PDA

View Full Version : Dissapearing Spybot (not a magic trick)



ttocsic
2008-03-04, 02:41
Posted this in the general issues forum and was told to get checked out here:
(please read carefully and dont just tell me the files are hidden. thanks.)

I recently updated my s&d. Installation went fine. Upon the first run of the updated program, it seems to begin to run and then disappears. If i try to run the program again from the start menu, it tries to search for the exe. I've looked in the s&d sub-folder in the program files folder and none of the exe files exist (even as hidden files). All the rest of the files seem to be present just the exe's are missing. They only disappear after the first attempt to run them after installation. I have the same problem when installing older versions of spybot. (It also happens when installing Ad-Aware). I am running winxpsp2 and no anti-virus software (since symantec support cant figure out why NAV wont install on my computer). Could a virus or malware be canning my S&D? If so what do i do about it? Thanks in advance for any help.

Logfile of HijackThis v1.99.1
Scan saved at 8:23:22 PM, on 3/3/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\toshiba\ivp\ism\pinger.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\Setups\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.toshiba.com/search
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [BMc7174b6d] Rundll32.exe "C:\WINDOWS\system32\hbovyrnf.dll",s
O4 - HKLM\..\Run: [c42478f1] rundll32.exe "C:\WINDOWS\system32\vyvvvgga.dll",b
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)

[I]Edit: "BEFORE you POST"(READ this Procedure BEFORE Requesting Assistance) (http://forums.spybot.info/showthread.php?t=288)

Shaba
2008-03-06, 11:14
Hi ttocsic

First rename HijackThis.exe to ttocsic.exe

After that:

Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)

http://i266.photobucket.com/albums/ii277/sUBs_/combofix/CF_download_FF.gif


http://i266.photobucket.com/albums/ii277/sUBs_/combofix/CF_download_rename.gif
--------------------------------------------------------------------

Double click on Combo-Fix.exe & follow the prompts.
When finished, it will produce a report for you.
Please post the C:\ComboFix.txt along with a HijackThis log so we can continue cleaning the system.

Note:
Do not mouseclick combofix's window while it's running. That may cause it to stall

ttocsic
2008-03-07, 04:25
Spybot Scan
virtuemonde: 6 entries
virtuemonde.generic: 3 entries
I HAVE NOT RUN SPYBOT S&D FIXES YET

HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 11:09:12 AM, on 3/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\toshiba\ivp\ism\pinger.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\rundll32.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\WINDOWS\system32\Rundll32.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Setups\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.toshiba.com/search
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {733E9132-53CA-4C97-9AC9-145C4502FA20} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [c42478f1] rundll32.exe "C:\WINDOWS\system32\jirfbvqn.dll",b
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [BMc7174b6d] Rundll32.exe "C:\WINDOWS\system32\puisvoqs.dll",s
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O20 - Winlogon Notify: awtrrrq - awtrrrq.dll (file missing)
O20 - Winlogon Notify: tuspp - C:\WINDOWS\system32\tuspp.dll (file missing)
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)

ttocsic
2008-03-07, 04:26
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Thursday, March 06, 2008 10:21:18 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 6/03/2008
Kaspersky Anti-Virus database records: 603975
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\

Scan Statistics:
Total number of scanned objects: 170651
Number of viruses found: 4
Number of infected objects: 67
Number of suspicious objects: 0
Duration of the scan process: 03:34:44

Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\Administrator\ntuser.dat Object is locked skipped
C:\Documents and Settings\Administrator\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\All Users\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\All Users\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\cert8.db Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\formhistory.dat Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\foxmarks.log Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\history.dat Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\key3.db Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\parent.lock Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\search.sqlite Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\Owner\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\History\History.IE5\MSHist012008030620080307\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\Perflib_Perfdata_724.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\Perflib_Perfdata_b0c.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\~DF4465.tmp Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\~DFF7AE.tmp Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7BFE57KJ\cmp638[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7BFE57KJ\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\WGGD03WT\ptch[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Owner\ntuser.dat Object is locked skipped
C:\Documents and Settings\Owner\ntuser.dat.LOG Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\aswResp.dat Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\Avast4.db Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\AshWebSv.ws Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\aswMaiSv.log Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\nshield.log Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\report\Resident protection.txt Object is locked skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045111.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045112.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045113.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045114.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045115.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045223.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045224.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045225.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045226.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ixe skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045314.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.bce skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045315.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.bce skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045316.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045317.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045318.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045319.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP424\A0045357.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP424\A0045358.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP425\A0045400.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP425\A0045417.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045497.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045498.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045515.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP435\change.log Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\shgina.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\migrate.js Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\srrstr.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\userenv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\msobmain.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\shell32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\termsrv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\syssetup.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\netsetup.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\ssdpapi.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\ssdpsrv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\upnp.dll Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\slpd.log Object is locked skipped
C:\WINDOWS\SoftwareDistribution\EventCache\{B90FB940-8502-4D38-9C69-3A7DE82A958F}.bin Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\system32\aifmmjdw.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\aoduptva.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\bayymuva.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\bfqlyhye.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\blkmvkxs.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\cacaectv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\cegrqnwg.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\config\Antivirus.Evt Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\dijffact.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\dkthhkca.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\dqxqupey.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ejeuitep.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\eyuddijl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\fbmfwrwm.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\fqkxycuv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ghpfoahl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\hbovyrnf.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\hywvhreg.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ietiqyne.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\jirfbvqn.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\jxdpdcyl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\jyfldjwe.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ixf skipped
C:\WINDOWS\system32\LogFiles\HTTPERR\httperr1.log Object is locked skipped
C:\WINDOWS\system32\lublakwt.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\mwgrhnvw.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\noeteyrc.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\npeicimd.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\nxvjquig.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\plwkfgqq.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ppnqurxp.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\puisvoqs.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\pwdqhebs.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\rghsdwpe.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\slerhakr.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\sqqblqqi.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\suthipvv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\uontvmbh.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\system32\whwlugos.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\xcqvihav.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\xgmlmvmb.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\xuxlaiui.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ybdgdbei.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\yqklulfv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\yunsvsbt.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\temp\Perflib_Perfdata_63c.dat Object is locked skipped
C:\WINDOWS\temp\_avast4_\Webshlock.txt Object is locked skipped
C:\WINDOWS\TempFile Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped

Scan process completed.

tashi
2008-03-07, 19:40
Merged two topics.

Shaba
2008-03-07, 19:42
Hi ttocsic

I see that you haven't followed my instructions - so I expect that you follow them now :)

ttocsic
2008-03-08, 05:17
Sorry, didn't realize my threads were merged.

HJT and S&D as above.

Here is combofix log:
Thanks.

ComboFix 08-03-07.4 - Owner 2008-03-07 19:47:56.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.114 [GMT -5:00]
Running from: C:\Documents and Settings\Owner\Desktop\Combo-Fix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Program Files\download plugin
C:\Program Files\download plugin\DlPlugin-Moz\buddy.dat
C:\Program Files\download plugin\DlPlugin-Moz\vendor.txt
C:\WINDOWS\BMc7174b6d.xml
C:\WINDOWS\cookies.ini
C:\WINDOWS\pskt.ini
C:\WINDOWS\system32\ackhhtkd.ini
C:\WINDOWS\system32\aifmmjdw.dll
C:\WINDOWS\system32\aiswcpfv.ini
C:\WINDOWS\system32\aoduptva.dll
C:\WINDOWS\system32\auayauhx.ini
C:\WINDOWS\system32\avtpudoa.ini
C:\WINDOWS\system32\axwocmum.ini
C:\WINDOWS\system32\bayymuva.dll
C:\WINDOWS\system32\bdpybwri.ini
C:\WINDOWS\system32\bfqlyhye.dll
C:\WINDOWS\system32\bkrbasep.ini
C:\WINDOWS\system32\blkmvkxs.dll
C:\WINDOWS\system32\cacaectv.dll
C:\WINDOWS\system32\cegrqnwg.dll
C:\WINDOWS\system32\chjjsnxa.ini
C:\WINDOWS\system32\crjvuetu.ini
C:\WINDOWS\system32\cyekeuel.ini
C:\WINDOWS\system32\dijffact.dll
C:\WINDOWS\system32\dkthhkca.dll
C:\WINDOWS\system32\dqxqupey.dll
C:\WINDOWS\system32\eixiedpo.ini
C:\WINDOWS\system32\ejeuitep.dll
C:\WINDOWS\system32\epsqcvxy.ini
C:\WINDOWS\system32\eyuddijl.dll
C:\WINDOWS\system32\fbloymhp.ini
C:\WINDOWS\system32\fbmfwrwm.dll
C:\WINDOWS\system32\fpxuvrtc.ini
C:\WINDOWS\system32\fqkxycuv.dll
C:\WINDOWS\system32\fxwsumjs.ini
C:\WINDOWS\system32\ghpfoahl.dll
C:\WINDOWS\system32\gooyqpfu.ini
C:\WINDOWS\system32\hbovyrnf.dll
C:\WINDOWS\system32\hghbdhfa.ini
C:\WINDOWS\system32\hpwdmqit.ini
C:\WINDOWS\system32\hqkivcle.ini
C:\WINDOWS\system32\hujowimf.ini
C:\WINDOWS\system32\huyfwhjx.ini
C:\WINDOWS\system32\hywvhreg.dll
C:\WINDOWS\system32\ibjckteh.ini
C:\WINDOWS\system32\ietiqyne.dll
C:\WINDOWS\system32\iewlfoma.ini
C:\WINDOWS\system32\irqhswiy.ini
C:\WINDOWS\system32\iwkhgsdc.ini
C:\WINDOWS\system32\jayqicvu.ini
C:\WINDOWS\system32\jcrdmwtv.ini
C:\WINDOWS\system32\jirfbvqn.dll
C:\WINDOWS\system32\jiwjcsao.ini
C:\WINDOWS\system32\jnxxlsll.ini
C:\WINDOWS\system32\jrinndtl.ini
C:\WINDOWS\system32\jxdpdcyl.dll
C:\WINDOWS\system32\jyfldjwe.dll
C:\WINDOWS\system32\kaojnkka.ini
C:\WINDOWS\system32\kjcyljmf.ini
C:\WINDOWS\system32\kpgexeed.ini
C:\WINDOWS\system32\kurgccuy.ini
C:\WINDOWS\system32\lmarcxhh.ini
C:\WINDOWS\system32\lublakwt.dll
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\mlokxtdq.ini
C:\WINDOWS\system32\msyavkle.ini
C:\WINDOWS\system32\mwgrhnvw.dll
C:\WINDOWS\system32\nmvksuxf.ini
C:\WINDOWS\system32\noeteyrc.dll
C:\WINDOWS\system32\npeicimd.dll
C:\WINDOWS\system32\nqvbfrij.ini
C:\WINDOWS\system32\ntiqjbks.ini
C:\WINDOWS\system32\nxvjquig.dll
C:\WINDOWS\system32\oqmfdubn.ini
C:\WINDOWS\system32\ovlvcmqb.ini
C:\WINDOWS\system32\pherlvil.ini
C:\WINDOWS\system32\plwkfgqq.dll
C:\WINDOWS\system32\ppnqurxp.dll
C:\WINDOWS\system32\ppsut.bak1
C:\WINDOWS\system32\ppsut.bak2
C:\WINDOWS\system32\ppsut.ini
C:\WINDOWS\system32\ppsut.ini2
C:\WINDOWS\system32\ppsut.tmp
C:\WINDOWS\system32\puisvoqs.dll
C:\WINDOWS\system32\pwdqhebs.dll
C:\WINDOWS\system32\qajelmqh.ini
C:\WINDOWS\system32\qknoedrg.ini
C:\WINDOWS\system32\qlkxeoye.ini
C:\WINDOWS\system32\qmnddudh.ini
C:\WINDOWS\system32\rceudlen.ini
C:\WINDOWS\system32\rfisubfs.ini
C:\WINDOWS\system32\rfwvgnth.ini
C:\WINDOWS\system32\rghsdwpe.dll
C:\WINDOWS\system32\rumnevui.ini
C:\WINDOWS\system32\rxacacil.ini
C:\WINDOWS\system32\saeqdtft.ini
C:\WINDOWS\system32\sbeiwojl.ini
C:\WINDOWS\system32\scunamey.ini
C:\WINDOWS\system32\seqhexhp.ini
C:\WINDOWS\system32\sjhvhsoq.ini
C:\WINDOWS\system32\slerhakr.dll
C:\WINDOWS\system32\sqqblqqi.dll
C:\WINDOWS\system32\srpybmwf.ini
C:\WINDOWS\system32\suthipvv.dll
C:\WINDOWS\system32\tar.exe
C:\WINDOWS\system32\tgcmlkvq.ini
C:\WINDOWS\system32\thfubgfd.ini
C:\WINDOWS\system32\tjwulxor.ini
C:\WINDOWS\system32\tulwiaqs.ini
C:\WINDOWS\system32\ukvbvrhj.ini
C:\WINDOWS\system32\uontvmbh.dll
C:\WINDOWS\system32\useddkhm.ini
C:\WINDOWS\system32\wbdvfhli.ini
C:\WINDOWS\system32\wforrnlu.ini
C:\WINDOWS\system32\whwlugos.dll
C:\WINDOWS\system32\wlkreyen.ini
C:\WINDOWS\system32\xbrgrker.ini
C:\WINDOWS\system32\xcqvihav.dll
C:\WINDOWS\system32\xgmlmvmb.dll
C:\WINDOWS\system32\xjkoqjrb.ini
C:\WINDOWS\system32\xuxlaiui.dll
C:\WINDOWS\system32\ybdgdbei.dll
C:\WINDOWS\system32\yjdxnbgk.ini
C:\WINDOWS\system32\ykfmdpde.ini
C:\WINDOWS\system32\yqklulfv.dll
C:\WINDOWS\system32\yrelocip.ini
C:\WINDOWS\system32\yunsvsbt.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\LEGACY_DOMAINSERVICE
-------\DomainService
-------\nm


((((((((((((((((((((((((( Files Created from 2008-02-08 to 2008-03-08 )))))))))))))))))))))))))))))))
.

2008-03-06 11:14 . 2008-03-06 11:14 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-03-06 11:14 . 2008-03-06 11:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-03-06 09:51 . 2008-03-06 09:52 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-03-05 11:28 . 2008-03-05 11:28 <DIR> d-------- C:\Program Files\Sun
2008-03-05 11:28 . 2008-02-22 02:33 69,632 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-03-05 11:24 . 2008-03-05 11:28 <DIR> d-------- C:\Program Files\Java
2008-03-05 11:24 . 2008-03-05 11:24 <DIR> d-------- C:\Program Files\Common Files\Java
2008-03-03 21:37 . 2008-03-03 21:37 <DIR> d-------- C:\Program Files\Alwil Software
2008-03-03 21:37 . 2007-12-04 08:04 837,496 --a------ C:\WINDOWS\system32\aswBoot.exe
2008-03-03 21:37 . 2004-01-09 04:13 380,928 --a------ C:\WINDOWS\system32\actskin4.ocx
2008-03-03 21:37 . 2007-12-04 07:54 95,608 --a------ C:\WINDOWS\system32\AvastSS.scr
2008-03-03 21:37 . 2007-12-04 09:55 94,544 --a------ C:\WINDOWS\system32\drivers\aswmon2.sys
2008-03-03 21:37 . 2007-12-04 09:56 93,264 --a------ C:\WINDOWS\system32\drivers\aswmon.sys
2008-03-03 21:37 . 2007-12-04 09:51 42,912 --a------ C:\WINDOWS\system32\drivers\aswTdi.sys
2008-03-03 21:37 . 2007-12-04 09:49 26,624 --a------ C:\WINDOWS\system32\drivers\aavmker4.sys
2008-03-03 21:37 . 2007-12-04 09:53 23,152 --a------ C:\WINDOWS\system32\drivers\aswRdr.sys
2008-03-03 21:23 . 2008-03-06 00:33 <DIR> d-------- C:\Program Files\SpywareGuard
2008-03-03 21:20 . 2008-03-03 21:20 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\TEMP
2008-03-03 20:19 . 2008-03-03 21:19 1,302,502 --ahs---- C:\WINDOWS\system32\aggvvvyv.ini
2008-02-27 12:14 . 2008-02-27 12:14 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Move Networks
2008-02-23 14:42 . 2008-02-23 14:47 <DIR> d-------- C:\Program Files\Virtual SmartFade
2008-02-23 14:14 . 2008-02-23 15:08 <DIR> d-------- C:\congo
2008-02-23 14:14 . 2006-08-25 14:41 36,864 --a------ C:\WINDOWS\system32\CongoShell.exe
2008-02-23 14:05 . 2006-02-28 10:08 118,784 --a------ C:\WINDOWS\system32\AppMux.exe
2008-02-23 14:05 . 2008-01-10 16:43 102,400 --a------ C:\WINDOWS\system32\slpd.exe
2008-02-23 14:05 . 2008-01-10 16:43 69,632 --a------ C:\WINDOWS\system32\slptool.exe
2008-02-23 14:05 . 2007-11-20 15:52 13,786 -ra------ C:\WINDOWS\system32\2055.keys
2008-02-23 14:05 . 2007-11-20 15:51 13,696 -ra------ C:\WINDOWS\system32\1031.keys
2008-02-23 14:05 . 2007-11-20 15:53 13,606 -ra------ C:\WINDOWS\system32\1040.keys
2008-02-23 14:05 . 2007-11-20 15:51 11,792 -ra------ C:\WINDOWS\system32\1033.keys
2008-02-23 14:05 . 2007-11-20 15:53 11,752 -ra------ C:\WINDOWS\system32\1049.keys
2008-02-23 14:05 . 2007-05-22 16:04 9,238 --------- C:\WINDOWS\slp.conf
2008-02-15 14:56 . 2008-02-15 14:57 1,305,973 --ahs---- C:\WINDOWS\system32\rpxpxhgd.ini
2008-02-11 13:07 . 2008-02-11 13:07 294 --ahs---- C:\WINDOWS\system32\giccddrx.ini

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-03-07 15:13 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-03-04 02:22 --------- d-----w C:\Program Files\SpywareBlaster
2008-02-28 13:36 --------- d-----w C:\Program Files\palmOne
2008-02-23 19:14 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-02-23 19:06 --------- d-----w C:\Program Files\ETC
2008-02-19 00:17 --------- d-----w C:\Program Files\ENTTEC LightFactory
2008-02-18 23:34 --------- d-----w C:\Program Files\RegCleaner
2008-01-30 04:03 --------- d-----w C:\Documents and Settings\Owner\Application Data\AdobeUM
2008-01-29 02:00 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
2008-01-27 21:04 --------- d-----w C:\Program Files\VectorWorks 11
2008-01-27 17:44 --------- d-----w C:\Program Files\VectorWorks 11.5.1
2008-01-27 17:40 --------- d-----w C:\Program Files\QuickTime
2008-01-19 23:53 --------- d-----w C:\Documents and Settings\Owner\Application Data\Nero
2008-01-19 23:43 --------- d-----w C:\Program Files\Common Files\Nero
2008-01-19 23:40 --------- d-----w C:\Program Files\Nero
2008-01-19 23:40 --------- d-----w C:\Documents and Settings\All Users\Application Data\Nero
2008-01-14 23:31 --------- d-----w C:\Program Files\Hewlett-Packard
2007-12-14 00:09 972,072 ----a-w C:\WINDOWS\UNNeroMediaHome.exe
2006-09-05 22:09 25,600 ----a-w C:\Documents and Settings\Owner\usbsermptxp.sys
2006-09-05 22:09 22,768 ----a-w C:\Documents and Settings\Owner\usbsermpt.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-03 23:56 15360]
"NVIEW"="nview.dll" [2003-10-17 16:02 852039 C:\WINDOWS\system32\nview.dll]
"AIM"="C:\Program Files\AIM\aim.exe" [2005-08-05 14:08 67160]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-01-28 11:43 2097488]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Tpwrtray"="TPWRTRAY.EXE" [2002-01-31 13:00 196608 C:\WINDOWS\system32\TPWRTRAY.EXE]
"TosHKCW.exe"="C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe" [2002-01-22 21:20 49152]
"TMESRV.EXE"="C:\Program Files\TOSHIBA\TME3\TMESRV31.exe" [2002-02-04 18:36 118784]
"TMESBS.EXE"="C:\Program Files\TOSHIBA\TME3\TMESBS32.exe" [2001-12-14 21:39 73728]
"TMERzCtl.EXE"="C:\Program Files\TOSHIBA\TME3\TMERzCtl.exe" [2002-02-04 19:54 77824]
"TMEEJME.EXE"="C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE" [2002-02-05 12:30 65536]
"TFNF5"="TFNF5.exe" [2001-08-03 20:08 73728 C:\WINDOWS\system32\TFNF5.exe]
"QAGENT"="C:\quickenw\QAGENT.EXE" [2000-09-19 20:28 94208]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2001-11-14 05:37 147456]
"nwiz"="nwiz.exe" [2003-10-17 16:02 323584 C:\WINDOWS\system32\nwiz.exe]
"NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2003-10-17 16:02 4866048]
"Logitech Utility"="Logi_MwX.Exe" [2003-12-17 08:50 19968 C:\WINDOWS\LOGI_MWX.EXE]
"googletalk"="C:\Program Files\Google\Google Talk\googletalk.exe" [2007-01-01 16:22 3739648]
"00THotkey"="C:\WINDOWS\System32\00THotkey.exe" [2002-01-30 18:57 249856]
"000StTHK"="000StTHK.exe" [2001-06-23 23:28 24576 C:\WINDOWS\system32\000StTHK.exe]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2007-11-15 13:11 267048]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2008-01-27 12:40 98304]
"avast!"="C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe" [2007-12-04 08:00 79224]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 04:25 144784]

C:\Documents and Settings\Owner\Start Menu\Programs\Startup\
ERUNT AutoBackup.lnk - C:\Program Files\ERUNT\AUTOBACK.EXE [2005-10-20 11:04:08 38912]
SpywareGuard.lnk - C:\Program Files\SpywareGuard\sgmain.exe [2003-08-29 19:05:35 360448]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2006-08-09 16:05:46 113664]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 22:05:26 29696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\awtrrrq]
awtrrrq.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tuspp]
C:\WINDOWS\system32\tuspp.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\VectorWorks 11\\VectorWorks.exe"=
"C:\\Program Files\\AIM\\aim.exe"=
"C:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA 3D\\GrandMA 3D.exe"=
"C:\\Program Files\\myTunes Redux\\mDNSResponder.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideoAdmin.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideo.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\launcher-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\critical-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\livecache-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\ob2000-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\server-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\desktop-win32-golden.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\WINDOWS\\System32\\slpd.exe"=
"C:\\WINDOWS\\system32\\java.exe"=
"C:\\Documents and Settings\\Owner\\Desktop\\grandMA FTP\\grandMAftp.exe"=
"C:\\Program Files\\Avolites\\Pearl 2004 Simulator\\Pearl.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA Offline 5.810\\gmaOffline.exe"=
"C:\\Program Files\\MA Lighting Technologies\\GMA Remote Emulator 5.700\\GmaREmu.exe"=
"C:\\Program Files\\ENTTEC LightFactory\\sl.exe"=
"C:\\Program Files\\Capture 2005\\Capture.exe"=
"C:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"C:\\Program Files\\Jands\\Vista\\vista.exe"=
"C:\\Program Files\\Internet Explorer\\iexplore.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.828\\gmaOnPC.exe"=
"C:\\Program Files\\Macromedia\\Dreamweaver 8\\Dreamweaver.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.831\\gmaOnPC.exe"=
"C:\\Program Files\\HighEnd\\Content Management Application\\ContentManagementApplication.exe"=
"C:\\Program Files\\VectorWorks 11.5.1\\VectorWorks.exe"=
"C:\\Program Files\\ETC\\Eos\\Eos.exe"=
"C:\\WINDOWS\\System32\\Appmux.exe"=
"C:\\congo\\congo.exe"=

R0 tosrfec;Bluetooth ACPI from Toshiba;C:\WINDOWS\system32\DRIVERS\tosrfec.sys [2001-07-13 06:26]
R0 TVALG;Toshiba Value Added Logical and General Purpose Device Driver;C:\WINDOWS\system32\DRIVERS\TVALG.SYS [2001-09-13 22:53]
R1 TMEI3E;TMEI3E;C:\WINDOWS\system32\Drivers\TMEI3E.SYS [2002-01-08 17:44]
R2 io;io;C:\WINDOWS\system32\drivers\io.sys [2006-11-29 22:13]
R2 mrtRate;mrtRate;C:\WINDOWS\system32\drivers\mrtRate.sys [2000-05-31 17:20]
R2 slpd;Service Location Protocol;C:\WINDOWS\system32\slpd.exe [2008-01-10 16:43]
R2 taskmon;taskmon;C:\Program Files\uICE\taskmon.sys [2002-11-16 18:57]
R2 Tmesbs;Tmesbs32;"C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service []
R3 SOFTXG;YAMAHA XG WDM SoftSynthesizer;C:\WINDOWS\system32\drivers\sxgxgwdm.sys [2001-07-09 18:20]
R3 TOSHIBASoftModem;TOSHIBA Software Modem;C:\WINDOWS\system32\DRIVERS\LTSM.sys [2001-09-26 23:34]
R3 tsdhd;TOSHIBA SD Card Host Controller Driver;C:\WINDOWS\system32\DRIVERS\tsdhd.sys [2002-01-07 04:02]
S2 NSLSVC;Network System Logon;"C:\WINDOWS\Cursors\netmsvc.exe" []
S3 BrScnUsb;Brother USB Still Image driver;C:\WINDOWS\system32\Drivers\BrScnUsb.sys [2004-10-15 11:50]
S3 dcddrv;dcddrv;C:\Program Files\uICE\devices\dcddrv.sys [2002-11-16 19:13]
S3 DMXGenerator;DMXGenerator;C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe [2006-09-15 15:49]
S3 MaxExtMidi;MaxExtMidiService;"C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe" [2005-12-06 13:12]
S3 MaxxyzResourceTransportService;Maxxyz Resource Transport;c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe [2006-10-17 16:45]
S3 pciSd;pciSd;C:\WINDOWS\system32\DRIVERS\tossdpci.sys [2002-01-07 21:16]
S3 SBExtigyIR;SBExtigyIR;C:\WINDOWS\system32\drivers\sbextigy.sys [2002-11-17 18:35]
S3 toslane;Toshiba BT-LANE;C:\WINDOWS\system32\DRIVERS\TOSRFLAN.sys [2002-02-07 19:24]
S4 MSSQL$MAXXYZ;MSSQL$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlservr.exe" -sMAXXYZ []
S4 SQLAgent$MAXXYZ;SQLAgent$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlagent.EXE" -i MAXXYZ []

.
Contents of the 'Scheduled Tasks' folder
"2008-02-26 23:49:00 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-07 19:57:06
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\DMXGenerator]
"ImagePath"="C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe /startedbyscm:CD78F72B-40E2F1D2-DMXGenerator"
.
------------------------ Other Running Processes ------------------------
.
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\SpywareGuard\sgbhp.exe
.
**************************************************************************
.
Completion time: 2008-03-07 20:01:45 - machine was rebooted
ComboFix-quarantined-files.txt 2008-03-08 01:01:39
.
2008-02-13 06:11:49 --- E O F ---

Shaba
2008-03-08, 11:49
Hi

Please post also a fresh HijackThis log :)

ttocsic
2008-03-08, 16:49
Do you also want a new kaspersky?


Logfile of HijackThis v1.99.1
Scan saved at 10:41:46 AM, on 3/8/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\svchost.exe
C:\toshiba\ivp\ism\ivpsvmgr.exe
C:\Setups\hijackthis\ttocsic.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: awtrrrq - awtrrrq.dll (file missing)
O20 - Winlogon Notify: tuspp - C:\WINDOWS\system32\tuspp.dll (file missing)
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)

Shaba
2008-03-08, 17:03
Hi

Not yet :)

Please click this link-->Jotti (http://virusscan.jotti.org/)

Copy/paste the first file on the list into the white Upload a file box and click Submit/Send (depends on which one you are using Jotti or VirusTotal).

C:\WINDOWS\system32\2055.keys

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/

ttocsic
2008-03-09, 01:04
I uploaded:
C:\WINDOWS\system32\2055.keys
(i think thats what you meant)

Jotti's Result looked like this:

Service load:
0% 100%
File: 2055.keys
Status:
OK
MD5: e1428d216bd4061c413b7bc2c15c2c29
Packers detected:
-
Bit9 reports: File not found

Scanner results
Scan taken on 08 Mar 2008 23:47:10 (GMT)
A-Squared
Found nothing
AntiVir
Found nothing
ArcaVir
Found nothing
Avast
Found nothing
AVG Antivirus
Found nothing
BitDefender
Found nothing
ClamAV
Found nothing
CPsecure
Found nothing
Dr.Web
Found nothing
F-Prot Antivirus
Found nothing
F-Secure Anti-Virus
Found nothing
Fortinet
Found nothing
Ikarus
Found nothing
Kaspersky Anti-Virus
Found nothing
NOD32
Found nothing
Norman Virus Control
Found nothing
Panda Antivirus
Found nothing
Rising Antivirus
Found nothing
Sophos Antivirus
Found nothing
VirusBuster
Found nothing
VBA32
Found nothing

Statistics
Last file scanned at least one scanner reported something about: wga.dll (MD5: ca2520c9f3993f88f3eacb2b1dd5d080, size: 156160 bytes), detected by:

Scanner Malware name
A-Squared X
AntiVir HEUR/Malware
ArcaVir X
Avast Win32:Delf-DYU
AVG Antivirus X
BitDefender Trojan.Generic.4028
ClamAV X
CPsecure X
Dr.Web X
F-Prot Antivirus X
F-Secure Anti-Virus X
Fortinet X
Ikarus X
Kaspersky Anti-Virus X
NOD32 X
Norman Virus Control X
Panda Antivirus Trj/Passtealer.FG
Rising Antivirus X
Sophos Antivirus Sus/Delf-J
VirusBuster X
VBA32 Trojan-Spy.Delf.4 (paranoid heuristics)


VirusTotal showed this:

File 2055.keys received on 03.09.2008 00:53:24 (CET)
Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED
Result: 0/32 (0%)
Loading server information...
Your file is queued in position: 15.
Estimated start time is between 87 and 125 seconds.
Do not close the window until scan is complete.
The scanner that was processing your file is stopped at this moment, we are going to wait a few seconds to try to recover your result.
If you are waiting for more than five minutes you have to resend your file.
Your file is being scanned by VirusTotal in this moment,
results will be shown as they're generated.
Compact Compact
Print results Print results
Your file has expired or does not exists.
Service is stopped in this moments, your file is waiting to be scanned (position: ) for an undefined time.

You can wait for web response (automatic reload) or type your email in the form below and click "request" so the system sends you a notification when the scan is finished.
Email:

Antivirus Version Last Update Result
AhnLab-V3 2008.3.4.0 2008.03.07 -
AntiVir 7.6.0.73 2008.03.07 -
Authentium 4.93.8 2008.03.07 -
Avast 4.7.1098.0 2008.03.08 -
AVG 7.5.0.516 2008.03.08 -
BitDefender 7.2 2008.03.08 -
CAT-QuickHeal 9.50 2008.03.08 -
ClamAV 0.92.1 2008.03.08 -
DrWeb 4.44.0.09170 2008.03.08 -
eSafe 7.0.15.0 2008.03.06 -
eTrust-Vet 31.3.5597 2008.03.07 -
Ewido 4.0 2008.03.08 -
FileAdvisor 1 2008.03.09 -
Fortinet 3.14.0.0 2008.03.08 -
F-Prot 4.4.2.54 2008.03.08 -
F-Secure 6.70.13260.0 2008.03.08 -
Ikarus T3.1.1.20 2008.03.08 -
Kaspersky 7.0.0.125 2008.03.09 -
McAfee 5247 2008.03.07 -
Microsoft 1.3301 2008.03.07 -
NOD32v2 2931 2008.03.08 -
Norman 5.80.02 2008.03.07 -
Panda 9.0.0.4 2008.03.08 -
Prevx1 V2 2008.03.09 -
Rising 20.34.52.00 2008.03.08 -
Sophos 4.27.0 2008.03.08 -
Sunbelt 3.0.930.0 2008.03.05 -
Symantec 10 2008.03.08 -
TheHacker 6.2.92.238 2008.03.08 -
VBA32 3.12.6.2 2008.03.05 -
VirusBuster 4.3.26:9 2008.03.08 -
Webwasher-Gateway 6.6.2 2008.03.08 -
Additional information
File size: 13786 bytes
MD5: e1428d216bd4061c413b7bc2c15c2c29
SHA1: 7f73ec880675be7c88cad24f6bc865323c58839b
PEiD: -
packers: Unicode
packers: Unicode

Shaba
2008-03-09, 11:01
Hi

Thanks for that.

Do you recognize these files?

2008-02-23 14:05 . 2007-11-20 15:52 13,786 -ra------ C:\WINDOWS\system32\2055.keys
2008-02-23 14:05 . 2007-11-20 15:51 13,696 -ra------ C:\WINDOWS\system32\1031.keys
2008-02-23 14:05 . 2007-11-20 15:53 13,606 -ra------ C:\WINDOWS\system32\1040.keys
2008-02-23 14:05 . 2007-11-20 15:51 11,792 -ra------ C:\WINDOWS\system32\1033.keys
2008-02-23 14:05 . 2007-11-20 15:53 11,752 -ra------ C:\WINDOWS\system32\1049.keys

ttocsic
2008-03-09, 15:35
No i dont know what those files are. I didnt put them there if thats what you're asking. Could they possibly be registry backups of some sort? I ask because of the ".keys" extension.

Shaba
2008-03-09, 15:40
Hi

Do you recognize then these?

2008-02-23 14:05 . 2006-02-28 10:08 118,784 --a------ C:\WINDOWS\system32\AppMux.exe
2008-02-23 14:05 . 2008-01-10 16:43 102,400 --a------ C:\WINDOWS\system32\slpd.exe
2008-02-23 14:05 . 2008-01-10 16:43 69,632 --a------ C:\WINDOWS\system32\slptool.exe

Those .keys are likely related to same program.

ttocsic
2008-03-09, 16:27
Im not sure what they are. I can say however that slpd.exe is usually running in the background.
A little info:
The slpd and slptool were created in february. And the appmux claims to be created 2 years ago.

Did a file search and came up with an slpd.log

Its contents:
****************************************
Wed Dec 12 19:11:47 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Agent Interfaces = 192.168.0.2
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
****************************************
Fri Dec 14 13:26:52 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Agent Interfaces = 192.168.0.5
Startup complete entering main run loop ...

****************************************
Fri Dec 14 16:10:52 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Agent Interfaces = 192.168.0.5
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
****************************************
Mon Dec 17 11:27:40 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Agent Interfaces = (null)
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.4 ...
Multicast (IPv4) socket on 192.168.0.4 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.4 ready
Unicast socket on 192.168.0.4 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.4 ...
Multicast (IPv4) socket on 192.168.0.4 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.4 ready
Unicast socket on 192.168.0.4 ready
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
****************************************
Mon Dec 17 21:58:22 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Agent Interfaces = 12.40.111.236
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 169.254.33.218 ...
Multicast (IPv4) socket on 169.254.33.218 ready
SLPv1 DA Discovery Multicast socket on 169.254.33.218 ready
Unicast socket on 169.254.33.218 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready

Goes on and on. Ive shortened it to fit.
Last log is:

****************************************
Sat Mar 08 10:02:34 2008
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Agent Interfaces = 192.168.1.100
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready

Shaba
2008-03-09, 16:34
Hi

Ok, those seem to be fine.

We need first to disable TeaTimer that it doesn't interfere with fixes. You can re-enable it when you're clean again:

1. Run Spybot-S&D in Advanced Mode.
2. If it is not already set to do this Go to the Mode menu select "Advanced Mode"
3. On the left hand side, Click on Tools
4. Then click on the Resident Icon in the List
5. Uncheck "Resident TeaTimer" and OK any prompts.
6. Restart your computer.

Open notepad and copy/paste the text in the quotebox below into it:


File::
C:\WINDOWS\system32\rpxpxhgd.ini
C:\WINDOWS\system32\giccddrx.ini

Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\awtrrrq]

[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tuspp]


Save this as "CFScript"

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

http://users.pandora.be/bluepatchy/miekiemoes/images/CFScript.gif

This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.

Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.

ttocsic
2008-03-09, 17:55
Combo fix results:

ComboFix 08-03-07.4 - Owner 2008-03-09 12:42:34.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.218 [GMT -4:00]
Running from: C:\Documents and Settings\Owner\Desktop\Combo-Fix.exe
Command switches used :: C:\Documents and Settings\Owner\Desktop\CFScript.txt
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

FILE ::
C:\WINDOWS\system32\giccddrx.ini
C:\WINDOWS\system32\rpxpxhgd.ini
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\system32\giccddrx.ini
C:\WINDOWS\system32\rpxpxhgd.ini

.
((((((((((((((((((((((((( Files Created from 2008-02-09 to 2008-03-09 )))))))))))))))))))))))))))))))
.

2008-03-06 12:14 . 2008-03-06 12:14 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-03-06 12:14 . 2008-03-06 12:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-03-06 10:51 . 2008-03-06 10:52 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-03-05 12:28 . 2008-03-05 12:28 <DIR> d-------- C:\Program Files\Sun
2008-03-05 12:28 . 2008-02-22 03:33 69,632 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-03-05 12:24 . 2008-03-05 12:28 <DIR> d-------- C:\Program Files\Java
2008-03-05 12:24 . 2008-03-05 12:24 <DIR> d-------- C:\Program Files\Common Files\Java
2008-03-03 22:37 . 2008-03-03 22:37 <DIR> d-------- C:\Program Files\Alwil Software
2008-03-03 22:37 . 2007-12-04 09:04 837,496 --a------ C:\WINDOWS\system32\aswBoot.exe
2008-03-03 22:37 . 2004-01-09 05:13 380,928 --a------ C:\WINDOWS\system32\actskin4.ocx
2008-03-03 22:37 . 2007-12-04 08:54 95,608 --a------ C:\WINDOWS\system32\AvastSS.scr
2008-03-03 22:37 . 2007-12-04 10:55 94,544 --a------ C:\WINDOWS\system32\drivers\aswmon2.sys
2008-03-03 22:37 . 2007-12-04 10:56 93,264 --a------ C:\WINDOWS\system32\drivers\aswmon.sys
2008-03-03 22:37 . 2007-12-04 10:51 42,912 --a------ C:\WINDOWS\system32\drivers\aswTdi.sys
2008-03-03 22:37 . 2007-12-04 10:49 26,624 --a------ C:\WINDOWS\system32\drivers\aavmker4.sys
2008-03-03 22:37 . 2007-12-04 10:53 23,152 --a------ C:\WINDOWS\system32\drivers\aswRdr.sys
2008-03-03 22:23 . 2008-03-08 12:00 <DIR> d-------- C:\Program Files\SpywareGuard
2008-03-03 22:20 . 2008-03-03 22:20 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\TEMP
2008-03-03 21:19 . 2008-03-03 22:19 1,302,502 --ahs---- C:\WINDOWS\system32\aggvvvyv.ini
2008-02-27 13:14 . 2008-02-27 13:14 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Move Networks
2008-02-23 15:42 . 2008-02-23 15:47 <DIR> d-------- C:\Program Files\Virtual SmartFade
2008-02-23 15:14 . 2008-02-23 16:08 <DIR> d-------- C:\congo
2008-02-23 15:14 . 2006-08-25 15:41 36,864 --a------ C:\WINDOWS\system32\CongoShell.exe
2008-02-23 15:05 . 2006-02-28 11:08 118,784 --a------ C:\WINDOWS\system32\AppMux.exe
2008-02-23 15:05 . 2008-01-10 17:43 102,400 --a------ C:\WINDOWS\system32\slpd.exe
2008-02-23 15:05 . 2008-01-10 17:43 69,632 --a------ C:\WINDOWS\system32\slptool.exe
2008-02-23 15:05 . 2007-11-20 16:52 13,786 -ra------ C:\WINDOWS\system32\2055.keys
2008-02-23 15:05 . 2007-11-20 16:51 13,696 -ra------ C:\WINDOWS\system32\1031.keys
2008-02-23 15:05 . 2007-11-20 16:53 13,606 -ra------ C:\WINDOWS\system32\1040.keys
2008-02-23 15:05 . 2007-11-20 16:51 11,792 -ra------ C:\WINDOWS\system32\1033.keys
2008-02-23 15:05 . 2007-11-20 16:53 11,752 -ra------ C:\WINDOWS\system32\1049.keys
2008-02-23 15:05 . 2007-05-22 17:04 9,238 --------- C:\WINDOWS\slp.conf

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-03-09 16:19 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-03-09 06:14 --------- d-----w C:\Program Files\Flying Pig Systems
2008-03-04 02:22 --------- d-----w C:\Program Files\SpywareBlaster
2008-02-28 13:36 --------- d-----w C:\Program Files\palmOne
2008-02-23 19:14 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-02-23 19:06 --------- d-----w C:\Program Files\ETC
2008-02-19 00:17 --------- d-----w C:\Program Files\ENTTEC LightFactory
2008-02-18 23:34 --------- d-----w C:\Program Files\RegCleaner
2008-01-30 04:03 --------- d-----w C:\Documents and Settings\Owner\Application Data\AdobeUM
2008-01-29 02:00 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
2008-01-27 21:04 --------- d-----w C:\Program Files\VectorWorks 11
2008-01-27 17:44 --------- d-----w C:\Program Files\VectorWorks 11.5.1
2008-01-27 17:40 --------- d-----w C:\Program Files\QuickTime
2008-01-19 23:53 --------- d-----w C:\Documents and Settings\Owner\Application Data\Nero
2008-01-19 23:43 --------- d-----w C:\Program Files\Common Files\Nero
2008-01-19 23:40 --------- d-----w C:\Program Files\Nero
2008-01-19 23:40 --------- d-----w C:\Documents and Settings\All Users\Application Data\Nero
2008-01-14 23:31 --------- d-----w C:\Program Files\Hewlett-Packard
2007-12-14 00:09 972,072 ----a-w C:\WINDOWS\UNNeroMediaHome.exe
2006-09-05 22:09 25,600 ----a-w C:\Documents and Settings\Owner\usbsermptxp.sys
2006-09-05 22:09 22,768 ----a-w C:\Documents and Settings\Owner\usbsermpt.sys
.

((((((((((((((((((((((((((((( snapshot@2008-03-07_20.01.13.87 )))))))))))))))))))))))))))))))))))))))))
.
+ 2005-10-20 16:02:28 163,328 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-8-2008\ERDNT.EXE
+ 2008-03-08 15:03:17 9,252,864 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-8-2008\Users\00000001\ntuser.dat
+ 2008-03-08 15:03:18 405,504 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-8-2008\Users\00000002\UsrClass.dat
+ 2005-10-20 16:02:28 163,328 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-9-2008\ERDNT.EXE
+ 2008-03-09 16:23:05 9,265,152 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-9-2008\Users\00000001\ntuser.dat
+ 2008-03-09 16:23:06 405,504 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-9-2008\Users\00000002\UsrClass.dat
- 2000-08-31 13:00:00 163,328 ----a-w C:\WINDOWS\ERDNT\Hiv-backup\ERDNT.EXE
+ 2000-08-31 12:00:00 163,328 ----a-w C:\WINDOWS\ERDNT\Hiv-backup\ERDNT.EXE
- 2000-08-31 13:00:00 28,160 ----a-w C:\WINDOWS\Nircmd.exe
+ 2000-08-31 12:00:00 28,160 ----a-w C:\WINDOWS\Nircmd.exe
- 2007-11-04 22:09:53 61,284 ----a-w C:\WINDOWS\system32\perfc009.dat
+ 2008-03-09 16:26:40 61,284 ----a-w C:\WINDOWS\system32\perfc009.dat
- 2007-11-04 22:09:53 400,090 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2008-03-09 16:26:40 400,090 ----a-w C:\WINDOWS\system32\perfh009.dat
- 2000-08-31 13:00:00 161,792 ----a-w C:\WINDOWS\system32\swreg.exe
+ 2000-08-31 12:00:00 161,792 ----a-w C:\WINDOWS\system32\swreg.exe
+ 2008-03-09 16:22:16 16,384 ----atw C:\WINDOWS\temp\Perflib_Perfdata_62c.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 00:56 15360]
"NVIEW"="nview.dll" [2003-10-17 17:02 852039 C:\WINDOWS\system32\nview.dll]
"AIM"="C:\Program Files\AIM\aim.exe" [2005-08-05 15:08 67160]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Tpwrtray"="TPWRTRAY.EXE" [2002-01-31 14:00 196608 C:\WINDOWS\system32\TPWRTRAY.EXE]
"TosHKCW.exe"="C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe" [2002-01-22 22:20 49152]
"TMESRV.EXE"="C:\Program Files\TOSHIBA\TME3\TMESRV31.exe" [2002-02-04 19:36 118784]
"TMESBS.EXE"="C:\Program Files\TOSHIBA\TME3\TMESBS32.exe" [2001-12-14 22:39 73728]
"TMERzCtl.EXE"="C:\Program Files\TOSHIBA\TME3\TMERzCtl.exe" [2002-02-04 20:54 77824]
"TMEEJME.EXE"="C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE" [2002-02-05 13:30 65536]
"TFNF5"="TFNF5.exe" [2001-08-03 21:08 73728 C:\WINDOWS\system32\TFNF5.exe]
"QAGENT"="C:\quickenw\QAGENT.EXE" [2000-09-19 21:28 94208]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2001-11-14 06:37 147456]
"nwiz"="nwiz.exe" [2003-10-17 17:02 323584 C:\WINDOWS\system32\nwiz.exe]
"NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2003-10-17 17:02 4866048]
"Logitech Utility"="Logi_MwX.Exe" [2003-12-17 09:50 19968 C:\WINDOWS\LOGI_MWX.EXE]
"googletalk"="C:\Program Files\Google\Google Talk\googletalk.exe" [2007-01-01 17:22 3739648]
"00THotkey"="C:\WINDOWS\System32\00THotkey.exe" [2002-01-30 19:57 249856]
"000StTHK"="000StTHK.exe" [2001-06-24 00:28 24576 C:\WINDOWS\system32\000StTHK.exe]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2007-11-15 14:11 267048]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2008-01-27 13:40 98304]
"avast!"="C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe" [2007-12-04 09:00 79224]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 05:25 144784]

C:\Documents and Settings\Owner\Start Menu\Programs\Startup\
ERUNT AutoBackup.lnk - C:\Program Files\ERUNT\AUTOBACK.EXE [2005-10-20 12:04:08 38912]
SpywareGuard.lnk - C:\Program Files\SpywareGuard\sgmain.exe [2003-08-29 20:05:35 360448]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2006-08-09 17:05:46 113664]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 23:05:26 29696]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\VectorWorks 11\\VectorWorks.exe"=
"C:\\Program Files\\AIM\\aim.exe"=
"C:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA 3D\\GrandMA 3D.exe"=
"C:\\Program Files\\myTunes Redux\\mDNSResponder.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideoAdmin.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideo.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\launcher-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\critical-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\livecache-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\ob2000-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\server-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\desktop-win32-golden.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\WINDOWS\\System32\\slpd.exe"=
"C:\\WINDOWS\\system32\\java.exe"=
"C:\\Documents and Settings\\Owner\\Desktop\\grandMA FTP\\grandMAftp.exe"=
"C:\\Program Files\\Avolites\\Pearl 2004 Simulator\\Pearl.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA Offline 5.810\\gmaOffline.exe"=
"C:\\Program Files\\MA Lighting Technologies\\GMA Remote Emulator 5.700\\GmaREmu.exe"=
"C:\\Program Files\\ENTTEC LightFactory\\sl.exe"=
"C:\\Program Files\\Capture 2005\\Capture.exe"=
"C:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"C:\\Program Files\\Jands\\Vista\\vista.exe"=
"C:\\Program Files\\Internet Explorer\\iexplore.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.828\\gmaOnPC.exe"=
"C:\\Program Files\\Macromedia\\Dreamweaver 8\\Dreamweaver.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.831\\gmaOnPC.exe"=
"C:\\Program Files\\HighEnd\\Content Management Application\\ContentManagementApplication.exe"=
"C:\\Program Files\\VectorWorks 11.5.1\\VectorWorks.exe"=
"C:\\Program Files\\ETC\\Eos\\Eos.exe"=
"C:\\WINDOWS\\System32\\Appmux.exe"=
"C:\\congo\\congo.exe"=

R0 tosrfec;Bluetooth ACPI from Toshiba;C:\WINDOWS\system32\DRIVERS\tosrfec.sys [2001-07-13 07:26]
R0 TVALG;Toshiba Value Added Logical and General Purpose Device Driver;C:\WINDOWS\system32\DRIVERS\TVALG.SYS [2001-09-13 23:53]
R1 TMEI3E;TMEI3E;C:\WINDOWS\system32\Drivers\TMEI3E.SYS [2002-01-08 18:44]
R2 io;io;C:\WINDOWS\system32\drivers\io.sys [2006-11-29 23:13]
R2 mrtRate;mrtRate;C:\WINDOWS\system32\drivers\mrtRate.sys [2000-05-31 18:20]
R2 slpd;Service Location Protocol;C:\WINDOWS\system32\slpd.exe [2008-01-10 17:43]
R2 taskmon;taskmon;C:\Program Files\uICE\taskmon.sys [2002-11-16 19:57]
R2 Tmesbs;Tmesbs32;"C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service []
R3 SOFTXG;YAMAHA XG WDM SoftSynthesizer;C:\WINDOWS\system32\drivers\sxgxgwdm.sys [2001-07-09 19:20]
R3 TOSHIBASoftModem;TOSHIBA Software Modem;C:\WINDOWS\system32\DRIVERS\LTSM.sys [2001-09-27 00:34]
R3 tsdhd;TOSHIBA SD Card Host Controller Driver;C:\WINDOWS\system32\DRIVERS\tsdhd.sys [2002-01-07 05:02]
S2 NSLSVC;Network System Logon;"C:\WINDOWS\Cursors\netmsvc.exe" []
S3 BrScnUsb;Brother USB Still Image driver;C:\WINDOWS\system32\Drivers\BrScnUsb.sys [2004-10-15 12:50]
S3 dcddrv;dcddrv;C:\Program Files\uICE\devices\dcddrv.sys [2002-11-16 20:13]
S3 DMXGenerator;DMXGenerator;C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe [2006-09-15 16:49]
S3 MaxExtMidi;MaxExtMidiService;"C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe" [2005-12-06 14:12]
S3 MaxxyzResourceTransportService;Maxxyz Resource Transport;c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe [2006-10-17 17:45]
S3 pciSd;pciSd;C:\WINDOWS\system32\DRIVERS\tossdpci.sys [2002-01-07 22:16]
S3 SBExtigyIR;SBExtigyIR;C:\WINDOWS\system32\drivers\sbextigy.sys [2002-11-17 19:35]
S3 toslane;Toshiba BT-LANE;C:\WINDOWS\system32\DRIVERS\TOSRFLAN.sys [2002-02-07 20:24]
S4 MSSQL$MAXXYZ;MSSQL$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlservr.exe" -sMAXXYZ []
S4 SQLAgent$MAXXYZ;SQLAgent$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlagent.EXE" -i MAXXYZ []

.
Contents of the 'Scheduled Tasks' folder
"2008-02-26 23:49:00 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-09 12:46:44
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\DMXGenerator]
"ImagePath"="C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe /startedbyscm:CD78F72B-40E2F1D2-DMXGenerator"
.
Completion time: 2008-03-09 12:47:50
ComboFix-quarantined-files.txt 2008-03-09 16:47:29
ComboFix2.txt 2008-03-08 01:01:46
.
2008-02-13 06:11:49 --- E O F ---

ttocsic
2008-03-09, 17:56
HJT Report:

Logfile of HijackThis v1.99.1
Scan saved at 12:51:34 PM, on 3/9/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\WINDOWS\system32\mrtMngr.EXE
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\toshiba\ivp\ism\ivpsvmgr.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Setups\hijackthis\ttocsic.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)

Shaba
2008-03-09, 18:32
Hi

Open HijackThis, click do a system scan only and checkmark this:

O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)

Close all windows including browser and press fix checked.

Reboot.

Delete if present:

C:\WINDOWS\Cursors\netmsvc.exe

Empty Recycle Bin.

Re-scan with kaspersky.

Post:

- a fresh HijackThis log
- kaspersky report

ttocsic
2008-03-10, 17:23
Kaspersky scan took longer than expected because it scanned my network drive as well. I stopped the scan before it finished the network drive but it did complete the local drive.


Log too long for post. Also too large to attach.

HJT:

Logfile of HijackThis v1.99.1
Scan saved at 12:18:00 PM, on 3/10/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\toshiba\ivp\ism\pinger.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\palmOne\Palm.exe
C:\Setups\hijackthis\ttocsic.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)

ttocsic
2008-03-10, 17:25
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Monday, March 10, 2008 12:00:07 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 9/03/2008
Kaspersky Anti-Virus database records: 618846
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\
Z:\

Scan Statistics:
Total number of scanned objects: 190632
Number of viruses found: 4
Number of infected objects: 106
Number of suspicious objects: 0
Duration of the scan process: 21:13:59


Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\cert8.db Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\formhistory.dat Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\foxmarks.log Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\history.dat Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\key3.db Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\parent.lock Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\search.sqlite Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\Owner\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\History\History.IE5\MSHist012008030920080310\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\~DFE534.tmp Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\~DFE9C7.tmp Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Owner\ntuser.dat Object is locked skipped
C:\Documents and Settings\Owner\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\Owner\UserData\index.dat Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\aswResp.dat Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\Avast4.db Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\AshWebSv.ws Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\aswMaiSv.log Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\nshield.log Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\report\Resident protection.txt Object is locked skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\aifmmjdw.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\aoduptva.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\bayymuva.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\bfqlyhye.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\blkmvkxs.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\cacaectv.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\cegrqnwg.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\dijffact.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\dkthhkca.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\dqxqupey.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ejeuitep.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\eyuddijl.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\fbmfwrwm.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\fqkxycuv.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ghpfoahl.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\hbovyrnf.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\hywvhreg.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ietiqyne.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\jirfbvqn.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\jxdpdcyl.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\jyfldjwe.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.ixf skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\lublakwt.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\mwgrhnvw.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\noeteyrc.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\npeicimd.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\nxvjquig.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\plwkfgqq.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ppnqurxp.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\puisvoqs.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\pwdqhebs.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\rghsdwpe.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\slerhakr.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\sqqblqqi.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\suthipvv.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\uontvmbh.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\whwlugos.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xcqvihav.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xgmlmvmb.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xuxlaiui.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ybdgdbei.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\yqklulfv.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\yunsvsbt.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped

ttocsic
2008-03-10, 17:26
Kaspersky Scan Continued:


C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045111.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045112.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045113.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045114.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045115.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045223.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045224.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045225.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045226.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ixe skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045314.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.bce skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045315.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.bce skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045316.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045317.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045318.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045319.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP424\A0045357.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP424\A0045358.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP425\A0045400.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP425\A0045417.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045497.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045498.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045515.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046472.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046473.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046474.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046475.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046476.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046477.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046478.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046479.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046480.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046481.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046482.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046483.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046484.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046485.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046486.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046487.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046488.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046489.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046490.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046491.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046492.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ixf skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046493.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046494.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046495.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046496.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046497.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046498.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046499.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046500.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046501.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046502.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046503.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046504.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046505.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046506.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046507.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046508.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046509.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046510.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046511.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046512.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP438\A0046513.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP440\change.log Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\shgina.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\migrate.js Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\srrstr.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\userenv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\msobmain.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\shell32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\termsrv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\syssetup.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\netsetup.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\ssdpapi.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\ssdpsrv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\upnp.dll Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\slpd.log Object is locked skipped
C:\WINDOWS\SoftwareDistribution\EventCache\{090D0D91-40AE-48BE-B626-F0520E80D33A}.bin Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\system32\config\Antivirus.Evt Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\LogFiles\HTTPERR\httperr1.log Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\temp\Perflib_Perfdata_630.dat Object is locked skipped
C:\WINDOWS\temp\_avast4_\Webshlock.txt Object is locked skipped
C:\WINDOWS\TempFile Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped

Scan was interrupted by user!

Shaba
2008-03-10, 18:45
Hi

Empty this folder:

C:\QooBox\Quarantine

Empty Recycle Bin.

All other viruses are in system restore and inactive.

I give you later instructions how to empty it.

Other than that, any problems left?

ttocsic
2008-03-10, 19:09
Should i delete the actual Qoobox folder?

Everything seems to be fine now. Spybot is operational.
Thank you so much for your help.


I do have one other question.
I use RegCleanr to view startup values in my registry.
Under registered software there are 2 versions of spybot registered. One is authored by safer networking and the other is by PepiMK software. Is this correct or is one outdated?

Shaba
2008-03-10, 19:11
Hi

"Should i delete the actual Qoobox folder?"

You can, however it gets deleted during final cleanup step anyway.

"Under registered software there are 2 versions of spybot registered. One is authored by safer networking and the other is by PepiMK software. Is this correct or is one outdated?"

If you go to add/remove programs, which version of spybot is there?

ttocsic
2008-03-11, 02:13
Under Add/remove, the only spybot listed is authored by safer networking.

Shaba
2008-03-11, 14:25
Hi

Well then you can remove that PepiMK entry if you take registry backup before that.

Any other issues?

ttocsic
2008-03-11, 17:14
Nope everything is running normally. Actually, better than ever. Thank you so much.

Shaba
2008-03-11, 17:18
Hi

Then you're clean!

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Please click Start > Run and type in: services.msc
Click OK
In the Services window find: Network System Logon (NSLSVC)
Select/highlight and right click the entry, and choose: Properties
On the General tab, under Service Status click the Stop button
Beside: Startup Type, in the drop menu, select: Disabled
Click Apply, then OK

Now, go to Start > Run, and copy/paste the following into the Open box:
sc delete NSLSVC

Looking over your log, it seems you don't have any evidence of a third party firewall.

As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

1) Comodo (http://www.personalfirewall.comodo.com/)
2) Online Armor (http://www.tallemu.com/online_armor_free.html)
3) Sunbelt/Kerio (http://www.sunbelt-software.com/Kerio-Download.cfm)
4) Agnitum (http://www.agnitum.com/products/outpostfree/download.php)
5) ZoneAlarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=nav_za) (uncheck ZoneAlarm Spy Blocker during installation if you choose this one)

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
Click: OK

Next we remove all used tools.

Please download OTMoveIt2 (http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe) and save it to desktop.

Double-click OTMoveIt2.exe.
Click the CleanUp! button.
Select Yes when the "Begin cleanup Process?" prompt appears.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes, if not delete it by yourself.


Note: If you receive a warning from your firewall or other security programs regarding OTMoveIt2 attempting to contact the internet, please allow it to do so.

Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

You can find instructions on how to enable and re-enable system restore here:

Windows XP System Restore Guide (http://www.bleepingcomputer.com/forums/tutorial56.html)

Re-enable system restore with instructions from tutorial above

Make your Internet Explorer more secure - This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt

Change the Download unsigned ActiveX controls to Disable

Change the Initialize and script ActiveX controls not marked as safe to Disable

Change the Installation of desktop items to Prompt

Change the Launching programs and files in an IFRAME to Prompt

Change the Navigate sub-frames across different domains to Prompt

When all these settings have been made, click on the OK button.

If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.

Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.


Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com (http://www.windowsupdate.com) regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

A tutorial on installing & using this product can be found here:

Using SpywareBlaster to protect your computer from Spyware and Malware (http://www.bleepingcomputer.com/tutorials/tutorial49.html)


Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety

MVPS Hosts file (http://mvps.org/winhelp2002/hosts.htm) <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
Google Toolbar (http://toolbar.google.com/) <= Get the free google toolbar to help stop pop up windows.
Comodo BOCLEAN (http://www.comodo.com/boclean/boclean.html) <= Stop identity thieves from getting personal information. Instantly detects well over 1,000,000 unique, variant and repack malware in total. And it's free.
Winpatrol (http://www.winpatrol.com/) <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
Using Winpatrol to protect your computer from malicious software (http://www.winpatrol.com/features.html)

Stand Up and Be Counted ---> Malware Complaints (http://www.malwarecomplaints.info/index.php) <--- where you can make difference!

The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

Also, please read this great article by Tony Klein So How Did I Get Infected In First Place (http://castlecops.com/postlite7736-.html)

Happy surfing and stay clean! :bigthumb:

ttocsic
2008-03-12, 01:16
Thank you for everything.
I truly appreciate the work that you all do here.
Thank you for making the internet a safer place and teaching us how to protect ourselves.

Shaba
2008-03-14, 10:37
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.

Note: If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.