Page 1 of 3 123 LastLast
Results 1 to 10 of 25

Thread: Click.Giftload problem

  1. #1
    Junior Member
    Join Date
    Oct 2006
    Posts
    21

    Default Click.Giftload problem

    Would be very grateful for your help. Spybot shows Click.Giftload, reoccurs when machine restarted. Followed all the 'new post' instructions on Spybot. Ran Erunt. Downloading / running DDS produced 'blue screen of death' twice; third attempt Windows started up and ran, DDS produced its two logs. System is XP 5.1 SP3 all up to date; Zone Alarm; AVG up to date; Spybot with Tea Timer, up to date. Thanks very much. DDS.txt log below and attach.txt zipped and attached; and below DDS is the previous Spybot log:

    DDS

    .
    DDS (Ver_11-03-05.01) - NTFSx86
    Run by John at 17:05:12.45 on 13/05/2011
    Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_23
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.44.1033.18.894.360 [GMT 1:00]
    .
    AV: AVG Anti-Virus Free Edition 2011 *Enabled/Updated* {17DDD097-36FF-435F-9E1B-52D74245D6BF}
    FW: ZoneAlarm Firewall *Enabled*
    .
    ============== Running Processes ===============
    .
    C:\PROGRA~1\AVG\AVG10\avgchsvx.exe
    C:\PROGRA~1\AVG\AVG10\avgrsx.exe
    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\svchost.exe -k netsvcs
    svchost.exe
    svchost.exe
    C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe
    C:\WINDOWS\system32\spoolsv.exe
    svchost.exe
    C:\Program Files\AVG\AVG10\avgwdsvc.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Nero\Update\NASvc.exe
    C:\WINDOWS\System32\svchost.exe -k HPZ12
    C:\Program Files\AVG\AVG10\avgnsx.exe
    C:\Program Files\AVG\AVG10\avgemcx.exe
    C:\WINDOWS\System32\svchost.exe -k HPZ12
    C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
    C:\WINDOWS\system32\svchost.exe -k imgsvc
    C:\Program Files\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Common Files\Java\Java Update\jusched.exe
    C:\Program Files\AVG\AVG10\avgtray.exe
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
    C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe
    C:\Program Files\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    C:\Program Files\Brother\Brmfcmon\BrMfimon.exe
    C:\Program Files\Brother\ControlCenter3\brccMCtl.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
    C:\Program Files\CheckPoint\ZAForceField\ForceField.exe
    C:\Documents and Settings\John\Desktop\dds.scr
    .
    ============== Pseudo HJT Report ===============
    .
    uStart Page = https://www.facebook.com
    uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg10\toolbar\IEToolbar.dll
    uURLSearchHooks: ZoneAlarm Security Toolbar: {91da5e8a-3318-4f8c-b67e-5964de3ab546} - c:\program files\zonealarm_security\tbZone.dll
    mURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg10\toolbar\IEToolbar.dll
    BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg10\avgssie.dll
    BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
    BHO: ZoneAlarm Security Engine Registrar: {8a4a36c2-0535-4d2c-bd3d-496cb7eed6e3} - c:\program files\checkpoint\zaforcefield\trustchecker\bin\TrustCheckerIEPlugin.dll
    BHO: ZoneAlarm Security Toolbar: {91da5e8a-3318-4f8c-b67e-5964de3ab546} - c:\program files\zonealarm_security\tbZone.dll
    BHO: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg10\toolbar\IEToolbar.dll
    BHO: Nero Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
    BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
    BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - c:\program files\avg\avg10\toolbar\IEToolbar.dll
    TB: Nero Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
    TB: ZoneAlarm Security Toolbar: {91da5e8a-3318-4f8c-b67e-5964de3ab546} - c:\program files\zonealarm_security\tbZone.dll
    TB: ZoneAlarm Security Engine: {ee2ac4e5-b0b0-4ec6-88a9-bca1a32ab107} - c:\program files\checkpoint\zaforcefield\trustchecker\bin\TrustCheckerIEPlugin.dll
    uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
    uRun: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\ahead\lib\NMBgMonitor.exe"
    mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
    mRun: [AVG_TRAY] c:\program files\avg\avg10\avgtray.exe
    mRun: [ZoneAlarm Client] "c:\program files\zone labs\zonealarm\zlclient.exe"
    mRun: [ISW] "c:\program files\checkpoint\zaforcefield\ForceField.exe" /icon="hidden"
    mRun: [SSBkgdUpdate] "c:\program files\common files\scansoft shared\ssbkgdupdate\SSBkgdupdate.exe" -Embedding -boot
    mRun: [PaperPort PTD] "c:\program files\scansoft\paperport\pptd40nt.exe"
    mRun: [IndexSearch] "c:\program files\scansoft\paperport\IndexSearch.exe"
    mRun: [PPort11reminder] "c:\program files\scansoft\paperport\ereg\ereg.exe" -r "c:\documents and settings\all users\application data\scansoft\paperport\11\config\ereg\Ereg.ini"
    mRun: [BrMfcWnd] c:\program files\brother\brmfcmon\BrMfcWnd.exe /AUTORUN
    mRun: [ControlCenter3] c:\program files\brother\controlcenter3\brctrcen.exe /autorun
    dRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
    DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
    DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
    TCP: {C0758729-D7D4-4455-A5FE-104A9C3EC618} = 194.72.9.34,194.72.9.38
    Handler: avgsecuritytoolbar - {F2DDE6B2-9684-4A55-86D4-E255E237B77C} - c:\program files\avg\avg10\toolbar\IEToolbar.dll
    Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg10\avgpp.dll
    Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\windows\system32\Skype4COM.dll
    Hosts: 127.0.0.1 www.spywareinfo.com
    .
    ================= FIREFOX ===================
    .
    FF - ProfilePath - c:\docume~1\john\applic~1\mozilla\firefox\profiles\zwh89pt5.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
    FF - prefs.js: keyword.URL - hxxp://www.google.com/search?btnI=I%27m+Feeling+Lucky&q=
    FF - prefs.js: network.proxy.type - 0
    FF - component: c:\documents and settings\john\application data\mozilla\firefox\profiles\zwh89pt5.default\extensions\{91da5e8a-3318-4f8c-b67e-5964de3ab546}\components\FFExternalAlert.dll
    FF - component: c:\documents and settings\john\application data\mozilla\firefox\profiles\zwh89pt5.default\extensions\{91da5e8a-3318-4f8c-b67e-5964de3ab546}\components\RadioWMPCore.dll
    FF - component: c:\program files\avg\avg10\firefox\components\avgssff.dll
    FF - component: c:\program files\avg\avg10\firefox4\components\avgssff4.dll
    FF - component: c:\program files\avg\avg10\toolbar\firefox\avg@igeared\components\IGeared_tavgp_xputils3.dll
    FF - component: c:\program files\avg\avg10\toolbar\firefox\avg@igeared\components\IGeared_tavgp_xputils35.dll
    FF - component: c:\program files\avg\avg10\toolbar\firefox\avg@igeared\components\xpavgtbapi.dll
    FF - component: c:\program files\checkpoint\zaforcefield\trustchecker\components\TrustCheckerMozillaPlugin.dll
    FF - plugin: c:\program files\checkpoint\zaforcefield\trustchecker\bin\npFFApi.dll
    FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
    FF - plugin: c:\program files\google\update\1.3.21.53\npGoogleUpdate3.dll
    FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
    FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
    FF - plugin: c:\program files\mozilla firefox\plugins\npqtplugin8.dll
    FF - plugin: c:\program files\quicktime\plugins\npqtplugin8.dll
    .
    ============= SERVICES / DRIVERS ===============
    .
    R0 AVGIDSEH;AVGIDSEH;c:\windows\system32\drivers\AVGIDSEH.sys [2010-9-13 25680]
    R0 Avgrkx86;AVG Anti-Rootkit Driver;c:\windows\system32\drivers\avgrkx86.sys [2010-9-7 26064]
    R1 Avgldx86;AVG AVI Loader Driver;c:\windows\system32\drivers\avgldx86.sys [2010-9-7 251728]
    R1 Avgmfx86;AVG Mini-Filter Resident Anti-Virus Shield;c:\windows\system32\drivers\avgmfx86.sys [2010-9-7 34384]
    R1 Avgtdix;AVG TDI Driver;c:\windows\system32\drivers\avgtdix.sys [2010-9-7 299984]
    R1 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2010-6-28 532224]
    R2 AVGIDSAgent;AVGIDSAgent;c:\program files\avg\avg10\identity protection\agent\bin\AVGIDSAgent.exe [2011-1-6 6128720]
    R2 avgwd;AVG WatchDog;c:\program files\avg\avg10\avgwdsvc.exe [2010-10-22 265400]
    R2 ISWKL;ZoneAlarm Toolbar ISWKL;c:\program files\checkpoint\zaforcefield\ISWKL.sys [2010-11-5 26872]
    R2 IswSvc;ZoneAlarm Toolbar IswSvc;c:\program files\checkpoint\zaforcefield\ISWSVC.exe [2010-11-5 488952]
    R2 NAUpdate;@c:\program files\nero\update\nasvc.exe,-200;c:\program files\nero\update\NASvc.exe [2010-5-4 503080]
    R2 Start BT in service;Start BT in service;c:\program files\ivt corporation\bluesoleil\StartSkysolSvc.exe [2007-12-27 51816]
    R2 vsmon;TrueVector Internet Monitor;c:\windows\system32\zonelabs\vsmon.exe -service --> c:\windows\system32\zonelabs\vsmon.exe -service [?]
    R3 AVGIDSDriver;AVGIDSDriver;c:\windows\system32\drivers\AVGIDSDriver.sys [2010-8-19 123472]
    R3 AVGIDSFilter;AVGIDSFilter;c:\windows\system32\drivers\AVGIDSFilter.sys [2010-8-19 30288]
    R3 AVGIDSShim;AVGIDSShim;c:\windows\system32\drivers\AVGIDSShim.sys [2010-8-19 26192]
    S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-9-27 136176]
    S3 AVG Security Toolbar Service;AVG Security Toolbar Service;c:\program files\avg\avg10\toolbar\ToolbarBroker.exe [2010-11-4 517448]
    S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-9-27 136176]
    S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\lavasoft\ad-aware\kernexplorer.sys --> c:\program files\lavasoft\ad-aware\KernExplorer.sys [?]
    .
    =============== Created Last 30 ================
    .
    2011-05-13 13:58:08 -------- d-----w- c:\docume~1\john\applic~1\Vygyop
    2011-05-13 13:58:08 -------- d-----w- c:\docume~1\john\applic~1\Biiml
    2011-04-29 17:24:30 89048 ----a-w- c:\program files\mozilla firefox\libEGL.dll
    2011-04-29 17:24:30 781272 ----a-w- c:\program files\mozilla firefox\mozsqlite3.dll
    2011-04-29 17:24:30 465880 ----a-w- c:\program files\mozilla firefox\libGLESv2.dll
    2011-04-29 17:24:30 1874904 ----a-w- c:\program files\mozilla firefox\mozjs.dll
    2011-04-29 17:24:30 15832 ----a-w- c:\program files\mozilla firefox\mozalloc.dll
    2011-04-29 17:24:29 1974616 ----a-w- c:\program files\mozilla firefox\D3DCompiler_42.dll
    2011-04-29 17:24:29 1892184 ----a-w- c:\program files\mozilla firefox\d3dx9_42.dll
    2011-04-29 17:24:29 142296 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
    2011-04-28 16:38:29 -------- d-----w- c:\docume~1\john\applic~1\Auslogics
    2011-04-26 22:21:07 -------- d-----w- c:\docume~1\alluse~1\applic~1\Zeon
    2011-04-26 22:21:04 -------- d-----w- c:\docume~1\john\applic~1\Zeon
    .
    ==================== Find3M ====================
    .
    2011-03-07 05:33:50 692736 ----a-w- c:\windows\system32\inetcomm.dll
    2011-03-04 06:45:07 434176 ----a-w- c:\windows\system32\vbscript.dll
    2011-03-03 13:21:11 1857920 ----a-w- c:\windows\system32\win32k.sys
    2011-02-17 13:51:57 81920 ----a-w- c:\windows\system32\ieencode.dll
    2011-02-17 13:51:57 667136 ----a-w- c:\windows\system32\wininet.dll
    2011-02-17 13:51:57 61952 ----a-w- c:\windows\system32\tdc.ocx
    2011-02-17 12:37:38 369664 ----a-w- c:\windows\system32\html.iec
    2011-02-17 12:32:12 5120 ----a-w- c:\windows\system32\xpsp4res.dll
    2011-02-15 12:56:39 290432 ----a-w- c:\windows\system32\atmfd.dll
    .
    =================== ROOTKIT ====================
    .
    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 5.1.2600 Disk: HTS541060G9AT00 rev.MB3OA60A -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
    .
    device: opened successfully
    user: MBR read successfully
    .
    Disk trace:
    called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x84AE76F0]<<
    _asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x84aeda10]; MOV EAX, [0x84aeda8c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
    1 nt!IofCallDriver[0x804E37D5] -> \Device\Harddisk0\DR0[0x84B7DAB8]
    3 CLASSPNP[0xF7734FD7] -> nt!IofCallDriver[0x804E37D5] -> \Device\00000086[0x84B649E8]
    5 ACPI[0xF76AB620] -> nt!IofCallDriver[0x804E37D5] -> [0x84B64D98]
    \Driver\atapi[0x84BD0890] -> IRP_MJ_CREATE -> 0x84AE76F0
    error: Read A device attached to the system is not functioning.
    kernel: MBR read successfully
    _asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
    detected disk devices:
    detected hooks:
    \Driver\atapi DriverStartIo -> 0x84AE753B
    user & kernel MBR OK
    Warning: possible TDL3 rootkit infection !
    .
    ============= FINISH: 17:06:49.59 ===============

    EARLIER SPYBOT LOG:


    --- Search result list ---
    Click.GiftLoad: [SBI $89783858] User settings (Registry value, nothing done)
    HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\FEATURE_BROWSER_EMULATION\svchost.exe


    --- Spybot - Search & Destroy version: 1.6.2 (build: 20090126) ---

    2009-01-26 blindman.exe (1.0.0.8)
    2009-01-26 SDFiles.exe (1.6.1.7)
    2009-01-26 SDMain.exe (1.0.0.6)
    2009-01-26 SDShred.exe (1.0.2.5)
    2009-01-26 SDUpdate.exe (1.6.0.12)
    2009-01-26 SpybotSD.exe (1.6.2.46)
    2009-03-05 TeaTimer.exe (1.6.6.32)
    2010-06-17 unins000.exe (51.49.0.0)
    2009-01-26 Update.exe (1.6.0.7)
    2009-11-04 advcheck.dll (1.6.5.20)
    2007-04-02 aports.dll (2.1.0.0)
    2008-06-14 DelZip179.dll (1.79.11.1)
    2009-01-26 SDHelper.dll (1.6.2.14)
    2008-06-19 sqlite3.dll
    2009-01-26 Tools.dll (2.1.6.10)
    2009-01-16 UninsSrv.dll (1.0.0.0)
    2011-03-18 Includes\Adware.sbi (*)
    2011-05-09 Includes\AdwareC.sbi (*)
    2010-08-13 Includes\Cookies.sbi (*)
    2010-12-14 Includes\Dialer.sbi (*)
    2011-03-08 Includes\DialerC.sbi (*)
    2011-02-24 Includes\HeavyDuty.sbi (*)
    2011-03-29 Includes\Hijackers.sbi (*)
    2011-03-29 Includes\HijackersC.sbi (*)
    2010-09-15 Includes\iPhone.sbi (*)
    2010-12-14 Includes\Keyloggers.sbi (*)
    2011-03-08 Includes\KeyloggersC.sbi (*)
    2004-11-29 Includes\LSP.sbi (*)
    2011-04-05 Includes\Malware.sbi (*)
    2011-05-09 Includes\MalwareC.sbi (*)
    2011-02-24 Includes\PUPS.sbi (*)
    2011-03-15 Includes\PUPSC.sbi (*)
    2010-01-25 Includes\Revision.sbi (*)
    2011-02-24 Includes\Security.sbi (*)
    2011-05-03 Includes\SecurityC.sbi (*)
    2008-06-03 Includes\Spybots.sbi (*)
    2008-06-03 Includes\SpybotsC.sbi (*)
    2011-02-24 Includes\Spyware.sbi (*)
    2011-05-10 Includes\SpywareC.sbi (*)
    2010-03-08 Includes\Tracks.uti
    2010-12-28 Includes\Trojans.sbi (*)
    2011-05-11 Includes\TrojansC-02.sbi (*)
    2011-05-11 Includes\TrojansC-03.sbi (*)
    2011-05-11 Includes\TrojansC-04.sbi (*)
    2011-05-11 Includes\TrojansC-05.sbi (*)
    2011-05-11 Includes\TrojansC.sbi (*)
    2008-03-04 Plugins\Chai.dll
    2008-03-05 Plugins\Fennel.dll
    2008-02-26 Plugins\Mate.dll
    2007-12-24 Plugins\TCPIPAddress.dll



    --- System information ---
    Windows XP (Build: 2600) Service Pack 3 (5.1.2600)
    / MSXML4SP2: Security update for MSXML4 SP2 (KB954430)
    / MSXML4SP2: Security update for MSXML4 SP2 (KB973688)
    / Windows Media Player: Security Update for Windows Media Player (KB2378111)
    / Windows Media Player: Security Update for Windows Media Player (KB952069)
    / Windows Media Player: Security Update for Windows Media Player (KB954155)
    / Windows Media Player: Security Update for Windows Media Player (KB973540)
    / Windows Media Player: Security Update for Windows Media Player (KB973540)
    / Windows Media Player: Security Update for Windows Media Player (KB975558)
    / Windows Media Player: Security Update for Windows Media Player (KB978695)
    / Windows Media Player: Security Update for Windows Media Player (KB979402)
    / Windows Media Player: Security Update for Windows Media Player (KB979402)
    / Windows XP: Security Update for Windows XP (KB941569)
    / Windows XP / SP3: Windows XP Service Pack 3
    / Windows XP / SP4: Security Update for Windows XP (KB2079403)
    / Windows XP / SP4: Security Update for Windows XP (KB2115168)
    / Windows XP / SP4: Security Update for Windows XP (KB2121546)
    / Windows XP / SP4: Update for Windows XP (KB2141007)
    / Windows XP / SP4: Hotfix for Windows XP (KB2158563)
    / Windows XP / SP4: Security Update for Windows XP (KB2160329)
    / Windows XP / SP4: Security Update for Windows XP (KB2183461)
    / Windows XP / SP4: Security Update for Windows XP (KB2229593)
    / Windows XP / SP4: Security Update for Windows XP (KB2259922)
    / Windows XP / SP4: Security Update for Windows XP (KB2279986)
    / Windows XP / SP4: Security Update for Windows XP (KB2286198)
    / Windows XP / SP4: Security Update for Windows XP (KB2296011)
    / Windows XP / SP4: Security Update for Windows XP (KB2296199)
    / Windows XP / SP4: Update for Windows XP (KB2345886)
    / Windows XP / SP4: Security Update for Windows XP (KB2347290)
    / Windows XP / SP4: Security Update for Windows XP (KB2360131)
    / Windows XP / SP4: Security Update for Windows XP (KB2360937)
    / Windows XP / SP4: Security Update for Windows XP (KB2387149)
    / Windows XP / SP4: Security Update for Windows XP (KB2393802)
    / Windows XP / SP4: Security Update for Windows XP (KB2412687)
    / Windows XP / SP4: Security Update for Windows XP (KB2416400)
    / Windows XP / SP4: Security Update for Windows XP (KB2419632)
    / Windows XP / SP4: Security Update for Windows XP (KB2423089)
    / Windows XP / SP4: Security Update for Windows XP (KB2436673)
    / Windows XP / SP4: Security Update for Windows XP (KB2440591)
    / Windows XP / SP4: Security Update for Windows XP (KB2443105)
    / Windows XP / SP4: Hotfix for Windows XP (KB2443685)
    / Windows XP / SP4: Update for Windows XP (KB2467659)
    / Windows XP / SP4: Security Update for Windows XP (KB2476687)
    / Windows XP / SP4: Security Update for Windows XP (KB2478960)
    / Windows XP / SP4: Security Update for Windows XP (KB2478971)
    / Windows XP / SP4: Security Update for Windows XP (KB2479628)
    / Windows XP / SP4: Security Update for Windows XP (KB2479943)
    / Windows XP / SP4: Security Update for Windows XP (KB2481109)
    / Windows XP / SP4: Security Update for Windows XP (KB2482017)
    / Windows XP / SP4: Security Update for Windows XP (KB2483185)
    / Windows XP / SP4: Security Update for Windows XP (KB2485376)
    / Windows XP / SP4: Security Update for Windows XP (KB2485663)
    / Windows XP / SP4: Security Update for Windows XP (KB2497640)
    / Windows XP / SP4: Security Update for Windows XP (KB2503658)
    / Windows XP / SP4: Security Update for Windows XP (KB2506212)
    / Windows XP / SP4: Security Update for Windows XP (KB2506223)
    / Windows XP / SP4: Security Update for Windows XP (KB2507618)
    / Windows XP / SP4: Security Update for Windows XP (KB2508272)
    / Windows XP / SP4: Security Update for Windows XP (KB2508429)
    / Windows XP / SP4: Security Update for Windows XP (KB2509553)
    / Windows XP / SP4: Security Update for Windows XP (KB2510581)
    / Windows XP / SP4: Security Update for Windows XP (KB2511455)
    / Windows XP / SP4: Security Update for Windows XP (KB2524375)
    / Windows XP / SP4: Security Update for Windows XP (KB923561)
    / Windows XP / SP4: Hotfix for Windows XP (KB942288-v3)
    / Windows XP / SP4: Security Update for Windows XP (KB946648)
    / Windows XP / SP4: Security Update for Windows XP (KB950760)
    / Windows XP / SP4: Security Update for Windows XP (KB950762)
    / Windows XP / SP4: Security Update for Windows XP (KB950974)
    / Windows XP / SP4: Security Update for Windows XP (KB951376-v2)
    / Windows XP / SP4: Security Update for Windows XP (KB951748)
    / Windows XP / SP4: Update for Windows XP (KB951978)
    / Windows XP / SP4: Security Update for Windows XP (KB952004)
    / Windows XP / SP4: Hotfix for Windows XP (KB952287)
    / Windows XP / SP4: Security Update for Windows XP (KB952954)
    / Windows XP / SP4: Security Update for Windows XP (KB955069)
    / Windows XP / SP4: Update for Windows XP (KB955759)
    / Windows XP / SP4: Security Update for Windows XP (KB956572)
    / Windows XP / SP4: Security Update for Windows XP (KB956744)
    / Windows XP / SP4: Security Update for Windows XP (KB956802)
    / Windows XP / SP4: Security Update for Windows XP (KB956803)
    / Windows XP / SP4: Security Update for Windows XP (KB956844)
    / Windows XP / SP4: Security Update for Windows XP (KB958644)
    / Windows XP / SP4: Security Update for Windows XP (KB958869)
    / Windows XP / SP4: Security Update for Windows XP (KB959426)
    / Windows XP / SP4: Security Update for Windows XP (KB960225)
    / Windows XP / SP4: Security Update for Windows XP (KB960803)
    / Windows XP / SP4: Security Update for Windows XP (KB960859)
    / Windows XP / SP4: Security Update for Windows XP (KB961501)
    / Windows XP / SP4: Update for Windows XP (KB967715)
    / Windows XP / SP4: Update for Windows XP (KB968389)
    / Windows XP / SP4: Security Update for Windows XP (KB969059)
    / Windows XP / SP4: Security Update for Windows XP (KB970238)
    / Windows XP / SP4: Security Update for Windows XP (KB970430)
    / Windows XP / SP4: Update for Windows XP (KB971029)
    / Windows XP / SP4: Security Update for Windows XP (KB971468)
    / Windows XP / SP4: Security Update for Windows XP (KB971657)
    / Windows XP / SP4: Update for Windows XP (KB971737)
    / Windows XP / SP4: Security Update for Windows XP (KB971961)
    / Windows XP / SP4: Security Update for Windows XP (KB972270)
    / Windows XP / SP4: Security Update for Windows XP (KB973507)
    / Windows XP / SP4: Update for Windows XP (KB973687)
    / Windows XP / SP4: Update for Windows XP (KB973815)
    / Windows XP / SP4: Security Update for Windows XP (KB973869)
    / Windows XP / SP4: Security Update for Windows XP (KB973904)
    / Windows XP / SP4: Security Update for Windows XP (KB974112)
    / Windows XP / SP4: Security Update for Windows XP (KB974318)
    / Windows XP / SP4: Security Update for Windows XP (KB974392)
    / Windows XP / SP4: Security Update for Windows XP (KB974571)
    / Windows XP / SP4: Security Update for Windows XP (KB975025)
    / Windows XP / SP4: Security Update for Windows XP (KB975467)
    / Windows XP / SP4: Security Update for Windows XP (KB975560)
    / Windows XP / SP4: Security Update for Windows XP (KB975561)
    / Windows XP / SP4: Security Update for Windows XP (KB975562)
    / Windows XP / SP4: Security Update for Windows XP (KB975713)
    / Windows XP / SP4: Hotfix for Windows XP (KB976002-v5)
    / Windows XP / SP4: Security Update for Windows XP (KB977816)
    / Windows XP / SP4: Security Update for Windows XP (KB977914)
    / Windows XP / SP4: Security Update for Windows XP (KB978037)
    / Windows XP / SP4: Security Update for Windows XP (KB978338)
    / Windows XP / SP4: Security Update for Windows XP (KB978542)
    / Windows XP / SP4: Security Update for Windows XP (KB978601)
    / Windows XP / SP4: Security Update for Windows XP (KB978706)
    / Windows XP / SP4: Security Update for Windows XP (KB979309)
    / Windows XP / SP4: Security Update for Windows XP (KB979482)
    / Windows XP / SP4: Security Update for Windows XP (KB979559)
    / Windows XP / SP4: Security Update for Windows XP (KB979683)
    / Windows XP / SP4: Security Update for Windows XP (KB979687)
    / Windows XP / SP4: Security Update for Windows XP (KB980195)
    / Windows XP / SP4: Security Update for Windows XP (KB980218)
    / Windows XP / SP4: Security Update for Windows XP (KB980232)
    / Windows XP / SP4: Security Update for Windows XP (KB980436)
    / Windows XP / SP4: Security Update for Windows XP (KB981322)
    / Windows XP / SP4: Security Update for Windows XP (KB981349)
    / Windows XP / SP4: Hotfix for Windows XP (KB981793)
    / Windows XP / SP4: Security Update for Windows XP (KB981852)
    / Windows XP / SP4: Security Update for Windows XP (KB981957)
    / Windows XP / SP4: Security Update for Windows XP (KB981997)
    / Windows XP / SP4: Security Update for Windows XP (KB982132)
    / Windows XP / SP4: Security Update for Windows XP (KB982214)
    / Windows XP / SP4: Security Update for Windows XP (KB982381)
    / Windows XP / SP4: Security Update for Windows XP (KB982665)
    / Windows XP / SP4: Security Update for Windows XP (KB982802)


    --- Startup entries list ---
    Located: HK_LM:Run, AVG_TRAY
    command: C:\Program Files\AVG\AVG10\avgtray.exe
    file: C:\Program Files\AVG\AVG10\avgtray.exe
    size: 2747744
    MD5: 4719ED2A9E1F0FF37BC3FC1999F4FFC4

    Located: HK_LM:Run, BrMfcWnd
    command: C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
    file: C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe
    size: 1085440
    MD5: 8070D04DE18022E7E65701461C978AE3

    Located: HK_LM:Run, ControlCenter3
    command: C:\Program Files\Brother\ControlCenter3\brctrcen.exe /autorun
    file: C:\Program Files\Brother\ControlCenter3\brctrcen.exe
    size: 86016
    MD5: 5983E84038FF6CB55B4BA740C341A54B

    Located: HK_LM:Run, IndexSearch
    command: "C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe"
    file: C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe
    size: 46368
    MD5: BE72C212B14FC8F872A70C6C311D0529

    Located: HK_LM:Run, ISW
    command: "C:\Program Files\CheckPoint\ZAForceField\ForceField.exe" /icon="hidden"
    file: C:\Program Files\CheckPoint\ZAForceField\ForceField.exe
    size: 738808
    MD5: 55BB967FBB994D52A7C9DADA8939FB6F

    Located: HK_LM:Run, PaperPort PTD
    command: "C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe"
    file: C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
    size: 29984
    MD5: 27249F2A900032F3C2DFAB8DE8F16399

    Located: HK_LM:Run, PPort11reminder
    command: "C:\Program Files\ScanSoft\PaperPort\Ereg\Ereg.exe" -r "C:\Documents and Settings\All Users\Application Data\ScanSoft\PaperPort\11\Config\Ereg\Ereg.ini"
    file: C:\Program Files\ScanSoft\PaperPort\Ereg\Ereg.exe
    size: 328992
    MD5: A4A66195EB0ECD574A32AAA92DC0A7BD

    Located: HK_LM:Run, SSBkgdUpdate
    command: "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
    file: C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe
    size: 210472
    MD5: 846965AE55A2662B1576C0F392DD1D6E

    Located: HK_LM:Run, SunJavaUpdateSched
    command: "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
    file: C:\Program Files\Common Files\Java\Java Update\jusched.exe
    size: 248552
    MD5: 93DB1FF92B03D24738A71E6E4992DFD3

    Located: HK_LM:Run, ZoneAlarm Client
    command: "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    file: C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    size: 1043968
    MD5: FBE8EBAC021C641AB3AD011328F8ABAA

    Located: HK_CU:Run, ctfmon.exe
    where: .DEFAULT...
    command: C:\WINDOWS\system32\ctfmon.exe
    file: C:\WINDOWS\system32\ctfmon.exe
    size: 15360
    MD5: 5F1D5F88303D4A4DBC8E5F97BA967CC3

    Located: HK_CU:Run, BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}
    where: S-1-5-21-1614895754-1757981266-682003330-1004...
    command: "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    file: C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    size: 152872
    MD5: 86F0D0B3A07C142C81DAB47E8495A822

    Located: HK_CU:Run, SpybotSD TeaTimer
    where: S-1-5-21-1614895754-1757981266-682003330-1004...
    command: C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    file: C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    size: 2260480
    MD5: 390679F7A217A5E73D756276C40AE887

    Located: HK_CU:Run, ctfmon.exe
    where: S-1-5-18...
    command: C:\WINDOWS\system32\ctfmon.exe
    file: C:\WINDOWS\system32\ctfmon.exe
    size: 15360
    MD5: 5F1D5F88303D4A4DBC8E5F97BA967CC3

    Located: WinLogon, crypt32chain
    command: crypt32.dll
    file: crypt32.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, cryptnet
    command: cryptnet.dll
    file: cryptnet.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, cscdll
    command: cscdll.dll
    file: cscdll.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, dimsntfy
    command: %SystemRoot%\System32\dimsntfy.dll
    file: %SystemRoot%\System32\dimsntfy.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, ScCertProp
    command: wlnotify.dll
    file: wlnotify.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, Schedule
    command: wlnotify.dll
    file: wlnotify.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, sclgntfy
    command: sclgntfy.dll
    file: sclgntfy.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, SensLogn
    command: WlNotify.dll
    file: WlNotify.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, termsrv
    command: wlnotify.dll
    file: wlnotify.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!

    Located: WinLogon, wlballoon
    command: wlnotify.dll
    file: wlnotify.dll
    size: 0
    MD5: D41D8CD98F00B204E9800998ECF8427E
    Warning: if the file is actually larger than 0 bytes,
    the checksum could not be properly calculated!



    --- Browser helper object list ---
    {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} (WormRadar.com IESiteBlocker.NavFilter)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name: WormRadar.com IESiteBlocker.NavFilter
    CLSID name: AVG Safe Search
    Path: C:\Program Files\AVG\AVG10\
    Long name: avgssie.dll
    Short name:
    Date (created): 07/01/2011 02:22:42
    Date (last access): 13/05/2011 17:27:50
    Date (last write): 07/01/2011 02:22:42
    Filesize: 2731872
    Attributes: archive
    MD5: E0D679F19D3F45E911DB5A4F2110CD8E
    CRC32: 81399660
    Version: 10.0.0.1201

    {53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name:
    CLSID name: Spybot-S&D IE Protection
    description: Spybot-S&D IE Browser plugin
    classification: Legitimate
    known filename: SDHelper.dll
    info link: http://www.safer-networking.org/
    info source: Safer-Networking Ltd.
    Path: C:\PROGRA~1\SPYBOT~1\
    Long name: SDHelper.dll
    Short name:
    Date (created): 17/06/2010 18:36:28
    Date (last access): 13/05/2011 17:27:50
    Date (last write): 26/01/2009 15:31:02
    Filesize: 1879896
    Attributes: archive
    MD5: 022C2F6DCCDFA0AD73024D254E62AFAC
    CRC32: 5BA24007
    Version: 1.6.2.14

    {8A4A36C2-0535-4D2C-BD3D-496CB7EED6E3} (ZoneAlarm Security Engine Registrar)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name: ZoneAlarm Security Engine Registrar
    CLSID name: ZoneAlarm Security Engine Registrar
    Path: C:\Program Files\CheckPoint\ZAForceField\TrustChecker\bin\
    Long name: TrustCheckerIEPlugin.dll
    Short name: TRUSTC~1.DLL
    Date (created): 05/11/2010 12:42:00
    Date (last access): 13/05/2011 17:27:52
    Date (last write): 05/11/2010 12:42:00
    Filesize: 599544
    Attributes: archive
    MD5: DCAA8EC30CB1E037DA067BE09DCDFAAA
    CRC32: 46B5B37A
    Version: 1.5.260.0

    {91da5e8a-3318-4f8c-b67e-5964de3ab546} (ZoneAlarm Security Toolbar)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name:
    CLSID name: ZoneAlarm Security Toolbar
    Path: C:\Program Files\ZoneAlarm_Security\
    Long name: tbZone.dll
    Short name:
    Date (created): 15/01/2011 11:37:30
    Date (last access): 13/05/2011 14:47:32
    Date (last write): 01/12/2010 12:27:42
    Filesize: 2735200
    Attributes: archive
    MD5: 02DE6B9AE1269AF813FE8B629EE50093
    CRC32: 5BCFA001
    Version: 5.7.4.0

    {A3BC75A2-1F87-4686-AA43-5347D756017C} (AVG Security Toolbar BHO)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name:
    CLSID name: AVG Security Toolbar BHO
    Path: C:\Program Files\AVG\AVG10\Toolbar\
    Long name: IEToolbar.dll
    Short name: IETOOL~1.DLL
    Date (created): 04/11/2010 14:47:08
    Date (last access): 13/05/2011 16:37:16
    Date (last write): 25/11/2010 10:49:42
    Filesize: 2463048
    Attributes: archive
    MD5: A7F21CD5CDFCBA8E0778ADAA6A7D6566
    CRC32: 380C0B3E
    Version: 6.11.25.1

    {D4027C7F-154A-4066-A1AD-4243D8127440} (Ask Toolbar BHO)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name: Ask Toolbar BHO
    CLSID name: Nero Toolbar
    Path: C:\Program Files\Ask.com\
    Long name: GenericAskToolbar.dll
    Short name: GENERI~1.DLL
    Date (created): 11/10/2010 17:12:10
    Date (last access): 13/05/2011 14:47:28
    Date (last write): 11/10/2010 17:12:10
    Filesize: 1244040
    Attributes: archive
    MD5: 154433405E2C109C5A4A83ACA0517038
    CRC32: 7E893340
    Version: 5.6.13.184

    {DBC80044-A445-435b-BC74-9C25C1C588A9} (Java(tm) Plug-In 2 SSV Helper)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name:
    CLSID name: Java(tm) Plug-In 2 SSV Helper
    Path: C:\Program Files\Java\jre6\bin\
    Long name: jp2ssv.dll
    Short name:
    Date (created): 05/01/2011 14:47:40
    Date (last access): 13/05/2011 17:22:00
    Date (last write): 05/01/2011 14:47:40
    Filesize: 41760
    Attributes: archive
    MD5: 67E74163C6178AA696E2B4A726770A02
    CRC32: 87035BA5
    Version: 6.0.230.5

    {E7E6F031-17CE-4C07-BC86-EABFE594F69C} (JQSIEStartDetectorImpl)
    location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    BHO name: JQSIEStartDetectorImpl
    CLSID name: JQSIEStartDetectorImpl Class
    Path: C:\Program Files\Java\jre6\lib\deploy\jqs\ie\
    Long name: jqs_plugin.dll
    Short name: JQS_PL~1.DLL
    Date (created): 05/01/2011 14:47:40
    Date (last access): 13/05/2011 17:19:32
    Date (last write): 05/01/2011 14:47:40
    Filesize: 79648
    Attributes: archive
    MD5: 054DCC54B7DE3A9511F50B9FCBF4CDD1
    CRC32: A287BEA2
    Version: 6.0.230.5



    --- ActiveX list ---
    {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool)
    DPF name:
    CLSID name: Windows Genuine Advantage Validation Tool
    Installer: C:\WINDOWS\Downloaded Program Files\LegitCheckControl.inf
    Codebase: http://go.microsoft.com/fwlink/?linkid=39204
    description:
    classification: Legitimate
    known filename: LegitCheckControl.DLL
    info link:
    info source: Safer Networking Ltd.
    Path: C:\WINDOWS\system32\
    Long name: LegitCheckControl.DLL
    Short name: LEGITC~1.DLL
    Date (created): 20/03/2008 18:06:36
    Date (last access): 13/05/2011 17:16:44
    Date (last write): 25/06/2009 13:20:28
    Filesize: 1485176
    Attributes: archive
    MD5: 3307A07B81206F354F0D4BEFEE922437
    CRC32: 58E4DC38
    Version: 1.9.42.0

    {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0)
    DPF name: Java Runtime Environment 1.6.0
    CLSID name: Java Plug-in 1.6.0_23
    Installer:
    Codebase: http://java.sun.com/update/1.6.0/jin...ndows-i586.cab
    description: Sun Java
    classification: Legitimate
    known filename: %PROGRAM FILES%\JabaSoft\JRE\*\Bin\npjava131.dll
    info link:
    info source: Patrick M. Kolla
    Path: C:\Program Files\Java\jre6\bin\
    Long name: npjpi160_23.dll
    Short name: NPJPI1~1.DLL
    Date (created): 12/11/2010 17:34:14
    Date (last access): 11/05/2011 17:46:02
    Date (last write): 12/11/2010 19:53:14
    Filesize: 141088
    Attributes: archive
    MD5: 44E02BCB6E86B337F85E84BF30D1F21F
    CRC32: A050C619
    Version: 6.0.230.5

    {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
    DPF name: Java Runtime Environment 1.6.0
    CLSID name: Java Plug-in 1.6.0_22
    Installer:
    Codebase: http://java.sun.com/update/1.6.0/jin...ndows-i586.cab
    Path: C:\Program Files\Java\jre1.6.0_22\bin\
    Long name: npjpi160_22.dll
    Short name: NPJPI1~1.DLL
    Date (created): 03/04/2011 15:40:06
    Date (last access): 11/05/2011 17:46:02
    Date (last write): 03/04/2011 15:40:06
    Filesize: 141088
    Attributes: archive
    MD5: AFB7EFCDE5277F6514EF0E9FF8D8D862
    CRC32: 2A43B8CC
    Version: 6.0.220.4

    {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
    DPF name: Java Runtime Environment 1.6.0
    CLSID name: Java Plug-in 1.6.0_23
    Installer:
    Codebase: http://java.sun.com/update/1.6.0/jin...ndows-i586.cab
    Path: C:\Program Files\Java\jre6\bin\
    Long name: npjpi160_23.dll
    Short name: NPJPI1~1.DLL
    Date (created): 12/11/2010 17:34:14
    Date (last access): 13/05/2011 17:32:10
    Date (last write): 12/11/2010 19:53:14
    Filesize: 141088
    Attributes: archive
    MD5: 44E02BCB6E86B337F85E84BF30D1F21F
    CRC32: A050C619
    Version: 6.0.230.5

    {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
    DPF name: Java Runtime Environment 1.6.0
    CLSID name: Java Plug-in 1.6.0_23
    Installer:
    Codebase: http://java.sun.com/update/1.6.0/jin...ndows-i586.cab
    description:
    classification: Legitimate
    known filename: npjpi150_06.dll
    info link:
    info source: Safer Networking Ltd.
    Path: C:\Program Files\Java\jre6\bin\
    Long name: npjpi160_23.dll
    Short name: NPJPI1~1.DLL
    Date (created): 12/11/2010 17:34:14
    Date (last access): 13/05/2011 17:32:10
    Date (last write): 12/11/2010 19:53:14
    Filesize: 141088
    Attributes: archive
    MD5: 44E02BCB6E86B337F85E84BF30D1F21F
    CRC32: A050C619
    Version: 6.0.230.5

    {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object)
    DPF name:
    CLSID name: Shockwave Flash Object
    Installer: C:\WINDOWS\Downloaded Program Files\swflash.inf
    Codebase: http://download.macromedia.com/pub/s...sh/swflash.cab
    description: Macromedia Shockwave Flash Player
    classification: Legitimate
    known filename:
    info link:
    info source: Patrick M. Kolla
    Path: C:\WINDOWS\system32\Macromed\Flash\
    Long name: Flash10h.ocx
    Short name:
    Date (created): 06/07/2010 15:54:42
    Date (last access): 13/05/2011 16:37:34
    Date (last write): 06/07/2010 15:54:42
    Filesize: 5712336
    Attributes: readonly archive
    MD5: F366D1694E4D244A73F4E52817C38D5B
    CRC32: 1F489DFC
    Version: 10.1.53.64



    --- Process list ---
    PID: 0 ( 0) [System]
    PID: 896 ( 4) \SystemRoot\System32\smss.exe
    size: 50688
    PID: 960 ( 952) \??\C:\PROGRA~1\AVG\AVG10\avgchsvx.exe
    size: 650592
    PID: 1160 ( 896) \??\C:\WINDOWS\system32\csrss.exe
    size: 6144
    PID: 1184 ( 896) \??\C:\WINDOWS\system32\winlogon.exe
    size: 507904
    PID: 1232 (1184) C:\WINDOWS\system32\services.exe
    size: 110592
    MD5: 65DF52F5B8B6E9BBD183505225C37315
    PID: 1252 (1184) C:\WINDOWS\system32\lsass.exe
    size: 13312
    MD5: BF2466B3E18E970D8A976FB95FC1CA85
    PID: 1400 (1232) C:\WINDOWS\system32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 1464 (1232) C:\WINDOWS\system32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 1760 (1740) C:\WINDOWS\Explorer.EXE
    size: 1033728
    MD5: 12896823FB95BFB3DC9B46BCAEDC9923
    PID: 1920 (1232) C:\WINDOWS\system32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 128 (1232) C:\WINDOWS\system32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 172 (1232) C:\WINDOWS\system32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 216 (1232) C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    size: 2435592
    MD5: AEEC11FC2B0DBF973F54E30ECF42E73E
    PID: 352 (1232) C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe
    size: 488952
    MD5: 82D57415B28E1F374DF9EBA6D16A1B46
    PID: 420 (1232) C:\WINDOWS\system32\spoolsv.exe
    size: 58880
    MD5: 60784F891563FB1B767F70117FC2428F
    PID: 280 (1232) C:\WINDOWS\system32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 1964 (1232) C:\Program Files\AVG\AVG10\avgwdsvc.exe
    size: 265400
    MD5: 4AF61A15B3614FEF25FE93EA2FABD620
    PID: 1996 (1232) C:\Program Files\IVT Corporation\BlueSoleil\BTNtService.exe
    size: 166520
    MD5: 2072720F0848312C40E01C2AEC8ED439
    PID: 564 (1232) C:\Program Files\Java\jre6\bin\jqs.exe
    size: 153376
    MD5: E731921DB2E17DCD3DB472FAD5549C57
    PID: 680 (1232) C:\Program Files\Nero\Update\NASvc.exe
    size: 503080
    MD5: 9D1CCE440552500DED3A62F9D779CDB4
    PID: 1256 (1232) C:\WINDOWS\System32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 1552 (1964) C:\Program Files\AVG\AVG10\avgnsx.exe
    size: 1084256
    MD5: 7E6741A17CFDCD700DA5B6EC624F83B3
    PID: 1516 (1964) C:\Program Files\AVG\AVG10\avgemcx.exe
    size: 1052512
    MD5: D640784CA5BEF5A18322C45F8DEB2A5C
    PID: 2316 (1232) C:\WINDOWS\System32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 2376 (1232) C:\Program Files\IVT Corporation\BlueSoleil\StartSkysolSvc.exe
    size: 51816
    MD5: 329EBFCE6BA46C29EA1B8624E7823CAD
    PID: 2524 (1232) C:\WINDOWS\system32\svchost.exe
    size: 14336
    MD5: 27C6D03BCDB8CFEB96B716F3D8BE3E18
    PID: 2560 (1232) C:\WINDOWS\system32\wdfmgr.exe
    size: 38912
    MD5: C81B8635DEE0D3EF5F64B3DD643023A5
    PID: 2616 (1232) C:\Program Files\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe
    size: 6128720
    MD5: 288778D9E2D1C7E8A5DBD5C6DB8046B0
    PID: 3008 (1232) C:\WINDOWS\System32\alg.exe
    size: 44544
    MD5: 8C515081584A38AA007909CD02020B3D
    PID: 2740 (1760) C:\Program Files\Common Files\Java\Java Update\jusched.exe
    size: 248552
    MD5: 93DB1FF92B03D24738A71E6E4992DFD3
    PID: 3748 (1760) C:\Program Files\AVG\AVG10\avgtray.exe
    size: 2747744
    MD5: 4719ED2A9E1F0FF37BC3FC1999F4FFC4
    PID: 3028 (1760) C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    size: 1043968
    MD5: FBE8EBAC021C641AB3AD011328F8ABAA
    PID: 3728 (1760) C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
    size: 29984
    MD5: 27249F2A900032F3C2DFAB8DE8F16399
    PID: 4072 (1760) C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe
    size: 1085440
    MD5: 8070D04DE18022E7E65701461C978AE3
    PID: 1208 (3748) C:\Program Files\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe
    size: 737872
    MD5: 0CCE84F6F693478A769BFC1E993CBF67
    PID: 508 (1760) C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    size: 2260480
    MD5: 390679F7A217A5E73D756276C40AE887
    PID: 644 (1760) C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    size: 152872
    MD5: 86F0D0B3A07C142C81DAB47E8495A822
    PID: 1724 (4072) C:\Program Files\Brother\Brmfcmon\BrMfimon.exe
    size: 118784
    MD5: 601197F17B5CFFC4E4C8ECEA433E11F0
    PID: 3152 (1116) C:\Program Files\Brother\ControlCenter3\brccMCtl.exe
    size: 835584
    MD5: 7C5DF34EE483BBE5B45280B0DDF82AC6
    PID: 3344 (1232) C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
    size: 279848
    MD5: A328A46D87BB92CE4D8A4528E9D84787
    PID: 2756 (1400) C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
    size: 1213736
    MD5: FFBD5650348D4F9E0AA8E72938DC6478
    PID: 2968 (3028) C:\Program Files\CheckPoint\ZAForceField\ForceField.exe
    size: 738808
    MD5: 55BB967FBB994D52A7C9DADA8939FB6F
    PID: 3576 (1016) \??\C:\PROGRA~1\AVG\AVG10\avgrsx.exe
    size: 654176
    PID: 1796 (3576) \??\C:\Program Files\AVG\AVG10\avgcsrvx.exe
    size: 845664
    PID: 3300 (1760) C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
    size: 5365592
    MD5: 0477C2F9171599CA5BC3307FDFBA8D89
    PID: 804 (1760) C:\Program Files\Mozilla Firefox\firefox.exe
    size: 924632
    MD5: E83508D9A0F0D0D8449317DC6A4C5E02
    PID: 4 ( 0) System


    --- Browser start & search pages list ---
    Spybot - Search & Destroy browser pages report, 13/05/2011 17:32:11

    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page
    C:\WINDOWS\system32\blank.htm
    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
    http://www.microsoft.com/isapi/redir...ie&ar=iesearch
    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
    https://www.facebook.com
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
    %SystemRoot%\system32\blank.htm
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page
    http://www.microsoft.com/isapi/redir...ie&ar=iesearch
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
    http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
    http://www.microsoft.com/isapi/redir...r=6&ar=msnhome
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
    http://www.microsoft.com/isapi/redir...ie&ar=iesearch
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant
    http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\CustomizeSearch
    http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm


    --- Winsock Layered Service Provider list ---
    Protocol 0: MSAFD Tcpip [TCP/IP]
    GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP IP protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD Tcpip[*]

    Protocol 1: MSAFD Tcpip [UDP/IP]
    GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP IP protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD Tcpip[*]

    Protocol 2: MSAFD Tcpip [RAW/IP]
    GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP IP protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD Tcpip[*]

    Protocol 3: RSVP UDP Service Provider
    GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
    Filename: %SystemRoot%\system32\rsvpsp.dll
    Description: Microsoft Windows NT/2k/XP RVSP
    DB filename: %SystemRoot%\system32\rsvpsp.dll
    DB protocol: RSVP * Service Provider

    Protocol 4: RSVP TCP Service Provider
    GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
    Filename: %SystemRoot%\system32\rsvpsp.dll
    Description: Microsoft Windows NT/2k/XP RVSP
    DB filename: %SystemRoot%\system32\rsvpsp.dll
    DB protocol: RSVP * Service Provider

    Protocol 5: MSAFD NetBIOS [\Device\NetBT_Tcpip_{45C3CF44-7C35-441B-8191-7CE3CC8CAE2F}] SEQPACKET 4
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 6: MSAFD NetBIOS [\Device\NetBT_Tcpip_{45C3CF44-7C35-441B-8191-7CE3CC8CAE2F}] DATAGRAM 4
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 7: MSAFD NetBIOS [\Device\NetBT_Tcpip_{1A66B721-C5C3-43A6-A038-678CFB8A0505}] SEQPACKET 3
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 8: MSAFD NetBIOS [\Device\NetBT_Tcpip_{1A66B721-C5C3-43A6-A038-678CFB8A0505}] DATAGRAM 3
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 9: MSAFD NetBIOS [\Device\NetBT_Tcpip_{C0758729-D7D4-4455-A5FE-104A9C3EC618}] SEQPACKET 0
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 10: MSAFD NetBIOS [\Device\NetBT_Tcpip_{C0758729-D7D4-4455-A5FE-104A9C3EC618}] DATAGRAM 0
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 11: MSAFD NetBIOS [\Device\NetBT_Tcpip_{749C9290-3433-4E71-A854-8C66663572F0}] SEQPACKET 1
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 12: MSAFD NetBIOS [\Device\NetBT_Tcpip_{749C9290-3433-4E71-A854-8C66663572F0}] DATAGRAM 1
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 13: MSAFD NetBIOS [\Device\NetBT_Tcpip_{7F7BCF1A-F63E-4C17-A380-F0FD39C403D4}] SEQPACKET 2
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Protocol 14: MSAFD NetBIOS [\Device\NetBT_Tcpip_{7F7BCF1A-F63E-4C17-A380-F0FD39C403D4}] DATAGRAM 2
    GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
    Filename: %SystemRoot%\system32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP NetBios protocol
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: MSAFD NetBIOS *

    Namespace Provider 0: Tcpip
    GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B}
    Filename: %SystemRoot%\System32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP TCP/IP name space provider
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: TCP/IP

    Namespace Provider 1: NTDS
    GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC}
    Filename: %SystemRoot%\System32\winrnr.dll
    Description: Microsoft Windows NT/2k/XP name space provider
    DB filename: %SystemRoot%\system32\winrnr.dll
    DB protocol: NTDS

    Namespace Provider 2: Network Location Awareness (NLA) Namespace
    GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83}
    Filename: %SystemRoot%\System32\mswsock.dll
    Description: Microsoft Windows NT/2k/XP name space provider
    DB filename: %SystemRoot%\system32\mswsock.dll
    DB protocol: NLA-Namespace

  2. #2
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default




    Please read Before You Post
    While best efforts are made to assist in removing infections safely, unexpected stuff can happen. It is advisable that you back up your important data before starting any clean up procedure. Neither Safer Networking Forums nor the Analyst providing the advice may be held responsible for any loss.

    Until we deem your system clean I am going to ask you not to install or uninstall any software or hardware except for the programs we may run.

    Besides Click. Giftload, your infected with a nasty Rootkit


    This will remove Click.Giftload

    REGEDIT4

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\FEATURE_BROWSER_EMULATION]
    "svchost.exe"=-

    Copy the entire contents inside the Quote box and Paste it into Notepad ( this will only work with Notepad ) name the file Regfix.reg and in the drop down box, save it as All Files. Save it to your desktop. Then Rightclick on the Regfix.reg file and click on Merge, when it asks you to merge with the Registry, say yes.

    If you saved the file correctly it should look like this




    Download aswMBR.exe ( 511KB ) to your desktop.

    Double click the aswMBR.exe to run it

    Click the "Scan" button to start scan


    On completion of the scan click save log, save it to your desktop and post in your next reply
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  3. #3
    Junior Member
    Join Date
    Oct 2006
    Posts
    21

    Default Click.Giftload

    Thanks so much ken545, that's great. I've done the registry item, but http://public.avast.com/~gmerek/aswMBR.exe keeps giving 'problem loading page' so will continue to try downloading it.

  4. #4
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default

    See if this will run

    Please download TDSSKiller.zip
    • Extract it to your desktop
    • Double click TDSSKiller.exe
    • Press Start Scan
      • Only if Malicious objects are found then ensure Cure is selected
      • Then click Continue > Reboot now
    • Copy and paste the log in your next reply
      • A copy of the log will be saved automatically to the root of the drive (typically C:\)
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  5. #5
    Junior Member
    Join Date
    Oct 2006
    Posts
    21

    Default click.giftload etc

    Thanks Ken545, all done as instructed, I've been able to download and run both those programs, logs below

    Just to mention I have Spybot (up to date) with Resident/Teatimer on; AVG (updated) with Resident on - it has been picking up several viruses and quarantining some of them; ZoneAlarm on. If any of these should be off please tell me.

    I ran TDSSKiller.exe twice by accident as at first I couldn't find the report (have now found it), with two reboots after cure. Both times it found malicious item and cured it, but evidently hadn't cured it as it showed on the second run again - don't know if it has yet as haven't run it again.

    Thanks very much for your continuing help, much appreciated, Jak P

    Logs:

    (a) aswMBR version 0.9.5.256 Copyright(c) 2011 AVAST Software
    Run date: 2011-05-20 14:08:52
    -----------------------------
    14:08:52.796 OS Version: Windows 5.1.2600 Service Pack 3
    14:08:52.796 Number of processors: 1 586 0xD08
    14:08:52.796 ComputerName: JOHN-48E4D4636A UserName: John
    14:09:00.968 Initialize success
    14:09:14.500 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
    14:09:14.515 Disk 0 Vendor: HTS541060G9AT00 MB3OA60A Size: 57231MB BusType: 3
    14:09:14.531 Device \Driver\atapi -> DriverStartIo 84af053b
    14:09:16.546 Disk 0 MBR read successfully
    14:09:16.546 Disk 0 MBR scan
    14:09:16.546 Disk 0 TDL4@MBR code has been found
    14:09:16.546 Disk 0 Windows XP default MBR code found via API
    14:09:16.546 Disk 0 MBR hidden
    14:09:16.546 Disk 0 MBR [TDL4] **ROOTKIT**
    14:09:16.546 Disk 0 trace - called modules:
    14:09:16.546 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x84af06f0]<<
    14:09:16.546 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x84b6eab8]
    14:09:16.546 3 CLASSPNP.SYS[f7734fd7] -> nt!IofCallDriver -> \Device\00000073[0x84b709e8]
    14:09:16.546 5 ACPI.sys[f76ab620] -> nt!IofCallDriver -> [0x84bc9940]
    14:09:16.593 \Driver\atapi[0x84b7ff38] -> IRP_MJ_CREATE -> 0x84af06f0
    14:09:16.609 Scan finished successfully
    14:11:17.046 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\John\Desktop\MBR.dat"
    14:11:17.078 The log file has been saved successfully to "C:\Documents and Settings\John\Desktop\aswMBR.txt"

    (b) 2011/05/20 14:48:51.0343 2068 TDSS rootkit removing tool 2.5.1.0 May 13 2011 13:20:29
    2011/05/20 14:48:51.0625 2068 ================================================================================
    2011/05/20 14:48:51.0625 2068 SystemInfo:
    2011/05/20 14:48:51.0625 2068
    2011/05/20 14:48:51.0625 2068 OS Version: 5.1.2600 ServicePack: 3.0
    2011/05/20 14:48:51.0625 2068 Product type: Workstation
    2011/05/20 14:48:51.0625 2068 ComputerName: JOHN-48E4D4636A
    2011/05/20 14:48:51.0625 2068 UserName: John
    2011/05/20 14:48:51.0625 2068 Windows directory: C:\WINDOWS
    2011/05/20 14:48:51.0625 2068 System windows directory: C:\WINDOWS
    2011/05/20 14:48:51.0625 2068 Processor architecture: Intel x86
    2011/05/20 14:48:51.0625 2068 Number of processors: 1
    2011/05/20 14:48:51.0625 2068 Page size: 0x1000
    2011/05/20 14:48:51.0625 2068 Boot type: Normal boot
    2011/05/20 14:48:51.0625 2068 ================================================================================
    2011/05/20 14:48:52.0031 2068 Initialize success
    2011/05/20 14:49:13.0218 0140 ================================================================================
    2011/05/20 14:49:13.0218 0140 Scan started
    2011/05/20 14:49:13.0218 0140 Mode: Manual;
    2011/05/20 14:49:13.0218 0140 ================================================================================
    2011/05/20 14:49:13.0843 0140 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
    2011/05/20 14:49:13.0906 0140 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
    2011/05/20 14:49:14.0078 0140 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
    2011/05/20 14:49:14.0203 0140 AFD (7618d5218f2a614672ec61a80d854a37) C:\WINDOWS\System32\drivers\afd.sys
    2011/05/20 14:49:14.0578 0140 ALCXWDM (95aa37bec6c72c277c2caeaee736dd2d) C:\WINDOWS\system32\drivers\ALCXWDM.SYS
    2011/05/20 14:49:14.0984 0140 AR5416 (864160f5f4fbdd97b6a686854bfebd86) C:\WINDOWS\system32\DRIVERS\athw.sys
    2011/05/20 14:49:15.0265 0140 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
    2011/05/20 14:49:15.0343 0140 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
    2011/05/20 14:49:15.0437 0140 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
    2011/05/20 14:49:15.0562 0140 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
    2011/05/20 14:49:15.0828 0140 AVGIDSDriver (0c61f066f4d94bd67063dc6691935143) C:\WINDOWS\system32\DRIVERS\AVGIDSDriver.Sys
    2011/05/20 14:49:15.0890 0140 AVGIDSEH (84853f800cd69252c3c764fe50d0346f) C:\WINDOWS\system32\DRIVERS\AVGIDSEH.Sys
    2011/05/20 14:49:15.0968 0140 AVGIDSFilter (28d6adcd03e10f3838488b9b5d407dd4) C:\WINDOWS\system32\DRIVERS\AVGIDSFilter.Sys
    2011/05/20 14:49:16.0062 0140 AVGIDSShim (0eb16f4dbbb946360af30d2b13a52d1d) C:\WINDOWS\system32\DRIVERS\AVGIDSShim.Sys
    2011/05/20 14:49:16.0171 0140 Avgldx86 (5fe5a2c2330c376a1d8dcff8d2680a2d) C:\WINDOWS\system32\DRIVERS\avgldx86.sys
    2011/05/20 14:49:16.0281 0140 Avgmfx86 (54f1a9b4c9b540c2d8ac4baa171696b1) C:\WINDOWS\system32\DRIVERS\avgmfx86.sys
    2011/05/20 14:49:16.0359 0140 Avgrkx86 (8da3b77993c5f354cc2977b7ea06d03a) C:\WINDOWS\system32\DRIVERS\avgrkx86.sys
    2011/05/20 14:49:16.0453 0140 Avgtdix (660788ec46f10ece80274d564fa8b4aa) C:\WINDOWS\system32\DRIVERS\avgtdix.sys
    2011/05/20 14:49:16.0593 0140 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
    2011/05/20 14:49:17.0078 0140 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
    2011/05/20 14:49:17.0171 0140 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
    2011/05/20 14:49:17.0281 0140 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
    2011/05/20 14:49:17.0375 0140 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
    2011/05/20 14:49:17.0578 0140 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
    2011/05/20 14:49:17.0703 0140 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
    2011/05/20 14:49:18.0015 0140 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
    2011/05/20 14:49:18.0140 0140 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
    2011/05/20 14:49:18.0265 0140 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
    2011/05/20 14:49:18.0343 0140 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
    2011/05/20 14:49:18.0453 0140 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
    2011/05/20 14:49:18.0625 0140 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
    2011/05/20 14:49:18.0984 0140 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
    2011/05/20 14:49:19.0109 0140 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
    2011/05/20 14:49:19.0187 0140 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
    2011/05/20 14:49:19.0250 0140 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
    2011/05/20 14:49:19.0312 0140 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
    2011/05/20 14:49:19.0375 0140 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
    2011/05/20 14:49:19.0453 0140 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
    2011/05/20 14:49:19.0562 0140 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
    2011/05/20 14:49:19.0656 0140 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
    2011/05/20 14:49:19.0843 0140 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
    2011/05/20 14:49:20.0062 0140 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
    2011/05/20 14:49:20.0171 0140 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
    2011/05/20 14:49:20.0406 0140 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
    2011/05/20 14:49:20.0484 0140 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
    2011/05/20 14:49:20.0562 0140 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
    2011/05/20 14:49:20.0609 0140 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
    2011/05/20 14:49:20.0703 0140 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
    2011/05/20 14:49:20.0750 0140 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
    2011/05/20 14:49:20.0828 0140 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
    2011/05/20 14:49:20.0890 0140 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
    2011/05/20 14:49:21.0015 0140 ISWKL (5c7c9ea45700f5187f71eb7b0dab18c5) C:\Program Files\CheckPoint\ZAForceField\ISWKL.sys
    2011/05/20 14:49:21.0140 0140 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
    2011/05/20 14:49:21.0187 0140 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
    2011/05/20 14:49:21.0281 0140 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
    2011/05/20 14:49:21.0390 0140 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
    2011/05/20 14:49:21.0703 0140 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
    2011/05/20 14:49:21.0812 0140 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
    2011/05/20 14:49:21.0906 0140 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
    2011/05/20 14:49:22.0031 0140 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
    2011/05/20 14:49:22.0093 0140 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
    2011/05/20 14:49:22.0218 0140 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
    2011/05/20 14:49:22.0296 0140 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
    2011/05/20 14:49:22.0375 0140 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
    2011/05/20 14:49:22.0484 0140 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
    2011/05/20 14:49:22.0546 0140 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
    2011/05/20 14:49:22.0640 0140 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
    2011/05/20 14:49:22.0734 0140 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
    2011/05/20 14:49:22.0796 0140 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
    2011/05/20 14:49:22.0906 0140 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
    2011/05/20 14:49:22.0968 0140 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
    2011/05/20 14:49:23.0015 0140 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
    2011/05/20 14:49:23.0093 0140 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
    2011/05/20 14:49:23.0281 0140 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
    2011/05/20 14:49:23.0406 0140 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
    2011/05/20 14:49:23.0515 0140 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
    2011/05/20 14:49:23.0593 0140 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
    2011/05/20 14:49:23.0671 0140 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
    2011/05/20 14:49:23.0765 0140 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
    2011/05/20 14:49:23.0859 0140 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
    2011/05/20 14:49:23.0921 0140 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
    2011/05/20 14:49:24.0000 0140 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
    2011/05/20 14:49:24.0062 0140 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
    2011/05/20 14:49:24.0171 0140 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
    2011/05/20 14:49:24.0234 0140 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
    2011/05/20 14:49:24.0750 0140 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
    2011/05/20 14:49:24.0828 0140 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
    2011/05/20 14:49:24.0890 0140 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
    2011/05/20 14:49:25.0250 0140 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
    2011/05/20 14:49:25.0359 0140 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
    2011/05/20 14:49:25.0500 0140 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
    2011/05/20 14:49:25.0546 0140 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
    2011/05/20 14:49:25.0609 0140 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
    2011/05/20 14:49:25.0718 0140 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
    2011/05/20 14:49:25.0812 0140 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
    2011/05/20 14:49:25.0906 0140 RimUsb (f17713d108aca124a139fde877eef68a) C:\WINDOWS\system32\Drivers\RimUsb.sys
    2011/05/20 14:49:25.0984 0140 ROOTMODEM (d8b0b4ade32574b2d9c5cc34dc0dbbe7) C:\WINDOWS\system32\Drivers\RootMdm.sys
    2011/05/20 14:49:26.0125 0140 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
    2011/05/20 14:49:26.0250 0140 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
    2011/05/20 14:49:26.0328 0140 Serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
    2011/05/20 14:49:26.0390 0140 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
    2011/05/20 14:49:26.0453 0140 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
    2011/05/20 14:49:26.0687 0140 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
    2011/05/20 14:49:26.0796 0140 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
    2011/05/20 14:49:26.0937 0140 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
    2011/05/20 14:49:27.0062 0140 StillCam (a9573045baa16eab9b1085205b82f1ed) C:\WINDOWS\system32\DRIVERS\serscan.sys
    2011/05/20 14:49:27.0234 0140 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
    2011/05/20 14:49:27.0343 0140 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
    2011/05/20 14:49:27.0828 0140 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
    2011/05/20 14:49:27.0968 0140 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
    2011/05/20 14:49:28.0062 0140 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
    2011/05/20 14:49:28.0140 0140 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
    2011/05/20 14:49:28.0218 0140 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
    2011/05/20 14:49:28.0421 0140 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
    2011/05/20 14:49:28.0625 0140 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
    2011/05/20 14:49:28.0765 0140 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
    2011/05/20 14:49:28.0812 0140 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
    2011/05/20 14:49:28.0890 0140 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
    2011/05/20 14:49:28.0953 0140 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
    2011/05/20 14:49:29.0046 0140 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
    2011/05/20 14:49:29.0171 0140 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
    2011/05/20 14:49:29.0265 0140 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
    2011/05/20 14:49:29.0468 0140 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
    2011/05/20 14:49:29.0609 0140 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
    2011/05/20 14:49:29.0750 0140 vsdatant (050c38ebb22512122e54b47dc278bccd) C:\WINDOWS\system32\vsdatant.sys
    2011/05/20 14:49:29.0937 0140 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
    2011/05/20 14:49:30.0109 0140 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
    2011/05/20 14:49:30.0343 0140 WpdUsb (c1b3d9d75c3fb735f5fa3a5806aded57) C:\WINDOWS\system32\Drivers\wpdusb.sys
    2011/05/20 14:49:30.0468 0140 WSIMD (7a36f3083e28405d6c5ecdb942513c3b) C:\WINDOWS\system32\DRIVERS\wsimd.sys
    2011/05/20 14:49:30.0687 0140 \HardDisk0 - detected Rootkit.Win32.TDSS.tdl4 (0)
    2011/05/20 14:49:30.0703 0140 ================================================================================
    2011/05/20 14:49:30.0703 0140 Scan finished
    2011/05/20 14:49:30.0703 0140 ================================================================================
    2011/05/20 14:49:30.0750 1096 Detected object count: 1
    2011/05/20 14:49:42.0812 1096 \HardDisk0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
    2011/05/20 14:49:42.0812 1096 \HardDisk0 - ok
    2011/05/20 14:49:42.0812 1096 Rootkit.Win32.TDSS.tdl4(\HardDisk0) - User select action: Cure
    2011/05/20 14:49:48.0203 1184 Deinitialize success

  6. #6
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default

    Go ahead and run aswMBR again, just to scan, not to fix and post the new log please

    Please download Malwarebytes from Here or Here

    • Double-click mbam-setup.exe and follow the prompts to install the program.
    • At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select Perform quick scan, then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Be sure that everything is checked, and click Remove Selected .
    • When completed, a log will open in Notepad. Please save it to a convenient location and post the results.
    • Note: If you receive a notice that some of the items couldn't be removed, that they have been added to the delete on reboot list, please reboot.
    Post the report please
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  7. #7
    Junior Member
    Join Date
    Oct 2006
    Posts
    21

    Default click.giftload

    Thank you ken545, done both those things aswMBR scan and Malwarebytes quick scan and remove infected. Logs below, thanks Jak P:

    (a) aswMBR log

    aswMBR version 0.9.5.256 Copyright(c) 2011 AVAST Software
    Run date: 2011-05-20 17:22:07
    -----------------------------
    17:22:07.500 OS Version: Windows 5.1.2600 Service Pack 3
    17:22:07.500 Number of processors: 1 586 0xD08
    17:22:07.500 ComputerName: JOHN-48E4D4636A UserName: John
    17:22:08.765 Initialize success
    17:22:13.546 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
    17:22:13.562 Disk 0 Vendor: HTS541060G9AT00 MB3OA60A Size: 57231MB BusType: 3
    17:22:13.718 Disk 0 MBR read successfully
    17:22:13.734 Disk 0 MBR scan
    17:22:13.750 Disk 0 Windows XP default MBR code
    17:22:15.765 Disk 0 scanning sectors +117210240
    17:22:15.906 Disk 0 scanning C:\WINDOWS\system32\drivers
    17:22:24.078 Service scanning
    17:22:25.187 Disk 0 trace - called modules:
    17:22:25.218 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS
    17:22:25.234 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x84b6eab8]
    17:22:25.250 3 CLASSPNP.SYS[f7734fd7] -> nt!IofCallDriver -> \Device\00000073[0x84b709e8]
    17:22:25.281 5 ACPI.sys[f76ab620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x84bc9940]
    17:22:25.296 Scan finished successfully
    17:22:34.046 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\John\Desktop\MBR.dat"
    17:22:34.125 The log file has been saved successfully to "C:\Documents and Settings\John\Desktop\aswMBR.txt"
    17:23:27.781 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\John\Desktop\MBR.dat"
    17:23:28.921 The log file has been saved successfully to "C:\Documents and Settings\John\Desktop\aswMBR.txt"

    (b) Malwarebytes log:

    Malwarebytes' Anti-Malware 1.50.1.1100
    www.malwarebytes.org

    Database version: 6628

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 6.0.2900.5512

    20/05/2011 17:36:14
    mbam-log-2011-05-20 (17-36-14).txt

    Scan type: Quick scan
    Objects scanned: 137360
    Time elapsed: 5 minute(s), 57 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 1
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WORT (Trojan.Vilsel) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)

    END

  8. #8
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default

    Looking good, how are things running now, any redirects or unwanted pop up windows ?

    ESET Online Scanner
    I'd like us to scan your machine with ESET OnlineScan

    *Note
    It is recommended to disable onboard antivirus program and antispyware programs while performing scans so there are no conflicts and it will speed up scan time.
    Please don't go surfing while your resident protection is disabled!
    Once the scan is finished remember to re-enable your antivirus along with your antispyware programs.



    1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
      ESET OnlineScan
    2. Click the button.
    3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
      1. Click on to download the ESET Smart Installer. Save it to your desktop.
      2. Double click on the icon on your desktop.
    4. Check
    5. Click the button.
    6. Accept any security warnings from your browser.
    7. Check
    8. Make sure that the option "Remove found threats" is Unchecked
    9. Push the Start button.
    10. ESET will then download updates for itself, install itself, and begin
      scanning your computer. Please be patient as this can take some time.
    11. When the scan completes, push
    12. Push , and save the file to your desktop using a unique name, such as
      ESETScan. Include the contents of this report in your next reply.
    13. Push the button.
    14. Push
    Please make sure you include the following items in your next post:
    The log that was produced after running ESET Online Scanner.
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  9. #9
    Junior Member
    Join Date
    Oct 2006
    Posts
    21

    Default Click.Giftload etc

    Thank you ken 345.

    Replying to questions: no redirects or unwanted pop up windows ?

    I deleted all items from the AVG virus vault and ran AVG scan - clean. Ran Spybot scan clean. I then disabled them both as requested and disabled Zone Alarm. I've installed and run ESET as requested and it has brought up a threat item. Report below:

    ESET Scan log:

    C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\1KXA88CB\index[1].htm JS/Kryptik.AI trojan

    Thanks very much for your continuing help

  10. #10
    Junior Member
    Join Date
    Oct 2006
    Posts
    21

    Default Click.Giftload etc

    ken545:

    Correcting the last post: There's a question mark that shouldn't be there. The reply is there have been no redirects or unwanted pop ups. The rest is correct.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •