
    REDUCED FUNCTIONALITY MODE
    Usually, that means, you had a pop-up, that Combofix update is available and most likely, you clicked "No" to it.
    Please, re-run Combofix and accept update, this time.
    Post fresh logs.
     
  12. 2010/01/13
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    ComboFix 10-01-13.07 - Owner 01/13/2010 23:24:52.6.2 - x86
    Microsoft® Windows Vistaâ„¢ Home Premium 6.0.6002.2.1252.1.1033.18.2037.1156 [GMT -5:00]
    Running from: c:\users\Owner\Desktop\8cdr5etf45f.exe
    SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
    SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\users\Owner\AppData\Roaming\SystemProc
    c:\windows\system32\jgaw400.dll

    .
    ((((((((((((((((((((((((( Files Created from 2009-12-14 to 2010-01-14 )))))))))))))))))))))))))))))))
    .

    2010-01-14 04:37 . 2010-01-14 04:38 -------- d-----w- c:\users\Owner\AppData\Local\temp
    2010-01-14 04:37 . 2010-01-14 04:37 -------- d-----w- c:\users\Public\AppData\Local\temp
    2010-01-14 04:37 . 2010-01-14 04:37 -------- d-----w- c:\users\Mcx1\AppData\Local\temp
    2010-01-14 04:37 . 2010-01-14 04:37 -------- d-----w- c:\users\Default\AppData\Local\temp
    2010-01-13 23:33 . 2009-11-12 09:00 84912 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\NAVENG.SYS
    2010-01-13 23:33 . 2009-11-12 09:00 177520 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\NAVENG32.DLL
    2010-01-13 23:33 . 2009-11-12 09:00 1647984 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\NAVEX32A.DLL
    2010-01-13 23:33 . 2009-11-12 09:00 1323568 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\NAVEX15.SYS
    2010-01-13 23:33 . 2009-11-12 09:00 371248 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\EECTRL.SYS
    2010-01-13 23:33 . 2009-11-12 09:00 259440 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\ECMSVR32.DLL
    2010-01-13 23:33 . 2009-11-12 09:00 102448 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\ERASER.SYS
    2010-01-13 23:33 . 2009-12-09 09:00 2747440 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100113.009\CCERASER.DLL
    2010-01-13 04:25 . 2009-11-03 01:42 195456 ------w- c:\windows\system32\MpSigStub.exe
    2010-01-08 19:37 . 2009-10-28 22:37 329592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSXpx86.sys
    2010-01-08 19:37 . 2009-10-28 22:37 811896 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\Scxpx86.dll
    2010-01-08 19:37 . 2009-10-28 22:37 488312 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSxpx86.dll
    2010-01-08 19:37 . 2009-10-28 22:37 343088 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSvix86.sys
    2010-01-08 19:37 . 2009-10-28 22:37 466992 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSviA64.sys
    2010-01-07 03:16 . 2010-01-07 03:16 -------- dc----w- c:\program files\DVD Identifier
    2010-01-05 12:50 . 2010-01-05 12:50 5061520 ----a-w- c:\programdata\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
    2010-01-05 05:45 . 2010-01-05 05:45 52224 ----a-w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
    2010-01-05 05:45 . 2010-01-05 05:45 117760 ----a-w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2010-01-05 05:44 . 2010-01-05 05:44 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
    2010-01-05 05:43 . 2010-01-05 05:43 -------- dc----w- c:\program files\SUPERAntiSpyware
    2010-01-05 05:43 . 2010-01-05 05:43 -------- d-----w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com
    2010-01-05 05:42 . 2010-01-05 05:42 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-01-04 21:29 . 2009-10-28 22:37 343088 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSvix86.sys
    2010-01-04 21:29 . 2009-10-28 22:37 329592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSXpx86.sys
    2010-01-04 21:29 . 2009-10-28 22:37 811896 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\Scxpx86.dll
    2010-01-04 21:29 . 2009-10-28 22:37 488312 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSxpx86.dll
    2010-01-04 21:29 . 2009-10-28 22:37 466992 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20091230.004\IDSviA64.sys
    2010-01-04 05:00 . 2010-01-04 05:00 -------- d-----w- c:\users\Owner\AppData\Roaming\adma
    2010-01-04 04:58 . 2010-01-04 04:58 -------- dc----w- c:\program files\adma
    2009-12-29 03:24 . 2009-12-29 03:24 -------- d-----w- c:\users\Owner\AppData\Roaming\Malwarebytes
    2009-12-29 03:24 . 2009-12-30 19:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-12-29 03:24 . 2009-12-29 03:24 -------- d-----w- c:\programdata\Malwarebytes
    2009-12-29 03:24 . 2009-12-30 19:54 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-12-29 03:24 . 2010-01-05 12:50 -------- dc----w- c:\program files\Malwarebytes' Anti-Malware
    2009-12-19 08:36 . 2009-12-19 08:36 439816 ----a-w- c:\users\Owner\AppData\Roaming\Real\Update\setup3.09\setup.exe

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-01-02 19:15 . 2008-11-15 03:22 -------- d-----w- c:\users\Owner\AppData\Roaming\Apple Computer
    2009-12-26 04:44 . 2009-04-26 18:09 -------- d-----w- c:\users\Owner\AppData\Roaming\dvdcss
    2009-12-12 14:41 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
    2009-12-06 03:11 . 2009-12-06 03:11 658184 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
    2009-11-22 07:10 . 2009-11-22 07:10 -------- dc----w- c:\program files\Windows Portable Devices
    2009-11-22 07:10 . 2006-11-02 10:25 665600 ----a-w- c:\windows\inf\drvindex.dat
    2009-11-22 06:55 . 2009-11-22 06:55 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
    2009-11-22 06:51 . 2009-11-22 06:51 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
    2009-11-21 20:42 . 2009-11-13 01:18 -------- d-----w- c:\programdata\{7B6BA59A-FB0E-4499-8536-A7420338BF3B}
    2009-11-21 20:40 . 2009-11-13 01:17 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
    2009-11-21 20:40 . 2009-11-13 01:17 7456 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
    2009-11-21 20:40 . 2009-11-13 01:17 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
    2009-11-21 20:40 . 2009-11-13 01:17 -------- dc----w- c:\program files\Symantec
    2009-11-21 20:38 . 2009-11-21 20:42 26600 ----a-r- c:\windows\system32\drivers\GEARAspiWDM.sys
    2009-11-21 20:38 . 2009-11-13 01:18 554352 ----a-r- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\coFFPlgn\components\coFFPlgn.dll
    2009-11-21 20:38 . 2009-09-11 04:59 107368 ----a-r- c:\windows\system32\GEARAspi.dll
    2009-11-18 02:32 . 2009-11-18 02:32 -------- dc----w- c:\program files\ImageShack Uploader
    2009-11-13 01:16 . 2009-11-13 01:16 1290592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\SyKnAppS.dll
    2009-11-13 01:16 . 2009-11-13 01:16 136840 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\patch25.dll
    2009-11-13 01:16 . 2009-11-13 01:16 796016 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\CLT\cltLMSx.dll
    2009-11-09 12:31 . 2009-12-12 14:29 24064 ----a-w- c:\windows\system32\nshhttp.dll
    2009-11-09 12:30 . 2009-12-12 14:29 30720 ----a-w- c:\windows\system32\httpapi.dll
    2009-11-09 10:36 . 2009-12-12 14:29 411648 ----a-w- c:\windows\system32\drivers\http.sys
    2009-10-29 09:17 . 2009-11-29 18:35 2048 ----a-w- c:\windows\system32\tzres.dll
    2009-10-28 22:37 . 2009-10-28 22:37 343088 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSvix86.sys
    2009-10-28 22:37 . 2009-10-28 22:37 329592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSXpx86.sys
    2009-10-28 22:37 . 2009-10-28 22:37 811896 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\Scxpx86.dll
    2009-10-28 22:37 . 2009-10-28 22:37 488312 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSxpx86.dll
    2009-10-28 22:37 . 2009-10-28 22:37 466992 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSviA64.sys
    2009-10-27 14:11 . 2009-12-09 09:05 834048 ----a-w- c:\windows\system32\wininet.dll
    2009-10-27 13:16 . 2009-12-09 09:05 78336 ----a-w- c:\windows\system32\ieencode.dll
    2009-04-01 02:47 . 2008-11-16 03:07 324976 ----a-w- c:\program files\mozilla firefox\components\coFFPlgn.dll
    2009-02-24 19:34 . 2009-02-24 19:34 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
    2009-02-24 19:34 . 2009-02-24 19:34 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Sidebar "= "c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
    "ehTray.exe "= "c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
    "IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA} "= "c:\program files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" [2008-06-24 1840424]
    "WMPNSCFG "= "c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Windows Defender "= "c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
    "SynTPEnh "= "c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-11-16 815104]
    "RtHDVCpl "= "RtHDVCpl.exe" [2006-12-01 4186112]
    "IgfxTray "= "c:\windows\system32\igfxtray.exe" [2008-02-12 141848]
    "HotKeysCmds "= "c:\windows\system32\hkcmd.exe" [2008-02-12 166424]
    "Persistence "= "c:\windows\system32\igfxpers.exe" [2008-02-12 133656]
    "IntelliPoint "= "c:\program files\Microsoft IntelliPoint\ipoint.exe" [2007-08-31 1037736]
    "TkBellExe "= "c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-02-22 198160]
    "QuickTime Task "= "c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
    "iTunesHelper "= "c:\program files\iTunes\iTunesHelper.exe" [2009-09-09 305440]
    "SunJavaUpdateSched "= "c:\program files\Java\jre6\bin\jusched.exe" [2009-07-25 149280]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "Picasa Media Detector "= "c:\program files\Picasa2\PicasaMediaDetector.exe" [2007-10-23 443968]

    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
    Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableLUA "= 0 (0x0)
    "EnableUIADesktopToggle "= 0 (0x0)

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} "= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 19:21 548352 -c--a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SymEFA.sys]
    @= "FSFilter Activity Monitor "

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
    @= "Service "

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Acer Tour]
    2007-01-14 09:11 327680 ----a-w- c:\acer\AcerTour\AcerTour.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\eDataSecurity Loader]
    2007-01-03 02:58 464168 -c--a-w- c:\acer\Empowering Technology\eDataSecurity\eDSloader.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LManager]
    2007-01-11 07:47 483328 ----a-w- c:\progra~1\LAUNCH~1\QtZgAcer.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
    "VistaSp2 "=hex(b):97,d9,72,88,21,4a,ca,01

    R0 SymEFA;Symantec Extended File Attributes;c:\windows\System32\drivers\N360\0305020.00B\SymEFA.sys [11/21/2009 3:40 PM 310320]
    R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\System32\drivers\N360\0305020.00B\BHDrvx86.sys [11/21/2009 3:40 PM 259632]
    R1 ccHP;Symantec Hash Provider;c:\windows\System32\drivers\N360\0305020.00B\cchpx86.sys [11/21/2009 3:40 PM 482432]
    R1 IDSVix86;IDSVix86;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100106.001\IDSvix86.sys [1/8/2010 2:37 PM 343088]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [12/16/2009 4:26 PM 9968]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/16/2009 4:26 PM 74480]
    R2 N360;Norton 360;c:\program files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe [11/21/2009 3:39 PM 117640]
    R2 WXRSS;TVTonic RSS;c:\program files\Wavexpress\TVTonic\WXRSS.exe [9/5/2007 4:58 PM 188416]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [11/21/2009 2:33 AM 102448]
    R3 SYMNDISV;Symantec Network Filter Driver;c:\windows\System32\drivers\N360\0305020.00B\symndisv.sys [11/21/2009 3:40 PM 48688]
    S2 gupdate1c907eac5b4ec40;Google Update Service (gupdate1c907eac5b4ec40);c:\program files\Google\Update\GoogleUpdate.exe [8/26/2008 9:15 PM 133104]
    S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [6/29/2008 1:56 PM 21504]
    S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [12/16/2009 4:27 PM 7408]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
    .
    Contents of the 'Scheduled Tasks' folder

    2010-01-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2008-08-27 05:00]

    2010-01-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2008-08-27 05:00]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = about:blank
    uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
    uDefault_Search_URL = hxxp://www.google.com/ie
    mStart Page = hxxp://en.us.acer.yahoo.com
    uInternet Settings,ProxyOverride = *.local
    uSearchAssistant = hxxp://www.google.com/ie
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    FF - ProfilePath - c:\users\Owner\AppData\Roaming\Mozilla\Firefox\Profiles\2036gl25.rantng\
    FF - prefs.js: network.proxy.type - 4
    FF - component: c:\program files\Real\RealPlayer\browserrecord\components\nprpbrowserrecordplugin.dll
    FF - component: c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\coFFPlgn\components\coFFPlgn.dll
    FF - component: c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\IPSFFPlgn\components\IPSFFPl.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
    FF - plugin: c:\program files\Virtual Earth 3D\npVE3D.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-01-13 23:37
    Windows 6.0.6002 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll >>UNKNOWN [0x85255618]<<
    kernel: MBR read successfully
    detected MBR rootkit hooks:
    \Driver\Disk -> CLASSPNP.SYS @ 0x881c6d24
    \Driver\ACPI -> acpi.sys @ 0x82694d68
    \Driver\atapi -> ataport.SYS @ 0x827dda2c
    IoDeviceObjectType ->\Device\Harddisk0\DR0 ->user & kernel MBR OK

    **************************************************************************

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\N360]
    "ImagePath "= "\ "c:\program files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe\" /s \ "N360\" /m \ "c:\program files\Norton 360\Engine\3.5.2.11\diMaster.dll\" /prefetch:1 "
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    "MSCurrentCountry "=dword:000000b5

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    .
    Completion time: 2010-01-13 23:44:49
    ComboFix-quarantined-files.txt 2010-01-14 04:44
    ComboFix2.txt 2010-01-13 04:14

    Pre-Run: 9,540,886,528 bytes free
    Post-Run: 9,504,817,152 bytes free

    - - End Of File - - 086203DBCC3844ACD9BB736C4872CB3D
    ------------------------------------------------------------------------------------

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:47:00 PM, on 1/13/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v7.00 (7.00.6002.18005)
    Boot mode: Normal

    Running processes:
    C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Windows\RtHDVCpl.exe
    C:\Windows\System32\igfxtray.exe
    C:\Windows\System32\hkcmd.exe
    C:\Windows\System32\igfxpers.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Program Files\Microsoft IntelliPoint\ipoint.exe
    C:\Windows\system32\igfxsrvc.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehtray.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Windows\system32\wuauclt.exe
    C:\Windows\explorer.exe
    C:\Users\Owner\Desktop\Malware\HijackThis.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Program Files\Mozilla Firefox\firefox.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.us.acer.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O1 - Hosts: ::1 localhost
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.5.2.11\IPSBHO.DLL
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: ShowBarObj Class - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - C:\Windows\system32\ActiveToolBand.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: Google Gears Helper - {E0FEFE40-FBF9-42AE-BA58-794CA7E3FB53} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
    O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
    O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\ipoint.exe "
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
    O4 - HKCU\..\Run: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKUS\S-1-5-18\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'Default user')
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O9 - Extra button: (no name) - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra 'Tools' menuitem: &Gears Settings - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra button: FlashCapture - {753BBC4B-CC73-4fb8-A5B5-CA09C804C1DD} - C:\Program Files\FlashCapture\fciext.dll (file missing)
    O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: eDataSecurity Service - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
    O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
    O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
    O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
    O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Google Update Service (gupdate1c907eac5b4ec40) (gupdate1c907eac5b4ec40) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
    O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
    O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
    O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
    O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
    O23 - Service: TVTonic RSS (WXRSS) - Wavexpress, Inc - C:\Program Files\Wavexpress\TVTonic\WXRSS.exe

    --
    End of file - 7709 bytes
     
  13. 2010/01/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    1. Please open Notepad
    • Click Start , then Run
    • Type notepad .exe in the Run Box.

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    KillAll::
    
    File::
    
    Folder::
    
    Driver::
    
    Registry::
    
    RegLockDel::
    
    MBR::
    
    

    3. Save the above as CFScript.txt

    4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
    • A new HijackThis log.
     
  14. 2010/01/17
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    Ran combofix using the method above and after reboot I got this error message when I tried running any programs - "illegal operation attempted on a registry key that has been marked for deletion ". I rebooted my computer and the message went away.

    ComboFix 10-01-16.04 - Owner 01/17/2010 14:21:46.10.2 - x86
    Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2037.1156 [GMT -5:00]
    Running from: c:\users\Owner\Desktop\8cdr5etf45f.exe
    Command switches used :: c:\users\Owner\Desktop\CFScript.txt
    SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
    SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
    .

    ((((((((((((((((((((((((( Files Created from 2009-12-17 to 2010-01-17 )))))))))))))))))))))))))))))))
    .

    2010-01-17 19:35 . 2010-01-17 19:39 -------- d-----w- c:\users\Owner\AppData\Local\temp
    2010-01-17 19:35 . 2010-01-17 19:35 -------- d-----w- c:\users\Public\AppData\Local\temp
    2010-01-17 19:35 . 2010-01-17 19:35 -------- d-----w- c:\users\Mcx1\AppData\Local\temp
    2010-01-17 19:35 . 2010-01-17 19:35 -------- d-----w- c:\users\Default\AppData\Local\temp
    2010-01-13 04:25 . 2009-11-03 01:42 195456 ------w- c:\windows\system32\MpSigStub.exe
    2010-01-12 23:42 . 2009-10-19 13:38 156672 ----a-w- c:\windows\system32\t2embed.dll
    2010-01-12 23:42 . 2009-10-19 13:35 72704 ----a-w- c:\windows\system32\fontsub.dll
    2010-01-07 03:16 . 2010-01-07 03:16 -------- dc----w- c:\program files\DVD Identifier
    2010-01-05 05:44 . 2010-01-05 05:44 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
    2010-01-05 05:43 . 2010-01-05 05:43 -------- dc----w- c:\program files\SUPERAntiSpyware
    2010-01-05 05:43 . 2010-01-05 05:43 -------- d-----w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com
    2010-01-05 05:42 . 2010-01-05 05:42 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-01-04 05:00 . 2010-01-04 05:00 -------- d-----w- c:\users\Owner\AppData\Roaming\adma
    2010-01-04 04:58 . 2010-01-04 04:58 -------- dc----w- c:\program files\adma
    2009-12-29 03:24 . 2009-12-29 03:24 -------- d-----w- c:\users\Owner\AppData\Roaming\Malwarebytes
    2009-12-29 03:24 . 2010-01-07 21:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-12-29 03:24 . 2009-12-29 03:24 -------- d-----w- c:\programdata\Malwarebytes
    2009-12-29 03:24 . 2010-01-07 21:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-12-29 03:24 . 2010-01-17 04:32 -------- dc----w- c:\program files\Malwarebytes' Anti-Malware

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-01-17 04:32 . 2010-01-05 12:50 5115824 ----a-w- c:\programdata\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
    2010-01-14 04:51 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
    2010-01-05 05:45 . 2010-01-05 05:45 52224 ----a-w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
    2010-01-05 05:45 . 2010-01-05 05:45 117760 ----a-w- c:\users\Owner\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2010-01-02 19:15 . 2008-11-15 03:22 -------- d-----w- c:\users\Owner\AppData\Roaming\Apple Computer
    2009-12-26 04:44 . 2009-04-26 18:09 -------- d-----w- c:\users\Owner\AppData\Roaming\dvdcss
    2009-12-19 08:36 . 2009-12-19 08:36 439816 ----a-w- c:\users\Owner\AppData\Roaming\Real\Update\setup3.09\setup.exe
    2009-12-09 09:00 . 2010-01-17 16:53 2747440 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\CCERASER.DLL
    2009-12-06 03:11 . 2009-12-06 03:11 658184 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
    2009-11-22 07:10 . 2009-11-22 07:10 -------- dc----w- c:\program files\Windows Portable Devices
    2009-11-22 06:55 . 2009-11-22 06:55 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
    2009-11-22 06:51 . 2009-11-22 06:51 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
    2009-11-21 20:42 . 2009-11-13 01:18 -------- d-----w- c:\programdata\{7B6BA59A-FB0E-4499-8536-A7420338BF3B}
    2009-11-21 20:40 . 2009-11-13 01:17 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
    2009-11-21 20:40 . 2009-11-13 01:17 7456 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
    2009-11-21 20:40 . 2009-11-13 01:17 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
    2009-11-21 20:40 . 2009-11-13 01:17 -------- dc----w- c:\program files\Symantec
    2009-11-21 20:38 . 2009-11-21 20:42 26600 ----a-r- c:\windows\system32\drivers\GEARAspiWDM.sys
    2009-11-21 20:38 . 2009-11-13 01:18 554352 ----a-r- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\coFFPlgn\components\coFFPlgn.dll
    2009-11-21 20:38 . 2009-09-11 04:59 107368 ----a-r- c:\windows\system32\GEARAspi.dll
    2009-11-13 01:16 . 2009-11-13 01:16 1290592 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\SyKnAppS.dll
    2009-11-13 01:16 . 2009-11-13 01:16 136840 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\patch25.dll
    2009-11-13 01:16 . 2009-11-13 01:16 796016 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\CLT\cltLMSx.dll
    2009-11-12 09:00 . 2010-01-17 16:53 84912 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\NAVENG.SYS
    2009-11-12 09:00 . 2010-01-17 16:53 177520 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\NAVENG32.DLL
    2009-11-12 09:00 . 2010-01-17 16:53 1647984 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\NAVEX32A.DLL
    2009-11-12 09:00 . 2010-01-17 16:53 1323568 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\NAVEX15.SYS
    2009-11-12 09:00 . 2010-01-17 16:53 371248 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\EECTRL.SYS
    2009-11-12 09:00 . 2010-01-17 16:53 259440 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\ECMSVR32.DLL
    2009-11-12 09:00 . 2010-01-17 16:53 102448 ----a-w- c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100117.002\ERASER.SYS
    2009-11-09 12:31 . 2009-12-12 14:29 24064 ----a-w- c:\windows\system32\nshhttp.dll
    2009-11-09 12:30 . 2009-12-12 14:29 30720 ----a-w- c:\windows\system32\httpapi.dll
    2009-11-09 10:36 . 2009-12-12 14:29 411648 ----a-w- c:\windows\system32\drivers\http.sys
    2009-10-29 09:17 . 2009-11-29 18:35 2048 ----a-w- c:\windows\system32\tzres.dll
    2009-10-27 14:11 . 2009-12-09 09:05 834048 ----a-w- c:\windows\system32\wininet.dll
    2009-10-27 13:16 . 2009-12-09 09:05 78336 ----a-w- c:\windows\system32\ieencode.dll
    2009-04-01 02:47 . 2008-11-16 03:07 324976 ----a-w- c:\program files\mozilla firefox\components\coFFPlgn.dll
    2009-02-24 19:34 . 2009-02-24 19:34 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
    2009-02-24 19:34 . 2009-02-24 19:34 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Sidebar "= "c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
    "ehTray.exe "= "c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
    "IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA} "= "c:\program files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" [2008-06-24 1840424]
    "WMPNSCFG "= "c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Windows Defender "= "c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
    "SynTPEnh "= "c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-11-16 815104]
    "RtHDVCpl "= "RtHDVCpl.exe" [2006-12-01 4186112]
    "IgfxTray "= "c:\windows\system32\igfxtray.exe" [2008-02-12 141848]
    "HotKeysCmds "= "c:\windows\system32\hkcmd.exe" [2008-02-12 166424]
    "Persistence "= "c:\windows\system32\igfxpers.exe" [2008-02-12 133656]
    "IntelliPoint "= "c:\program files\Microsoft IntelliPoint\ipoint.exe" [2007-08-31 1037736]
    "TkBellExe "= "c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-02-22 198160]
    "QuickTime Task "= "c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
    "iTunesHelper "= "c:\program files\iTunes\iTunesHelper.exe" [2009-09-09 305440]
    "SunJavaUpdateSched "= "c:\program files\Java\jre6\bin\jusched.exe" [2009-07-25 149280]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "Picasa Media Detector "= "c:\program files\Picasa2\PicasaMediaDetector.exe" [2007-10-23 443968]

    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
    Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableLUA "= 0 (0x0)
    "EnableUIADesktopToggle "= 0 (0x0)

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} "= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 19:21 548352 -c--a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SymEFA.sys]
    @= "FSFilter Activity Monitor "

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
    @= "Service "

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Acer Tour]
    2007-01-14 09:11 327680 ----a-w- c:\acer\AcerTour\AcerTour.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\eDataSecurity Loader]
    2007-01-03 02:58 464168 -c--a-w- c:\acer\Empowering Technology\eDataSecurity\eDSloader.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LManager]
    2007-01-11 07:47 483328 ----a-w- c:\progra~1\LAUNCH~1\QtZgAcer.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
    "VistaSp2 "=hex(b):97,d9,72,88,21,4a,ca,01

    R0 SymEFA;Symantec Extended File Attributes;c:\windows\System32\drivers\N360\0305020.00B\SymEFA.sys [11/21/2009 3:40 PM 310320]
    R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\System32\drivers\N360\0305020.00B\BHDrvx86.sys [11/21/2009 3:40 PM 259632]
    R1 ccHP;Symantec Hash Provider;c:\windows\System32\drivers\N360\0305020.00B\cchpx86.sys [11/21/2009 3:40 PM 482432]
    R1 IDSVix86;IDSVix86;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100112.001\IDSvix86.sys [1/14/2010 5:37 PM 343088]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [12/16/2009 4:26 PM 9968]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/16/2009 4:26 PM 74480]
    R2 N360;Norton 360;c:\program files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe [11/21/2009 3:39 PM 117640]
    R2 WXRSS;TVTonic RSS;c:\program files\Wavexpress\TVTonic\WXRSS.exe [9/5/2007 4:58 PM 188416]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [11/21/2009 2:33 AM 102448]
    R3 SYMNDISV;Symantec Network Filter Driver;c:\windows\System32\drivers\N360\0305020.00B\symndisv.sys [11/21/2009 3:40 PM 48688]
    S2 gupdate1c907eac5b4ec40;Google Update Service (gupdate1c907eac5b4ec40);c:\program files\Google\Update\GoogleUpdate.exe [8/26/2008 9:15 PM 133104]
    S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [6/29/2008 1:56 PM 21504]
    S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [12/16/2009 4:27 PM 7408]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
    .
    Contents of the 'Scheduled Tasks' folder

    2010-01-17 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2008-08-27 05:00]

    2010-01-17 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2008-08-27 05:00]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = about:blank
    uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
    uDefault_Search_URL = hxxp://www.google.com/ie
    mStart Page = hxxp://en.us.acer.yahoo.com
    uInternet Settings,ProxyOverride = *.local
    uSearchAssistant = hxxp://www.google.com/ie
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    FF - ProfilePath - c:\users\Owner\AppData\Roaming\Mozilla\Firefox\Profiles\2036gl25.rantng\
    FF - prefs.js: network.proxy.type - 4
    FF - component: c:\program files\Real\RealPlayer\browserrecord\components\nprpbrowserrecordplugin.dll
    FF - component: c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\coFFPlgn\components\coFFPlgn.dll
    FF - component: c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\IPSFFPlgn\components\IPSFFPl.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
    FF - plugin: c:\program files\Virtual Earth 3D\npVE3D.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-01-17 14:38
    Windows 6.0.6002 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...


    c:\users\Owner\AppData\Local\Temp\lucene-46cd1a9341243ab65f2e7919b61d997e-commit.lock

    scan completed successfully
    hidden files: 1

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll >>UNKNOWN [0x8525F618]<<
    kernel: MBR read successfully
    detected MBR rootkit hooks:
    \Driver\Disk -> CLASSPNP.SYS @ 0x881bad24
    \Driver\ACPI -> acpi.sys @ 0x82698d68
    \Driver\atapi -> ataport.SYS @ 0x827e1a2c
    IoDeviceObjectType ->\Device\Harddisk0\DR0 ->user & kernel MBR OK

    **************************************************************************

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\N360]
    "ImagePath "= "\ "c:\program files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe\" /s \ "N360\" /m \ "c:\program files\Norton 360\Engine\3.5.2.11\diMaster.dll\" /prefetch:1 "
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    "MSCurrentCountry "=dword:000000b5

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'Explorer.exe'(3012)
    c:\windows\system32\ieframe.dll
    c:\program files\Norton 360\Engine\3.5.2.11\ccVrTrst.dll
    c:\program files\Norton 360\Engine\3.5.2.11\ccSet.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\program files\Google\Update\1.2.183.13\GoogleCrashHandler.exe
    c:\windows\system32\agrsmsvc.exe
    c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    c:\program files\Bonjour\mDNSResponder.exe
    c:\acer\Empowering Technology\eDataSecurity\eDSService.exe
    c:\acer\Empowering Technology\eLock\Service\eLockServ.exe
    c:\acer\Empowering Technology\eNet\eNet Service.exe
    c:\program files\Common Files\LightScribe\LSSrvc.exe
    c:\acer\Mobility Center\MobilityService.exe
    c:\program files\CyberLink\Shared Files\RichVideo.exe
    c:\acer\Empowering Technology\eSettings\Service\capuserv.exe
    c:\acer\Empowering Technology\ePower\ePowerSvc.exe
    c:\windows\system32\WUDFHost.exe
    c:\windows\system32\DllHost.exe
    c:\windows\system32\wbem\unsecapp.exe
    c:\windows\RtHDVCpl.exe
    c:\windows\system32\igfxsrvc.exe
    c:\program files\Microsoft IntelliPoint\dpupdchk.exe
    c:\windows\ehome\ehmsas.exe
    c:\program files\Windows Media Player\wmpnetwk.exe
    c:\windows\system32\wbem\unsecapp.exe
    c:\program files\Common Files\Nero\Lib\NMIndexingService.exe
    c:\users\Owner\AppData\Local\Temp\RtkBtMnt.exe
    c:\program files\iPod\bin\iPodService.exe
    .
    **************************************************************************
    .
    Completion time: 2010-01-17 14:55:39 - machine was rebooted
    ComboFix-quarantined-files.txt 2010-01-17 19:55
    ComboFix2.txt 2010-01-14 04:44
    ComboFix3.txt 2010-01-13 04:14

    Pre-Run: 8,839,004,160 bytes free
    Post-Run: 8,812,527,616 bytes free

    - - End Of File - - 2FF59E4F277DBD1D1197A0FCA48D54B2

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 3:19:35 PM, on 1/17/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v7.00 (7.00.6002.18005)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Windows\RtHDVCpl.exe
    C:\Windows\System32\igfxtray.exe
    C:\Windows\System32\hkcmd.exe
    C:\Windows\System32\igfxpers.exe
    C:\Program Files\Microsoft IntelliPoint\ipoint.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\ehome\ehtray.exe
    C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    C:\Windows\system32\igfxsrvc.exe
    C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
    C:\Users\Owner\AppData\Local\Temp\RtkBtMnt.exe
    C:\Windows\ehome\ehmsas.exe
    C:\Windows\System32\mobsync.exe
    C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Users\Owner\Desktop\Malware\HijackThis.exe
    C:\Windows\system32\SearchFilterHost.exe
    C:\Windows\system32\NOTEPAD.EXE

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.us.acer.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.5.2.11\IPSBHO.DLL
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: ShowBarObj Class - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - C:\Windows\system32\ActiveToolBand.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: Google Gears Helper - {E0FEFE40-FBF9-42AE-BA58-794CA7E3FB53} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
    O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
    O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\ipoint.exe "
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
    O4 - HKCU\..\Run: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKUS\S-1-5-18\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'Default user')
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O9 - Extra button: (no name) - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra 'Tools' menuitem: &Gears Settings - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet Explorer\0.5.33.0\gears.dll
    O9 - Extra button: FlashCapture - {753BBC4B-CC73-4fb8-A5B5-CA09C804C1DD} - C:\Program Files\FlashCapture\fciext.dll (file missing)
    O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.5.2.11\coIEPlg.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: eDataSecurity Service - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
    O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
    O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
    O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
    O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Google Update Service (gupdate1c907eac5b4ec40) (gupdate1c907eac5b4ec40) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
    O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
    O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.5.2.11\ccSvcHst.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
    O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
    O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
    O23 - Service: TVTonic RSS (WXRSS) - Wavexpress, Inc - C:\Program Files\Wavexpress\TVTonic\WXRSS.exe

    --
    End of file - 7921 bytes
     
  15. 2010/01/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Still redirecting?

    Uninstall Combofix:
    Go Start > Run [Vista users, go Start> "Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall "
    Restart computer.

    ===============================================================

    Please download [color= "#CC0000"]The Avenger[/color] by Swandog46 to your Desktop.
    - Right click on the Avenger.zip folder and select Extract All...
    - Follow the prompts and extract the avenger folder to your desktop

    Double click on avenger.exe.
    Click OK in pop-up window.

    Avenger window will open.

    Click on Execute button.
    Click OK in two consecutive pop-up windows.

    Your computer will re-boot now.

    Upon re-boot, Notepad window will open.
    Select all text, copy it, and paste it into next reply.

    NOTE. If the log doesn't open on reboot, open Avenger again, and go File>Open Log File.
     
  16. 2010/01/17
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    Logfile of The Avenger Version 2.0, (c) by Swandog46
    http://swandog46.geekstogo.com

    Platform: Windows Vista

    *******************

    Script file opened successfully.
    Script file read successfully.

    Backups directory opened successfully at C:\Avenger

    *******************

    Beginning to process script file:

    Rootkit scan active.
    No rootkits found!


    Completed script processing.

    *******************

    Finished! Terminate.
     
  17. 2010/01/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    How is redirection issue?
     
  18. 2010/01/17
    rantng

    rantng Inactive Thread Starter

    Joined:
    2010/01/03
    Messages:
    9
    Likes Received:
    0
    Still being redirected & still getting pop-ups
     
  19. 2010/01/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    What browser is getting redirected?
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.