PDA

View Full Version : Virtumonde, please help me. :(



Jahn_G
2008-04-21, 07:10
Virtumonde attacked my computer. Please help me. Here are the requested files:

a) The HJT log

====================

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:08:32 PM, on 4/20/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\System32\smss.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\wininit.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Autodesk\3dsMax8\mentalray\satellite\raysat_3dsmax8server.exe
C:\Windows\system32\PnkBstrA.exe
C:\Windows\system32\svchost.exe
C:\Program Files\CyberLink\Shared files\RichVideo.exe
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Windows\stsystra.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Hawking\HWU8DD\HWU8DD.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\System32\mobsync.exe
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\SearchProtocolHost.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Internet Explorer\IEUser.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: IE to GetRight Helper - {31FF080D-12A3-439A-A2EF-4BA95A3148E8} - C:\Program Files\GetRight\xx2gr.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [LanguageShortcut] "C:\Program Files\CyberLink\PowerDVD\Language\Language.exe"
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe"
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [PCTAVApp] "C:\Program Files\PC Tools AntiVirus\PCTAV.exe" /MONITORSCAN
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [cmds] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\geBtssRh.dll,c
O4 - HKCU\..\Run: [MSServer] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\khfDwuSI.dll,#1
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [MS Juan] rundll32 "C:\Users\PCOWNE~1\AppData\Local\Temp\xgrnnatk.dll",run
O4 - HKCU\..\Run: [188b2446] rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\meldflpl.dll",b
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [BM1bb817da] Rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\ekolaccx.dll",s
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: Hawking Wireless Utility.lnk = C:\Program Files\Hawking\HWU8DD\HWU8DD.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O16 - DPF: {4EFA317A-8569-4788-B175-5BAF9731A549} (Microsoft Virtual Server VMRC Advanced Control) - http://www.windowsvistatestdrive.com/ActiveX/VMRCActiveXClient1.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://3dlifeplayer.dl.3dvia.com/player/install/installer.exe
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~2\GOEC62~1.DLL
O20 - Winlogon Notify: avgwlntf - avgwlntf.dll (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG7 Resident Shield Service (AvgCoreSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgrssvc.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Desktop Manager 5.5.709.30344 (GoogleDesktopManager-093007-112848) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: RaySat_3dsmax8 Server (mi-raysat_3dsmax8) - Unknown owner - C:\Program Files\Autodesk\3dsMax8\mentalray\satellite\raysat_3dsmax8server.exe
O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared files\RichVideo.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files\Common Files\Steam\SteamService.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

--
End of file - 11005 bytes

====================

b) The Kaspersky log report

====================

-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Sunday, April 20, 2008 11:59:49 PM
Operating System: Microsoft Windows Vista Home Edition, Service Pack 1 (Build 6001)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 20/04/2008
Kaspersky Anti-Virus database records: 717772
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\

Scan Statistics:
Total number of scanned objects: 181721
Number of viruses found: 2
Number of infected objects: 4
Number of suspicious objects: 0
Duration of the scan process: 01:58:15

Infected Object Name / Virus Name / Last Action
C:\Boot\BCD Object is locked skipped
C:\Boot\BCD.LOG Object is locked skipped
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\6a6f9f03b6f189d97a988dd50119e618_e6235454-bd8b-432c-b7ce-8873c38c6bd7 Object is locked skipped
C:\ProgramData\Microsoft\User Account Pictures\Dorothy.dat Object is locked skipped
C:\ProgramData\Microsoft\User Account Pictures\Guest Admin.dat Object is locked skipped
C:\ProgramData\Microsoft\User Account Pictures\Guest.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012008042020080421\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I6OBOMS\idkfa[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.pmx skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\54653D80\kriv[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.pmw skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG1 Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG2 Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat{60acaa72-251b-11dc-849d-cdb7ab10a7f0}.TM.blf Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat{60acaa72-251b-11dc-849d-cdb7ab10a7f0}.TMContainer00000000000000000001.regtrans-ms Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat{60acaa72-251b-11dc-849d-cdb7ab10a7f0}.TMContainer00000000000000000002.regtrans-ms Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows Defender\FileTracker\{DF1D35AC-EF10-4886-826F-DA9F15550C05} Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows Sidebar\Settings.ini Object is locked skipped
C:\Users\PC Owner\AppData\Local\Temp\ekolaccx.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.pmx skipped
C:\Users\PC Owner\AppData\Local\Temp\Low\~DF2A2D.tmp Object is locked skipped
C:\Users\PC Owner\AppData\Local\Temp\Low\~DF2A4A.tmp Object is locked skipped
C:\Users\PC Owner\AppData\Local\Temp\meldflpl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.pmw skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_001_ Object is locked skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_002_ Object is locked skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_003_ Object is locked skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Microsoft\Windows\Cookies\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\cert8.db Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\history.dat Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\key3.db Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\parent.lock Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\search.sqlite Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\urlclassifier2.sqlite Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT Object is locked skipped
C:\Users\PC Owner\ntuser.dat.LOG1 Object is locked skipped
C:\Users\PC Owner\ntuser.dat.LOG2 Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TM.blf Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000001.regtrans-ms Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000002.regtrans-ms Object is locked skipped
C:\Windows\Debug\PASSWD.LOG Object is locked skipped
C:\Windows\Debug\WIA\wiatrace.log Object is locked skipped
C:\Windows\Installer\MSI583C.tmp Object is locked skipped
C:\Windows\Installer\MSIBEB1.tmp Object is locked skipped
C:\Windows\Logs\CBS\CBS.log Object is locked skipped
C:\Windows\Logs\CBS\CBS.persist.log Object is locked skipped
C:\Windows\Logs\DPX\setupact.log Object is locked skipped
C:\Windows\Logs\DPX\setuperr.log Object is locked skipped
C:\Windows\MEMORY.DMP Object is locked skipped
C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe.config Object is locked skipped
C:\Windows\Panther\catalogs\OfflineUpgradeStore.dat Object is locked skipped
C:\Windows\Panther\catalogs\OnlineEnvStore.dat Object is locked skipped
C:\Windows\Panther\catalogs\OnlineMigStore.dat Object is locked skipped
C:\Windows\Panther\catalogs\OnlineUpgradeStore.dat Object is locked skipped
C:\Windows\Panther\UnattendGC\diagerr.xml Object is locked skipped
C:\Windows\Panther\UnattendGC\diagwrn.xml Object is locked skipped
C:\Windows\Panther\UnattendGC\setupact.log Object is locked skipped
C:\Windows\Panther\UnattendGC\setuperr.log Object is locked skipped
C:\Windows\security\database\secedit.sdb Object is locked skipped
C:\Windows\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0 Object is locked skipped
C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0 Object is locked skipped
C:\Windows\System32\catroot2\edb.log Object is locked skipped
C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb Object is locked skipped
C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb Object is locked skipped
C:\Windows\System32\drivers\sptd.sys Object is locked skipped
C:\Windows\System32\LogFiles\Scm\SCM.EVM Object is locked skipped
C:\Windows\System32\LogFiles\WUDF\WUDFTrace.etl Object is locked skipped
C:\Windows\System32\restore\MachineGuid.txt Object is locked skipped
C:\Windows\System32\spool\SpoolerETW.etl Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\0296C47314AB746EC35476488248FCD9.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\040270F850D5C3C91057DDDA2DA294D8.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\0A9DBC92D554324656F61F9862679F27.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\0DF617D6737A7561E732F853792261C3.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\1E2E58C73053C7775EB226DB5E739137.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\26C097A9392F8C541AD42E89B7909073.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2A811E5CCC22CC9D7AE2B04EF0402688.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2AA23BB86A5EBD8BC2D820944E55B233.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2CE523184A801AA7361A7039E2D6B41D.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2D57A7682ACD19214C258D31A06D008F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\3460B7617E0429A960E481B197F238A3.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\376786241A5443E41378D25CF812FCC1.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\3DC0BABDCA20E5E319117C21BD4BD795.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\494C62FAA08CD5217399BAA555FF491B.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\4A01E0F376B5833EBA98F0D1D5F60CD1.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\4B471F64BAF831EC7945C820FD5A16E5.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\4CB32C0A77CD4D9B0C9618F73F786C32.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\5774C77265BE4C55B5C6C9718979E015.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\5966D45C7B25EACA46E87DD8E5703964.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\5B5D21CF62E70BACF9D085E6AA6CE143.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\69554D930FCA40B0304B9A43A8036F2D.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\72F867EF62976CE9F70993FF3E68A4EB.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\75054C3771DF289038069A9BB1C1FB6E.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\7851AF96EA828F912853F32DB0D96138.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\7F417E1A6D819A9B2FEB55DA6858EA0A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\87AA2A001CE3E89926688B93E4DC2992.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\8A94AF24F162D580E3D9889344A3A317.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\8C718B5AFD373885B68D2836088CAF9A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\903E49C444C46FEF5F2C3A189C9CEF71.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\96ABB1671705F680578FE240427CBD4F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9A72EE7775E8021F75961342B8AFD1B4.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9AD3182A2F39A3E091E15109132EC6CC.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9CD33F0956942860B50AA1B9330DEFAF.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9E06E4FE97F0CBB8D659894823F805D7.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\A80FF2DC09487ECD60AFB147B262BDD7.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\AA6E0E396C238977CA909EFD82299737.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\AA742824DCADA846BA4B665D686DD5D6.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\BBF206490BAA431B592F9A13534F43F6.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\BE81B2C0741907C1FC1C42B6223E59AD.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\D1A1B12A7DA3F9675C01397A26DBF4B3.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\D4C4BA54B6A8FA6211E60E2ADFF7426A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\DE391013DA56ABA39FFF40A9ABDF052F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\DF80FD3849FFF74B4BF43E2EA8ADEC8A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\DFB9AD54AC2D3B8122567AAD3BF3EB7F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\E04DE4CDFEC284A342159BB920976701.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\E737DE61441445E1FDFCA45EF5E7D987.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\E9D8A460B2C986DD5FF19F299F4A27EC.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\EC45C70F2A3D9DED718E71631C38E2FE.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\F01326692CC5736EBAC31B9FC2381CF2.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\F81E6BEBC3067C406E6C491608474198.mof Object is locked skipped
C:\Windows\System32\wbem\Logs\WMITracing.log Object is locked skipped
C:\Windows\System32\wbem\Repository\INDEX.BTR Object is locked skipped
C:\Windows\System32\wbem\Repository\MAPPING1.MAP Object is locked skipped
C:\Windows\System32\wbem\Repository\MAPPING2.MAP Object is locked skipped
C:\Windows\System32\wbem\Repository\OBJECTS.DATA Object is locked skipped
C:\Windows\System32\winevt\Logs\Antivirus.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Application.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\DFS Replication.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\HardwareEvents.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Internet Explorer.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Key Management Service.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Media Center.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Bits-Client%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-CodeIntegrity%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-CorruptedFileRecovery-Client%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-CorruptedFileRecovery-Server%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DateTimeControlPanel%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnosis-DPS%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnosis-PLA%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnostics-Networking%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnostics-Performance%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DiskDiagnostic%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DiskDiagnosticDataCollector%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DiskDiagnosticResolver%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DriverFrameworks-UserMode%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Forwarding%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-GroupPolicy%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-International%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-WDI%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-WHEA.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-LanguagePackSetup%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-MUI%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-NetworkAccessProtection%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ParentalControls%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ReadyBoost%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ReliabilityAnalysisComponent%4Metrics.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ReliabilityAnalysisComponent%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Resource-Exhaustion-Resolver%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Resource-Leak-Diagnostic%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-TaskScheduler%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-UAC%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-WindowsUpdateClient%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Winlogon%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Winsock-WS2HELP%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Wired-AutoConfig%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-WLAN-AutoConfig%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Security.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Setup.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\System.evtx Object is locked skipped
C:\Windows\Tasks\SCHEDLGU.TXT Object is locked skipped
C:\Windows\WindowsUpdate.log Object is locked skipped
C:\Windows\winsxs\x86_microsoft-windows-n..n_service_datastore_31bf3856ad364e35_6.0.6000.16386_none_cef7ceb03914a67f\dnary.xsd Object is locked skipped
C:\Windows\winsxs\x86_microsoft-windows-n..n_service_datastore_31bf3856ad364e35_6.0.6001.18000_none_d12e90ac35ffb753\dnary.xsd Object is locked skipped

Scan process completed.

====================

Blade81
2008-04-21, 19:52
Hi

Disable Spybot's TeaTimer
Run Spybot-S&D in Advanced Mode
If it is not already set to do this, go to the Mode menu
select
Advanced Mode

On the left hand side, click on Tools
Then click on the Resident icon in the list
Uncheck
Resident TeaTimer
and OK any prompts.
Restart your computer


1. Download combofix from any of these links and save it to Desktop:
Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)

**Note: It is important that it is saved directly to your desktop**

2. Double click combofix.exe & follow the prompts.
3. When finished, it shall produce a log for you (C:\ComboFix.txt). Post that log & a fresh hjt log in your next reply

Note:
Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.

If you have problems with Combofix usage, see here (http://www.bleepingcomputer.com/combofix/how-to-use-combofix)

Jahn_G
2008-04-21, 23:25
I just ran Combofix and HJT. Here are the new reports:

a) Combofix Report

====================

ComboFix 08-04-20.5 - PC Owner 2008-04-21 16:11:20.1 - NTFSx86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1322 [GMT -4:00]
Running from: C:\Users\PC Owner\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Windows\system32\pthreadVC.dll
C:\Windows\system32\x64
I:\Autorun.inf

.
((((((((((((((((((((((((( Files Created from 2008-03-21 to 2008-04-21 )))))))))))))))))))))))))))))))
.

2008-04-20 21:10 . 2008-04-20 21:10 <DIR> d-------- C:\Windows\System32\Kaspersky Lab
2008-04-20 21:07 . 2008-04-20 21:07 <DIR> d-------- C:\Program Files\Trend Micro
2008-04-20 19:10 . 2008-04-20 19:51 <DIR> d-------- C:\Users\All Users\Spybot - Search & Destroy
2008-04-20 19:10 . 2008-04-20 19:51 <DIR> d-------- C:\ProgramData\Spybot - Search & Destroy
2008-04-20 19:10 . 2008-04-20 19:10 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-04-20 15:57 . 2007-12-10 14:53 81,288 --a------ C:\Windows\System32\drivers\iksyssec.sys
2008-04-20 15:57 . 2007-12-10 14:53 66,952 --a------ C:\Windows\System32\drivers\iksysflt.sys
2008-04-20 15:57 . 2008-02-01 12:55 42,376 --a------ C:\Windows\System32\drivers\ikfilesec.sys
2008-04-20 15:57 . 2007-12-10 14:53 29,576 --a------ C:\Windows\System32\drivers\kcom.sys
2008-04-20 15:56 . 2008-04-21 09:59 <DIR> d-------- C:\Program Files\Spyware Doctor
2008-04-20 15:32 . 2008-04-20 15:32 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{5bfe4e16-0ed8-11dd-a330-0019d1080d15}.TMContainer00000000000000000002.regtrans-ms
2008-04-20 15:32 . 2008-04-21 16:11 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{5bfe4e16-0ed8-11dd-a330-0019d1080d15}.TMContainer00000000000000000001.regtrans-ms
2008-04-20 15:32 . 2008-04-20 15:32 524,288 --ahs---- C:\Users\Jahn\NTUSER.DAT{5bfe4e12-0ed8-11dd-a330-0019d1080d15}.TMContainer00000000000000000002.regtrans-ms
2008-04-20 15:32 . 2008-04-21 16:11 524,288 --ahs---- C:\Users\Jahn\NTUSER.DAT{5bfe4e12-0ed8-11dd-a330-0019d1080d15}.TMContainer00000000000000000001.regtrans-ms
2008-04-20 15:32 . 2008-04-21 16:11 65,536 --ahs---- C:\Users\Public\NTUSER.DAT{5bfe4e16-0ed8-11dd-a330-0019d1080d15}.TM.blf
2008-04-20 15:32 . 2008-04-21 16:11 65,536 --ahs---- C:\Users\Jahn\NTUSER.DAT{5bfe4e12-0ed8-11dd-a330-0019d1080d15}.TM.blf
2008-04-19 20:14 . 2008-04-19 20:14 <DIR> d-------- C:\Program Files\Alwil Software
2008-04-19 19:58 . 2008-04-19 20:13 21,787,912 --a------ C:\Users\PC Owner\setupeng.exe
2008-04-19 17:57 . 2008-04-19 17:57 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{44c74d81-0e4f-11dd-b5c7-0019d1080d15}.TMContainer00000000000000000002.regtrans-ms
2008-04-19 17:57 . 2008-04-19 17:57 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{44c74d81-0e4f-11dd-b5c7-0019d1080d15}.TMContainer00000000000000000001.regtrans-ms
2008-04-19 17:57 . 2008-04-19 17:57 524,288 --ahs---- C:\Users\Jahn\NTUSER.DAT{44c74d7d-0e4f-11dd-b5c7-0019d1080d15}.TMContainer00000000000000000002.regtrans-ms
2008-04-19 17:57 . 2008-04-19 17:57 524,288 --ahs---- C:\Users\Jahn\NTUSER.DAT{44c74d7d-0e4f-11dd-b5c7-0019d1080d15}.TMContainer00000000000000000001.regtrans-ms
2008-04-19 17:57 . 2008-04-19 17:57 65,536 --ahs---- C:\Users\Public\NTUSER.DAT{44c74d81-0e4f-11dd-b5c7-0019d1080d15}.TM.blf
2008-04-19 17:57 . 2008-04-19 17:57 65,536 --ahs---- C:\Users\Jahn\NTUSER.DAT{44c74d7d-0e4f-11dd-b5c7-0019d1080d15}.TM.blf
2008-04-19 17:57 . 2008-04-21 16:11 5,120 --ah----- C:\Users\Public\NTUSER.DAT.LOG1
2008-04-19 17:57 . 2008-04-21 16:11 5,120 --ah----- C:\Users\Jahn\NTUSER.DAT.LOG1
2008-04-19 17:57 . 2008-04-19 17:57 0 --ah----- C:\Users\Public\NTUSER.DAT.LOG2
2008-04-19 17:57 . 2008-04-19 17:57 0 --ah----- C:\Users\Jahn\NTUSER.DAT.LOG2
2008-04-19 14:40 . 2008-04-20 15:30 <DIR> d-------- C:\Users\All Users\SiteAdvisor
2008-04-19 14:40 . 2008-04-20 15:30 <DIR> d-------- C:\ProgramData\SiteAdvisor
2008-04-19 14:10 . 2008-04-20 16:04 <DIR> d-------- C:\Users\All Users\McAfee
2008-04-19 14:10 . 2008-04-20 16:04 <DIR> d-------- C:\ProgramData\McAfee
2008-04-18 22:56 . 2008-04-19 11:30 <DIR> d-------- C:\Users\PC Owner\AppData\Roaming\AVG7
2008-04-18 22:56 . 2008-04-18 22:56 524,288 --ahs---- C:\Users\Guest\NTUSER.DAT{5b1ca51a-0dbb-11dd-85b0-0019d1080d15}.TMContainer00000000000000000002.regtrans-ms
2008-04-18 22:56 . 2008-04-21 16:11 524,288 --ahs---- C:\Users\Guest\NTUSER.DAT{5b1ca51a-0dbb-11dd-85b0-0019d1080d15}.TMContainer00000000000000000001.regtrans-ms
2008-04-18 22:56 . 2008-04-21 16:11 65,536 --ahs---- C:\Users\Guest\NTUSER.DAT{5b1ca51a-0dbb-11dd-85b0-0019d1080d15}.TM.blf
2008-04-18 22:54 . 2008-04-18 22:54 <DIR> d-------- C:\Users\All Users\Grisoft
2008-04-18 22:54 . 2008-04-19 14:10 <DIR> d-------- C:\Users\All Users\avg7
2008-04-18 22:54 . 2008-04-18 22:54 <DIR> d-------- C:\ProgramData\Grisoft
2008-04-18 22:54 . 2008-04-19 14:10 <DIR> d-------- C:\ProgramData\avg7
2008-04-18 21:47 . 2008-04-18 21:47 <DIR> d-------- C:\Program Files\Common Files\PC Tools
2008-04-12 23:04 . 2008-04-12 23:05 <DIR> d-------- C:\Program Files\Virtual Earth 3D
2008-04-10 15:14 . 2008-04-10 15:30 <DIR> d-------- C:\Program Files\Empire Interactive
2008-04-08 15:51 . 2008-02-29 03:11 988,216 --a------ C:\Windows\System32\winload.exe
2008-04-08 15:51 . 2008-02-29 03:11 927,288 --a------ C:\Windows\System32\winresume.exe
2008-04-08 15:51 . 2008-02-22 01:05 615,992 --a------ C:\Windows\System32\ci.dll
2008-04-08 15:51 . 2008-02-29 02:53 378,368 --a------ C:\Windows\System32\srcore.dll
2008-04-08 15:51 . 2008-02-29 00:12 318,464 --a------ C:\Windows\System32\rstrui.exe
2008-04-08 15:51 . 2008-02-29 02:53 46,592 --a------ C:\Windows\System32\setbcdlocale.dll
2008-04-08 15:51 . 2008-02-29 02:53 40,960 --a------ C:\Windows\System32\srclient.dll
2008-04-08 15:51 . 2008-02-29 03:14 19,000 --a------ C:\Windows\System32\kd1394.dll
2008-04-08 15:51 . 2008-02-29 00:12 14,848 --a------ C:\Windows\System32\srdelayed.exe
2008-04-08 15:51 . 2008-02-29 02:35 6,656 --a------ C:\Windows\System32\kbd106n.dll
2008-04-08 15:15 . 2008-02-21 22:50 1,383,424 --a------ C:\Windows\System32\mshtml.tlb
2008-04-08 15:15 . 2008-02-22 01:01 826,880 --a------ C:\Windows\System32\wininet.dll
2008-04-08 14:14 . 2008-02-29 00:21 2,032,128 --a------ C:\Windows\System32\win32k.sys
2008-04-08 14:04 . 2008-02-22 00:57 295,936 --a------ C:\Windows\System32\gdi32.dll
2008-04-06 20:48 . 2008-04-06 20:48 <DIR> d-------- C:\Program Files\AutoHotkey
2008-04-05 23:50 . 2008-04-05 23:50 <DIR> d-------- C:\Users\PC Owner\dimsum
2008-04-05 12:49 . 2008-04-05 14:29 <DIR> d-------- C:\Program Files\Pcsx2_0.9.4
2008-04-05 09:47 . 2008-04-05 09:47 <DIR> d-------- C:\Program Files\Kap.GRETests
2008-04-05 09:47 . 1999-05-09 23:00 1,384,448 --a------ C:\Windows\System32\temp.007
2008-04-05 09:47 . 1999-07-09 14:38 995,383 --a------ C:\Windows\System32\temp.00A
2008-04-05 09:47 . 1999-04-13 23:00 379,152 --a------ C:\Windows\System32\temp.008
2008-04-05 09:47 . 1999-04-23 21:22 266,293 --a------ C:\Windows\System32\temp.009
2008-04-05 09:47 . 1999-06-16 03:19 238,080 --a------ C:\Windows\System32\fximg50g.ocx
2008-04-05 09:47 . 1999-08-31 15:55 164,112 --a------ C:\Windows\System32\temp.006
2008-04-05 09:47 . 1999-08-31 15:55 147,728 --a------ C:\Windows\System32\temp.005
2008-04-05 09:47 . 1999-02-25 06:32 122,880 --a------ C:\Windows\System32\fxtls532.dll
2008-04-05 09:47 . 1996-05-03 17:05 28,672 --a------ C:\Windows\System32\MsgHoo32.OCX
2008-04-05 09:47 . 1999-08-31 15:55 17,920 --a------ C:\Windows\System32\temp.004
2008-04-05 09:46 . 1999-08-31 15:55 598,288 --a------ C:\Windows\System32\temp.003
2008-04-05 09:46 . 1999-03-25 19:00 101,888 --a------ C:\Windows\System32\VB6STKIT.DLL
2008-04-05 08:46 . 2006-08-16 21:54 9,539,584 --a------ C:\Program Files\GTR2.exe
2008-04-05 08:31 . 2008-04-18 21:17 <DIR> d-------- C:\Program Files\GTR2
2008-04-04 17:31 . 2008-04-04 17:31 41,296 --a------ C:\Windows\System32\xfcodec.dll
2008-04-04 15:27 . 2008-04-04 15:27 <DIR> d-------- C:\Program Files\Logitech
2008-04-04 15:27 . 2008-04-04 15:27 <DIR> d-------- C:\Program Files\Common Files\Logitech
2008-04-04 15:27 . 2005-04-12 19:09 159,744 --a------ C:\Windows\System32\WmJoyFrc.dll
2008-04-04 15:27 . 2005-04-12 19:21 45,504 --a------ C:\Windows\System32\drivers\WmXlCore.sys
2008-04-04 15:27 . 2005-04-12 19:21 22,240 --a------ C:\Windows\System32\drivers\WmFilter.sys
2008-04-04 15:27 . 2005-04-12 19:21 10,144 --a------ C:\Windows\System32\drivers\WmBEnum.sys
2008-04-04 15:27 . 2005-04-12 19:21 5,600 --a------ C:\Windows\System32\drivers\WmVirHid.sys
2008-04-01 21:47 . 2008-03-05 16:03 479,752 --a------ C:\Windows\System32\XAudio2_0.dll
2008-04-01 21:38 . 2008-04-01 21:38 <DIR> d-------- C:\Users\PC Owner\AppData\Roaming\ICAClient
2008-04-01 21:21 . 2008-04-01 21:21 <DIR> d-------- C:\Users\PC Owner\AppData\Roaming\Runaware
2008-03-30 11:31 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Searches
2008-03-30 11:31 . 2008-03-30 11:31 <DIR> d-------- C:\Users\Guest\AppData\Roaming\GTek
2008-03-30 11:31 . 2008-03-30 11:31 <DIR> d-------- C:\Users\Guest\AppData\Roaming\ATI
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Videos
2008-03-30 11:30 . 2007-06-27 22:12 <DIR> d-------- C:\Users\Guest\video
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Saved Games
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Pictures
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Music
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Links
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Downloads
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> dr------- C:\Users\Guest\Documents
2008-03-30 11:30 . 2008-03-30 11:30 <DIR> dr------- C:\Users\Guest\Contacts
2008-03-30 11:30 . 2006-11-02 08:37 <DIR> d-------- C:\Users\Guest\AppData\Roaming\Media Center Programs
2008-03-30 11:30 . 2008-03-30 11:31 <DIR> d--h----- C:\Users\Guest\AppData
2008-03-30 11:30 . 2008-04-18 22:56 <DIR> d-------- C:\Users\Guest
2008-03-30 11:30 . 2008-03-30 11:33 524,288 --ahs---- C:\Users\Guest\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000002.regtrans-ms
2008-03-30 11:30 . 2008-04-18 22:56 524,288 --ahs---- C:\Users\Guest\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000001.regtrans-ms
2008-03-30 11:30 . 2008-04-21 16:11 262,144 --ah----- C:\Users\Guest\ntuser.dat.LOG1
2008-03-30 11:30 . 2008-04-18 22:56 65,536 --ahs---- C:\Users\Guest\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TM.blf
2008-03-30 11:30 . 2008-03-30 11:30 0 --ah----- C:\Users\Guest\ntuser.dat.LOG2
2008-03-30 11:15 . 2008-03-30 11:15 0 --ah----- C:\Windows\System32\drivers\Msft_User_WpdFs_01_00_00.Wdf
2008-03-30 01:38 . 2008-04-07 19:52 <DIR> d-------- C:\Windows\System32\Adobe
2008-03-29 21:24 . 2008-03-29 21:24 <DIR> d-------- C:\Users\All Users\Adobe Systems
2008-03-29 21:24 . 2008-03-29 21:24 <DIR> d-------- C:\ProgramData\Adobe Systems
2008-03-29 21:23 . 2008-03-29 21:23 <DIR> d-------- C:\Program Files\Common Files\Adobe Systems Shared
2008-03-28 18:24 . 2008-03-28 18:33 <DIR> d-------- C:\Program Files\ATITool
2008-03-25 08:59 . 2008-03-25 08:59 <DIR> d-------- C:\Program Files\directx
2008-03-25 08:59 . 2008-03-25 08:59 0 --a------ C:\Windows\DXT4585.tmp
2008-03-25 08:59 . 2008-03-25 08:59 0 --a------ C:\Windows\DXT4584.tmp
2008-03-25 08:59 . 2008-03-25 08:59 0 --a------ C:\Windows\DXT4573.tmp
2008-03-25 08:59 . 2008-03-25 08:59 0 --a------ C:\Windows\DXT4572.tmp
2008-03-25 08:56 . 2008-03-25 08:59 <DIR> d-------- C:\Program Files\DeusEx
2008-03-24 17:17 . 2008-03-24 17:17 <DIR> d-------- C:\Windows\System32\QuickTime
2008-03-24 17:17 . 2008-03-24 17:17 <DIR> d-------- C:\Users\All Users\TechSmith
2008-03-24 17:17 . 2008-03-24 17:17 <DIR> d-------- C:\ProgramData\TechSmith
2008-03-24 17:17 . 2008-01-18 03:36 107,864 --a------ C:\Windows\System32\tsccvid.dll
2008-03-24 17:16 . 2008-03-24 17:16 <DIR> d-------- C:\Windows\System32\Flash
2008-03-24 17:16 . 2008-03-24 17:16 <DIR> d-------- C:\Program Files\TechSmith
2008-03-24 17:16 . 2008-03-24 17:16 <DIR> d-------- C:\Program Files\Common Files\TechSmith Shared

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-21 20:03 --------- d---a-w C:\ProgramData\TEMP
2008-04-21 20:02 --------- d-----w C:\Users\PC Owner\AppData\Roaming\uTorrent
2008-04-21 15:51 --------- d-----w C:\Users\PC Owner\AppData\Roaming\Xfire
2008-04-20 22:30 --------- d-----w C:\ProgramData\Xfire
2008-04-20 19:58 --------- d-----w C:\ProgramData\Google Updater
2008-04-20 19:56 --------- d-----w C:\Users\PC Owner\AppData\Roaming\PC Tools
2008-04-20 15:21 --------- d-----w C:\Program Files\GameSpy Arcade
2008-04-20 12:59 --------- d-----w C:\Program Files\Ubisoft
2008-04-19 22:48 --------- d-----w C:\ProgramData\PC Tools
2008-04-19 18:35 --------- d-----w C:\Program Files\PC Tools AntiVirus
2008-04-19 01:33 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-04-19 01:33 --------- d-----w C:\Program Files\EA GAMES
2008-04-19 00:53 --------- d-s---w C:\Program Files\Xfire
2008-04-14 03:50 --------- d-----w C:\Program Files\Microsoft Silverlight
2008-04-09 16:06 --------- d-----w C:\Program Files\Windows Mail
2008-04-02 02:24 --------- d-----w C:\Program Files\LimeWire
2008-03-30 01:23 --------- d-----w C:\Program Files\Common Files\Adobe
2008-03-30 01:03 --------- d-----w C:\ProgramData\FLEXnet
2008-03-29 03:29 --------- d-----w C:\Program Files\Call of Duty
2008-03-29 03:15 --------- d-----w C:\Program Files\Sierra Entertainment
2008-03-23 21:59 --------- d-----w C:\ProgramData\Media Center Programs
2008-03-23 18:48 --------- d-----w C:\Program Files\Bethesda Softworks
2008-03-21 19:25 --------- d-----w C:\Users\PC Owner\AppData\Roaming\IGN_DLM
2008-03-20 05:31 --------- d-----w C:\Program Files\America's Army
2008-03-20 05:22 --------- d-----w C:\Program Files\Microsoft Games
2008-03-20 05:22 --------- d-----w C:\Program Files\Common Files\Microsoft Games
2008-03-20 05:03 --------- d-----w C:\Users\PC Owner\AppData\Roaming\Microsoft Game Studios
2008-03-20 05:03 --------- d-----w C:\ProgramData\Microsoft Games
2008-03-20 04:16 --------- d-----w C:\Program Files\Sierra On-Line
2008-03-19 23:27 --------- d-----w C:\Program Files\Safari
2008-03-19 01:03 174 --sha-w C:\Program Files\desktop.ini
2008-03-19 00:46 --------- d-----w C:\Program Files\Windows Sidebar
2008-03-19 00:46 --------- d-----w C:\Program Files\Windows Photo Gallery
2008-03-19 00:46 --------- d-----w C:\Program Files\Windows Journal
2008-03-19 00:46 --------- d-----w C:\Program Files\Windows Collaboration
2008-03-19 00:46 --------- d-----w C:\Program Files\Windows Calendar
2008-03-19 00:45 --------- d-----w C:\Program Files\Windows Defender
2008-03-19 00:15 82,432 ----a-w C:\Windows\System32\axaltocm.dll
2008-03-19 00:15 101,888 ----a-w C:\Windows\System32\ifxcardm.dll
2008-03-18 23:38 47,560 ----a-w C:\Windows\System32\SPReview.exe
2008-03-18 23:38 152,576 ----a-w C:\Windows\System32\SPWizUI.dll
2008-03-14 23:58 --------- d-----w C:\Program Files\Common Files\Steam
2008-03-14 19:17 22,328 ----a-w C:\Windows\system32\drivers\PnkBstrK.sys
2008-03-14 19:17 107,832 ----a-w C:\Windows\System32\PnkBstrB.exe
2008-03-14 03:31 --------- d-----w C:\Program Files\Folding@Home
2008-03-10 19:43 --------- d-----w C:\Program Files\ATI
2008-03-09 21:55 --------- d-----w C:\ProgramData\ATI
2008-03-09 20:18 --------- d-----w C:\Program Files\ATI Technologies
2008-03-09 19:36 --------- d-----w C:\Program Files\The Rosetta Stone
2008-03-09 04:29 --------- d-----w C:\Users\PC Owner\AppData\Roaming\BitTorrent DNA
2008-03-08 06:24 --------- d-----w C:\Program Files\Activision
2008-03-08 06:19 --------- d-----w C:\Program Files\Eidos
2008-03-08 06:18 --------- d-----w C:\Users\PC Owner\AppData\Roaming\Microsoft Games
2008-03-08 00:29 --------- d-----w C:\Program Files\Starcraft
2008-03-06 01:26 --------- d-----w C:\Program Files\PowerISO
2008-03-05 20:03 238,088 ----a-w C:\Windows\System32\xactengine3_0.dll
2008-03-05 20:00 25,608 ----a-w C:\Windows\System32\X3DAudio1_3.dll
2008-03-05 19:56 3,786,760 ----a-w C:\Windows\System32\D3DX9_37.dll
2008-03-05 19:56 1,420,824 ----a-w C:\Windows\System32\D3DCompiler_37.dll
2008-03-04 21:51 --------- d-----w C:\Program Files\Java
2008-02-28 02:06 --------- d-----w C:\Program Files\BestGameEver
2008-02-27 20:22 --------- d-----w C:\Program Files\iTunes
2008-02-27 20:21 --------- d-----w C:\ProgramData\Apple Computer
2008-02-27 20:21 --------- d-----w C:\Program Files\iPod
2008-02-27 20:17 --------- d-----w C:\Program Files\QuickTime
2008-02-26 05:53 3,520,512 ----a-w C:\Windows\system32\drivers\atikmdag.sys
2008-02-26 03:10 372,736 ----a-w C:\Windows\System32\ATIDEMGX.dll
2008-02-26 03:10 159,744 ----a-w C:\Windows\System32\atitmmxx.dll
2008-02-26 03:09 43,520 ----a-w C:\Windows\System32\ati2edxx.dll
2008-02-26 03:09 315,392 ----a-w C:\Windows\System32\atipdlxx.dll
2008-02-26 03:09 253,952 ----a-w C:\Windows\System32\Ati2evxx.dll
2008-02-26 03:09 245,760 ----a-w C:\Windows\System32\Oemdspif.dll
2008-02-26 03:08 655,360 ----a-w C:\Windows\System32\Ati2evxx.exe
2008-02-26 02:55 3,074,048 ----a-w C:\Windows\System32\atiumdag.dll
2008-02-26 02:47 9,662,464 ----a-w C:\Windows\System32\atioglxx.dll
2008-02-26 02:40 4,084,736 ----a-w C:\Windows\System32\atiumdva.dll
2008-02-26 02:29 47,104 ----a-w C:\Windows\System32\amdpcom32.dll
2008-02-26 02:14 49,152 ----a-w C:\Windows\system32\drivers\ati2erec.dll
2008-02-06 03:07 462,864 ----a-w C:\Windows\System32\d3dx10_37.dll
2008-01-23 22:14 302,592 ----a-w C:\Users\PC Owner\Music Mix-Distorter.exe
2007-11-17 04:58 22,328 ----a-w C:\Users\PC Owner\AppData\Roaming\PnkBstrK.sys
2007-09-13 21:57 1,902,536 ----a-w C:\Users\PC Owner\daemon410-x86.exe
2007-09-06 01:20 8 ----a-w C:\Users\PC Owner\AppData\Roaming\usb.dat.bin
2007-08-22 02:18 3,938,593 ----a-w C:\Users\PC Owner\skyrocket2.zip
2007-01-23 20:42 1,475,376 ----a-w C:\Users\PC Owner\GenuineCheck.exe
2006-05-21 17:03 2,806,272 ----a-w C:\Users\PC Owner\halo.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [2008-01-18 23:33 1233920]
"ISUSPM Startup"="C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 19:50 221184]
"ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2008-01-18 23:33 125952]
"Aim6"="" []
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [2008-01-18 23:33 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2008-01-18 23:38 1008184]
"ISUSScheduler"="C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" [2004-08-09 06:03 81920]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 05:25 144784]
"LanguageShortcut"="C:\Program Files\CyberLink\PowerDVD\Language\Language.exe" [2007-02-07 16:21 54832]
"StartCCC"="C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-01-21 12:17 61440]
"SigmatelSysTrayApp"="stsystra.exe" [2006-03-20 17:00 282624 C:\Windows\stsystra.exe]
"PCTAVApp"="C:\Program Files\PC Tools AntiVirus\PCTAV.exe" [ ]
"AVG7_CC"="C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" [ ]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"AVG7_Run"="C:\PROGRA~1\Grisoft\AVG7\avgw.exe" [ ]

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\
Hawking Wireless Utility.lnk - C:\Program Files\Hawking\HWU8DD\HWU8DD.exe [2007-06-28 07:24:40 483328]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"LogonHoursAction"= 2 (0x2)
"DontDisplayLogonHoursWarnings"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgwlntf]
avgwlntf.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=C:\PROGRA~1\Google\GOOGLE~2\GOEC62~1.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"vidc.ffds"= C:\PROGRA~1\COMBIN~1\Filters\FFDShow\ff_vfw.dll
"VIDC.XFR1"= xfcodec.dll
"MSVideo"= CSvidcap.dll
"VIDC.CFHD"= CFHD.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{C1D220CA-1F15-45A1-948F-997D0A2B3BD2}"= UDP:C:\Program Files\Microsoft Games\Halo 2\halo2.exe:Halo 2
"{4DF723C9-F9A1-4FB1-A986-41B997EFC459}"= TCP:C:\Program Files\Microsoft Games\Halo 2\halo2.exe:Halo 2
"TCP Query User{D81FAF31-9445-4971-AFE5-795E4C7581FE}C:\\program files\\xfire\\xfire.exe"= UDP:C:\program files\xfire\xfire.exe:Xfire
"UDP Query User{99D53D52-E1E7-4BB5-B73B-DEBE7A857FED}C:\\program files\\xfire\\xfire.exe"= TCP:C:\program files\xfire\xfire.exe:Xfire
"TCP Query User{7BD7BCB0-16CF-48E3-9197-BA010BD09D2E}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike source\\hl2.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\counter-strike source\hl2.exe:hl2
"UDP Query User{7C5E3CD3-2AF6-46F6-BA7F-4520B251FCA1}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike source\\hl2.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\counter-strike source\hl2.exe:hl2
"TCP Query User{55EDC8EE-C72B-404B-8E16-BCFE80705B23}C:\\program files\\firaxis games\\sid meier's civilization 4\\civilization4.exe"= UDP:C:\program files\firaxis games\sid meier's civilization 4\civilization4.exe:Sid Meier's Civilization 4
"UDP Query User{2B8B1B28-78C5-4CAD-B625-34AA242D8DB9}C:\\program files\\firaxis games\\sid meier's civilization 4\\civilization4.exe"= TCP:C:\program files\firaxis games\sid meier's civilization 4\civilization4.exe:Sid Meier's Civilization 4
"TCP Query User{1483D07F-D3FD-4316-9E97-D3DB206BC8FD}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike\\hl.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\counter-strike\hl.exe:Half-Life Launcher
"UDP Query User{9A1FEF0F-9B7B-4E5A-A827-DA36A1831B29}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike\\hl.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\counter-strike\hl.exe:Half-Life Launcher
"TCP Query User{C8734D36-8D75-4D00-90EF-1D89E01058C4}C:\\program files\\limewire\\limewire.exe"= UDP:C:\program files\limewire\limewire.exe:LimeWire
"UDP Query User{2737C640-0ADF-4F82-BB01-7E8654962FFE}C:\\program files\\limewire\\limewire.exe"= TCP:C:\program files\limewire\limewire.exe:LimeWire
"TCP Query User{4B3A14D5-B564-4230-B541-2288FC90AFCC}C:\\program files\\internet explorer\\iexplore.exe"= UDP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
"UDP Query User{C0ECEC21-2CBD-4B07-BA1C-97C63B70E02F}C:\\program files\\internet explorer\\iexplore.exe"= TCP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
"{3B45B202-CE32-423C-98C4-F162225AFB1A}"= UDP:C:\Program Files\iTunes\iTunes.exe:iTunes
"{DEAFAF7B-62D1-4F3F-99FC-27A28075E378}"= TCP:C:\Program Files\iTunes\iTunes.exe:iTunes
"TCP Query User{64930317-828C-462F-BF61-F9171E757E4D}C:\\program files\\trillian\\trillian.exe"= UDP:C:\program files\trillian\trillian.exe:Trillian
"UDP Query User{73D080B2-828C-4305-9664-B0BCB94BDF5B}C:\\program files\\trillian\\trillian.exe"= TCP:C:\program files\trillian\trillian.exe:Trillian
"{BE7F2D2F-848D-4F70-85B6-E675ADA9BA0D}"= UDP:C:\Program Files\Sierra Entertainment\World in Conflict - BETA\wic.exe:World in Conflict - BETA
"{8D59AD03-61B5-433E-92D9-2BEBCD8EE011}"= TCP:C:\Program Files\Sierra Entertainment\World in Conflict - BETA\wic.exe:World in Conflict - BETA
"TCP Query User{6089614B-BA21-4F4E-B861-C380C5F173A8}C:\\program files\\america's army\\system\\armyops.exe"= UDP:C:\program files\america's army\system\armyops.exe:ArmyOps
"UDP Query User{1AE80463-6302-4B18-AFF9-247E06E31639}C:\\program files\\america's army\\system\\armyops.exe"= TCP:C:\program files\america's army\system\armyops.exe:ArmyOps
"{4CDE7A8E-8BD3-42CB-AB27-D8D2681C5807}"= UDP:C:\Program Files\LucasArts\Star Wars Empire at War\GameData\sweaw.exe:Star Wars(TM): Empire at War(TM)
"{297A4757-C6E9-43A6-99F2-320AAC5C1A8D}"= TCP:C:\Program Files\LucasArts\Star Wars Empire at War\GameData\sweaw.exe:Star Wars(TM): Empire at War(TM)
"TCP Query User{9EBADC28-D600-40A0-B59A-C8807831F536}C:\\program files\\xfire\\xfire.exe"= UDP:C:\program files\xfire\xfire.exe:Xfire
"UDP Query User{6DA3B325-739E-46B8-BF02-4D75EC65DF1F}C:\\program files\\xfire\\xfire.exe"= TCP:C:\program files\xfire\xfire.exe:Xfire
"TCP Query User{02B8F430-BD8E-4C22-98E8-7CF73387FBCE}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike\\hl.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\counter-strike\hl.exe:Half-Life Launcher
"UDP Query User{8F05D736-E9AB-4976-8D66-909EE6D80D71}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike\\hl.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\counter-strike\hl.exe:Half-Life Launcher
"TCP Query User{316EE94F-C0AB-402A-B75F-167C8BD02588}C:\\program files\\limewire\\limewire.exe"= UDP:C:\program files\limewire\limewire.exe:LimeWire
"UDP Query User{2826E2A2-023E-4891-9A60-DE09D488EEEC}C:\\program files\\limewire\\limewire.exe"= TCP:C:\program files\limewire\limewire.exe:LimeWire
"TCP Query User{A8255C5D-7416-4216-A189-4C19B4B58227}C:\\program files\\internet explorer\\iexplore.exe"= UDP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
"UDP Query User{EDE7C59C-8BA0-4B59-9132-2A5D233B0C2E}C:\\program files\\internet explorer\\iexplore.exe"= TCP:C:\program files\internet explorer\iexplore.exe:Internet Explorer
"TCP Query User{4A6B9552-2C4A-4F34-8F31-85595B559DBA}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike source\\hl2.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\counter-strike source\hl2.exe:hl2
"UDP Query User{F9D9301A-1D14-4A0A-A369-3BF1D6C6C35B}C:\\program files\\valve\\steam\\steamapps\\recoton007\\counter-strike source\\hl2.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\counter-strike source\hl2.exe:hl2
"{05529A63-98EA-444F-907F-6AF1325A207E}"= UDP:C:\Windows\System32\PnkBstrA.exe:PnkBstrA
"{54A06348-2CB3-48CC-A2D7-7916C488B6F2}"= TCP:C:\Windows\System32\PnkBstrA.exe:PnkBstrA
"{A1339F72-C74F-4354-8CE5-72A36B7FB936}"= UDP:C:\Windows\System32\PnkBstrB.exe:PnkBstrB
"{917157E0-959F-4C01-B4B2-37BAEA891620}"= TCP:C:\Windows\System32\PnkBstrB.exe:PnkBstrB
"TCP Query User{865808CD-747F-4CAE-B13E-F0158912E8D3}C:\\program files\\bmw m3 challenge\\bmw.exe"= UDP:C:\program files\bmw m3 challenge\bmw.exe:BMW M3 Challenge
"UDP Query User{26CFA803-817E-4750-9173-F55E7034B4BD}C:\\program files\\bmw m3 challenge\\bmw.exe"= TCP:C:\program files\bmw m3 challenge\bmw.exe:BMW M3 Challenge
"TCP Query User{34D9CB9B-FE61-4FDF-A122-27CE478C6AC3}C:\\program files\\getright\\getright.exe"= UDP:C:\program files\getright\getright.exe:GetRight® Download Manager. www.GetRight.com
"UDP Query User{F56EA348-88DA-43C6-80EC-E96AB4FED835}C:\\program files\\getright\\getright.exe"= TCP:C:\program files\getright\getright.exe:GetRight® Download Manager. www.GetRight.com
"{78170B61-76C2-4C53-9901-779EBA0091C7}"= UDP:C:\Program Files\BitTorrent_DNA\dna.exe:BitTorrent DNA
"{FA6EE6C2-2435-4BF0-9A80-9F7AACD016B9}"= TCP:C:\Program Files\BitTorrent_DNA\dna.exe:BitTorrent DNA
"TCP Query User{6B794882-94DD-40BC-BFC2-97FACEA90D67}C:\\program files\\bittorrent\\bittorrent.exe"= UDP:C:\program files\bittorrent\bittorrent.exe:bittorrent
"UDP Query User{34B1B8BB-19C8-4840-9FFD-4D383CA4F65E}C:\\program files\\bittorrent\\bittorrent.exe"= TCP:C:\program files\bittorrent\bittorrent.exe:bittorrent
"{1A7CC2B9-208E-49F9-915F-7E85BFC40F95}"= UDP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent
"{6782682C-DE45-435F-B136-7354DB67EDB3}"= TCP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent
"TCP Query User{CB3EAE59-04B4-4740-95A5-25119EED1C0B}C:\\users\\pc owner\\program files\\bittorrent_dna\\dna.exe"= UDP:C:\users\pc owner\program files\bittorrent_dna\dna.exe:dna.exe
"UDP Query User{48528156-7719-4A08-90E0-D123A215B5B8}C:\\users\\pc owner\\program files\\bittorrent_dna\\dna.exe"= TCP:C:\users\pc owner\program files\bittorrent_dna\dna.exe:dna.exe
"TCP Query User{305D2C4B-2AB1-4E00-8EB2-B515A8A7990B}C:\\program files\\utorrent\\utorrent.exe"= UDP:C:\program files\utorrent\utorrent.exe:uTorrent
"UDP Query User{6A69B13A-510F-40EA-BA36-83EFA4E3BA74}C:\\program files\\utorrent\\utorrent.exe"= TCP:C:\program files\utorrent\utorrent.exe:uTorrent
"TCP Query User{61160E47-2EFC-40A1-B643-0041B211A174}C:\\program files\\ea sports\\mvp baseball 2005\\mvp2005.exe"= UDP:C:\program files\ea sports\mvp baseball 2005\mvp2005.exe:mvp2005
"UDP Query User{5742D211-02B6-4A67-B890-B8316B3A44A2}C:\\program files\\ea sports\\mvp baseball 2005\\mvp2005.exe"= TCP:C:\program files\ea sports\mvp baseball 2005\mvp2005.exe:mvp2005
"TCP Query User{FB4BAA58-DCAC-420E-AE04-5E69B9EC466D}C:\\program files\\valve\\steam\\steam.exe"= UDP:C:\program files\valve\steam\steam.exe:Steam
"UDP Query User{D04ABCF5-0B0D-4385-B6FB-DC8026EE7696}C:\\program files\\valve\\steam\\steam.exe"= TCP:C:\program files\valve\steam\steam.exe:Steam
"{53E48B68-F051-44F4-9F7A-12FF94E9E3E0}"= UDP:C:\Program Files\Autodesk\Backburner\monitor.exe:backburner 2.3 monitor
"{2E273FD8-AFFF-483D-8814-5A0158BBECE1}"= TCP:C:\Program Files\Autodesk\Backburner\monitor.exe:backburner 2.3 monitor
"{3ED0E006-5181-41F3-8820-F1A210597949}"= UDP:C:\Program Files\Autodesk\Backburner\manager.exe:backburner 2.3 manager
"{803C64EE-372E-41D2-9D0E-0D5271E40631}"= TCP:C:\Program Files\Autodesk\Backburner\manager.exe:backburner 2.3 manager
"{26297959-421E-4FEA-9B85-B7F46D153C2C}"= UDP:C:\Program Files\Autodesk\Backburner\server.exe:backburner 2.3 server
"{2EB72A41-B79B-4D5B-81FA-7346A721188D}"= TCP:C:\Program Files\Autodesk\Backburner\server.exe:backburner 2.3 server
"TCP Query User{D07F3B69-9EE6-42A6-9914-8CD83121DF47}C:\\program files\\microsoft games\\halo custom edition\\haloce.exe"= UDP:C:\program files\microsoft games\halo custom edition\haloce.exe:Halo
"UDP Query User{D77B47D5-AE08-4088-83BE-AA03A0128726}C:\\program files\\microsoft games\\halo custom edition\\haloce.exe"= TCP:C:\program files\microsoft games\halo custom edition\haloce.exe:Halo
"{5B7A2D8A-08CD-485D-B231-DFFEA2024CD5}"= C:\Program Files\Cyberlink\PowerDVD\PowerDVD.EXE:CyberLink PowerDVD
"TCP Query User{98E43971-F8E3-469B-8DFE-56C158EEB3C3}C:\\program files\\trillian\\trillian.exe"= UDP:C:\program files\trillian\trillian.exe:Trillian
"UDP Query User{C702183B-0FCB-4FB6-B190-62D9F6651594}C:\\program files\\trillian\\trillian.exe"= TCP:C:\program files\trillian\trillian.exe:Trillian
"TCP Query User{8BC61A1D-3788-408D-A90A-F6FCC47DA2C0}C:\\program files\\valve\\steam\\steamapps\\recoton007\\team fortress 2\\hl2.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\team fortress 2\hl2.exe:hl2
"UDP Query User{C61C1160-F034-4C4A-B1FD-D3DA5F97EB0A}C:\\program files\\valve\\steam\\steamapps\\recoton007\\team fortress 2\\hl2.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\team fortress 2\hl2.exe:hl2
"TCP Query User{CD8B5FF9-DD5D-490B-8F7C-0AEA574BFDBD}C:\\users\\pc owner\\appdata\\local\\microsoft\\windows\\temporary internet files\\content.ie5\\r42bja3r\\starcraft2cinematictrailer_englishus-avi-downloader[1].exe"= UDP:C:\users\pc owner\appdata\local\microsoft\windows\temporary internet files\content.ie5\r42bja3r\starcraft2cinematictrailer_englishus-avi-downloader[1].exe:starcraft2cinematictrailer_englishus-avi-downloader[1].exe
"UDP Query User{4C4D0BAB-830C-443A-9ED9-270BB5A40491}C:\\users\\pc owner\\appdata\\local\\microsoft\\windows\\temporary internet files\\content.ie5\\r42bja3r\\starcraft2cinematictrailer_englishus-avi-downloader[1].exe"= TCP:C:\users\pc owner\appdata\local\microsoft\windows\temporary internet files\content.ie5\r42bja3r\starcraft2cinematictrailer_englishus-avi-downloader[1].exe:starcraft2cinematictrailer_englishus-avi-downloader[1].exe
"{C9CBC1BF-66DE-4B3A-B46E-90827F143CFC}"= C:\Program Files\Electronic Arts\Command & Conquer 3 BattleCast Viewer\RetailExeBCV\1.9\cnc3bcv.dat:Command & Conquer 3 Tiberium Wars
"TCP Query User{AA519E86-637F-4B28-AC0C-08969F535579}C:\\program files\\sierra\\fearcombat\\fpupdate.exe"= UDP:C:\program files\sierra\fearcombat\fpupdate.exe:fpupdate
"UDP Query User{D36584C7-77BF-4405-B565-7F57A9E35919}C:\\program files\\sierra\\fearcombat\\fpupdate.exe"= TCP:C:\program files\sierra\fearcombat\fpupdate.exe:fpupdate
"{E28EE8BF-449F-4C23-9D0D-7EA518266715}"= UDP:C:\Program Files\Activision\Call of Duty 4 - Modern Warfare\iw3mp.exe:Call of Duty(R) 4 - Modern Warfare(TM)
"{F194D1BC-EDD2-41E9-AA24-E178F878788C}"= TCP:C:\Program Files\Activision\Call of Duty 4 - Modern Warfare\iw3mp.exe:Call of Duty(R) 4 - Modern Warfare(TM)
"TCP Query User{9AD8FC64-AC60-439C-BA83-214C3E31E5D2}C:\\program files\\starcraft\\starcraft.exe"= UDP:C:\program files\starcraft\starcraft.exe:StarCraft
"UDP Query User{33FEED52-B971-4F54-971C-4160758C764A}C:\\program files\\starcraft\\starcraft.exe"= TCP:C:\program files\starcraft\starcraft.exe:StarCraft
"TCP Query User{AB3F0E9E-21D3-4154-A270-6B2DB3CB3AF6}C:\\program files\\valve\\steam\\steamapps\\recoton007\\source sdk base\\hl2.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\source sdk base\hl2.exe:hl2
"UDP Query User{9AFE0868-5E0A-4F14-B327-18AFFC174A21}C:\\program files\\valve\\steam\\steamapps\\recoton007\\source sdk base\\hl2.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\source sdk base\hl2.exe:hl2
"{9D0A9C7B-35A4-4A99-905D-22904F5FB9CA}"= UDP:C:\Program Files\Common Files\AOL\Loader\aolload.exe:AOL Loader
"{B0DE7385-07EA-4A1E-96D9-9420D88C8D64}"= TCP:C:\Program Files\Common Files\AOL\Loader\aolload.exe:AOL Loader
"{A552F7E7-B34B-4B1F-8A07-B3F07A188FC3}"= UDP:C:\Program Files\AIM6\aim6.exe:AIM
"{4ADDA2B2-3156-4EB7-B2F4-39B0E42CC633}"= TCP:C:\Program Files\AIM6\aim6.exe:AIM
"TCP Query User{AF23175B-40A5-4119-AB04-DF9E78309914}C:\\program files\\ubisoft\\tom clancy's splinter cell double agent\\scda-offline\\system\\splintercell4.exe"= UDP:C:\program files\ubisoft\tom clancy's splinter cell double agent\scda-offline\system\splintercell4.exe:SplinterCell4
"UDP Query User{7DC49524-0F87-45DB-8968-F97D0FF1519C}C:\\program files\\ubisoft\\tom clancy's splinter cell double agent\\scda-offline\\system\\splintercell4.exe"= TCP:C:\program files\ubisoft\tom clancy's splinter cell double agent\scda-offline\system\splintercell4.exe:SplinterCell4
"TCP Query User{EAB48D13-7B58-4CA7-894F-2A3FA5BB4716}C:\\program files\\ccp\\eve\\bin\\exefile.exe"= UDP:C:\program files\ccp\eve\bin\exefile.exe:CCP ExeFile
"UDP Query User{412370EB-3244-4668-B45A-04C316B76527}C:\\program files\\ccp\\eve\\bin\\exefile.exe"= TCP:C:\program files\ccp\eve\bin\exefile.exe:CCP ExeFile
"TCP Query User{999731A6-8814-41C5-81E6-6DD0273859DD}C:\\python25\\pythonw.exe"= UDP:C:\python25\pythonw.exe:pythonw
"UDP Query User{E52A794F-678A-45C6-9C1D-2DF3AC914248}C:\\python25\\pythonw.exe"= TCP:C:\python25\pythonw.exe:pythonw
"TCP Query User{1DD70687-342F-4BF9-B08A-723EA87FFDAE}C:\\program files\\valve\\steam\\steamapps\\recoton007\\day of defeat\\hl.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\day of defeat\hl.exe:Half-Life Launcher
"UDP Query User{F26E579B-5DFE-4BC9-B0DD-9BDD20CF4DDC}C:\\program files\\valve\\steam\\steamapps\\recoton007\\day of defeat\\hl.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\day of defeat\hl.exe:Half-Life Launcher
"TCP Query User{1D3235F5-2215-460A-84CC-BA64F1109273}C:\\program files\\valve\\steam\\steamapps\\recoton007\\half-life 2 deathmatch\\hl2.exe"= UDP:C:\program files\valve\steam\steamapps\recoton007\half-life 2 deathmatch\hl2.exe:hl2
"UDP Query User{DF02166D-A1B5-4A48-BA12-E5E347CBB63E}C:\\program files\\valve\\steam\\steamapps\\recoton007\\half-life 2 deathmatch\\hl2.exe"= TCP:C:\program files\valve\steam\steamapps\recoton007\half-life 2 deathmatch\hl2.exe:hl2
"TCP Query User{91AB6A8F-87E1-4367-80A6-136D1023E53D}C:\\users\\pc owner\\program files\\utorrent\\utorrent.exe"= UDP:C:\users\pc owner\program files\utorrent\utorrent.exe:utorrent.exe
"UDP Query User{B8D95A2C-D4BC-4ED3-8725-AED1AC886E8C}C:\\users\\pc owner\\program files\\utorrent\\utorrent.exe"= TCP:C:\users\pc owner\program files\utorrent\utorrent.exe:utorrent.exe
"{474AAC00-1088-481F-BD43-EAE500DFC538}"= UDP:C:\Program Files\Microsoft Games\Gears of War\Binaries\WarGame-G4WLive.exe:Gears of War
"{CF20FD93-D464-4F8E-9FAF-B438D3220FCD}"= TCP:C:\Program Files\Microsoft Games\Gears of War\Binaries\WarGame-G4WLive.exe:Gears of War
"TCP Query User{154A3D3F-C891-48E1-82BA-466B25E03436}C:\\program files\\america's army\\system\\armyops.exe"= UDP:C:\program files\america's army\system\armyops.exe:ArmyOps
"UDP Query User{79E3AD1B-86FD-4D8B-A413-EA27D1AD31D2}C:\\program files\\america's army\\system\\armyops.exe"= TCP:C:\program files\america's army\system\armyops.exe:ArmyOps
"{2D7BA20C-5AEE-4A9F-B275-884B5F16D955}"= UDP:C:\Program Files\iTunes\iTunes.exe:iTunes
"{54C41E60-8526-43FE-BAFA-52659D541BAE}"= TCP:C:\Program Files\iTunes\iTunes.exe:iTunes
"TCP Query User{D9B26540-2672-4949-A057-96CB11AD344A}C:\\program files\\call of duty\\codmp.exe"= UDP:C:\program files\call of duty\codmp.exe:CoDMP
"UDP Query User{601AFD28-FB6F-4E79-ABA7-E67A637478FB}C:\\program files\\call of duty\\codmp.exe"= TCP:C:\program files\call of duty\codmp.exe:CoDMP
"TCP Query User{5E791D29-F8CD-4E1C-BC21-A664031BA416}C:\\program files\\ea games\\battlefield 2\\bf2_w32ded.exe"= UDP:C:\program files\ea games\battlefield 2\bf2_w32ded.exe:bf2_w32ded
"UDP Query User{B1C200C3-73D7-47E0-A6B3-845A1051F6C5}C:\\program files\\ea games\\battlefield 2\\bf2_w32ded.exe"= TCP:C:\program files\ea games\battlefield 2\bf2_w32ded.exe:bf2_w32ded
"{C3ACA824-D281-41B5-BE6A-48F3FC60DF1E}"= UDP:C:\Program Files\Ubisoft\Tom Clancy's Rainbow Six Vegas\Binaries\R6Vegas_Game.exe:Rainbow Six Vegas
"{82692B43-ED0E-4DB1-A928-259D30A225AE}"= TCP:C:\Program Files\Ubisoft\Tom Clancy's Rainbow Six Vegas\Binaries\R6Vegas_Game.exe:Rainbow Six Vegas
"{33E7D2A1-5316-418B-BF8F-E1B5A62054FE}"= UDP:C:\Program Files\Ubisoft\Tom Clancy's Rainbow Six Vegas\Binaries\R6Vegas_Launcher.exe:Rainbow Six Vegas Updater
"{25FF706F-7671-4A16-9EDE-8329F566B692}"= TCP:C:\Program Files\Ubisoft\Tom Clancy's Rainbow Six Vegas\Binaries\R6Vegas_Launcher.exe:Rainbow Six Vegas Updater
"TCP Query User{37A7B65C-EFB8-44AF-BA99-415CD9FB7A24}C:\\program files\\java\\jre1.6.0_05\\bin\\javaw.exe"= UDP:C:\program files\java\jre1.6.0_05\bin\javaw.exe:Java(TM) Platform SE binary
"UDP Query User{2ACAD988-6D17-41A1-8794-D20FE552C5A3}C:\\program files\\java\\jre1.6.0_05\\bin\\javaw.exe"= TCP:C:\program files\java\jre1.6.0_05\bin\javaw.exe:Java(TM) Platform SE binary
"TCP Query User{F3EFC1D8-DB92-4970-A42E-6DFC35E724E1}C:\\program files\\bittorrent\\bittorrent.exe"= UDP:C:\program files\bittorrent\bittorrent.exe:bittorrent
"UDP Query User{56E46536-37D0-412D-9FC6-2EC33F49C03C}C:\\program files\\bittorrent\\bittorrent.exe"= TCP:C:\program files\bittorrent\bittorrent.exe:bittorrent

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List]
"C:\\Program Files\\BitTorrent\\bittorrent.exe"= C:\Program Files\BitTorrent\bittorrent.exe:*:Enabled:BitTorrent

R2 {95808DC4-FA4A-4c74-92FE-5B863F82066B};{95808DC4-FA4A-4c74-92FE-5B863F82066B};C:\Program Files\CyberLink\PowerDVD\000.fcl [2006-11-02 16:51]
R2 SBSDWSCService;SBSD Security Center Service;C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe [2008-01-28 11:43]
R2 Viewpoint Manager Service;Viewpoint Manager Service;"C:\Program Files\Viewpoint\Common\ViewpointService.exe" [2007-01-04 17:38]
R3 athrusb;XPC 802.11b/g Wireless Kit Driver;C:\Windows\system32\DRIVERS\athrusb.sys [2006-12-22 20:05]
R3 atikmdag;atikmdag;C:\Windows\system32\DRIVERS\atikmdag.sys [2008-02-26 01:53]
R3 VST_DPV;VST_DPV;C:\Windows\system32\DRIVERS\VSTDPV3.SYS [2006-11-02 03:41]
R3 VSTHWBS2;VSTHWBS2;C:\Windows\system32\DRIVERS\VSTBS23.SYS [2006-11-02 03:41]
S3 GoogleDesktopManager-093007-112848;Google Desktop Manager 5.5.709.30344;"C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" [2007-12-25 14:02]
S3 Steam Client Service;Steam Client Service;C:\Program Files\Common Files\Steam\SteamService.exe [2008-03-14 19:57]
S3 ZD1211BU(ZyDAS);ZyDAS ZD1211B IEEE 802.11 b+g Wireless LAN Driver (USB)(ZyDAS);C:\Windows\system32\DRIVERS\zd1211Bu.sys [2006-06-27 14:32]
S3 ZD1211U(Hawking);Hawking Hi-Gain Wireless-G USB Dish Adapter(Hawking);C:\Windows\system32\DRIVERS\zd1211u.sys [2005-10-04 18:38]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\G]
\shell\AutoRun\command - G:\dvdcheck.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{d445e529-8b40-11dc-94c0-0019d1080d15}]
\shell\AutoRun\command - E:\LaunchU3.exe

*Newly Created Service* - CATCHME
.
Contents of the 'Scheduled Tasks' folder
"2008-04-21 20:15:31 C:\Windows\Tasks\User_Feed_Synchronization-{4743113D-4DA1-42E6-B040-67655FEE91E9}.job"
- C:\Windows\system32\msfeedssync.exe
.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-21 16:17:18
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-04-21 16:19:17
ComboFix-quarantined-files.txt 2008-04-21 20:18:27

Pre-Run: 10,775,896,064 bytes free
Post-Run: 10,753,155,072 bytes free

425 --- E O F --- 2008-04-17 20:56:42

====================

b) Hyjackthis Updated Report

====================

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:08:32 PM, on 4/20/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\System32\smss.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\wininit.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Autodesk\3dsMax8\mentalray\satellite\raysat_3dsmax8server.exe
C:\Windows\system32\PnkBstrA.exe
C:\Windows\system32\svchost.exe
C:\Program Files\CyberLink\Shared files\RichVideo.exe
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Windows\stsystra.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Hawking\HWU8DD\HWU8DD.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\System32\mobsync.exe
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\SearchProtocolHost.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Internet Explorer\IEUser.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: IE to GetRight Helper - {31FF080D-12A3-439A-A2EF-4BA95A3148E8} - C:\Program Files\GetRight\xx2gr.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [LanguageShortcut] "C:\Program Files\CyberLink\PowerDVD\Language\Language.exe"
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe"
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [PCTAVApp] "C:\Program Files\PC Tools AntiVirus\PCTAV.exe" /MONITORSCAN
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [cmds] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\geBtssRh.dll,c
O4 - HKCU\..\Run: [MSServer] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\khfDwuSI.dll,#1
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [MS Juan] rundll32 "C:\Users\PCOWNE~1\AppData\Local\Temp\xgrnnatk.dll",run
O4 - HKCU\..\Run: [188b2446] rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\meldflpl.dll",b
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [BM1bb817da] Rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\ekolaccx.dll",s
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: Hawking Wireless Utility.lnk = C:\Program Files\Hawking\HWU8DD\HWU8DD.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O16 - DPF: {4EFA317A-8569-4788-B175-5BAF9731A549} (Microsoft Virtual Server VMRC Advanced Control) - http://www.windowsvistatestdrive.com/ActiveX/VMRCActiveXClient1.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://3dlifeplayer.dl.3dvia.com/player/install/installer.exe
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~2\GOEC62~1.DLL
O20 - Winlogon Notify: avgwlntf - avgwlntf.dll (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG7 Resident Shield Service (AvgCoreSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgrssvc.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Desktop Manager 5.5.709.30344 (GoogleDesktopManager-093007-112848) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: RaySat_3dsmax8 Server (mi-raysat_3dsmax8) - Unknown owner - C:\Program Files\Autodesk\3dsMax8\mentalray\satellite\raysat_3dsmax8server.exe
O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared files\RichVideo.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files\Common Files\Steam\SteamService.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

--
End of file - 11005 bytes

====================

Blade81
2008-04-21, 23:43
Hi


Disable Spybot's TeaTimer
Run Spybot-S&D in Advanced Mode
If it is not already set to do this, go to the Mode menu
select
Advanced Mode

On the left hand side, click on Tools
Then click on the Resident icon in the list
Uncheck
Resident TeaTimer
and OK any prompts.
Restart your computer


Disable Windows Defender's realtime protection.

Open Windows Defender
Click on
Tools

Click on
General Settings

Scroll down to
Real-time protection options

Uncheck
Turn on Real-time protection (recommended)

Click
Save

Exit the program.


Start hjt, do a system scan, check:
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O4 - HKCU\..\Run: [cmds] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\geBtssRh.dll,c
O4 - HKCU\..\Run: [MSServer] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\khfDwuSI.dll,#1
O4 - HKCU\..\Run: [MS Juan] rundll32 "C:\Users\PCOWNE~1\AppData\Local\Temp\xgrnnatk.dll",run
O4 - HKCU\..\Run: [188b2446] rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\meldflpl.dll",b
O4 - HKCU\..\Run: Rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\ekolaccx.dll",s

Close browsers and fix checked entries.


Show hidden files (Vista)
-----------------
1. Open Folder Options by clicking the Start button, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options.
2. Click the View tab.
3. Under Advanced settings, click Show hidden files and folders, and then click OK.

Delete following files if found (PCOWNE~1 is a folder which name begins as PCOWNE):
C:\Users\PCOWNE~1\AppData\Local\Temp\geBtssRh.dll
C:\Users\PCOWNE~1\AppData\Local\Temp\khfDwuSI.dll
C:\Users\PCOWNE~1\AppData\Local\Temp\xgrnnatk.dll
C:\Users\PCOWNE~1\AppData\Local\Temp\meldflpl.dll
C:\Users\PCOWNE~1\AppData\Local\Temp\ekolaccx.dll

Download ATF (Atribune Temp File) Cleaner© by Atribune (http://www.atribune.org/ccount/click.php?id=1) to your desktop.

Double-click ATF Cleaner.exe to open it

Under Main choose:
Windows Temp
Current User Temp
All Users Temp
Cookies
Temporary Internet Files
Prefetch
Java Cache
*The other boxes are optional*
Then click the Empty Selected button.

If you use Firefox:
Click Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

If you use Opera:
Click Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

Click Exit on the Main menu to close the program.



Please run an online scan with Kaspersky Online Scanner (http://www.kaspersky.com/downloads/kws/kavwebscan.html). You will be prompted to install an ActiveX component from Kaspersky, click Yes.
The program will launch and start to download the latest definition files.
Once the scanner is installed and the definitions downloaded, click [B]Next.
Now click on Scan Settings and select the following:
Scan using the following Anti-Virus database:
Extended (If available, otherwise Standard)
Scan Options:
Scan Archives
Scan Mail Bases
Click OK.
Under
select a target to scan
, select My Computer.
The scan will take a while so be patient and let it run. As it scans your machine very deeply it could take hours to complete, Kaspersky suggests running it during a time of low activity.Once the scan is complete:
Click on the Save as Text button.
Save the file to your desktop.
Copy and paste that information into your next post if the AV content will fit into one post only. Post a fresh hjt log too.


Note for Internet Explorer 7 users: If at any time you have trouble with the Accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.

If having a problme doing the above

Make sure that your Internet security settings are set to default values.

To set default security settings for Internet Explorer:

* Open Internet Explorer.
* Go to the Tools menu, then choose Internet Options.
* Click on the Security tab.
* Make sure that all four item (Internet, Local intranet, Trusted sites, and Restricted sites) are set to their default settings.

Jahn_G
2008-04-22, 03:41
After running the hjt app, the following files were no longer on the scan. I don't know why, but they just disappeared and seem to be permanently gone:

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
O4 - HKCU\..\Run: [cmds] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\geBtssRh.dll,c
O4 - HKCU\..\Run: [MSServer] rundll32.exe C:\Users\PCOWNE~1\AppData\Local\Temp\khfDwuSI.dll,#1
O4 - HKCU\..\Run: [MS Juan] rundll32 "C:\Users\PCOWNE~1\AppData\Local\Temp\xgrnnatk.dll",run
O4 - HKCU\..\Run: [188b2446] rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\meldflpl.dll",b
O4 - HKCU\..\Run: [BM1bb817da] Rundll32.exe "C:\Users\PCOWNE~1\AppData\Local\Temp\ekolaccx.dll",s

I did delete the following:

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)

This is the new HJT log after I cleared the two files.


a) HJT Updated Log

====================

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:39:52 PM, on 4/21/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Windows\stsystra.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Hawking\HWU8DD\HWU8DD.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: IE to GetRight Helper - {31FF080D-12A3-439A-A2EF-4BA95A3148E8} - C:\Program Files\GetRight\xx2gr.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [LanguageShortcut] "C:\Program Files\CyberLink\PowerDVD\Language\Language.exe"
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe"
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [PCTAVApp] "C:\Program Files\PC Tools AntiVirus\PCTAV.exe" /MONITORSCAN
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: Hawking Wireless Utility.lnk = C:\Program Files\Hawking\HWU8DD\HWU8DD.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {4EFA317A-8569-4788-B175-5BAF9731A549} (Microsoft Virtual Server VMRC Advanced Control) - http://www.windowsvistatestdrive.com/ActiveX/VMRCActiveXClient1.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://3dlifeplayer.dl.3dvia.com/player/install/installer.exe
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~2\GOEC62~1.DLL
O20 - Winlogon Notify: avgwlntf - avgwlntf.dll (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG7 Resident Shield Service (AvgCoreSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgrssvc.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Desktop Manager 5.5.709.30344 (GoogleDesktopManager-093007-112848) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: RaySat_3dsmax8 Server (mi-raysat_3dsmax8) - Unknown owner - C:\Program Files\Autodesk\3dsMax8\mentalray\satellite\raysat_3dsmax8server.exe
O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared files\RichVideo.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files\Common Files\Steam\SteamService.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

--
End of file - 7995 bytes

====================



The files in the temp folder were cleared successfully.

The ATF Cleaner successfully cleaned all sections but the Prefetch, which read as "Prefetch (Disabled)" and was grayed out.

Firefox was successfully cleaned as well.

I ran Kaspersky, and it said that I had 2 viruses and 2 infected objects.

b) Kaspersky Updated Log

====================

-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Monday, April 21, 2008 8:38:16 PM
Operating System: Microsoft Windows Vista Home Edition, Service Pack 1 (Build 6001)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 21/04/2008
Kaspersky Anti-Virus database records: 719519
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\
I:\

Scan Statistics:
Total number of scanned objects: 213779
Number of viruses found: 2
Number of infected objects: 2
Number of suspicious objects: 0
Duration of the scan process: 01:54:15

Infected Object Name / Virus Name / Last Action
C:\$Recycle.Bin\S-1-5-21-2155666659-804555949-1685249000-1000\$R1MQZP7.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.pmx skipped
C:\$Recycle.Bin\S-1-5-21-2155666659-804555949-1685249000-1000\$RFRIJIW.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.pmw skipped
C:\Boot\BCD Object is locked skipped
C:\Boot\BCD.LOG Object is locked skipped
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\6a6f9f03b6f189d97a988dd50119e618_e6235454-bd8b-432c-b7ce-8873c38c6bd7 Object is locked skipped
C:\ProgramData\Microsoft\User Account Pictures\Dorothy.dat Object is locked skipped
C:\ProgramData\Microsoft\User Account Pictures\Guest Admin.dat Object is locked skipped
C:\ProgramData\Microsoft\User Account Pictures\Guest.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012008042120080422\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012008042120080422\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG1 Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG2 Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat{60acaa72-251b-11dc-849d-cdb7ab10a7f0}.TM.blf Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat{60acaa72-251b-11dc-849d-cdb7ab10a7f0}.TMContainer00000000000000000001.regtrans-ms Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows\UsrClass.dat{60acaa72-251b-11dc-849d-cdb7ab10a7f0}.TMContainer00000000000000000002.regtrans-ms Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT Object is locked skipped
C:\Users\PC Owner\AppData\Local\Microsoft\Windows Sidebar\Settings.ini Object is locked skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_001_ Object is locked skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_002_ Object is locked skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_003_ Object is locked skipped
C:\Users\PC Owner\AppData\Local\Mozilla\Firefox\Profiles\kyjiq064.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Microsoft\Windows\Cookies\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.dat Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\cert8.db Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\history.dat Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\key3.db Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\parent.lock Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\search.sqlite Object is locked skipped
C:\Users\PC Owner\AppData\Roaming\Mozilla\Firefox\Profiles\kyjiq064.default\urlclassifier2.sqlite Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT Object is locked skipped
C:\Users\PC Owner\ntuser.dat.LOG1 Object is locked skipped
C:\Users\PC Owner\ntuser.dat.LOG2 Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TM.blf Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000001.regtrans-ms Object is locked skipped
C:\Users\PC Owner\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000002.regtrans-ms Object is locked skipped
C:\Windows\Debug\PASSWD.LOG Object is locked skipped
C:\Windows\Debug\WIA\wiatrace.log Object is locked skipped
C:\Windows\Installer\MSI583C.tmp Object is locked skipped
C:\Windows\Installer\MSIBEB1.tmp Object is locked skipped
C:\Windows\Logs\CBS\CBS.log Object is locked skipped
C:\Windows\Logs\CBS\CBS.persist.log Object is locked skipped
C:\Windows\Logs\DPX\setupact.log Object is locked skipped
C:\Windows\Logs\DPX\setuperr.log Object is locked skipped
C:\Windows\MEMORY.DMP Object is locked skipped
C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe.config Object is locked skipped
C:\Windows\Panther\catalogs\OfflineUpgradeStore.dat Object is locked skipped
C:\Windows\Panther\catalogs\OnlineEnvStore.dat Object is locked skipped
C:\Windows\Panther\catalogs\OnlineMigStore.dat Object is locked skipped
C:\Windows\Panther\catalogs\OnlineUpgradeStore.dat Object is locked skipped
C:\Windows\Panther\UnattendGC\diagerr.xml Object is locked skipped
C:\Windows\Panther\UnattendGC\diagwrn.xml Object is locked skipped
C:\Windows\Panther\UnattendGC\setupact.log Object is locked skipped
C:\Windows\Panther\UnattendGC\setuperr.log Object is locked skipped
C:\Windows\security\database\secedit.sdb Object is locked skipped
C:\Windows\SoftwareDistribution\EventCache\{307A2BFF-2105-4EF5-814C-028C433012EB}.bin Object is locked skipped
C:\Windows\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0 Object is locked skipped
C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0 Object is locked skipped
C:\Windows\System32\catroot2\edb.log Object is locked skipped
C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb Object is locked skipped
C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb Object is locked skipped
C:\Windows\System32\drivers\sptd.sys Object is locked skipped
C:\Windows\System32\LogFiles\Scm\SCM.EVM Object is locked skipped
C:\Windows\System32\LogFiles\WUDF\WUDFTrace.etl Object is locked skipped
C:\Windows\System32\restore\MachineGuid.txt Object is locked skipped
C:\Windows\System32\spool\SpoolerETW.etl Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\0296C47314AB746EC35476488248FCD9.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\040270F850D5C3C91057DDDA2DA294D8.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\0A9DBC92D554324656F61F9862679F27.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\0DF617D6737A7561E732F853792261C3.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\1E2E58C73053C7775EB226DB5E739137.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\26C097A9392F8C541AD42E89B7909073.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2A811E5CCC22CC9D7AE2B04EF0402688.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2AA23BB86A5EBD8BC2D820944E55B233.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2CE523184A801AA7361A7039E2D6B41D.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\2D57A7682ACD19214C258D31A06D008F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\3460B7617E0429A960E481B197F238A3.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\376786241A5443E41378D25CF812FCC1.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\3DC0BABDCA20E5E319117C21BD4BD795.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\494C62FAA08CD5217399BAA555FF491B.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\4A01E0F376B5833EBA98F0D1D5F60CD1.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\4B471F64BAF831EC7945C820FD5A16E5.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\4CB32C0A77CD4D9B0C9618F73F786C32.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\5774C77265BE4C55B5C6C9718979E015.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\5966D45C7B25EACA46E87DD8E5703964.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\5B5D21CF62E70BACF9D085E6AA6CE143.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\69554D930FCA40B0304B9A43A8036F2D.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\72F867EF62976CE9F70993FF3E68A4EB.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\75054C3771DF289038069A9BB1C1FB6E.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\7851AF96EA828F912853F32DB0D96138.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\7F417E1A6D819A9B2FEB55DA6858EA0A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\87AA2A001CE3E89926688B93E4DC2992.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\8A94AF24F162D580E3D9889344A3A317.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\8C718B5AFD373885B68D2836088CAF9A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\903E49C444C46FEF5F2C3A189C9CEF71.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\96ABB1671705F680578FE240427CBD4F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9A72EE7775E8021F75961342B8AFD1B4.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9AD3182A2F39A3E091E15109132EC6CC.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9CD33F0956942860B50AA1B9330DEFAF.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\9E06E4FE97F0CBB8D659894823F805D7.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\A80FF2DC09487ECD60AFB147B262BDD7.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\AA6E0E396C238977CA909EFD82299737.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\AA742824DCADA846BA4B665D686DD5D6.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\BBF206490BAA431B592F9A13534F43F6.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\BE81B2C0741907C1FC1C42B6223E59AD.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\D1A1B12A7DA3F9675C01397A26DBF4B3.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\D4C4BA54B6A8FA6211E60E2ADFF7426A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\DE391013DA56ABA39FFF40A9ABDF052F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\DF80FD3849FFF74B4BF43E2EA8ADEC8A.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\DFB9AD54AC2D3B8122567AAD3BF3EB7F.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\E04DE4CDFEC284A342159BB920976701.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\E737DE61441445E1FDFCA45EF5E7D987.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\E9D8A460B2C986DD5FF19F299F4A27EC.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\EC45C70F2A3D9DED718E71631C38E2FE.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\F01326692CC5736EBAC31B9FC2381CF2.mof Object is locked skipped
C:\Windows\System32\wbem\AutoRecover\F81E6BEBC3067C406E6C491608474198.mof Object is locked skipped
C:\Windows\System32\wbem\Logs\WMITracing.log Object is locked skipped
C:\Windows\System32\wbem\Repository\INDEX.BTR Object is locked skipped
C:\Windows\System32\wbem\Repository\MAPPING1.MAP Object is locked skipped
C:\Windows\System32\wbem\Repository\MAPPING2.MAP Object is locked skipped
C:\Windows\System32\wbem\Repository\OBJECTS.DATA Object is locked skipped
C:\Windows\System32\winevt\Logs\Antivirus.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Application.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\DFS Replication.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\HardwareEvents.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Internet Explorer.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Key Management Service.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Media Center.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Bits-Client%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-CodeIntegrity%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-CorruptedFileRecovery-Client%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-CorruptedFileRecovery-Server%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DateTimeControlPanel%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnosis-DPS%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnosis-PLA%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnostics-Networking%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Diagnostics-Performance%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DiskDiagnostic%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DiskDiagnosticDataCollector%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DiskDiagnosticResolver%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DriverFrameworks-UserMode%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Forwarding%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-GroupPolicy%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-International%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-WDI%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-WHEA.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-LanguagePackSetup%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-MUI%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-NetworkAccessProtection%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ParentalControls%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ReadyBoost%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ReliabilityAnalysisComponent%4Metrics.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-ReliabilityAnalysisComponent%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Resource-Exhaustion-Resolver%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Resource-Leak-Diagnostic%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-TaskScheduler%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-UAC%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-WindowsUpdateClient%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Winlogon%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Winsock-WS2HELP%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-Wired-AutoConfig%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Microsoft-Windows-WLAN-AutoConfig%4Operational.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Security.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\Setup.evtx Object is locked skipped
C:\Windows\System32\winevt\Logs\System.evtx Object is locked skipped
C:\Windows\Tasks\SCHEDLGU.TXT Object is locked skipped
C:\Windows\WindowsUpdate.log Object is locked skipped
C:\Windows\winsxs\x86_microsoft-windows-n..n_service_datastore_31bf3856ad364e35_6.0.6000.16386_none_cef7ceb03914a67f\dnary.xsd Object is locked skipped
C:\Windows\winsxs\x86_microsoft-windows-n..n_service_datastore_31bf3856ad364e35_6.0.6001.18000_none_d12e90ac35ffb753\dnary.xsd Object is locked skipped

Scan process completed.

====================

I have since emptied the recycle bin containing the infected files. Does this mean I'm completely clean? Thank you so much for your help so far. I can't express my appreciation in a posting. :)

Blade81
2008-04-22, 08:38
Yes, looks fine :)

Well congrats, it appears your system is all clean Are you still noticing any problems? If not, it's time to secure your system to prevent against further intrusions.


THESE STEPS ARE VERY IMPORTANT

Let's reset system restore
Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs changing those files. This is the only way to clean these files: You will lose all previous restore points which are likely to be infected. Please note you need Administrator Access to do clean the restore points.

A To disable the System Restore feature:

1. Click on the Start button.
2. Hover over the Computer option, right click on it and then click Properties.
3. On the left hand side, click Advanced Settings.
4. If asked to permit the action, click on Allow.
5. Click on the System Protection tab.
6. Uncheck any checkboxes listed for your hard drives.
7. Press OK.


B. Reboot.

C Turn ON System Restore.
Follow the steps like you did when disabling system restore but on step 6. check any checkboxes listed for your hard drives.



Now lets uninstall ComboFix:

Click START then RUN
Now type Combofix /u in the runbox and click OK



Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version Java components and update to the latest version...

Updating Java:

Download the latest version of Java Runtime Environment (JRE) 6 Update 6 (http://java.sun.com/javase/downloads/index.jsp).
Scroll down to where it says
The J2SE Runtime Environment (JRE) allows end-users to run Java applications.

Click the
Download
button to the right.
Select Windows on platform combobox and check the box that says:
Accept License Agreement. Click continue.

The page will refresh.
Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
Close any programs you may have running - especially your web browser.
Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java.
Check any item with Java Runtime Environment (JRE or J2SE) in the name.
Click the Remove or Change/Remove button.
Repeat as many times as necessary to remove each Java versions.
Reboot your computer once all Java components are removed.
Then from your desktop double-click on jre-6u6-windows-i586-p.exe to install the newest version.


UPDATING WINDOWS AND INTERNET EXPLORER

IMPORTANT: You Need to Update Windows and Internet Explorer to protect your computer from the malware that is around on the Internet. Please go to the windows update site (http://windowsupdate.microsoft.com/) to get the critical updates.

If you are running Microsoft Office, or any portion thereof, go to the Microsoft's Office Update site and make sure you have at least all the critical updates installed (Free) Microsoft Office Update.

Make your Internet Explorer more secure

This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.



The following are recommended third party programs that are designed to keep your computer clean. A link as well as a brief description is included with each item.

Download SpywareBlaster
Spyware blaster is a program that stops known malicious activex controls from installing on your computer. It works by changing settings in your registry. It makes
kill bits
in the registry, so that certain activex controls can't install.
If you don't know what activex controls are, see here (http://www.webopedia.com/TERM/A/ActiveX_control.html)
You can download SpywareBlaster here here (http://majorgeeks.com/downloadget.php?id=2859&file=11&evp=61b0e8ad41924a03c37615f4682b4cef)
SpywareBlaster tutorial (http://www.bleepingcomputer.com/forums/tutorial49.html)

Download iespyad
It puts many bad webpages on your restricted zones list. This means that you can still view the
bad
webpages, but the webpages cannot do certain things (such as use javascripts and cookies).
If you need help understanding how it works, there is a tutorial here (http://www.bleepingcomputer.com/tutorials/tutorial53.html)
Download it here (http://www.spywarewarrior.com/uiuc/res/ie-spyad.exe)

hosts file:
Every version of windows has a hosts file as part of them. In a very basic sense, they are used to locate webpages. We can customize a hosts file so that it blocks certain webpages. However, it can slow down certain computers. This is why using a hosts file is optional!!
Download it here (http://www.mvps.org/winhelp2002/hosts.htm). Make sure you read the instructions on how to install the hosts file. There is a good tutorial here (http://www.bleepingcomputer.com/forums/tutorial51.html)
If you decide to download the hosts file, the slowdown problems can usually be avoided by following these steps:
Click the start button (at the lower left hand corner of your screen) Click run In the dialog box, type services.msc hit enter, then locate dns client Highlight it, then double-click it. On the dropdown box, change the setting from automatic to manual. Click ok



Just a final reminder for you. I am trying to stress these two points.
UPDATE UPDATE UPDATE!!! Make sure you do this about every 1-2 weeks.
Make sure all of your security programs are up to date.
Run the spybot and adaware regularly. (Once or twice a week minimum.)
Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.


Once again, please post and tell me how things are going with your system... problems etc.

Have a great day,
Blade :cool:

Jahn_G
2008-04-22, 22:17
Thank you so very very much for all your help. I can not express the extent of my gratitude in a posting. You are providing such an incredible service to everyone suffering from these security threats, and we all appreciate it very very much. I hope you continue your incredible service to the online community. I hope that I will never have to talk with you again, but in the case that I might have to, I am so glad to have the help of reliable people such as yourselves. Thank you very very much. :)

Blade81
2008-04-22, 22:26
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help. :)

Note:If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.