1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Nothing will open....trojan horse?

Discussion in 'Malware and Virus Removal Archive' started by violetwroy, 2010/02/28.

  1. 2010/03/03
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    OTM and SystemLook logs attached...

    NOTE: before OTM was finished, I got a popup that stated:

    cannot create file C:\WINDOWS\system32\drivers\etc\Hosts.


    *********

    All processes killed
    ========== PROCESSES ==========
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\NetworkService\Local Settings\Application Data\av.exe scheduled to be moved on reboot.
    File/Folder C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\1I0S2LOB\z002106201318r0409J0f000601R2cdb60fdW6be34445Xcc 1d6c99Y87919bffZ0100f0700[1] not found.
    File/Folder C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\G8XVKV86\q002106201317r0409R2cdb60fdXcc1d6cbcY87919bffZ01 00f070[1].pdf not found.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdjeb382.default\extensions\{0b521176-81b5-4849-b963-98c7a257827d}\opinstaller.msi scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\Local Settings\Application Data\av.exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\Local Settings\temp\ctv243.exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\Local Settings\temp\wmpscfgs.exe scheduled to be moved on reboot.
    File/Folder C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\8ONK6IHP\oHff911d12V0100f070006Rb9f32a55102Tb41dd7b6201l0 409K1501dfc5317[1].pdf not found.
    File/Folder C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EWZ75F3V\eHff911d12V0100f070006Rb9f32a55102Tb41dd7ae201l0 409K1501dfc5318J0f0006010[1] not found.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VP3DUZJO\TATRA9[1].htm scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\nwiz .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\nwiz.exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\rundll32 .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Documents and Settings\Owner\rundll32.exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\hp\region\EN_US-ie.reg scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Program Files\Adobe\acrotray .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Program Files\Internet Explorer\js.mui scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Program Files\Internet Explorer\wmpscfgs.exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Program Files\Softex\OmniPass\scureapp .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\Program Files\Softex\OmniPass\scureapp.exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\Befhozf.exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\SMINST\recguard .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\SMINST\recguard.exe.delme171 scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\system\hpsysdrv .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\system32\hkcmd .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\system32\igfxtray .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\system32\ps2 .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\system32\sctdisk.sys scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb06 .exe scheduled to be moved on reboot.
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb06.exe scheduled to be moved on reboot.
    ========== COMMANDS ==========
    Unable to create HKLM\Software\OldTimer Tools\OTM key.
    File move failed. C:\WINDOWS\System32\drivers\etc\Hosts scheduled to be moved on reboot.

    *************

    SystemLook v1.0 by jpshortstuff (11.01.10)
    Log created at 11:03 on 03/03/2010 by Owner (Administrator - Elevation successful)

    ========== file ==========

    C:\WINDOWS\SMINST\recguard.exe - Unable to find/read file.

    ========== filefind ==========

    Searching for "hpsysdrv.exe "
    C:\WINDOWS\system\hpsysdrv.exe --a--- 57344 bytes [10:14 10/04/2003] [11:45 02/03/2010] (Unable to calculate MD5)

    Searching for "hkcmd.exe "
    C:\hp\drivers\video\865\hkcmd.exe --a--c 114688 bytes [10:24 10/04/2003] [00:11 12/03/2003] 4EC9B66AA45683B89D58C3B2C3E64E49
    C:\WINDOWS\system32\hkcmd.exe --a--- 57344 bytes [23:51 20/08/2004] [11:45 02/03/2010] (Unable to calculate MD5)
    C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\hkcmd.exe --a--c 114688 bytes [10:24 10/04/2003] [00:11 12/03/2003] 4EC9B66AA45683B89D58C3B2C3E64E49
    C:\WINDOWS\system32\ReinstallBackups\0011\DriverFiles\hkcmd.exe --a--c 114688 bytes [23:11 26/01/2001] [00:11 12/03/2003] 4EC9B66AA45683B89D58C3B2C3E64E49

    Searching for "igfxtray.exe "
    C:\hp\drivers\video\865\igfxtray.exe --a--c 155648 bytes [10:24 10/04/2003] [00:24 12/03/2003] 1B84CFBFF768206CFF895B852B76977B
    C:\WINDOWS\system32\igfxtray.exe --a--- 57344 bytes [23:55 20/08/2004] [11:45 02/03/2010] (Unable to calculate MD5)
    C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\igfxtray.exe --a--c 155648 bytes [10:24 10/04/2003] [00:24 12/03/2003] 1B84CFBFF768206CFF895B852B76977B
    C:\WINDOWS\system32\ReinstallBackups\0011\DriverFiles\igfxtray.exe --a--c 155648 bytes [23:11 26/01/2001] [00:24 12/03/2003] 1B84CFBFF768206CFF895B852B76977B

    Searching for "ps2.exe "
    C:\hp\drivers\keyboard\PS2.EXE --a--c 81920 bytes [10:42 10/04/2003] [02:28 01/08/2002] 5F48E155D9D723763FEAF4A73DDAD62C
    C:\WINDOWS\system32\ps2.exe --a--- 57344 bytes [10:42 10/04/2003] [11:45 02/03/2010] (Unable to calculate MD5)

    -=End Of File=-
     
  2. 2010/03/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
    • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    Code:
    :Processes
    
    :Services
          
    :Reg
    
    :Files
    C:\WINDOWS\system\hpsysdrv.exe
    C:\WINDOWS\system32\hkcmd.exe|C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\hkcmd.exe /replace
    C:\WINDOWS\system32\igfxtray.exe|C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\igfxtray.exe /replace
    C:\WINDOWS\system32\ps2.exe|C:\hp\drivers\keyboard\PS2.EXE /replace
    
    :Commands
    [purity]
    [emptytemp]
    [Reboot]
    
    • Return to OTM, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
    • Close OTM and reboot your PC.
    Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
     

  3. to hide this advert.

  4. 2010/03/04
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    I've tried to run OTM twice and each time it just goes on and on forever, writing:

    unable to create HKLM\Software\OldTimer Tools\OTM key.


    Not to mention, I cannot copy and paste the test in the above box into the main textbox for OTM, I have to type it myself.
     
  5. 2010/03/04
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Delete your OTM file. Download fresh one and try again.
     
  6. 2010/03/04
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    It is not letting me go to the OTM website at all. I get a pop up that states:


    *************
    C:\DOCUME~\Owner\LOCALS~1\Temp\UeBmNWsi.exe.part could not be saved because you cannot change the contents of that folder.

    Change the folder properties and try again, or try saving in a different location.
    **********​
     
  7. 2010/03/05
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    1. Please download The Avenger to your Desktop.
    • Right click on the Avenger.zip folder and select "Extract All... "
    • Follow the prompts and extract the Avenger folder to your desktop
    2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


    Code:
    Begin copying here:
    Files to move:
    C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\hkcmd.exe | C:\WINDOWS\system32\hkcmd.exe
    C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\igfxtray.exe | C:\WINDOWS\system32\igfxtray.exe
    C:\hp\drivers\keyboard\PS2.EXE | C:\WINDOWS\system32\ps2.exe
    

    3. Now, open the avenger folder and start The Avenger program by clicking on its icon.

    • Right click on the window under Input script here:, and select Paste.
    • You can also click on this window and press (Ctrl+V) to paste the contents of the clipboard.
    • Click on Execute
    • Answer "Yes" twice when prompted.
    4. The Avenger will automatically do the following:

    • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete ", The Avenger will actually restart your system twice.)
    • On reboot, it will briefly open a black command windowon your desktop, this is normal.
    • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
    • The Avenger will also back up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
    5. Please copy/paste the content of c:\avenger.txt into your reply
     
  8. 2010/03/05
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    Logfile of The Avenger Version 2.0, (c) by Swandog46
    http://swandog46.geekstogo.com

    Platform: Windows XP

    *******************

    Script file opened successfully.
    Script file read successfully.

    Backups directory opened successfully at C:\Avenger

    *******************

    Beginning to process script file:

    Rootkit scan active.
    No rootkits found!

    File move operation "C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\hkcmd.exe|C:\WINDOWS\system32\hkcmd.exe" completed successfully.
    File move operation "C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\igfxtray.exe|C:\WINDOWS\system32\igfxtray.exe" completed successfully.
    File move operation "C:\hp\drivers\keyboard\PS2.EXE|C:\WINDOWS\system32\ps2.exe" completed successfully.

    Completed script processing.

    *******************

    Finished! Terminate.
     
  9. 2010/03/05
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Very good :)

    I want you to re-run Kaspersky scan now.
     
  10. 2010/03/07
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    --------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER 7.0: scan report
    Sunday, March 7, 2010
    Operating system: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
    Kaspersky Online Scanner version: 7.0.26.13
    Last database update: Sunday, March 07, 2010 17:06:29
    Records in database: 3730576
    --------------------------------------------------------------------------------

    Scan settings:
    scan using the following database: extended
    Scan archives: yes
    Scan e-mail databases: yes

    Scan area - My Computer:
    A:\
    C:\
    D:\
    E:\
    F:\

    Scan statistics:
    Objects scanned: 104764
    Threats found: 12
    Infected objects found: 64
    Suspicious objects found: 0
    Scan duration: 07:12:43


    File name / Threat / Threats count
    C:\Avenger\hkcmd.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\Avenger\igfxtray.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\Avenger\ps2.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\av.exe Infected: Trojan.Win32.FraudPack.ankh 1
    C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\1I0S2LOB\z002106201318r0409J0f000601R2cdb60fdW6be34445Xcc1d6c99Y87919bffZ0100f0700[1] Infected: Trojan.Win32.FraudPack.ankh 1
    C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\G8XVKV86\q002106201317r0409R2cdb60fdXcc1d6cbcY87919bffZ0100f070[1].pdf Infected: Exploit.JS.Pdfka.bso 1
    C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdjeb382.default\extensions\{0b521176-81b5-4849-b963-98c7a257827d}\opinstaller.msi Infected: not-a-virus:AdWare.Win32.RK.aw 3
    C:\Documents and Settings\Owner\Local Settings\Application Data\av.exe Infected: Trojan.Win32.FraudPack.angp 1
    C:\Documents and Settings\Owner\Local Settings\temp\ctv1486.exe Infected: Trojan-PSW.Win32.Papras.uz 1
    C:\Documents and Settings\Owner\Local Settings\temp\ctv243.exe Infected: Trojan-PSW.Win32.Papras.uz 1
    C:\Documents and Settings\Owner\Local Settings\temp\ctv31664.exe Infected: Trojan-PSW.Win32.Papras.uz 1
    C:\Documents and Settings\Owner\Local Settings\temp\ctv74966.exe Infected: Trojan-PSW.Win32.Papras.uz 1
    C:\Documents and Settings\Owner\Local Settings\temp\wmpscfgs.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\Documents and Settings\Owner\nwiz.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\Documents and Settings\Owner\rundll32.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\hp\region\EN_US-ie.reg Infected: Trojan.WinREG.StartPage 1
    C:\Program Files\Internet Explorer\js.mui Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\Program Files\Internet Explorer\wmpscfgs.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\Program Files\Softex\OmniPass\scureapp.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP1\A0000029.EXE Infected: Trojan-Downloader.Win32.VB.dx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP1\A0000029.EXE Infected: not-a-virus:AdWare.Win32.F1Organizer.h 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001524.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001525.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001526.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001527.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001532.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001535.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001536.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001537.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001538.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001539.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001540.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15\A0001553.exe Infected: Trojan-PSW.Win32.Papras.va 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP16\A0001596.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP16\A0001597.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP16\A0001611.exe Infected: Trojan-PSW.Win32.Papras.va 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3\A0000326.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3\A0000327.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3\A0000328.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3\A0000330.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3\A0000331.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3\A0000332.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3\A0000333.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000720.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000721.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000722.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000723.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000724.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000725.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000726.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5\A0000745.exe Infected: Trojan-PSW.Win32.Papras.va 1
    C:\WINDOWS\Befhozf.exe Infected: Backdoor.Win32.Agent.bg 1
    C:\WINDOWS\SMINST\recguard.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\WINDOWS\system\hpsysdrv.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\WINDOWS\system32\hkcmd .exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\WINDOWS\system32\igfxtray .exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\WINDOWS\system32\nwiz.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\WINDOWS\system32\ps2 .exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\WINDOWS\system32\sctdisk.sys Infected: Trojan-Downloader.Win32.Geral.pyz 1
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb06.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1
    C:\WINDOWS\Temp\ctv18708.exe Infected: Trojan-PSW.Win32.Papras.uz 1
    C:\WINDOWS\Temp\wmpscfgs.exe Infected: Trojan-Downloader.Win32.FraudLoad.wysx 1

    Selected area has been scanned.
     
  11. 2010/03/07
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Malwarebytes before running the scans.***


    STEP 1. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform Quick Scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 2.
    Post fresh HijackThis log.
    NOTE. If you're using Vista, right click on HijackThis, and click Run as Administrator
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  12. 2010/03/08
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    Malwarebytes' Anti-Malware 1.44
    Database version: 3838
    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702

    3/8/2010 1:11:39 PM
    mbam-log-2010-03-08 (13-11-39).txt

    Scan type: Quick Scan
    Objects scanned: 135200
    Time elapsed: 13 minute(s), 55 second(s)

    Memory Processes Infected: 2
    Memory Modules Infected: 1
    Registry Keys Infected: 105
    Registry Values Infected: 5
    Registry Data Items Infected: 5
    Folders Infected: 2
    Files Infected: 29

    Memory Processes Infected:
    C:\Documents and Settings\Owner\Local Settings\Application Data\av.exe (Trojan.FakeAlert) -> Failed to unload process.
    C:\WINDOWS\SMINST\recguard.exe (Trojan.Downloader) -> Failed to unload process.

    Memory Modules Infected:
    C:\WINDOWS\system32\app_dll.dll (Trojan.Agent.Gen) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_CLASSES_ROOT\imcupdate.update (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\imcupdate.update.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\imcwselparser.wselparser (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\imcwselparser.wselparser.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx (Adware.Minibug) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx.1 (Adware.Minibug) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\searchrep.searchreppp (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\searchrep.searchreppp.1 (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\swin32.sdwin32 (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\whistlehlprobj.whistlehlprobj.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wselservices.wsellogservices.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wselservices.wselnetworkservices (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wselservices.wselnetworkservices.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wselservices.wselxmlservices.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wseltypelibrary.user (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wseltypelibrary.user.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wseltypelibrary.wselservice (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wseltypelibrary.wselservice.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wseltypelibrary.wselservicecol (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\wseltypelibrary.wselservicecol.1 (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{0bf6b2ca-be97-4275-8695-2fb086be0b9b} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{0cc38e71-6ad3-450c-8c71-50728a640b43} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{0fbd6033-24c5-45d2-a1e5-38c46ed3b135} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{322400d5-8fb0-45ba-8f09-0e837d57493b} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{54a770f4-d5f3-42ae-9fd5-390a6a4d85e7} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{7ea005fe-90da-4bc7-955b-9face4a2069c} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{80e6ee09-3db1-4627-a7c9-dad7cfbdf05f} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{8179b6d6-513d-45dc-b910-aa329a524142} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{8d9bffc9-e027-4ea3-8ae9-8dbefed2fb93} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{8da46338-ba81-4065-b7b9-36450e42b017} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{92a17f40-e69b-44fa-9b8a-aaf7dbe413af} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{930cb039-564e-4c04-b6a8-8b31bfb28347} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{99258154-5666-4561-ad45-c76ae7077b70} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{a58aacf2-6e0f-4465-8c81-52151e60e07b} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{aa5955f9-b090-4d3b-ad7f-c9b46509bb87} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{bb46ac71-9f97-4518-b0d0-f3008b65cf88} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{d02fac77-c2e0-44d9-aa62-e9f40831ca8e} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{d5e6a641-453e-4650-a49a-fa912a870827} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{f75448f7-4f62-45fa-9bc1-4250bb4d87c9} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{fdc2fa83-0e09-427a-a4e6-04fb98667c32} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{fe2c03f1-eb17-4017-9c22-99c65870b9ec} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{2b96d5cc-c5b5-49a5-a69d-cc0a30f9028c} (Adware.Minibug) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{3fecb959-1fdd-4803-850a-ca3f2859f5ab} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{889395bf-f7f7-4023-b42e-6074de380ea5} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{9f05772f-c5ab-4491-b8e1-a5a1a0b883a7} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{a16e4ecf-12aa-49e2-9891-ece57af678b9} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{a625720f-c6eb-4806-b3d6-8fc4df89db94} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{ac8b00eb-0b68-49a6-a278-cbba09e8151e} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{b135ed26-a131-4861-b081-35c69398a704} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{c7a2084b-969c-439a-96e8-176bf9a93879} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{ebcf7b0e-2277-4ee4-95ee-3d542cdb8191} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{cc905ff6-b553-496c-9dfa-cff65adcd0fc} (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{0a88c7a6-f482-462a-8f43-f1ad8c009f50} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{568f3ba7-b0e2-4a83-b8b6-319631c4622c} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{93cf2521-df05-41f4-b803-5eb17c4bb424} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{b8848f69-e8e2-4952-90f2-bc4ef0c22243} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{d1bcd273-d241-4bff-a2a0-e45b3b4eb27b} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{c7a2084b-969c-439a-96e8-176bf9a93879} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0ed403e8-470a-4a8a-85a4-d7688cfe39a3} (Adware.Gamevance) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{25560540-9571-4d7b-9389-0f166788785a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{100eb1fd-d03e-47fd-81f3-ee91287f9465} (Adware.ShopperReports) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{a7cddcdc-beeb-4685-a062-978f5e07ceee} (Adware.ShopperReports) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c5428486-50a0-4a02-9d20-520b59a9f9b2} (Adware.ShopperReports) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c5428486-50a0-4a02-9d20-520b59a9f9b3} (Adware.ShopperReports) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{220e39c3-b081-4719-ab1a-9a884dcbd05c} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{0ed403e8-470a-4a8a-85a4-d7688cfe39a3} (Adware.Gamevance) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{100eb1fd-d03e-47fd-81f3-ee91287f9465} (Adware.ShopperReports) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{220e39c3-b081-4719-ab1a-9a884dcbd05c} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\whistlehlprobj.whistlehlprobj (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WSEM Update (Adware.NetOptimizer) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\WhistleSoftware (Adware.Whistle) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\recguard (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpsysdrv (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpdj taskbar utility (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{220e39c3-b081-4719-ab1a-9a884dcbd05c} (Adware.Whistle) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe_reader (Trojan.Downloader) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    HKEY_CLASSES_ROOT\.exe\(default) (Hijacked.exeFile) -> Bad: (secfile) Good: (exefile) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (Hijack.Regedit) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    C:\Documents and Settings\All Users\Application Data\13479534 (Rogue.Multiple) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2006 (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.

    Files Infected:
    C:\Documents and Settings\Owner\Local Settings\Application Data\av.exe (Trojan.FakeAlert) -> Delete on reboot.
    C:\WINDOWS\SMINST\recguard.exe (Trojan.Downloader) -> Delete on reboot.
    c:\WINDOWS\system\hpsysdrv.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\nwiz.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb06.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Program Files\Internet Explorer\js.mui (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Program Files\Internet Explorer\wmpscfgs.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\hkcmd .exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\igfxtray .exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\ps2 .exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\sctdisk.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\ctv18708.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
    C:\WINDOWS\Temp\wmpscfgs.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\Local Settings\temp\ctv1486.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\Local Settings\temp\ctv243.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\Local Settings\temp\ctv31664.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\Local Settings\temp\ctv74966.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\Local Settings\temp\wmpscfgs.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\nwiz.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\rundll32 .exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\rundll32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\WINDOWS\system\hpsysdrv .exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\13479534\13479534 (Rogue.Multiple) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\13479534\pc13479534ins (Rogue.Multiple) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\app_dll.dll (Trojan.Agent.Gen) -> Delete on reboot.
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\Local Settings\temp\ctv1493.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Owner\Local Settings\temp\ctv1545.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
    C:\Program Files\Adobe\acrotray .exe (Trojan.Agent) -> Delete on reboot.

    **************

    Logfile of Trend Micro HijackThis v2.0.3 (BETA)
    Scan saved at 1:16:03 PM, on 3/8/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Softex\OmniPass\Omniserv.exe
    c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Softex\OmniPass\OPXPApp.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\PROGRA~1\AVG\AVG8\avgemc.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\PROGRA~1\AVG\AVG8\avgnsx.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\AVG\AVG8\avgcsrvx.exe
    C:\WINDOWS\System32\hkcmd.exe
    C:\WINDOWS\system32\ps2.exe
    C:\Program Files\Softex\OmniPass\scureapp.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.ask.com?o=15549&l=dis
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchURL = C:\WINDOWS\search.htm
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = C:\WINDOWS\search.htm
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded /nodetect
    O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
    O4 - HKLM\..\Run: [OmniPass] C:\Program Files\Softex\OmniPass\scureapp.exe
    O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
    O12 - Plugin for .asx: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O12 - Plugin for .wmv: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
    O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader1006.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w3/resources/MSNPUpld.cab
    O16 - DPF: {54771E6F-A5A2-4413-8FB8-7B8F85398174} - http://dl.lygo.com/Sidesearch/en_US/Lycos/Sidesearch.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?978967456656
    O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} - http://cabs.elitemediagroup.net/cabs/mediaview.cab
    O16 - DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader2.cab
    O16 - DPF: {9E17A5F9-2B9C-4C66-A592-199A4BA1FBC8} - http://pictures05.aim.com/ygp/aol/plugin/upf/AOLUPF.en-US-AIM.9.5.1.8.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {D4C15E81-E2F6-4013-B81D-6F796D2C78C5} (SdcWebSecurityCtrl Class) - https://secure.stamps.com/download/us/registration/4_1_0_175/SdcWebSecurity.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/bingame/dim2/default/popcaploader_v6.cab
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: app_dll.dll
    O20 - Winlogon Notify: avgrsstarter - avgrsstx.dll (file missing)
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: NMIndexingService - Unknown owner - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe (file missing)
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe

    --
    End of file - 7867 bytes
     
  13. 2010/03/08
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    OK :)

    Download Dr.Web CureIt to the desktop:
    ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe
    • Doubleclick the drweb-cureit.exe file and click Scan to run express scan. Click OK in pop-up window to allow scan.
    • This will scan the files currently running in memory and when something is found, click the Yes button when it asks you if you want to cure it. This is only a short scan.
    • Once the short scan has finished, select Complete scan.
    • Click the green arrow [​IMG] at the right, and the scan will start.
    • Click Yes to all if it asks if you want to cure/move the file.
    • When the scan has finished, in the menu, click File and choose Save report list
    • Save the report to your desktop. The report will be called DrWeb.csv
    • Close Dr.Web Cureit.
    • [color=5]Important![/color] Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
    • Copy and paste that log in the next reply. You can use Notepad to open the DrWeb.cvs report.

    NOTE. During the scan, pop-up window will open asking for full version purchase. Simply close the window by clicking on X in upper right corner.


    Post fresh HijackThis log as well.
     
  14. 2010/03/09
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    hkcmd.exe;C:\WINDOWS\system32;Trojan.MulDrop1.3728;Deleted.;
    igfxtray.exe;C:\WINDOWS\system32;Trojan.MulDrop1.3728;Deleted.;
    ps2.exe;C:\WINDOWS\system32;Trojan.MulDrop1.3728;Deleted.;
    wmpscfgs.exe;C:\DOCUME~1\Owner\LOCALS~1\Temp;Trojan.MulDrop1.3728;Deleted.;
    wmpscfgs.exe;c:\program files\internet explorer;Trojan.MulDrop1.3728;Deleted.;
    scureapp.exe;c:\program files\softex\omnipass;Trojan.MulDrop1.3728;Deleted.;
    ocpinst.exe\___;C:\Documents and Settings\All Users\Application Data\AOL Downloads\triton_suite_install_6.0.28.3\ocpinst.exe;Probably BACKDOOR.Trojan;;
    ocpinst.exe;C:\Documents and Settings\All Users\Application Data\AOL Downloads\triton_suite_install_6.0.28.3;Archive contains infected objects;;
    nwiz.exe;C:\Documents and Settings\Owner;Trojan.MulDrop1.3728;Deleted.;
    rundll32 .exe;C:\Documents and Settings\Owner;Trojan.MulDrop1.3728;Deleted.;
    rundll32.exe;C:\Documents and Settings\Owner;Trojan.MulDrop1.3728;Deleted.;
    opinstaller.msi/stream000\opservice;C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdjeb382.default\extensions\{0b521176-81b5-4849-b963-;Program.RelKnow.1;;
    stream000;C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdjeb382.default\extensions\{0b521176-81b5-4849-b963-;Archive contains infected objects;;
    opinstaller.msi;C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdjeb382.default\extensions\{0b521176-81b5-4849-b963-;Archive contains infected objects;;
    KillWind.exe;C:\hp\bin;Tool.ProcessKill;;
    EN_CA-ie.reg;C:\hp\region;Trojan.StartPage.1505;Deleted.;
    js.mui;C:\Program Files\Internet Explorer;Trojan.MulDrop1.3728;Deleted.;
    A0000029.EXE\data006;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP1\A0000029.EXE;BackDoor.Generic.665;;
    A0000029.EXE\data007;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP1\A0000029.EXE;Trojan.MulDrop.1027;;
    A0000029.EXE;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP1;Archive contains infected objects;;
    A0000132.EXE;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP1;Adware.Aws;;
    A0000133.EXE;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP1;Adware.Aws;;
    A0001524.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001525.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001526.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001527.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001532.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001535.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001536.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001537.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001538.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001539.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001540.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.MulDrop1.3728;Deleted.;
    A0001553.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP15;Trojan.PWS.Siggen.3812;;
    A0001596.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP16;Trojan.MulDrop1.3728;Deleted.;
    A0001597.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP16;Trojan.MulDrop1.3728;Deleted.;
    A0001611.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP16;Trojan.PWS.Siggen.3812;;
    A0001646.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.Fakealert.11956;Deleted.;
    A0001647.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001648.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001649.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001650.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001651.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001652.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001653.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001655.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001656.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001657.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0001658.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP18;Trojan.MulDrop1.3728;Deleted.;
    A0000326.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3;Trojan.MulDrop1.3728;Deleted.;
    A0000327.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3;Trojan.MulDrop1.3728;Deleted.;
    A0000328.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3;Trojan.MulDrop1.3728;Deleted.;
    A0000330.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3;Trojan.MulDrop1.3728;Deleted.;
    A0000331.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3;Trojan.MulDrop1.3728;Deleted.;
    A0000332.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3;Trojan.MulDrop1.3728;Deleted.;
    A0000333.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP3;Trojan.MulDrop1.3728;Deleted.;
    A0000720.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.MulDrop1.3728;Deleted.;
    A0000721.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.MulDrop1.3728;Deleted.;
    A0000722.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.MulDrop1.3728;Deleted.;
    A0000723.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.MulDrop1.3728;Deleted.;
    A0000724.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.MulDrop1.3728;Deleted.;
    A0000725.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.MulDrop1.3728;Deleted.;
    A0000726.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.MulDrop1.3728;Deleted.;
    A0000745.exe;C:\System Volume Information\_restore{E0C22EC0-D318-4D95-967D-A5C2B4653ED0}\RP5;Trojan.PWS.Siggen.3812;;
    Befhozf.exe;C:\WINDOWS;Trojan.StartPage.origin;;
    thin.inf;C:\WINDOWS\Downloaded Program Files;Trojan.DownLoader.3634;Deleted.;

    *************

    Logfile of Trend Micro HijackThis v2.0.3 (BETA)
    Scan saved at 11:28:15 PM, on 3/8/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Softex\OmniPass\Omniserv.exe
    c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Softex\OmniPass\OPXPApp.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\PROGRA~1\AVG\AVG8\avgemc.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\PROGRA~1\AVG\AVG8\avgnsx.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\AVG\AVG8\avgcsrvx.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.ask.com?o=15549&l=dis
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchURL = C:\WINDOWS\search.htm
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = C:\WINDOWS\search.htm
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded /nodetect
    O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
    O12 - Plugin for .asx: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O12 - Plugin for .wmv: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
    O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader1006.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w3/resources/MSNPUpld.cab
    O16 - DPF: {54771E6F-A5A2-4413-8FB8-7B8F85398174} - http://dl.lygo.com/Sidesearch/en_US/Lycos/Sidesearch.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?978967456656
    O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} - http://cabs.elitemediagroup.net/cabs/mediaview.cab
    O16 - DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader2.cab
    O16 - DPF: {9E17A5F9-2B9C-4C66-A592-199A4BA1FBC8} - http://pictures05.aim.com/ygp/aol/plugin/upf/AOLUPF.en-US-AIM.9.5.1.8.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {D4C15E81-E2F6-4013-B81D-6F796D2C78C5} (SdcWebSecurityCtrl Class) - https://secure.stamps.com/download/us/registration/4_1_0_175/SdcWebSecurity.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/bingame/dim2/default/popcaploader_v6.cab
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: app_dll.dll
    O20 - Winlogon Notify: avgrsstarter - avgrsstx.dll (file missing)
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: NMIndexingService - Unknown owner - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe (file missing)
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe

    --
    End of file - 7506 bytes
     
  15. 2010/03/09
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please download ComboFix from [color= "Red"]Here[/color] or [color= "#FF0000"]Here[/color] to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  16. 2010/03/09
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    ComboFix 10-03-09.06 - Owner 03/09/2010 20:45:35.3.2 - x86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.503.346 [GMT -8:00]
    Running from: c:\documents and settings\Owner\My Documents\Downloads\ComboFix.exe
    AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\documents and settings\Owner\Local Settings\Temporary Internet Files\5y8YbJBj.jpg
    c:\documents and settings\Owner\Local Settings\Temporary Internet Files\6MPxobKm.jpg
    c:\documents and settings\Owner\Local Settings\Temporary Internet Files\k8NBa735x.jpg
    c:\documents and settings\Owner\Local Settings\Temporary Internet Files\x35pN.jpg
    c:\windows\Downloaded Program Files\f3initialsetup1.0.1.1.inf
    c:\windows\system32\ctfmon .exe
    c:\windows\system32\hkcmd .exe
    c:\windows\system32\igfxtray .exe
    c:\windows\system32\nwiz .exe
    c:\windows\system32\ps2 .exe
    c:\windows\system32\rundll32 .exe

    .
    ((((((((((((((((((((((((( Files Created from 2010-02-10 to 2010-03-10 )))))))))))))))))))))))))))))))
    .

    2010-03-09 01:46 . 2010-03-09 01:46 -------- d-----w- c:\documents and settings\Owner\DoctorWeb
    2010-03-08 21:07 . 2010-03-08 21:09 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
    2010-03-08 20:55 . 2010-03-08 20:55 -------- d-----w- c:\documents and settings\Owner\Application Data\Malwarebytes
    2010-03-08 20:55 . 2010-03-08 20:55 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2010-03-08 20:55 . 2010-03-10 04:41 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-03-06 19:02 . 2010-03-06 19:02 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
    2010-03-03 18:57 . 2010-03-03 18:57 -------- d-----w- C:\_OTM
    2010-03-03 18:17 . 2010-03-03 18:17 388096 ----a-r- c:\documents and settings\Owner\Application Data\Microsoft\Installer\{0761C9A8-8F3A-4216-B4A7-B7AFBF24A24A}\HiJackThis.exe
    2010-03-03 02:21 . 2010-03-03 02:25 -------- dc-h--w- c:\windows\ie8
    2010-03-02 01:24 . 2010-03-02 01:24 -------- d-----w- c:\program files\TrendMicro
    2010-02-25 09:35 . 2010-02-25 09:35 -------- d-----w- C:\found.000
    2010-02-24 02:47 . 2010-02-24 02:47 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
    2010-02-13 05:28 . 2010-02-13 05:35 -------- d-----w- c:\documents and settings\Owner\Application Data\Stamps.com Internet Postage
    2010-02-13 05:25 . 2010-03-03 04:03 -------- d-----w- c:\program files\Stamps.com Internet Postage
    2010-02-13 05:24 . 2010-02-13 05:24 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Seven Zip
    2010-02-13 03:56 . 2008-04-14 00:11 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
    2010-02-13 03:56 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\hidserv.dll
    2010-02-13 03:56 . 2008-04-13 18:39 14592 -c--a-w- c:\windows\system32\dllcache\kbdhid.sys
    2010-02-13 03:56 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-03-03 03:53 . 2009-01-10 18:10 -------- d-----w- c:\program files\Foxit Software
    2010-03-03 03:53 . 2003-04-10 10:28 -------- d--h--w- c:\program files\InstallShield Installation Information
    2010-03-03 03:53 . 2001-01-08 00:54 -------- d-----w- c:\program files\CyberLink
    2010-03-03 03:46 . 2009-03-27 02:09 -------- d-----w- c:\program files\AviSynth 2.5
    2010-03-03 03:44 . 2009-03-26 21:35 -------- d-----w- c:\program files\Avi2Dvd
    2010-03-02 00:44 . 2010-01-09 23:56 -------- d-----w- c:\program files\QuickTime
    2010-03-02 00:27 . 2009-12-27 20:19 -------- d-----w- c:\documents and settings\Owner\Application Data\MP3Rocket
    2010-03-02 00:20 . 2009-03-25 17:46 -------- d-----w- c:\documents and settings\Owner\Application Data\uTorrent
    2010-02-24 04:10 . 2009-02-06 00:39 -------- d-----w- c:\documents and settings\All Users\Application Data\avg8
    2010-02-24 03:26 . 2000-02-11 23:46 -------- d-----w- c:\program files\Common Files\omuw
    2010-01-25 18:24 . 2000-05-22 00:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
    2010-01-21 14:59 . 2009-02-13 17:46 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
    2010-01-20 17:50 . 2010-01-20 17:48 -------- d-----w- c:\documents and settings\Owner\Application Data\Paltalk
    2010-01-20 16:25 . 2003-04-10 10:58 -------- d-----w- c:\program files\Common Files\Adobe
    2010-01-20 16:18 . 2010-01-20 16:18 86016 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\arh.exe
    2010-01-10 18:53 . 2001-01-08 00:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
    2010-01-10 18:48 . 2003-04-10 10:48 -------- d-----w- c:\program files\InterVideo
    2010-01-10 18:42 . 2009-09-21 16:22 -------- d-----w- c:\program files\Aptana
    2010-01-10 00:01 . 2000-06-25 19:44 -------- d-----w- c:\documents and settings\Owner\Application Data\Apple Computer
    2010-01-09 23:59 . 2010-01-09 23:57 -------- d-----w- c:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
    2009-12-31 16:50 . 2003-04-25 15:45 353792 ----a-w- c:\windows\system32\drivers\srv.sys
    2009-12-21 19:14 . 2004-08-24 03:32 916480 ----a-w- c:\windows\system32\wininet.dll
    2009-12-16 18:43 . 2003-04-25 15:44 343040 ----a-w- c:\windows\system32\mspaint.exe
    2009-12-14 07:08 . 2003-04-25 16:23 33280 ----a-w- c:\windows\system32\csrsrv.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NVIEW "= "nview.dll" [2003-03-03 831557]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon "= "c:\windows\System32\NvCpl.dll" [2003-03-03 4595712]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
    2009-08-16 23:47 11952 ----a-w- c:\windows\system32\avgrsstx.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\OPXPGina]
    2003-02-21 10:50 40960 ----a-w- c:\program files\Softex\OmniPass\OPXPGina.dll

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
    BootExecute REG_MULTI_SZ autocheck autochk *\0stera

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride "=dword:00000001
    "FirewallOverride "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall "= 0 (0x0)
    "DisableNotifications "= 1 (0x1)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE "=
    "c:\\Program Files\\AVG\\AVG8\\avgemc.exe "=
    "c:\\Program Files\\AVG\\AVG8\\avgnsx.exe "=
    "c:\\Program Files\\AVG\\AVG8\\avgupd.exe "=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe "=
    "c:\\Program Files\\Mozilla Firefox\\firefox.exe "=
    "c:\\Program Files\\Java\\jre6\\bin\\javaw.exe "=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "3389:TCP "= 3389:TCP:mad:xpsp2res.dll,-22009

    R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2/5/2009 4:40 PM 335240]
    R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2/5/2009 4:40 PM 108552]
    R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2/5/2009 4:39 PM 908056]
    R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2/5/2009 4:39 PM 297752]
    R3 NB762_XP;NB 802.11g XG762 1211B Driver;c:\windows\system32\drivers\WlanUZXP.sys [8/8/2009 3:46 PM 437760]
    S3 sctdisk;sctdisk;\??\c:\windows\system32\sctdisk.sys --> c:\windows\system32\sctdisk.sys [?]
    .
    Contents of the 'Scheduled Tasks' folder

    2010-03-09 c:\windows\Tasks\FRU Task 2002-06-04 23:12ewlett-Packardeskjet4E8BF07F6DE51996434C1696D032A924550.job
    - c:\program files\Hewlett-Packard\upapp\hpqfruv.exe [2002-06-04 23:12]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.ask.com?o=15549&l=dis
    uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
    uCustomizeSearch = c:\windows\search.htm
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
    DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
    DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
    DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} - hxxp://lads.myspace.com/upload/MySpaceUploader2.cab
    DPF: {D4C15E81-E2F6-4013-B81D-6F796D2C78C5} - hxxps://secure.stamps.com/download/us/registration/4_1_0_175/SdcWebSecurity.cab
    FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdjeb382.default\
    FF - prefs.js: browser.search.defaulturl - hxxp://aim.search.aol.com/search/search?query={searchTerms}&invocationType=tb50-ff-aim-chromesbox-en-us
    FF - prefs.js: browser.startup.homepage - hxxp://www.ask.com?o=15549&l=dis
    FF - prefs.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
    FF - component: c:\program files\Real\RealPlayer\browserrecord\firefox\ext\components\nprpffbrowserrecordext.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\nptgeqplugin.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npaudio.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npavi32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npdrmv2.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npdsplay.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\NPMAsst32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npnul32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\NPOFF12.DLL
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nppdf32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nppl3260.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin2.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin3.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin4.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin5.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin6.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin7.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nprfxins.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nprjplug.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nprpjplug.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npstm32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npswf32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npwmsdrm.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npwthost.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npwtplug.dll

    ---- FIREFOX POLICIES ----
    FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false.
    - - - - ORPHANS REMOVED - - - -

    HKLM-Run-nwiz - nwiz.exe
    AddRemove-PS2 - c:\windows\system32\ps2.exe



    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-03-09 20:54
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(728)
    c:\program files\Softex\OmniPass\opxpgina.dll
    .
    Completion time: 2010-03-09 21:00:11
    ComboFix-quarantined-files.txt 2010-03-10 04:59

    Pre-Run: 81,173,188,608 bytes free
    Post-Run: 81,349,959,680 bytes free

    - - End Of File - - ED6049326E450935FF15D973CEC8C3B8


    **********

    Logfile of Trend Micro HijackThis v2.0.3 (BETA)
    Scan saved at 9:01:32 PM, on 3/9/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Softex\OmniPass\Omniserv.exe
    c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Softex\OmniPass\OPXPApp.exe
    C:\PROGRA~1\AVG\AVG8\avgemc.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\Program Files\AVG\AVG8\avgcsrvx.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\AVG\AVG8\avgnsx.exe
    C:\Program Files\Common Files\Adobe\Updater6\Adobe_Updater.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.ask.com?o=15549&l=dis
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchURL = C:\WINDOWS\search.htm
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = C:\WINDOWS\search.htm
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
    O12 - Plugin for .asx: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O12 - Plugin for .wmv: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
    O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader1006.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w3/resources/MSNPUpld.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?978967456656
    O16 - DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader2.cab
    O16 - DPF: {9E17A5F9-2B9C-4C66-A592-199A4BA1FBC8} - http://pictures05.aim.com/ygp/aol/plugin/upf/AOLUPF.en-US-AIM.9.5.1.8.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {D4C15E81-E2F6-4013-B81D-6F796D2C78C5} (SdcWebSecurityCtrl Class) - https://secure.stamps.com/download/us/registration/4_1_0_175/SdcWebSecurity.cab
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - Winlogon Notify: avgrsstarter - avgrsstx.dll (file missing)
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: NMIndexingService - Unknown owner - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe (file missing)
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe

    --
    End of file - 7052 bytes
     
  17. 2010/03/09
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    It looks like we're getting somewhere this time around :)

    1. Please open Notepad
    • Click Start , then Run
    • Type notepad .exe in the Run Box.

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    File::
    c:\windows\system32\sctdisk.sys
    
    
    Folder::
    
    Driver::
    sctdisk
    
    Registry::
    
    RegLockDel::
    
    

    3. Save the above as CFScript.txt

    4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
    • A new HijackThis log.
     
  18. 2010/03/09
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    ComboFix 10-03-09.06 - Owner 03/09/2010 21:31:36.4.2 - x86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.503.243 [GMT -8:00]
    Running from: c:\documents and settings\Owner\My Documents\Downloads\ComboFix.exe
    Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt
    AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

    FILE ::
    "c:\windows\system32\sctdisk.sys "
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_SCTDISK
    -------\Service_sctdisk


    ((((((((((((((((((((((((( Files Created from 2010-02-10 to 2010-03-10 )))))))))))))))))))))))))))))))
    .

    2010-03-09 01:46 . 2010-03-09 01:46 -------- d-----w- c:\documents and settings\Owner\DoctorWeb
    2010-03-08 21:07 . 2010-03-08 21:09 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
    2010-03-08 20:55 . 2010-03-08 20:55 -------- d-----w- c:\documents and settings\Owner\Application Data\Malwarebytes
    2010-03-08 20:55 . 2010-03-08 20:55 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2010-03-08 20:55 . 2010-03-10 05:40 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-03-06 19:02 . 2010-03-06 19:02 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
    2010-03-03 18:57 . 2010-03-03 18:57 -------- d-----w- C:\_OTM
    2010-03-03 02:21 . 2010-03-03 02:25 -------- dc-h--w- c:\windows\ie8
    2010-03-02 01:24 . 2010-03-02 01:24 -------- d-----w- c:\program files\TrendMicro
    2010-02-25 09:35 . 2010-02-25 09:35 -------- d-----w- C:\found.000
    2010-02-24 02:47 . 2010-02-24 02:47 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
    2010-02-13 05:28 . 2010-02-13 05:35 -------- d-----w- c:\documents and settings\Owner\Application Data\Stamps.com Internet Postage
    2010-02-13 05:25 . 2010-03-03 04:03 -------- d-----w- c:\program files\Stamps.com Internet Postage
    2010-02-13 05:24 . 2010-02-13 05:24 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Seven Zip
    2010-02-13 03:56 . 2008-04-14 00:11 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
    2010-02-13 03:56 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\hidserv.dll
    2010-02-13 03:56 . 2008-04-13 18:39 14592 -c--a-w- c:\windows\system32\dllcache\kbdhid.sys
    2010-02-13 03:56 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-03-03 18:17 . 2010-03-03 18:17 388096 ----a-r- c:\documents and settings\Owner\Application Data\Microsoft\Installer\{0761C9A8-8F3A-4216-B4A7-B7AFBF24A24A}\HiJackThis.exe
    2010-03-03 03:53 . 2009-01-10 18:10 -------- d-----w- c:\program files\Foxit Software
    2010-03-03 03:53 . 2003-04-10 10:28 -------- d--h--w- c:\program files\InstallShield Installation Information
    2010-03-03 03:53 . 2001-01-08 00:54 -------- d-----w- c:\program files\CyberLink
    2010-03-03 03:46 . 2009-03-27 02:09 -------- d-----w- c:\program files\AviSynth 2.5
    2010-03-03 03:44 . 2009-03-26 21:35 -------- d-----w- c:\program files\Avi2Dvd
    2010-03-02 00:44 . 2010-01-09 23:56 -------- d-----w- c:\program files\QuickTime
    2010-03-02 00:27 . 2009-12-27 20:19 -------- d-----w- c:\documents and settings\Owner\Application Data\MP3Rocket
    2010-03-02 00:20 . 2009-03-25 17:46 -------- d-----w- c:\documents and settings\Owner\Application Data\uTorrent
    2010-02-24 04:10 . 2009-02-06 00:39 -------- d-----w- c:\documents and settings\All Users\Application Data\avg8
    2010-02-24 03:26 . 2000-02-11 23:46 -------- d-----w- c:\program files\Common Files\omuw
    2010-01-25 18:24 . 2000-05-22 00:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
    2010-01-21 14:59 . 2009-02-13 17:46 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
    2010-01-20 17:50 . 2010-01-20 17:48 -------- d-----w- c:\documents and settings\Owner\Application Data\Paltalk
    2010-01-20 16:25 . 2003-04-10 10:58 -------- d-----w- c:\program files\Common Files\Adobe
    2010-01-20 16:18 . 2010-01-20 16:18 86016 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\arh.exe
    2010-01-10 18:53 . 2001-01-08 00:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
    2010-01-10 18:48 . 2003-04-10 10:48 -------- d-----w- c:\program files\InterVideo
    2010-01-10 18:42 . 2009-09-21 16:22 -------- d-----w- c:\program files\Aptana
    2010-01-10 00:01 . 2000-06-25 19:44 -------- d-----w- c:\documents and settings\Owner\Application Data\Apple Computer
    2010-01-09 23:59 . 2010-01-09 23:57 -------- d-----w- c:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
    2009-12-31 16:50 . 2003-04-25 15:45 353792 ----a-w- c:\windows\system32\drivers\srv.sys
    2009-12-21 19:14 . 2004-08-24 03:32 916480 ------w- c:\windows\system32\wininet.dll
    2009-12-16 18:43 . 2003-04-25 15:44 343040 ----a-w- c:\windows\system32\mspaint.exe
    2009-12-14 07:08 . 2003-04-25 16:23 33280 ----a-w- c:\windows\system32\csrsrv.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NVIEW "= "nview.dll" [2003-03-03 831557]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon "= "c:\windows\System32\NvCpl.dll" [2003-03-03 4595712]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
    2009-08-16 23:47 11952 ----a-w- c:\windows\system32\avgrsstx.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\OPXPGina]
    2003-02-21 10:50 40960 ----a-w- c:\program files\Softex\OmniPass\OPXPGina.dll

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
    BootExecute REG_MULTI_SZ autocheck autochk *\0stera

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride "=dword:00000001
    "FirewallOverride "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall "= 0 (0x0)
    "DisableNotifications "= 1 (0x1)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE "=
    "c:\\Program Files\\AVG\\AVG8\\avgemc.exe "=
    "c:\\Program Files\\AVG\\AVG8\\avgnsx.exe "=
    "c:\\Program Files\\AVG\\AVG8\\avgupd.exe "=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe "=
    "c:\\Program Files\\Mozilla Firefox\\firefox.exe "=
    "c:\\Program Files\\Java\\jre6\\bin\\javaw.exe "=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "3389:TCP "= 3389:TCP:mad:xpsp2res.dll,-22009

    R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2/5/2009 4:40 PM 335240]
    R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2/5/2009 4:40 PM 108552]
    R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2/5/2009 4:39 PM 908056]
    R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2/5/2009 4:39 PM 297752]
    R3 NB762_XP;NB 802.11g XG762 1211B Driver;c:\windows\system32\drivers\WlanUZXP.sys [8/8/2009 3:46 PM 437760]
    .
    Contents of the 'Scheduled Tasks' folder

    2010-03-09 c:\windows\Tasks\FRU Task 2002-06-04 23:12ewlett-Packardeskjet4E8BF07F6DE51996434C1696D032A924550.job
    - c:\program files\Hewlett-Packard\upapp\hpqfruv.exe [2002-06-04 23:12]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.ask.com?o=15549&l=dis
    uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
    uCustomizeSearch = c:\windows\search.htm
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
    DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
    DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
    DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} - hxxp://lads.myspace.com/upload/MySpaceUploader2.cab
    DPF: {D4C15E81-E2F6-4013-B81D-6F796D2C78C5} - hxxps://secure.stamps.com/download/us/registration/4_1_0_175/SdcWebSecurity.cab
    FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdjeb382.default\
    FF - prefs.js: browser.search.defaulturl - hxxp://aim.search.aol.com/search/search?query={searchTerms}&invocationType=tb50-ff-aim-chromesbox-en-us
    FF - prefs.js: browser.startup.homepage - hxxp://www.ask.com?o=15549&l=dis
    FF - prefs.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
    FF - component: c:\program files\Real\RealPlayer\browserrecord\firefox\ext\components\nprpffbrowserrecordext.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\nptgeqplugin.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npaudio.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npavi32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npdrmv2.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npdsplay.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\NPMAsst32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npnul32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\NPOFF12.DLL
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nppdf32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nppl3260.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin2.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin3.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin4.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin5.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin6.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npqtplugin7.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nprfxins.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nprjplug.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\nprpjplug.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npstm32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npswf32.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npwmsdrm.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npwthost.dll
    FF - plugin: c:\program files\Netscape\Communicator\Program\Plugins\npwtplug.dll

    ---- FIREFOX POLICIES ----
    FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false.

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-03-09 21:42
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(720)
    c:\program files\Softex\OmniPass\opxpgina.dll

    - - - - - - - > 'Explorer.EXE'(2224)
    c:\windows\system32\WININET.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\webcheck.dll
    .
    Completion time: 2010-03-09 21:49:48 - machine was rebooted
    ComboFix-quarantined-files.txt 2010-03-10 05:49
    ComboFix2.txt 2010-03-10 05:00

    Pre-Run: 81,372,585,984 bytes free
    Post-Run: 82,006,261,760 bytes free

    - - End Of File - - A5099670C493BCE6B52810E65AD33F0C


    ************

    Logfile of Trend Micro HijackThis v2.0.3 (BETA)
    Scan saved at 9:52:40 PM, on 3/9/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Softex\OmniPass\Omniserv.exe
    c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Softex\OmniPass\OPXPApp.exe
    C:\PROGRA~1\AVG\AVG8\avgemc.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\PROGRA~1\AVG\AVG8\avgnsx.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\AVG\AVG8\avgcsrvx.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.ask.com?o=15549&l=dis
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchURL = C:\WINDOWS\search.htm
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = C:\WINDOWS\search.htm
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
    O12 - Plugin for .asx: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O12 - Plugin for .wmv: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npdsplay.dll
    O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
    O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader1006.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w3/resources/MSNPUpld.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?978967456656
    O16 - DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader2.cab
    O16 - DPF: {9E17A5F9-2B9C-4C66-A592-199A4BA1FBC8} - http://pictures05.aim.com/ygp/aol/plugin/upf/AOLUPF.en-US-AIM.9.5.1.8.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {D4C15E81-E2F6-4013-B81D-6F796D2C78C5} (SdcWebSecurityCtrl Class) - https://secure.stamps.com/download/us/registration/4_1_0_175/SdcWebSecurity.cab
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - Winlogon Notify: avgrsstarter - avgrsstx.dll (file missing)
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: NMIndexingService - Unknown owner - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe (file missing)
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe

    --
    End of file - 6989 bytes
     
  19. 2010/03/10
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Good :)

    Uninstall Combofix:
    Go Start > Run [Vista users, go Start> "Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall "
    Click OK (Vista users - press Enter).
    Restart computer.

    ===============================================================

    Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, push List of found threats
    • Push Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
     
  20. 2010/03/10
    violetwroy

    violetwroy Inactive Thread Starter

    Joined:
    2010/02/28
    Messages:
    23
    Likes Received:
    0
    C:\hp\region\EN_US-ie.reg HTML/StartPage trojan cleaned by deleting - quarantined
    C:\Program Files\Common Files\omuw\omuwd\vocabulary Win32/TrojanDownloader.TSUpdate.J trojan cleaned by deleting - quarantined
    C:\Program Files\Compaq Connections\1940576\Program\BackWeb-1940576.exe probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
    C:\WINDOWS\Befhozf.exe a variant of Win32/Agent.WBG trojan cleaned by deleting - quarantined
     
  21. 2010/03/10
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Verify your Java version here: http://www.java.com/en/download/installed.jsp
    Update, if necessary.
    Uninstall all previous Java versions, through Add\Remove (Programs & Features in Vista).

    ===============================================================

    Re-run HJT and checkmark:

    R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.ask.com?o=15549&l=dis


    Click "Fix checked" button.

    When done....


    Your computer is clean :)

    1. Turn off System Restore:

    - Windows XP:
    1. Click Start.
    2. Right-click the My Computer icon, and then click Properties.
    3. Click the System Restore tab.
    4. Check "Turn off System Restore ".
    5. Click Apply.
    6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
    7. Click OK.
    - Windows Vista:
    1. Click Start.
    2. Right-click the Computer icon, and then click Properties.
    3. Click on System Protection under the Tasks column on the left side
    4. Click on Continue on the "User Account Control" window that pops up
    5. Under the System Protection tab, find Available Disks
    6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C: ")
    7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
    8. Click OK

    2. Restart computer.

    3. Turn System Restore on.

    4. Make sure, Windows Updates are current.

    [SIZE= "4"]5. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately![/SIZE]

    6. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    7. Run defrag at your convenience.

    8. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    9. Please, let me know, how is your computer doing.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.