Page 1 of 2 12 LastLast
Results 1 to 10 of 13

Thread: Think I have the xpantivirus

  1. #1
    Junior Member
    Join Date
    Mar 2009
    Posts
    7

    Default Think I have the xpantivirus

    My pc says it has malware on it and that I should go to "their" site for anti-virus. I've run Spybot Search and Destroy. It removed a number of issues but needed a reboot of the pc to remove xpantivirus. After the reboot, spybot gets almost to the end of the scan when I encounter the windows blue screen and the system restarts. Virus is still there.

    Thank you,
    -Zeiger

    hijackthis log:
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:17:42 PM, on 3/17/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\Rundll32.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\MediaMall\MediaMallServer.exe
    C:\Program Files\MySQL\MySQL Server 5.1\bin\mysqld.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Documents and Settings\Justin\My Documents\Downloads\HiJackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: (no name) - {d0bd1255-f6cc-42a7-9f1e-a8cf17625072} - C:\WINDOWS\system32\sidefevi.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O2 - BHO: {7b5b913a-d0fa-2548-eb54-4143139dd9ef} - {fe9dd931-3414-45be-8452-af0da319b5b7} - C:\WINDOWS\system32\sqybwb.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [dutofatoha] Rundll32.exe "C:\WINDOWS\system32\worikalu.dll",s
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: c:\windows\temp\ntdll64.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\temp\ntdll64.dll
    O16 - DPF: {2A0B9B82-D5C8-4D3D-8338-AD55B23662B1} (F5 Networks CacheCleaner) - https://myportal.valleymed.org/vdesk...2008,0514,2338
    O16 - DPF: {45B69029-F3AB-4204-92DE-D5140C3E8E74} (F5 Networks Auto Update) - C:\DOCUME~1\Justin\LOCALS~1\Temp\IXP000.TMP\InstallerControl.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/wind...?1213676482968
    O16 - DPF: {6C275925-A1ED-4DD2-9CEE-9823F5FDAA10} (F5 Networks SSLTunnel) - https://myportal.valleymed.org/vdesk...2008,0514,2337
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1213680159859
    O16 - DPF: {E0FF21FA-B857-45C5-8621-F120A0C17FF2} (F5 Networks Host Control) - https://myportal.valleymed.org/vdesk...2008,0514,2340
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C049D0A6-54B0-4DAE-AFC6-CFEE6C65C5BC}: NameServer = 68.87.69.146,68.87.85.98
    O20 - AppInit_DLLs: C:\WINDOWS\system32\fpfstb.dll,C:\WINDOWS\system32\fuzufuya.dll c:\windows\system32\ c:\windows\system32\lojaloke.dll
    O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\lojaloke.dll (file missing)
    O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\lojaloke.dll (file missing)
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Client32 - NetSupport Ltd - C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    O23 - Service: ForceWare Intelligent Application Manager (IAM) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MediaMall Server - MediaMall Technologies, Inc. - C:\Program Files\MediaMall\MediaMallServer.exe
    O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
    O23 - Service: ForceWare IP service (nSvcIp) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

    --
    End of file - 7607 bytes

  2. #2
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Welcome to Safer Networking, I wish to be sure you have viewed and understand this information.
    "BEFORE you POST" (READ this Procedure before Requesting Assistance) http://forums.spybot.info/showthread.php?t=288
    All advice given is taken at your own risk.
    Please make sure you have read this information so we are on the same page.

    Pinned (sticky) to the top of this forum, and posted above are the directions, make sure you have read and followed them.

    You have multiple infections and becuase HijackThis is not placed as instructed, I have to assume you did not read the directions. Please read and follow all directions for the safety of your computer.

    1) Download Trend Micro Hijack This™ to your Desktop
    http://download.bleepingcomputer.com...HJTInstall.exe
    Doubleclick the HJTInstall.exe to start it.
    By default it will install HijackThis in the Program Files\Trendmicro folder and create a desktop shortcut.
    HijackThis will open after install. Press the Scan button below.
    This will start the scan and open a log. <<< close HJT until I ask for a log later.

    2) We will use an excellant tutorial at BleepingComputer, please follow the directions here:
    http://www.bleepingcomputer.com/malw...tispyware-2008

    When you get to line #12 in the tutorial, I would like you to follow these directions.

    * When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be opened by going to Start > All Programs > Malwarebytes' Anti-Malware > Logs > log-date.txt
    * Please post contents of that file & a new HJT log in your next reply.

    3) Post also an uninstall list: Open Hijackthis.
    Click the "Open the Misc Tools" section Button.
    Click the "Open Uninstall Manager" Button.
    Click the "Save list..." Button.
    Save it to your desktop. Copy and paste the contents into your reply.
    Image: http://img.bleepingcomputer.com/tuto...nstall-man.jpg

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  3. #3
    Junior Member
    Join Date
    Mar 2009
    Posts
    7

    Default

    MBAM Log
    -----------------------------

    Malwarebytes' Anti-Malware 1.34
    Database version: 1866
    Windows 5.1.2600 Service Pack 3

    3/18/2009 4:01:34 PM
    mbam-log-2009-03-18 (16-01-34).txt

    Scan type: Quick Scan
    Objects scanned: 63926
    Time elapsed: 3 minute(s), 28 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 2
    Folders Infected: 0
    Files Infected: 1

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\windows\system32\userinit.exe -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: system32\userinit.exe -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\WINDOWS\system32\win32hlp.cnf (Trojan.Agent) -> Quarantined and deleted successfully.
    ----------------------------------------

    Hijack This Log
    ---------------------------------

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 4:03:45 PM, on 3/18/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\MediaMall\MediaMallServer.exe
    C:\Program Files\MySQL\MySQL Server 5.1\bin\mysqld.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Documents and Settings\Justin\My Documents\Downloads\HiJackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O16 - DPF: {2A0B9B82-D5C8-4D3D-8338-AD55B23662B1} (F5 Networks CacheCleaner) - https://myportal.valleymed.org/vdesk...2008,0514,2338
    O16 - DPF: {45B69029-F3AB-4204-92DE-D5140C3E8E74} (F5 Networks Auto Update) - C:\DOCUME~1\Justin\LOCALS~1\Temp\IXP000.TMP\InstallerControl.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/wind...?1213676482968
    O16 - DPF: {6C275925-A1ED-4DD2-9CEE-9823F5FDAA10} (F5 Networks SSLTunnel) - https://myportal.valleymed.org/vdesk...2008,0514,2337
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1213680159859
    O16 - DPF: {E0FF21FA-B857-45C5-8621-F120A0C17FF2} (F5 Networks Host Control) - https://myportal.valleymed.org/vdesk...2008,0514,2340
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C049D0A6-54B0-4DAE-AFC6-CFEE6C65C5BC}: NameServer = 68.87.69.146,68.87.85.98
    O20 - AppInit_DLLs: C:\WINDOWS\system32\fpfstb.dll c:\windows\system32\ c:\windows\system32\lojaloke.dll memwca.dll ,
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Client32 - NetSupport Ltd - C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    O23 - Service: ForceWare Intelligent Application Manager (IAM) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MediaMall Server - MediaMall Technologies, Inc. - C:\Program Files\MediaMall\MediaMallServer.exe
    O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
    O23 - Service: ForceWare IP service (nSvcIp) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

    --
    End of file - 6664 bytes
    --------------------------

    Uninstall List

    -----------------------------

    7-Zip 4.57
    AC3Filter (remove only)
    Adobe Acrobat and Reader 8.1.2 Security Update 1 (KB403742)
    Adobe Flash Player 10 Plugin
    Adobe Flash Player ActiveX
    Adobe Reader 8.1.2
    Age of Conan - Hyborian Adventures
    Allway Sync version 9.0.1
    Apple Mobile Device Support
    Apple Software Update
    bitcontrol® MPEG Video Decoder v3.0
    Bonjour
    DivX Codec
    DivX Converter
    DivX Player
    DivX Plus DirectShow Filters
    DivX Web Player
    DR Systems Web Ambassador
    EA Download Manager
    ERUNT 1.1j
    EVE-Central.com MarketUploader 1.3.1
    EVEMon
    EVE-ONLINE (remove only)
    Google Talk (remove only)
    Google Talk Plugin
    HijackThis 2.0.2
    Hotfix for Windows Media Format 11 SDK (KB929399)
    Hotfix for Windows Media Player 11 (KB939683)
    Hotfix for Windows XP (KB952287)
    HP Image Zone 3.5
    HP PSC & OfficeJet 3.5
    HP Software Update
    ImgBurn
    iTunes
    Java(TM) 6 Update 11
    Java(TM) 6 Update 4
    Java(TM) 6 Update 7
    Linksys Wireless-G Music Bridge
    Malwarebytes' Anti-Malware
    Memories Disc Creator 2.0
    Microsoft .NET Framework 1.1
    Microsoft .NET Framework 1.1
    Microsoft .NET Framework 1.1 Hotfix (KB928366)
    Microsoft .NET Framework 2.0 Service Pack 1
    Microsoft Compression Client Pack 1.0 for Windows XP
    Microsoft Internationalized Domain Names Mitigation APIs
    Microsoft National Language Support Downlevel APIs
    Microsoft Silverlight
    Microsoft User-Mode Driver Framework Feature Pack 1.0
    MobileMe Control Panel
    Mozilla Firefox (3.0.7)
    MSXML 4.0 SP2 (KB936181)
    MSXML 4.0 SP2 (KB954430)
    MySQL Server 5.1
    NetSupport Manager
    NVIDIA Drivers
    NVIDIA ForceWare Network Access Manager
    NVIDIA ForceWare Network Access Manager
    NVIDIA PhysX v8.09.04
    OpenOffice.org 2.4
    PlayOn 2.59.3343
    Python 2.5 MySQL-python-1.2.2
    Python 2.5.4
    Python 3.0
    QuickTime
    Realtek High Definition Audio Driver
    Safari
    Security Update for Windows Internet Explorer 7 (KB938127-v2)
    Security Update for Windows Internet Explorer 7 (KB950759)
    Security Update for Windows Internet Explorer 7 (KB953838)
    Security Update for Windows Internet Explorer 7 (KB956390)
    Security Update for Windows Internet Explorer 7 (KB958215)
    Security Update for Windows Internet Explorer 7 (KB960714)
    Security Update for Windows Media Player (KB952069)
    Security Update for Windows Media Player 11 (KB936782)
    Security Update for Windows Media Player 11 (KB954154)
    Security Update for Windows XP (KB938464)
    Security Update for Windows XP (KB941569)
    Security Update for Windows XP (KB946648)
    Security Update for Windows XP (KB950760)
    Security Update for Windows XP (KB950762)
    Security Update for Windows XP (KB950974)
    Security Update for Windows XP (KB951066)
    Security Update for Windows XP (KB951376)
    Security Update for Windows XP (KB951376-v2)
    Security Update for Windows XP (KB951698)
    Security Update for Windows XP (KB951748)
    Security Update for Windows XP (KB952954)
    Security Update for Windows XP (KB953839)
    Security Update for Windows XP (KB954211)
    Security Update for Windows XP (KB954459)
    Security Update for Windows XP (KB954600)
    Security Update for Windows XP (KB955069)
    Security Update for Windows XP (KB956391)
    Security Update for Windows XP (KB956802)
    Security Update for Windows XP (KB956803)
    Security Update for Windows XP (KB956841)
    Security Update for Windows XP (KB957095)
    Security Update for Windows XP (KB957097)
    Security Update for Windows XP (KB958644)
    SPORE™
    Spybot - Search & Destroy
    Steam
    System Requirements Lab
    Update for Windows XP (KB942763)
    Update for Windows XP (KB951072-v2)
    Update for Windows XP (KB951978)
    Update for Windows XP (KB955839)
    VC80CRTRedist - 8.0.50727.762
    Ventrilo Client
    Warhammer Online - Age of Reckoning
    Winamp
    Winamp 5 Media Liabrary Import/Export (remove only)
    Windows Internet Explorer 7
    Windows Media Format 11 runtime
    Windows Media Format 11 runtime
    Windows Media Player 11
    Windows Media Player 11
    Windows Media Player Firefox Plugin
    Windows XP Service Pack 3
    WinFF 0.43
    World of Warcraft
    Z Engine

    ---------------------------------

    Thank you again for the assistance!

  4. #4
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    The first instruction I posted, to locate HijackThis safely was not followed. Please follow those directions which are also posted in the "Before you Post" instructions. Once HJT is located properly, post a new HJT log and we can continue.

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  5. #5
    Junior Member
    Join Date
    Mar 2009
    Posts
    7

    Default

    I'm sorry, thought I downloaded it from the link provided. I downloaded HJT again and did a system scan with a log file. Here are the results:

    -----------------------------------------
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 1:15:48 AM, on 3/19/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\rundll32.exe
    C:\WINDOWS\system32\Rundll32.exe
    C:\WINDOWS\system32\Rundll32.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\MediaMall\MediaMallServer.exe
    C:\Program Files\MySQL\MySQL Server 5.1\bin\mysqld.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: (no name) - {d0bd1255-f6cc-42a7-9f1e-a8cf17625072} - C:\WINDOWS\system32\sidefevi.dll (file missing)
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [440daf75] rundll32.exe "C:\WINDOWS\system32\keyutova.dll",b
    O4 - HKLM\..\Run: [dutofatoha] Rundll32.exe "C:\WINDOWS\system32\worikalu.dll",s
    O4 - HKLM\..\Run: [CPM473e9ce9] Rundll32.exe "c:\windows\system32\talefake.dll",a
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O16 - DPF: {2A0B9B82-D5C8-4D3D-8338-AD55B23662B1} (F5 Networks CacheCleaner) - https://myportal.valleymed.org/vdesk...2008,0514,2338
    O16 - DPF: {45B69029-F3AB-4204-92DE-D5140C3E8E74} (F5 Networks Auto Update) - C:\DOCUME~1\Justin\LOCALS~1\Temp\IXP000.TMP\InstallerControl.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/wind...?1213676482968
    O16 - DPF: {6C275925-A1ED-4DD2-9CEE-9823F5FDAA10} (F5 Networks SSLTunnel) - https://myportal.valleymed.org/vdesk...2008,0514,2337
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1213680159859
    O16 - DPF: {E0FF21FA-B857-45C5-8621-F120A0C17FF2} (F5 Networks Host Control) - https://myportal.valleymed.org/vdesk...2008,0514,2340
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C049D0A6-54B0-4DAE-AFC6-CFEE6C65C5BC}: NameServer = 68.87.69.146,68.87.85.98
    O20 - AppInit_DLLs: C:\WINDOWS\system32\fpfstb.dll c:\windows\system32\ c:\windows\system32\lojaloke.dll memwca.dll ,C:\WINDOWS\system32\fuzufuya.dll c:\windows\system32\talefake.dll
    O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\talefake.dll (file missing)
    O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\talefake.dll (file missing)
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Client32 - NetSupport Ltd - C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    O23 - Service: ForceWare Intelligent Application Manager (IAM) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MediaMall Server - MediaMall Technologies, Inc. - C:\Program Files\MediaMall\MediaMallServer.exe
    O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
    O23 - Service: ForceWare IP service (nSvcIp) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

    --
    End of file - 7234 bytes

  6. #6
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    1) Please DO NOT ENABLE Spybot S&D TeaTimer while we work together.

    2) A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix on your own. This tool is not a toy and not for everyday use

    Download ComboFix from here:

    Link 1

    * IMPORTANT !!! Save ComboFix.exe to your Desktop

    • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
    • See this Link for programs that need to be disabled and instruction on how to disable them.
    • Remember to re-enable them when we're done.

    • Double click on ComboFix.exe & follow the prompts.
    • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
    • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.


    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


    Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Click on Yes, to continue scanning for malware.

    When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply along with a New Hijackthis log.

    *If there is no internet connection when Combofix has completely finished then restart your computer to restore back the connections.

    Tutorial if needed
    http://www.bleepingcomputer.com/comb...o-use-combofix

    3) This can be done as time permits, but it is important, and may be why you are infected.
    Uninstall list: I look for malware and security issues and will not know all of your programs, but you should.
    Hackers are using out of date programs to infect folks more and more,
    Here is a small free tool that lets you know when something needs an update if you are interested:
    http://secunia.com/vulnerability_scanning/personal/ While PSI runs in the System Tray for realtime notifications, I personally prefer to turn it off in MSConfig and run it from All Programs when I want to do a check.

    Adobe Flash Player 10 Plugin
    Adobe Flash Player ActiveX

    Adobe recommends all users of Adobe Flash Player 10.0.12.36 and earlier versions upgrade to the newest version 10.0.22.87
    http://www.adobe.com/support/securit...apsb09-01.html

    Adobe Reader 8.1.2 <<< out of date and unsafe, see this:
    http://news.cnet.com/8301-1009_3-100...ml?tag=nl.e433
    http://www.filehippo.com/download_adobe_reader/
    (if you want a smaller program, look at this one)
    Foxit Reader 2.3 for Windows (make sure to uncheck any toolbars)
    http://www.foxitsoftware.com/pdf/rd_intro.php

    Java(TM) 6 Update 11 <<< valid but an update is available
    Java(TM) 6 Update 4
    Java(TM) 6 Update 7

    others are out of date and unsafe, see this:
    http://forums.spybot.info/showpost.p...80&postcount=2
    Be aware of this information so you can opt out of anything you do not want.
    Microsoft Does MSN Toolbar Distribution Deal With Java:
    http://searchengineland.com/microsof...java-15413.php
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  7. #7
    Junior Member
    Join Date
    Mar 2009
    Posts
    7

    Default

    I ran ComboFix and HKT again. Will also work on updating the software you suggested. Thank you!

    Here are the results:
    ----------------------------------------

    ComboFix 09-03-18.01 - Justin 2009-03-19 14:41:16.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1412 [GMT -7:00]
    Running from: c:\documents and settings\Justin\Desktop\ComboFix.exe
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
    c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
    c:\windows\system32\dahadare.dll
    c:\windows\system32\gegiweto.dll
    c:\windows\system32\hfvner.dll
    c:\windows\system32\init32.exe
    c:\windows\system32\julolufe.dll
    c:\windows\system32\layezefu.dll
    c:\windows\system32\molizili.dll
    c:\windows\system32\refewodu.dll
    c:\windows\system32\riyiaf.dll
    c:\windows\system32\sqybwb.dll
    c:\windows\system32\win32hlp.cnf

    ----- BITS: Possible infected sites -----

    hxxp://ccp.vo.llnwd.net
    Infected copy of c:\windows\system32\userinit.exe was found and disinfected
    Restored copy from - c:\windows\$NtServicePackUninstall$\userinit.exe


    .
    ((((((((((((((((((((((((( Files Created from 2009-02-19 to 2009-03-19 )))))))))))))))))))))))))))))))
    .

    2009-03-18 15:49 . 2009-03-18 15:49 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
    2009-03-18 15:49 . 2009-03-18 15:49 <DIR> d-------- c:\documents and settings\Justin\Application Data\Malwarebytes
    2009-03-18 15:49 . 2009-03-18 15:49 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-03-18 15:49 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
    2009-03-18 15:49 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
    2009-03-18 15:39 . 2009-03-18 15:39 <DIR> d-------- c:\program files\Trend Micro
    2009-03-17 23:07 . 2009-03-17 23:08 <DIR> d-------- c:\program files\ERUNT
    2009-03-17 13:50 . 2009-03-17 13:50 133,120 --a------ c:\windows\egiyogomusige.dll
    2009-03-17 13:40 . 2009-03-17 13:40 27,648 --a------ C:\ieghyv.exe
    2009-03-17 13:39 . 2009-03-17 13:39 139,264 --a------ C:\cpltpc.exe
    2009-03-17 13:39 . 2009-03-17 13:39 41,984 --a------ C:\mtaueu.exe
    2009-03-17 13:39 . 2009-03-17 13:39 20,480 --a------ C:\naidprla.exe
    2009-03-17 13:39 . 2009-03-17 13:39 10,240 --a------ C:\wkaqjah.exe
    2009-03-17 13:39 . 2009-03-17 13:40 8,704 --a------ C:\kfnuc.exe
    2009-03-17 13:38 . 2009-03-17 13:38 139,264 --a------ C:\rhhqysye.exe
    2009-03-17 13:38 . 2009-03-19 14:44 98,030 --a------ c:\windows\system32\drivers\448172e1.sys
    2009-03-17 13:38 . 2009-03-17 13:38 94,208 --a------ c:\windows\system32\fpfstb.dll
    2009-03-17 13:38 . 2009-03-17 13:38 41,984 --a------ c:\windows\Oyeresu.dll
    2009-03-17 13:38 . 2009-03-17 13:38 41,984 --a------ C:\sxprfkgw.exe
    2009-03-17 13:38 . 2009-03-17 13:38 27,648 --a------ C:\sjsocfq.exe
    2009-03-17 13:38 . 2009-03-17 14:05 20,480 --a------ C:\vobumjj.exe
    2009-03-17 13:38 . 2009-03-17 13:38 10,240 --a------ c:\windows\instsp2.exe
    2009-03-17 13:38 . 2009-03-17 13:38 10,240 --a------ C:\tlgvlvdw.exe
    2009-03-17 13:38 . 2009-03-17 13:40 2 --a------ C:\1141747674
    2009-03-08 13:04 . 2009-03-08 13:04 410,984 --a------ c:\windows\system32\deploytk.dll
    2009-03-07 18:02 . 2009-03-07 18:02 <DIR> d-------- c:\program files\EVE-Central MarketUploader
    2009-03-06 07:54 . 2009-03-06 07:54 <DIR> d-------- c:\documents and settings\Justin\Application Data\NetSupport
    2009-03-06 01:43 . 2009-03-06 01:43 <DIR> d-------- c:\program files\MediaMall
    2009-03-06 01:43 . 2009-03-06 01:43 <DIR> d-------- c:\program files\Common Files\TV-Websites
    2009-03-06 01:43 . 2009-03-06 01:43 <DIR> d-------- c:\program files\Common Files\ffdshowEx
    2009-03-06 01:25 . 2009-03-06 01:25 <DIR> d-------- c:\documents and settings\All Users\Application Data\CCP
    2009-03-04 23:38 . 2009-03-04 23:38 <DIR> d-------- c:\program files\EVEMon
    2009-03-04 23:38 . 2009-03-11 23:14 <DIR> d-------- c:\documents and settings\Justin\Application Data\EVEMon
    2009-03-04 17:13 . 2009-03-04 17:13 <DIR> d-------- c:\program files\NetSupport
    2009-03-04 17:13 . 2009-03-04 17:13 <DIR> d-------- c:\documents and settings\All Users\Application Data\NetSupport
    2009-03-04 17:13 . 2008-10-09 13:00 102,462 --a------ c:\windows\system32\pcimon.dll
    2009-03-04 17:13 . 2008-10-09 13:00 84,576 --a------ c:\windows\system32\clhook4.dll
    2009-03-04 17:13 . 2008-10-09 13:00 39,520 --a------ c:\windows\system32\drivers\pcisys.sys
    2009-03-04 17:13 . 2008-10-09 11:36 36,918 --a------ c:\windows\system32\pcimsg.dll
    2009-03-04 17:13 . 2008-10-09 13:00 32,831 --a------ c:\windows\system32\pcigina.dll
    2009-03-04 17:13 . 2008-10-09 13:00 20,542 --a------ c:\windows\system32\pcivdd.dll
    2009-03-04 17:13 . 2009-03-04 17:13 1,791 --a------ c:\windows\system32\autoexec.nt
    2009-03-04 17:13 . 2009-03-19 14:43 8 --a------ c:\windows\system32\pcisys.ntk
    2009-03-02 19:21 . 2009-03-02 19:21 <DIR> d-------- c:\program files\Common Files\BitCtrl
    2009-02-23 19:35 . 2009-02-23 19:35 <DIR> d-------- c:\program files\WinFF
    2009-02-23 19:35 . 2009-02-23 19:52 <DIR> d-------- c:\documents and settings\Justin\Application Data\WinFF
    2009-02-21 14:46 . 2009-02-21 14:46 <DIR> d-------- c:\temp\dir

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-03-18 22:44 --------- d-----w c:\documents and settings\Justin\Application Data\OpenOffice.org2
    2009-03-18 01:51 --------- d-----w c:\program files\Spybot - Search & Destroy
    2009-03-17 21:12 --------- d-----w c:\documents and settings\Justin\Application Data\DNA
    2009-03-17 01:42 --------- d-----w c:\program files\DNA
    2009-03-16 11:37 --------- d-----w c:\documents and settings\All Users\Application Data\MediaMall
    2009-03-09 04:23 --------- d-----w c:\program files\Steam
    2009-03-08 20:04 --------- d-----w c:\program files\Java
    2009-03-06 08:33 --------- d-----w c:\documents and settings\Justin\Application Data\BitTorrent
    2009-03-03 02:15 --------- d-----w c:\program files\DivX
    2009-02-15 06:45 --------- d-----w c:\program files\CCP
    2009-02-08 18:07 --------- d-----w c:\program files\MySQL
    2009-02-08 18:07 --------- d-----w c:\documents and settings\All Users\Application Data\MySQL
    2009-02-04 03:26 --------- d-----w c:\program files\Microsoft Silverlight
    2009-01-24 01:38 --------- d-----w c:\documents and settings\All Users\Application Data\Electronic Arts
    2009-01-20 05:18 --------- d-----w c:\documents and settings\NetworkService\Application Data\DivX
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-10-07 13574144]

    c:\documents and settings\Justin\Start Menu\Programs\Startup\
    ERUNT AutoBackup.lnk - c:\program files\ERUNT\AUTOBACK.EXE [2005-10-20 38912]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "msacm.ac3filter"= ac3filter.acm

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\Program Files\\DNA\\btdna.exe"=
    "c:\\Program Files\\BitTorrent\\bittorrent.exe"=
    "c:\\Documents and Settings\\Justin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=
    "c:\\Documents and Settings\\Justin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
    "c:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "c:\\Program Files\\iTunes\\iTunes.exe"=
    "c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead\\left4dead.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead demo\\left4dead.exe"=
    "c:\\Documents and Settings\\Justin\\Local Settings\\Application Data\\Google\\Update\\GoogleUpdate.exe"=
    "c:\\WINDOWS\\system32\\spoolsv.exe"=
    "c:\\Program Files\\MediaMall\\MediaMallServer.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\client32.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\PCICTLUI.EXE"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\pcideply.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\PCISA.EXE"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\pciscrui.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\runscrip.exe"=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "139:TCP"= 139:TCP:@xpsp2res.dll,-22004

    R2 MediaMall Server;MediaMall Server;c:\program files\MediaMall\MediaMallServer.exe [2009-02-25 2630144]
    R3 cmvad;Linksys Wireless-G Music Bridge Interface;c:\windows\system32\drivers\cmudaxv.sys [2008-06-16 1410240]
    S3 Alpham1;Ideazon Fang USB Human Interface Device;c:\windows\system32\drivers\Alpham1.sys [2007-07-23 42624]
    S3 Alpham2;Ideazon Fang MM USB Human Interface Device;c:\windows\system32\drivers\Alpham2.sys [2007-03-20 18432]

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
    Jveonikucqj
    IpbCaz
    .
    Contents of the 'Scheduled Tasks' folder

    2009-03-06 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]

    2009-03-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-117609710-484763869-725345543-1003.job
    - c:\documents and settings\Justin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-03 18:19]
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{d0bd1255-f6cc-42a7-9f1e-a8cf17625072} - c:\windows\system32\sidefevi.dll
    HKLM-Run-440daf75 - c:\windows\system32\keyutova.dll
    HKLM-Run-dutofatoha - c:\windows\system32\worikalu.dll
    HKLM-Run-CPM473e9ce9 - c:\windows\system32\talefake.dll


    .
    ------- Supplementary Scan -------
    .
    uInternet Settings,ProxyOverride = *.local
    LSP: %SYSTEMROOT%\system32\nvLsp.dll
    TCP: {C049D0A6-54B0-4DAE-AFC6-CFEE6C65C5BC} = 68.87.69.146,68.87.85.98
    FF - ProfilePath - c:\documents and settings\Justin\Application Data\Mozilla\Firefox\Profiles\bpv5m2hd.default\
    FF - plugin: c:\documents and settings\Justin\Application Data\Mozilla\plugins\npgoogletalk.dll
    FF - plugin: c:\documents and settings\Justin\Local Settings\Application Data\Google\Update\1.2.141.5\npGoogleOneClick7.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll

    ---- FIREFOX POLICIES ----
    FF - user.js: yahoo.homepage.dontask - true.

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-03-19 14:44:23
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MySQL]
    "ImagePath"="\"c:\program files\MySQL\MySQL Server 5.1\bin\mysqld\" --defaults-file=\"c:\program files\MySQL\MySQL Server 5.1\my.ini\" MySQL"

    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\448172e1]
    "ImagePath"="\SystemRoot\System32\drivers\448172e1.sys"
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_USERS\s-1-5-21-117609710-484763869-725345543-1003\Software\SecuROM\License information*]
    "datasecu"=hex:cb,c1,cf,2f,3f,0b,c1,6a,11,26,3d,90,5c,2c,a3,9f,f7,9a,fc,a0,64,
    36,5e,5b,c3,14,ed,53,65,4f,70,fe,19,d0,a4,4a,5d,e7,5f,ac,11,cf,e6,4b,bc,05,\
    "rkeysecu"=hex:e2,26,6d,94,9c,ba,ad,1d,64,79,70,1b,d8,19,de,23

    [HKEY_LOCAL_MACHINE\software\Classes\N4443fc97]
    @Denied: (4) (Everyone)
    @Denied: (4) (Administrators)
    @Allowed: (A B C D Full GENERIC_EXECUTE GENERIC_WRITE Read 1 2 3 4 5 6) (LocalSystem)
    "a"="M"
    "startday"="3"
    "startmonth"="3"
    "startyear"="2009"
    "expiryday"="3"
    "expirymonth"="4"
    "expiryyear"="2009"
    "authcode"="0xc7e303b1"
    "currentver"="1000"

    [HKEY_LOCAL_MACHINE\software\Classes\N4443fc97\N4443fc97]
    "startday"="3"
    "startmonth"="3"
    "startyear"="2009"
    "expiryday"="3"
    "expirymonth"="4"
    "expiryyear"="2009"
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'lsass.exe'(824)
    c:\windows\system32\nvLsp.dll

    - - - - - - - > 'csrss.exe'(740)
    c:\program files\NetSupport\NetSupport Manager\pcihooks.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    c:\program files\Bonjour\mDNSResponder.exe
    c:\program files\NetSupport\NetSupport Manager\client32.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\program files\MySQL\MySQL Server 5.1\bin\mysqld.exe
    c:\windows\system32\nvsvc32.exe
    c:\program files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    c:\program files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    c:\program files\Windows Media Player\wmpnetwk.exe
    c:\windows\system32\wscntfy.exe
    .
    **************************************************************************
    .
    Completion time: 2009-03-19 14:49:20 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-03-19 21:49:17

    Pre-Run: 289,320,669,184 bytes free
    Post-Run: 291,544,973,312 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    236 --- E O F --- 2008-12-20 05:16:53

    ---------------------------------------------

    HJT
    ---------------------------------------------

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 2:49:46 PM, on 3/19/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\MediaMall\MediaMallServer.exe
    C:\Program Files\MySQL\MySQL Server 5.1\bin\mysqld.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\system32\notepad.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O16 - DPF: {2A0B9B82-D5C8-4D3D-8338-AD55B23662B1} (F5 Networks CacheCleaner) - https://myportal.valleymed.org/vdesk...2008,0514,2338
    O16 - DPF: {45B69029-F3AB-4204-92DE-D5140C3E8E74} (F5 Networks Auto Update) - C:\DOCUME~1\Justin\LOCALS~1\Temp\IXP000.TMP\InstallerControl.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/wind...?1213676482968
    O16 - DPF: {6C275925-A1ED-4DD2-9CEE-9823F5FDAA10} (F5 Networks SSLTunnel) - https://myportal.valleymed.org/vdesk...2008,0514,2337
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1213680159859
    O16 - DPF: {E0FF21FA-B857-45C5-8621-F120A0C17FF2} (F5 Networks Host Control) - https://myportal.valleymed.org/vdesk...2008,0514,2340
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C049D0A6-54B0-4DAE-AFC6-CFEE6C65C5BC}: NameServer = 68.87.69.146,68.87.85.98
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Client32 - NetSupport Ltd - C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    O23 - Service: ForceWare Intelligent Application Manager (IAM) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MediaMall Server - MediaMall Technologies, Inc. - C:\Program Files\MediaMall\MediaMallServer.exe
    O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
    O23 - Service: ForceWare IP service (nSvcIp) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

    --
    End of file - 6267 bytes

  8. #8
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    1) Please download ATF Cleaner by Atribune
    http://www.atribune.org/public-beta/ATF-Cleaner.exe
    Save it to your Desktop. We will use this later.

    2) Open notepad and copy/paste the text in the codebox below into it:

    Code:
    Driver::
    448172e1
    
    File::
    c:\windows\egiyogomusige.dll
    C:\ieghyv.exe
    C:\cpltpc.exe
    C:\mtaueu.exe
    C:\naidprla.exe
    C:\wkaqjah.exe
    C:\kfnuc.exe
    C:\rhhqysye.exe
    c:\windows\system32\fpfstb.dll
    c:\windows\Oyeresu.dll
    C:\sxprfkgw.exe
    C:\sjsocfq.exe
    C:\vobumjj.exe
    c:\windows\instsp2.exe
    C:\tlgvlvdw.exe
    c:\windows\system32\drivers\448172e1.sys
    
    Folder::
    C:\1141747674
    c:\documents and settings\Justin\Application Data\BitTorrent
    Save this as CFScript



    Referring to the picture above, drag CFScript into ComboFix.exe.

    This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log. (wait until you finish to post the logs)

    3) Run ATF Cleaner
    Double-click ATF-Cleaner.exe to run the program.
    Click Select All found at the bottom of the list.
    Click the Empty Selected button.
    Click Exit on the Main menu to close the program.

    *Cleaning Prefetch may result in a few slow starts until the folder is repopulated:
    http://www.windowsnetworking.com/art...efetch-XP.html

    Restart the computer and post the log from CFScript and tell me how the computer is running now.

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  9. #9
    Junior Member
    Join Date
    Mar 2009
    Posts
    7

    Default

    I ran the script then made a HJT log and then ran ATF-Cleaner. I am no longer getting rundll errors on boot the spyware warnings. I did notice that many of my image files will no longer open, but I assume those had been corrupted or were possible targets.

    Thank you again, here are the two logs:

    Script Log
    -----------------------------------
    ComboFix 09-03-18.01 - Justin 2009-03-19 23:18:40.2 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1365 [GMT -7:00]
    Running from: c:\documents and settings\Justin\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\Justin\Desktop\CFScript.txt
    * Created a new restore point

    FILE ::
    C:\cpltpc.exe
    C:\ieghyv.exe
    C:\kfnuc.exe
    C:\mtaueu.exe
    C:\naidprla.exe
    C:\rhhqysye.exe
    C:\sjsocfq.exe
    C:\sxprfkgw.exe
    C:\tlgvlvdw.exe
    C:\vobumjj.exe
    c:\windows\egiyogomusige.dll
    c:\windows\instsp2.exe
    c:\windows\Oyeresu.dll
    c:\windows\system32\drivers\448172e1.sys
    c:\windows\system32\fpfstb.dll
    C:\wkaqjah.exe
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\1141747674\
    C:\cpltpc.exe
    c:\documents and settings\Justin\Application Data\BitTorrent
    c:\documents and settings\Justin\Application Data\BitTorrent\[Suze Randall] - The Young & The Raunchy - (Jana Cova, Cytherea, Taylor Rain).avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\8 Ball (Nikki Hunter) XXX [DVDRIP][All Sex].www.lokotorrents.com.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\analwhores.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\bittorrent.lng
    c:\documents and settings\Justin\Application Data\BitTorrent\Bookworm Bitches - Cytherea - 7 squirting orgasms!.mpeg.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\Cytherea - Specs Appeal 13 - by Bomkia.avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\Daisy - Specs Appeal 8 - by Bomkia.avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\dht.dat
    c:\documents and settings\Justin\Application Data\BitTorrent\dht.dat.old
    c:\documents and settings\Justin\Application Data\BitTorrent\French unknown brunette, glasses, boots, lingerie.wmv.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\Haley Paige-Dominated.wmv.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\Haley Paige - CollegeWildParties.com.avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\Haley_Paige[www.kiborg.org].avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\Jessica Darlin - Specs Appeal 9 - by Bomkia.avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\mshfbrookebanner2_large.mpg.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\ps-sa18.avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\resume.dat
    c:\documents and settings\Justin\Application Data\BitTorrent\resume.dat.old
    c:\documents and settings\Justin\Application Data\BitTorrent\RoughHerUp-HaleyPaige.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\rss.dat
    c:\documents and settings\Justin\Application Data\BitTorrent\rss.dat.old
    c:\documents and settings\Justin\Application Data\BitTorrent\settings.dat
    c:\documents and settings\Justin\Application Data\BitTorrent\settings.dat.old
    c:\documents and settings\Justin\Application Data\BitTorrent\Specs Appeal 05 (2002)-dvdrip-Xvid-SV-PureTnA.avi.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\teacherspet.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\teenland7.torrent
    c:\documents and settings\Justin\Application Data\BitTorrent\Virgin.Diaries.XXX.DVDRip.XviD-NYMPHO.[Pornofive.com].torrent
    C:\ieghyv.exe
    C:\kfnuc.exe
    C:\mtaueu.exe
    C:\naidprla.exe
    C:\rhhqysye.exe
    C:\sjsocfq.exe
    C:\sxprfkgw.exe
    C:\tlgvlvdw.exe
    C:\vobumjj.exe
    c:\windows\egiyogomusige.dll
    c:\windows\instsp2.exe
    c:\windows\Oyeresu.dll
    c:\windows\system32\drivers\448172e1.sys
    c:\windows\system32\fpfstb.dll
    C:\wkaqjah.exe

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Service_448172e1


    ((((((((((((((((((((((((( Files Created from 2009-02-20 to 2009-03-20 )))))))))))))))))))))))))))))))
    .

    2009-03-19 15:25 . 2009-03-19 15:26 <DIR> d-------- c:\documents and settings\Justin\Application Data\HeavyDuck.Eve
    2009-03-18 15:49 . 2009-03-18 15:49 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
    2009-03-18 15:49 . 2009-03-18 15:49 <DIR> d-------- c:\documents and settings\Justin\Application Data\Malwarebytes
    2009-03-18 15:49 . 2009-03-18 15:49 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-03-18 15:49 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
    2009-03-18 15:49 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
    2009-03-18 15:39 . 2009-03-18 15:39 <DIR> d-------- c:\program files\Trend Micro
    2009-03-17 23:07 . 2009-03-17 23:08 <DIR> d-------- c:\program files\ERUNT
    2009-03-17 13:38 . 2009-03-17 13:40 2 --a------ C:\1141747674
    2009-03-08 13:04 . 2009-03-08 13:04 410,984 --a------ c:\windows\system32\deploytk.dll
    2009-03-07 18:02 . 2009-03-07 18:02 <DIR> d-------- c:\program files\EVE-Central MarketUploader
    2009-03-06 07:54 . 2009-03-06 07:54 <DIR> d-------- c:\documents and settings\Justin\Application Data\NetSupport
    2009-03-06 01:43 . 2009-03-06 01:43 <DIR> d-------- c:\program files\MediaMall
    2009-03-06 01:43 . 2009-03-06 01:43 <DIR> d-------- c:\program files\Common Files\TV-Websites
    2009-03-06 01:43 . 2009-03-06 01:43 <DIR> d-------- c:\program files\Common Files\ffdshowEx
    2009-03-06 01:25 . 2009-03-06 01:25 <DIR> d-------- c:\documents and settings\All Users\Application Data\CCP
    2009-03-04 23:38 . 2009-03-04 23:38 <DIR> d-------- c:\program files\EVEMon
    2009-03-04 23:38 . 2009-03-11 23:14 <DIR> d-------- c:\documents and settings\Justin\Application Data\EVEMon
    2009-03-04 17:13 . 2009-03-04 17:13 <DIR> d-------- c:\program files\NetSupport
    2009-03-04 17:13 . 2009-03-04 17:13 <DIR> d-------- c:\documents and settings\All Users\Application Data\NetSupport
    2009-03-04 17:13 . 2008-10-09 13:00 102,462 --a------ c:\windows\system32\pcimon.dll
    2009-03-04 17:13 . 2008-10-09 13:00 84,576 --a------ c:\windows\system32\clhook4.dll
    2009-03-04 17:13 . 2008-10-09 13:00 39,520 --a------ c:\windows\system32\drivers\pcisys.sys
    2009-03-04 17:13 . 2008-10-09 11:36 36,918 --a------ c:\windows\system32\pcimsg.dll
    2009-03-04 17:13 . 2008-10-09 13:00 32,831 --a------ c:\windows\system32\pcigina.dll
    2009-03-04 17:13 . 2008-10-09 13:00 20,542 --a------ c:\windows\system32\pcivdd.dll
    2009-03-04 17:13 . 2009-03-04 17:13 1,791 --a------ c:\windows\system32\autoexec.nt
    2009-03-04 17:13 . 2009-03-19 23:23 8 --a------ c:\windows\system32\pcisys.ntk
    2009-03-02 19:21 . 2009-03-02 19:21 <DIR> d-------- c:\program files\Common Files\BitCtrl
    2009-02-23 19:35 . 2009-02-23 19:35 <DIR> d-------- c:\program files\WinFF
    2009-02-23 19:35 . 2009-02-23 19:52 <DIR> d-------- c:\documents and settings\Justin\Application Data\WinFF
    2009-02-21 14:46 . 2009-02-21 14:46 <DIR> d-------- c:\temp\dir

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-03-18 22:44 --------- d-----w c:\documents and settings\Justin\Application Data\OpenOffice.org2
    2009-03-18 01:51 --------- d-----w c:\program files\Spybot - Search & Destroy
    2009-03-17 21:12 --------- d-----w c:\documents and settings\Justin\Application Data\DNA
    2009-03-17 01:42 --------- d-----w c:\program files\DNA
    2009-03-16 11:37 --------- d-----w c:\documents and settings\All Users\Application Data\MediaMall
    2009-03-09 04:23 --------- d-----w c:\program files\Steam
    2009-03-08 20:04 --------- d-----w c:\program files\Java
    2009-03-03 02:15 --------- d-----w c:\program files\DivX
    2009-02-15 06:45 --------- d-----w c:\program files\CCP
    2009-02-08 18:07 --------- d-----w c:\program files\MySQL
    2009-02-08 18:07 --------- d-----w c:\documents and settings\All Users\Application Data\MySQL
    2009-02-04 03:26 --------- d-----w c:\program files\Microsoft Silverlight
    2009-01-24 01:38 --------- d-----w c:\documents and settings\All Users\Application Data\Electronic Arts
    2009-01-20 05:18 --------- d-----w c:\documents and settings\NetworkService\Application Data\DivX
    .

    ((((((((((((((((((((((((((((( SnapShot@2009-03-19_14.48.56.18 )))))))))))))))))))))))))))))))))))))))))
    .
    + 2009-02-03 02:07:18 240,544 ----a-r c:\windows\system32\Macromed\Flash\FlashUtil10b.exe
    - 2009-03-08 19:59:45 74,137 ----a-w c:\windows\system32\Macromed\Flash\uninstall_activeX.exe
    + 2009-03-19 22:05:32 88,590 ----a-w c:\windows\system32\Macromed\Flash\uninstall_activeX.exe
    + 2009-03-20 06:24:21 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_6e0.dat
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-10-07 13574144]

    c:\documents and settings\Justin\Start Menu\Programs\Startup\
    ERUNT AutoBackup.lnk - c:\program files\ERUNT\AUTOBACK.EXE [2005-10-20 38912]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "msacm.ac3filter"= ac3filter.acm

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\Program Files\\DNA\\btdna.exe"=
    "c:\\Program Files\\BitTorrent\\bittorrent.exe"=
    "c:\\Documents and Settings\\Justin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=
    "c:\\Documents and Settings\\Justin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
    "c:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "c:\\Program Files\\iTunes\\iTunes.exe"=
    "c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead\\left4dead.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead demo\\left4dead.exe"=
    "c:\\Documents and Settings\\Justin\\Local Settings\\Application Data\\Google\\Update\\GoogleUpdate.exe"=
    "c:\\WINDOWS\\system32\\spoolsv.exe"=
    "c:\\Program Files\\MediaMall\\MediaMallServer.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\client32.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\PCICTLUI.EXE"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\pcideply.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\PCISA.EXE"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\pciscrui.exe"=
    "c:\\Program Files\\NetSupport\\NetSupport Manager\\runscrip.exe"=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "139:TCP"= 139:TCP:@xpsp2res.dll,-22004

    R2 MediaMall Server;MediaMall Server;c:\program files\MediaMall\MediaMallServer.exe [2009-02-25 2630144]
    R3 cmvad;Linksys Wireless-G Music Bridge Interface;c:\windows\system32\drivers\cmudaxv.sys [2008-06-16 1410240]
    S3 Alpham1;Ideazon Fang USB Human Interface Device;c:\windows\system32\drivers\Alpham1.sys [2007-07-23 42624]
    S3 Alpham2;Ideazon Fang MM USB Human Interface Device;c:\windows\system32\drivers\Alpham2.sys [2007-03-20 18432]

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
    Jveonikucqj
    IpbCaz
    .
    Contents of the 'Scheduled Tasks' folder

    2009-03-06 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]

    2009-03-20 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-117609710-484763869-725345543-1003.job
    - c:\documents and settings\Justin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-03 18:19]
    .
    .
    ------- Supplementary Scan -------
    .
    uInternet Settings,ProxyOverride = *.local
    LSP: %SYSTEMROOT%\system32\nvLsp.dll
    TCP: {C049D0A6-54B0-4DAE-AFC6-CFEE6C65C5BC} = 68.87.69.146,68.87.85.98
    FF - ProfilePath - c:\documents and settings\Justin\Application Data\Mozilla\Firefox\Profiles\bpv5m2hd.default\
    FF - plugin: c:\documents and settings\Justin\Application Data\Mozilla\plugins\npgoogletalk.dll
    FF - plugin: c:\documents and settings\Justin\Local Settings\Application Data\Google\Update\1.2.141.5\npGoogleOneClick7.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll

    ---- FIREFOX POLICIES ----
    FF - user.js: yahoo.homepage.dontask - true.

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-03-19 23:24:54
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MySQL]
    "ImagePath"="\"c:\program files\MySQL\MySQL Server 5.1\bin\mysqld\" --defaults-file=\"c:\program files\MySQL\MySQL Server 5.1\my.ini\" MySQL"
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_USERS\S-1-5-21-117609710-484763869-725345543-1003\Software\SecuROM\License information*]
    "datasecu"=hex:cb,c1,cf,2f,3f,0b,c1,6a,11,26,3d,90,5c,2c,a3,9f,f7,9a,fc,a0,64,
    36,5e,5b,c3,14,ed,53,65,4f,70,fe,19,d0,a4,4a,5d,e7,5f,ac,11,cf,e6,4b,bc,05,\
    "rkeysecu"=hex:e2,26,6d,94,9c,ba,ad,1d,64,79,70,1b,d8,19,de,23

    [HKEY_LOCAL_MACHINE\software\Classes\N4443fc97]
    @Denied: (4) (Everyone)
    @Denied: (4) (Administrators)
    @Allowed: (A B C D Full GENERIC_EXECUTE GENERIC_WRITE Read 1 2 3 4 5 6) (LocalSystem)
    "a"="M"
    "startday"="3"
    "startmonth"="3"
    "startyear"="2009"
    "expiryday"="3"
    "expirymonth"="4"
    "expiryyear"="2009"
    "authcode"="0xc7e303b1"
    "currentver"="1000"

    [HKEY_LOCAL_MACHINE\software\Classes\N4443fc97\N4443fc97]
    "startday"="3"
    "startmonth"="3"
    "startyear"="2009"
    "expiryday"="3"
    "expirymonth"="4"
    "expiryyear"="2009"
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'lsass.exe'(828)
    c:\windows\system32\nvLsp.dll

    - - - - - - - > 'csrss.exe'(744)
    c:\program files\NetSupport\NetSupport Manager\pcihooks.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    c:\program files\Bonjour\mDNSResponder.exe
    c:\program files\NetSupport\NetSupport Manager\client32.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\program files\MySQL\MySQL Server 5.1\bin\mysqld.exe
    c:\windows\system32\nvsvc32.exe
    c:\program files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    c:\program files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    c:\program files\Windows Media Player\wmpnetwk.exe
    c:\windows\system32\wscntfy.exe
    .
    **************************************************************************
    .
    Completion time: 2009-03-19 23:27:52 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-03-20 06:27:50
    ComboFix2.txt 2009-03-19 21:49:20

    Pre-Run: 291,494,223,872 bytes free
    Post-Run: 291,483,283,456 bytes free

    264 --- E O F --- 2008-12-20 05:16:53
    ----------------------------



    HTJ Log
    ----------------------------
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:31:18 PM, on 3/19/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\MediaMall\MediaMallServer.exe
    C:\Program Files\MySQL\MySQL Server 5.1\bin\mysqld.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Documents and Settings\Justin\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nvlsp.dll
    O16 - DPF: {2A0B9B82-D5C8-4D3D-8338-AD55B23662B1} (F5 Networks CacheCleaner) - https://myportal.valleymed.org/vdesk...2008,0514,2338
    O16 - DPF: {45B69029-F3AB-4204-92DE-D5140C3E8E74} (F5 Networks Auto Update) - C:\DOCUME~1\Justin\LOCALS~1\Temp\IXP000.TMP\InstallerControl.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/wind...?1213676482968
    O16 - DPF: {6C275925-A1ED-4DD2-9CEE-9823F5FDAA10} (F5 Networks SSLTunnel) - https://myportal.valleymed.org/vdesk...2008,0514,2337
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1213680159859
    O16 - DPF: {E0FF21FA-B857-45C5-8621-F120A0C17FF2} (F5 Networks Host Control) - https://myportal.valleymed.org/vdesk...2008,0514,2340
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C049D0A6-54B0-4DAE-AFC6-CFEE6C65C5BC}: NameServer = 68.87.69.146,68.87.85.98
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Client32 - NetSupport Ltd - C:\Program Files\NetSupport\NetSupport Manager\client32.exe
    O23 - Service: ForceWare Intelligent Application Manager (IAM) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcAppFlt.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MediaMall Server - MediaMall Technologies, Inc. - C:\Program Files\MediaMall\MediaMallServer.exe
    O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
    O23 - Service: ForceWare IP service (nSvcIp) - Unknown owner - C:\Program Files\NVIDIA Corporation\NetworkAccessManager\bin32\nSvcIp.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

    --
    End of file - 6474 bytes

  10. #10
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    I did notice that many of my image files will no longer open,
    please post the error message you get word for word.

    I am not seeing an antivirus program, we waste out time cleaning if you are not going to try to secure the computer. If you need links to free programs, let me know now. What about a firewall?

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •