Dissapearing Spybot (not a magic trick)

ttocsic

New member
Posted this in the general issues forum and was told to get checked out here:
(please read carefully and dont just tell me the files are hidden. thanks.)

I recently updated my s&d. Installation went fine. Upon the first run of the updated program, it seems to begin to run and then disappears. If i try to run the program again from the start menu, it tries to search for the exe. I've looked in the s&d sub-folder in the program files folder and none of the exe files exist (even as hidden files). All the rest of the files seem to be present just the exe's are missing. They only disappear after the first attempt to run them after installation. I have the same problem when installing older versions of spybot. (It also happens when installing Ad-Aware). I am running winxpsp2 and no anti-virus software (since symantec support cant figure out why NAV wont install on my computer). Could a virus or malware be canning my S&D? If so what do i do about it? Thanks in advance for any help.

Logfile of HijackThis v1.99.1
Scan saved at 8:23:22 PM, on 3/3/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\toshiba\ivp\ism\pinger.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\Setups\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.toshiba.com/search
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [BMc7174b6d] Rundll32.exe "C:\WINDOWS\system32\hbovyrnf.dll",s
O4 - HKLM\..\Run: [c42478f1] rundll32.exe "C:\WINDOWS\system32\vyvvvgga.dll",b
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)

Edit: "BEFORE you POST"(READ this Procedure BEFORE Requesting Assistance)
 
Last edited by a moderator:
Hi ttocsic

First rename HijackThis.exe to ttocsic.exe

After that:

Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

Link 1
Link 2
Link 3

CF_download_FF.gif



CF_download_rename.gif

--------------------------------------------------------------------

Double click on Combo-Fix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt along with a HijackThis log so we can continue cleaning the system.

Note:
Do not mouseclick combofix's window while it's running. That may cause it to stall
 
virtumonde fix?

Spybot Scan
virtuemonde: 6 entries
virtuemonde.generic: 3 entries
I HAVE NOT RUN SPYBOT S&D FIXES YET

HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 11:09:12 AM, on 3/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\toshiba\ivp\ism\pinger.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\rundll32.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\WINDOWS\system32\Rundll32.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Setups\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.toshiba.com/search
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {733E9132-53CA-4C97-9AC9-145C4502FA20} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [c42478f1] rundll32.exe "C:\WINDOWS\system32\jirfbvqn.dll",b
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [BMc7174b6d] Rundll32.exe "C:\WINDOWS\system32\puisvoqs.dll",s
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O20 - Winlogon Notify: awtrrrq - awtrrrq.dll (file missing)
O20 - Winlogon Notify: tuspp - C:\WINDOWS\system32\tuspp.dll (file missing)
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)
 
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Thursday, March 06, 2008 10:21:18 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 6/03/2008
Kaspersky Anti-Virus database records: 603975
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\

Scan Statistics:
Total number of scanned objects: 170651
Number of viruses found: 4
Number of infected objects: 67
Number of suspicious objects: 0
Duration of the scan process: 03:34:44

Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\Administrator\ntuser.dat Object is locked skipped
C:\Documents and Settings\Administrator\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\All Users\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\All Users\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\cert8.db Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\formhistory.dat Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\foxmarks.log Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\history.dat Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\key3.db Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\parent.lock Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\search.sqlite Object is locked skipped
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\Owner\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\litsbj5s.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\History\History.IE5\MSHist012008030620080307\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\Perflib_Perfdata_724.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\Perflib_Perfdata_b0c.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\~DF4465.tmp Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temp\~DFF7AE.tmp Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7BFE57KJ\cmp638[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7BFE57KJ\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\WGGD03WT\ptch[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Owner\ntuser.dat Object is locked skipped
C:\Documents and Settings\Owner\ntuser.dat.LOG Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\aswResp.dat Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\Avast4.db Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\AshWebSv.ws Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\aswMaiSv.log Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\log\nshield.log Object is locked skipped
C:\Program Files\Alwil Software\Avast4\DATA\report\Resident protection.txt Object is locked skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045111.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045112.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045113.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045114.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP411\A0045115.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045223.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045224.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045225.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP417\A0045226.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ixe skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045314.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.bce skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045315.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.bce skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045316.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045317.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045318.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP423\A0045319.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP424\A0045357.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP424\A0045358.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP425\A0045400.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP425\A0045417.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045497.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045498.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP426\A0045515.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{4FD4413D-6A99-428E-BC13-79CC5D0909CB}\RP435\change.log Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\shgina.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ307274$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\migrate.js Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308131$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308402$\srrstr.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ308677$\userenv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\msobmain.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311345$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\shell32.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311455$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ311889$\termsrv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ312368$\syssetup.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\netsetup.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\spuninst\spuninst.exe Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\spuninst\spuninst.inf Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\ssdpapi.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\ssdpsrv.dll Object is locked skipped
C:\WINDOWS\$NtUninstallQ315000$\upnp.dll Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\slpd.log Object is locked skipped
C:\WINDOWS\SoftwareDistribution\EventCache\{B90FB940-8502-4D38-9C69-3A7DE82A958F}.bin Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\system32\aifmmjdw.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\aoduptva.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\bayymuva.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\bfqlyhye.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\blkmvkxs.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\cacaectv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\cegrqnwg.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\config\Antivirus.Evt Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\dijffact.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\dkthhkca.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\dqxqupey.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ejeuitep.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\eyuddijl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\fbmfwrwm.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\fqkxycuv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ghpfoahl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\hbovyrnf.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\hywvhreg.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ietiqyne.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\jirfbvqn.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\jxdpdcyl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\jyfldjwe.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ixf skipped
C:\WINDOWS\system32\LogFiles\HTTPERR\httperr1.log Object is locked skipped
C:\WINDOWS\system32\lublakwt.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\mwgrhnvw.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\noeteyrc.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\npeicimd.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\nxvjquig.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\plwkfgqq.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ppnqurxp.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\puisvoqs.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\pwdqhebs.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\rghsdwpe.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\slerhakr.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\sqqblqqi.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\suthipvv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\uontvmbh.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\system32\whwlugos.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\xcqvihav.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\xgmlmvmb.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\xuxlaiui.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ybdgdbei.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\yqklulfv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\yunsvsbt.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\temp\Perflib_Perfdata_63c.dat Object is locked skipped
C:\WINDOWS\temp\_avast4_\Webshlock.txt Object is locked skipped
C:\WINDOWS\TempFile Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped

Scan process completed.
 
Hi ttocsic

I see that you haven't followed my instructions - so I expect that you follow them now :)
 
Sorry, didn't realize my threads were merged.

HJT and S&D as above.

Here is combofix log:
Thanks.

ComboFix 08-03-07.4 - Owner 2008-03-07 19:47:56.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.114 [GMT -5:00]
Running from: C:\Documents and Settings\Owner\Desktop\Combo-Fix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Program Files\download plugin
C:\Program Files\download plugin\DlPlugin-Moz\buddy.dat
C:\Program Files\download plugin\DlPlugin-Moz\vendor.txt
C:\WINDOWS\BMc7174b6d.xml
C:\WINDOWS\cookies.ini
C:\WINDOWS\pskt.ini
C:\WINDOWS\system32\ackhhtkd.ini
C:\WINDOWS\system32\aifmmjdw.dll
C:\WINDOWS\system32\aiswcpfv.ini
C:\WINDOWS\system32\aoduptva.dll
C:\WINDOWS\system32\auayauhx.ini
C:\WINDOWS\system32\avtpudoa.ini
C:\WINDOWS\system32\axwocmum.ini
C:\WINDOWS\system32\bayymuva.dll
C:\WINDOWS\system32\bdpybwri.ini
C:\WINDOWS\system32\bfqlyhye.dll
C:\WINDOWS\system32\bkrbasep.ini
C:\WINDOWS\system32\blkmvkxs.dll
C:\WINDOWS\system32\cacaectv.dll
C:\WINDOWS\system32\cegrqnwg.dll
C:\WINDOWS\system32\chjjsnxa.ini
C:\WINDOWS\system32\crjvuetu.ini
C:\WINDOWS\system32\cyekeuel.ini
C:\WINDOWS\system32\dijffact.dll
C:\WINDOWS\system32\dkthhkca.dll
C:\WINDOWS\system32\dqxqupey.dll
C:\WINDOWS\system32\eixiedpo.ini
C:\WINDOWS\system32\ejeuitep.dll
C:\WINDOWS\system32\epsqcvxy.ini
C:\WINDOWS\system32\eyuddijl.dll
C:\WINDOWS\system32\fbloymhp.ini
C:\WINDOWS\system32\fbmfwrwm.dll
C:\WINDOWS\system32\fpxuvrtc.ini
C:\WINDOWS\system32\fqkxycuv.dll
C:\WINDOWS\system32\fxwsumjs.ini
C:\WINDOWS\system32\ghpfoahl.dll
C:\WINDOWS\system32\gooyqpfu.ini
C:\WINDOWS\system32\hbovyrnf.dll
C:\WINDOWS\system32\hghbdhfa.ini
C:\WINDOWS\system32\hpwdmqit.ini
C:\WINDOWS\system32\hqkivcle.ini
C:\WINDOWS\system32\hujowimf.ini
C:\WINDOWS\system32\huyfwhjx.ini
C:\WINDOWS\system32\hywvhreg.dll
C:\WINDOWS\system32\ibjckteh.ini
C:\WINDOWS\system32\ietiqyne.dll
C:\WINDOWS\system32\iewlfoma.ini
C:\WINDOWS\system32\irqhswiy.ini
C:\WINDOWS\system32\iwkhgsdc.ini
C:\WINDOWS\system32\jayqicvu.ini
C:\WINDOWS\system32\jcrdmwtv.ini
C:\WINDOWS\system32\jirfbvqn.dll
C:\WINDOWS\system32\jiwjcsao.ini
C:\WINDOWS\system32\jnxxlsll.ini
C:\WINDOWS\system32\jrinndtl.ini
C:\WINDOWS\system32\jxdpdcyl.dll
C:\WINDOWS\system32\jyfldjwe.dll
C:\WINDOWS\system32\kaojnkka.ini
C:\WINDOWS\system32\kjcyljmf.ini
C:\WINDOWS\system32\kpgexeed.ini
C:\WINDOWS\system32\kurgccuy.ini
C:\WINDOWS\system32\lmarcxhh.ini
C:\WINDOWS\system32\lublakwt.dll
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\mlokxtdq.ini
C:\WINDOWS\system32\msyavkle.ini
C:\WINDOWS\system32\mwgrhnvw.dll
C:\WINDOWS\system32\nmvksuxf.ini
C:\WINDOWS\system32\noeteyrc.dll
C:\WINDOWS\system32\npeicimd.dll
C:\WINDOWS\system32\nqvbfrij.ini
C:\WINDOWS\system32\ntiqjbks.ini
C:\WINDOWS\system32\nxvjquig.dll
C:\WINDOWS\system32\oqmfdubn.ini
C:\WINDOWS\system32\ovlvcmqb.ini
C:\WINDOWS\system32\pherlvil.ini
C:\WINDOWS\system32\plwkfgqq.dll
C:\WINDOWS\system32\ppnqurxp.dll
C:\WINDOWS\system32\ppsut.bak1
C:\WINDOWS\system32\ppsut.bak2
C:\WINDOWS\system32\ppsut.ini
C:\WINDOWS\system32\ppsut.ini2
C:\WINDOWS\system32\ppsut.tmp
C:\WINDOWS\system32\puisvoqs.dll
C:\WINDOWS\system32\pwdqhebs.dll
C:\WINDOWS\system32\qajelmqh.ini
C:\WINDOWS\system32\qknoedrg.ini
C:\WINDOWS\system32\qlkxeoye.ini
C:\WINDOWS\system32\qmnddudh.ini
C:\WINDOWS\system32\rceudlen.ini
C:\WINDOWS\system32\rfisubfs.ini
C:\WINDOWS\system32\rfwvgnth.ini
C:\WINDOWS\system32\rghsdwpe.dll
C:\WINDOWS\system32\rumnevui.ini
C:\WINDOWS\system32\rxacacil.ini
C:\WINDOWS\system32\saeqdtft.ini
C:\WINDOWS\system32\sbeiwojl.ini
C:\WINDOWS\system32\scunamey.ini
C:\WINDOWS\system32\seqhexhp.ini
C:\WINDOWS\system32\sjhvhsoq.ini
C:\WINDOWS\system32\slerhakr.dll
C:\WINDOWS\system32\sqqblqqi.dll
C:\WINDOWS\system32\srpybmwf.ini
C:\WINDOWS\system32\suthipvv.dll
C:\WINDOWS\system32\tar.exe
C:\WINDOWS\system32\tgcmlkvq.ini
C:\WINDOWS\system32\thfubgfd.ini
C:\WINDOWS\system32\tjwulxor.ini
C:\WINDOWS\system32\tulwiaqs.ini
C:\WINDOWS\system32\ukvbvrhj.ini
C:\WINDOWS\system32\uontvmbh.dll
C:\WINDOWS\system32\useddkhm.ini
C:\WINDOWS\system32\wbdvfhli.ini
C:\WINDOWS\system32\wforrnlu.ini
C:\WINDOWS\system32\whwlugos.dll
C:\WINDOWS\system32\wlkreyen.ini
C:\WINDOWS\system32\xbrgrker.ini
C:\WINDOWS\system32\xcqvihav.dll
C:\WINDOWS\system32\xgmlmvmb.dll
C:\WINDOWS\system32\xjkoqjrb.ini
C:\WINDOWS\system32\xuxlaiui.dll
C:\WINDOWS\system32\ybdgdbei.dll
C:\WINDOWS\system32\yjdxnbgk.ini
C:\WINDOWS\system32\ykfmdpde.ini
C:\WINDOWS\system32\yqklulfv.dll
C:\WINDOWS\system32\yrelocip.ini
C:\WINDOWS\system32\yunsvsbt.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\LEGACY_DOMAINSERVICE
-------\DomainService
-------\nm


((((((((((((((((((((((((( Files Created from 2008-02-08 to 2008-03-08 )))))))))))))))))))))))))))))))
.

2008-03-06 11:14 . 2008-03-06 11:14 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-03-06 11:14 . 2008-03-06 11:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-03-06 09:51 . 2008-03-06 09:52 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-03-05 11:28 . 2008-03-05 11:28 <DIR> d-------- C:\Program Files\Sun
2008-03-05 11:28 . 2008-02-22 02:33 69,632 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-03-05 11:24 . 2008-03-05 11:28 <DIR> d-------- C:\Program Files\Java
2008-03-05 11:24 . 2008-03-05 11:24 <DIR> d-------- C:\Program Files\Common Files\Java
2008-03-03 21:37 . 2008-03-03 21:37 <DIR> d-------- C:\Program Files\Alwil Software
2008-03-03 21:37 . 2007-12-04 08:04 837,496 --a------ C:\WINDOWS\system32\aswBoot.exe
2008-03-03 21:37 . 2004-01-09 04:13 380,928 --a------ C:\WINDOWS\system32\actskin4.ocx
2008-03-03 21:37 . 2007-12-04 07:54 95,608 --a------ C:\WINDOWS\system32\AvastSS.scr
2008-03-03 21:37 . 2007-12-04 09:55 94,544 --a------ C:\WINDOWS\system32\drivers\aswmon2.sys
2008-03-03 21:37 . 2007-12-04 09:56 93,264 --a------ C:\WINDOWS\system32\drivers\aswmon.sys
2008-03-03 21:37 . 2007-12-04 09:51 42,912 --a------ C:\WINDOWS\system32\drivers\aswTdi.sys
2008-03-03 21:37 . 2007-12-04 09:49 26,624 --a------ C:\WINDOWS\system32\drivers\aavmker4.sys
2008-03-03 21:37 . 2007-12-04 09:53 23,152 --a------ C:\WINDOWS\system32\drivers\aswRdr.sys
2008-03-03 21:23 . 2008-03-06 00:33 <DIR> d-------- C:\Program Files\SpywareGuard
2008-03-03 21:20 . 2008-03-03 21:20 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\TEMP
2008-03-03 20:19 . 2008-03-03 21:19 1,302,502 --ahs---- C:\WINDOWS\system32\aggvvvyv.ini
2008-02-27 12:14 . 2008-02-27 12:14 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Move Networks
2008-02-23 14:42 . 2008-02-23 14:47 <DIR> d-------- C:\Program Files\Virtual SmartFade
2008-02-23 14:14 . 2008-02-23 15:08 <DIR> d-------- C:\congo
2008-02-23 14:14 . 2006-08-25 14:41 36,864 --a------ C:\WINDOWS\system32\CongoShell.exe
2008-02-23 14:05 . 2006-02-28 10:08 118,784 --a------ C:\WINDOWS\system32\AppMux.exe
2008-02-23 14:05 . 2008-01-10 16:43 102,400 --a------ C:\WINDOWS\system32\slpd.exe
2008-02-23 14:05 . 2008-01-10 16:43 69,632 --a------ C:\WINDOWS\system32\slptool.exe
2008-02-23 14:05 . 2007-11-20 15:52 13,786 -ra------ C:\WINDOWS\system32\2055.keys
2008-02-23 14:05 . 2007-11-20 15:51 13,696 -ra------ C:\WINDOWS\system32\1031.keys
2008-02-23 14:05 . 2007-11-20 15:53 13,606 -ra------ C:\WINDOWS\system32\1040.keys
2008-02-23 14:05 . 2007-11-20 15:51 11,792 -ra------ C:\WINDOWS\system32\1033.keys
2008-02-23 14:05 . 2007-11-20 15:53 11,752 -ra------ C:\WINDOWS\system32\1049.keys
2008-02-23 14:05 . 2007-05-22 16:04 9,238 --------- C:\WINDOWS\slp.conf
2008-02-15 14:56 . 2008-02-15 14:57 1,305,973 --ahs---- C:\WINDOWS\system32\rpxpxhgd.ini
2008-02-11 13:07 . 2008-02-11 13:07 294 --ahs---- C:\WINDOWS\system32\giccddrx.ini

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-03-07 15:13 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-03-04 02:22 --------- d-----w C:\Program Files\SpywareBlaster
2008-02-28 13:36 --------- d-----w C:\Program Files\palmOne
2008-02-23 19:14 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-02-23 19:06 --------- d-----w C:\Program Files\ETC
2008-02-19 00:17 --------- d-----w C:\Program Files\ENTTEC LightFactory
2008-02-18 23:34 --------- d-----w C:\Program Files\RegCleaner
2008-01-30 04:03 --------- d-----w C:\Documents and Settings\Owner\Application Data\AdobeUM
2008-01-29 02:00 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
2008-01-27 21:04 --------- d-----w C:\Program Files\VectorWorks 11
2008-01-27 17:44 --------- d-----w C:\Program Files\VectorWorks 11.5.1
2008-01-27 17:40 --------- d-----w C:\Program Files\QuickTime
2008-01-19 23:53 --------- d-----w C:\Documents and Settings\Owner\Application Data\Nero
2008-01-19 23:43 --------- d-----w C:\Program Files\Common Files\Nero
2008-01-19 23:40 --------- d-----w C:\Program Files\Nero
2008-01-19 23:40 --------- d-----w C:\Documents and Settings\All Users\Application Data\Nero
2008-01-14 23:31 --------- d-----w C:\Program Files\Hewlett-Packard
2007-12-14 00:09 972,072 ----a-w C:\WINDOWS\UNNeroMediaHome.exe
2006-09-05 22:09 25,600 ----a-w C:\Documents and Settings\Owner\usbsermptxp.sys
2006-09-05 22:09 22,768 ----a-w C:\Documents and Settings\Owner\usbsermpt.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-03 23:56 15360]
"NVIEW"="nview.dll" [2003-10-17 16:02 852039 C:\WINDOWS\system32\nview.dll]
"AIM"="C:\Program Files\AIM\aim.exe" [2005-08-05 14:08 67160]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-01-28 11:43 2097488]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Tpwrtray"="TPWRTRAY.EXE" [2002-01-31 13:00 196608 C:\WINDOWS\system32\TPWRTRAY.EXE]
"TosHKCW.exe"="C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe" [2002-01-22 21:20 49152]
"TMESRV.EXE"="C:\Program Files\TOSHIBA\TME3\TMESRV31.exe" [2002-02-04 18:36 118784]
"TMESBS.EXE"="C:\Program Files\TOSHIBA\TME3\TMESBS32.exe" [2001-12-14 21:39 73728]
"TMERzCtl.EXE"="C:\Program Files\TOSHIBA\TME3\TMERzCtl.exe" [2002-02-04 19:54 77824]
"TMEEJME.EXE"="C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE" [2002-02-05 12:30 65536]
"TFNF5"="TFNF5.exe" [2001-08-03 20:08 73728 C:\WINDOWS\system32\TFNF5.exe]
"QAGENT"="C:\quickenw\QAGENT.EXE" [2000-09-19 20:28 94208]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2001-11-14 05:37 147456]
"nwiz"="nwiz.exe" [2003-10-17 16:02 323584 C:\WINDOWS\system32\nwiz.exe]
"NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2003-10-17 16:02 4866048]
"Logitech Utility"="Logi_MwX.Exe" [2003-12-17 08:50 19968 C:\WINDOWS\LOGI_MWX.EXE]
"googletalk"="C:\Program Files\Google\Google Talk\googletalk.exe" [2007-01-01 16:22 3739648]
"00THotkey"="C:\WINDOWS\System32\00THotkey.exe" [2002-01-30 18:57 249856]
"000StTHK"="000StTHK.exe" [2001-06-23 23:28 24576 C:\WINDOWS\system32\000StTHK.exe]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2007-11-15 13:11 267048]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2008-01-27 12:40 98304]
"avast!"="C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe" [2007-12-04 08:00 79224]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 04:25 144784]

C:\Documents and Settings\Owner\Start Menu\Programs\Startup\
ERUNT AutoBackup.lnk - C:\Program Files\ERUNT\AUTOBACK.EXE [2005-10-20 11:04:08 38912]
SpywareGuard.lnk - C:\Program Files\SpywareGuard\sgmain.exe [2003-08-29 19:05:35 360448]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2006-08-09 16:05:46 113664]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 22:05:26 29696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\awtrrrq]
awtrrrq.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tuspp]
C:\WINDOWS\system32\tuspp.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\VectorWorks 11\\VectorWorks.exe"=
"C:\\Program Files\\AIM\\aim.exe"=
"C:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA 3D\\GrandMA 3D.exe"=
"C:\\Program Files\\myTunes Redux\\mDNSResponder.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideoAdmin.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideo.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\launcher-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\critical-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\livecache-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\ob2000-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\server-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\desktop-win32-golden.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\WINDOWS\\System32\\slpd.exe"=
"C:\\WINDOWS\\system32\\java.exe"=
"C:\\Documents and Settings\\Owner\\Desktop\\grandMA FTP\\grandMAftp.exe"=
"C:\\Program Files\\Avolites\\Pearl 2004 Simulator\\Pearl.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA Offline 5.810\\gmaOffline.exe"=
"C:\\Program Files\\MA Lighting Technologies\\GMA Remote Emulator 5.700\\GmaREmu.exe"=
"C:\\Program Files\\ENTTEC LightFactory\\sl.exe"=
"C:\\Program Files\\Capture 2005\\Capture.exe"=
"C:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"C:\\Program Files\\Jands\\Vista\\vista.exe"=
"C:\\Program Files\\Internet Explorer\\iexplore.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.828\\gmaOnPC.exe"=
"C:\\Program Files\\Macromedia\\Dreamweaver 8\\Dreamweaver.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.831\\gmaOnPC.exe"=
"C:\\Program Files\\HighEnd\\Content Management Application\\ContentManagementApplication.exe"=
"C:\\Program Files\\VectorWorks 11.5.1\\VectorWorks.exe"=
"C:\\Program Files\\ETC\\Eos\\Eos.exe"=
"C:\\WINDOWS\\System32\\Appmux.exe"=
"C:\\congo\\congo.exe"=

R0 tosrfec;Bluetooth ACPI from Toshiba;C:\WINDOWS\system32\DRIVERS\tosrfec.sys [2001-07-13 06:26]
R0 TVALG;Toshiba Value Added Logical and General Purpose Device Driver;C:\WINDOWS\system32\DRIVERS\TVALG.SYS [2001-09-13 22:53]
R1 TMEI3E;TMEI3E;C:\WINDOWS\system32\Drivers\TMEI3E.SYS [2002-01-08 17:44]
R2 io;io;C:\WINDOWS\system32\drivers\io.sys [2006-11-29 22:13]
R2 mrtRate;mrtRate;C:\WINDOWS\system32\drivers\mrtRate.sys [2000-05-31 17:20]
R2 slpd;Service Location Protocol;C:\WINDOWS\system32\slpd.exe [2008-01-10 16:43]
R2 taskmon;taskmon;C:\Program Files\uICE\taskmon.sys [2002-11-16 18:57]
R2 Tmesbs;Tmesbs32;"C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service []
R3 SOFTXG;YAMAHA XG WDM SoftSynthesizer;C:\WINDOWS\system32\drivers\sxgxgwdm.sys [2001-07-09 18:20]
R3 TOSHIBASoftModem;TOSHIBA Software Modem;C:\WINDOWS\system32\DRIVERS\LTSM.sys [2001-09-26 23:34]
R3 tsdhd;TOSHIBA SD Card Host Controller Driver;C:\WINDOWS\system32\DRIVERS\tsdhd.sys [2002-01-07 04:02]
S2 NSLSVC;Network System Logon;"C:\WINDOWS\Cursors\netmsvc.exe" []
S3 BrScnUsb;Brother USB Still Image driver;C:\WINDOWS\system32\Drivers\BrScnUsb.sys [2004-10-15 11:50]
S3 dcddrv;dcddrv;C:\Program Files\uICE\devices\dcddrv.sys [2002-11-16 19:13]
S3 DMXGenerator;DMXGenerator;C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe [2006-09-15 15:49]
S3 MaxExtMidi;MaxExtMidiService;"C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe" [2005-12-06 13:12]
S3 MaxxyzResourceTransportService;Maxxyz Resource Transport;c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe [2006-10-17 16:45]
S3 pciSd;pciSd;C:\WINDOWS\system32\DRIVERS\tossdpci.sys [2002-01-07 21:16]
S3 SBExtigyIR;SBExtigyIR;C:\WINDOWS\system32\drivers\sbextigy.sys [2002-11-17 18:35]
S3 toslane;Toshiba BT-LANE;C:\WINDOWS\system32\DRIVERS\TOSRFLAN.sys [2002-02-07 19:24]
S4 MSSQL$MAXXYZ;MSSQL$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlservr.exe" -sMAXXYZ []
S4 SQLAgent$MAXXYZ;SQLAgent$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlagent.EXE" -i MAXXYZ []

.
Contents of the 'Scheduled Tasks' folder
"2008-02-26 23:49:00 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-07 19:57:06
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\DMXGenerator]
"ImagePath"="C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe /startedbyscm:CD78F72B-40E2F1D2-DMXGenerator"
.
------------------------ Other Running Processes ------------------------
.
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\SpywareGuard\sgbhp.exe
.
**************************************************************************
.
Completion time: 2008-03-07 20:01:45 - machine was rebooted
ComboFix-quarantined-files.txt 2008-03-08 01:01:39
.
2008-02-13 06:11:49 --- E O F ---
 
Do you also want a new kaspersky?


Logfile of HijackThis v1.99.1
Scan saved at 10:41:46 AM, on 3/8/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\svchost.exe
C:\toshiba\ivp\ism\ivpsvmgr.exe
C:\Setups\hijackthis\ttocsic.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: awtrrrq - awtrrrq.dll (file missing)
O20 - Winlogon Notify: tuspp - C:\WINDOWS\system32\tuspp.dll (file missing)
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)
 
Hi

Not yet :)

Please click this link-->Jotti

Copy/paste the first file on the list into the white Upload a file box and click Submit/Send (depends on which one you are using Jotti or VirusTotal).

C:\WINDOWS\system32\2055.keys

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/
 
I uploaded:
C:\WINDOWS\system32\2055.keys
(i think thats what you meant)

Jotti's Result looked like this:


Service load:
0% 100%
File: 2055.keys
Status:
OK
MD5: e1428d216bd4061c413b7bc2c15c2c29
Packers detected:
-
Bit9 reports: File not found

Scanner results
Scan taken on 08 Mar 2008 23:47:10 (GMT)
A-Squared
Found nothing
AntiVir
Found nothing
ArcaVir
Found nothing
Avast
Found nothing
AVG Antivirus
Found nothing
BitDefender
Found nothing
ClamAV
Found nothing
CPsecure
Found nothing
Dr.Web
Found nothing
F-Prot Antivirus
Found nothing
F-Secure Anti-Virus
Found nothing
Fortinet
Found nothing
Ikarus
Found nothing
Kaspersky Anti-Virus
Found nothing
NOD32
Found nothing
Norman Virus Control
Found nothing
Panda Antivirus
Found nothing
Rising Antivirus
Found nothing
Sophos Antivirus
Found nothing
VirusBuster
Found nothing
VBA32
Found nothing

Statistics
Last file scanned at least one scanner reported something about: wga.dll (MD5: ca2520c9f3993f88f3eacb2b1dd5d080, size: 156160 bytes), detected by:

Scanner Malware name
A-Squared X
AntiVir HEUR/Malware
ArcaVir X
Avast Win32:Delf-DYU
AVG Antivirus X
BitDefender Trojan.Generic.4028
ClamAV X
CPsecure X
Dr.Web X
F-Prot Antivirus X
F-Secure Anti-Virus X
Fortinet X
Ikarus X
Kaspersky Anti-Virus X
NOD32 X
Norman Virus Control X
Panda Antivirus Trj/Passtealer.FG
Rising Antivirus X
Sophos Antivirus Sus/Delf-J
VirusBuster X
VBA32 Trojan-Spy.Delf.4 (paranoid heuristics)


VirusTotal showed this:

File 2055.keys received on 03.09.2008 00:53:24 (CET)
Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED
Result: 0/32 (0%)
Loading server information...
Your file is queued in position: 15.
Estimated start time is between 87 and 125 seconds.
Do not close the window until scan is complete.
The scanner that was processing your file is stopped at this moment, we are going to wait a few seconds to try to recover your result.
If you are waiting for more than five minutes you have to resend your file.
Your file is being scanned by VirusTotal in this moment,
results will be shown as they're generated.
Compact Compact
Print results Print results
Your file has expired or does not exists.
Service is stopped in this moments, your file is waiting to be scanned (position: ) for an undefined time.

You can wait for web response (automatic reload) or type your email in the form below and click "request" so the system sends you a notification when the scan is finished.
Email:

Antivirus Version Last Update Result
AhnLab-V3 2008.3.4.0 2008.03.07 -
AntiVir 7.6.0.73 2008.03.07 -
Authentium 4.93.8 2008.03.07 -
Avast 4.7.1098.0 2008.03.08 -
AVG 7.5.0.516 2008.03.08 -
BitDefender 7.2 2008.03.08 -
CAT-QuickHeal 9.50 2008.03.08 -
ClamAV 0.92.1 2008.03.08 -
DrWeb 4.44.0.09170 2008.03.08 -
eSafe 7.0.15.0 2008.03.06 -
eTrust-Vet 31.3.5597 2008.03.07 -
Ewido 4.0 2008.03.08 -
FileAdvisor 1 2008.03.09 -
Fortinet 3.14.0.0 2008.03.08 -
F-Prot 4.4.2.54 2008.03.08 -
F-Secure 6.70.13260.0 2008.03.08 -
Ikarus T3.1.1.20 2008.03.08 -
Kaspersky 7.0.0.125 2008.03.09 -
McAfee 5247 2008.03.07 -
Microsoft 1.3301 2008.03.07 -
NOD32v2 2931 2008.03.08 -
Norman 5.80.02 2008.03.07 -
Panda 9.0.0.4 2008.03.08 -
Prevx1 V2 2008.03.09 -
Rising 20.34.52.00 2008.03.08 -
Sophos 4.27.0 2008.03.08 -
Sunbelt 3.0.930.0 2008.03.05 -
Symantec 10 2008.03.08 -
TheHacker 6.2.92.238 2008.03.08 -
VBA32 3.12.6.2 2008.03.05 -
VirusBuster 4.3.26:9 2008.03.08 -
Webwasher-Gateway 6.6.2 2008.03.08 -
Additional information
File size: 13786 bytes
MD5: e1428d216bd4061c413b7bc2c15c2c29
SHA1: 7f73ec880675be7c88cad24f6bc865323c58839b
PEiD: -
packers: Unicode
packers: Unicode
 
Hi

Thanks for that.

Do you recognize these files?

2008-02-23 14:05 . 2007-11-20 15:52 13,786 -ra------ C:\WINDOWS\system32\2055.keys
2008-02-23 14:05 . 2007-11-20 15:51 13,696 -ra------ C:\WINDOWS\system32\1031.keys
2008-02-23 14:05 . 2007-11-20 15:53 13,606 -ra------ C:\WINDOWS\system32\1040.keys
2008-02-23 14:05 . 2007-11-20 15:51 11,792 -ra------ C:\WINDOWS\system32\1033.keys
2008-02-23 14:05 . 2007-11-20 15:53 11,752 -ra------ C:\WINDOWS\system32\1049.keys
 
No i dont know what those files are. I didnt put them there if thats what you're asking. Could they possibly be registry backups of some sort? I ask because of the ".keys" extension.
 
Hi

Do you recognize then these?

2008-02-23 14:05 . 2006-02-28 10:08 118,784 --a------ C:\WINDOWS\system32\AppMux.exe
2008-02-23 14:05 . 2008-01-10 16:43 102,400 --a------ C:\WINDOWS\system32\slpd.exe
2008-02-23 14:05 . 2008-01-10 16:43 69,632 --a------ C:\WINDOWS\system32\slptool.exe

Those .keys are likely related to same program.
 
Im not sure what they are. I can say however that slpd.exe is usually running in the background.
A little info:
The slpd and slptool were created in february. And the appmux claims to be created 2 years ago.

Did a file search and came up with an slpd.log

Its contents:
****************************************
Wed Dec 12 19:11:47 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Agent Interfaces = 192.168.0.2
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.2 ...
Multicast (IPv4) socket on 192.168.0.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.2 ready
Unicast socket on 192.168.0.2 ready
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
****************************************
Fri Dec 14 13:26:52 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Agent Interfaces = 192.168.0.5
Startup complete entering main run loop ...

****************************************
Fri Dec 14 16:10:52 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Agent Interfaces = 192.168.0.5
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.5 ...
Multicast (IPv4) socket on 192.168.0.5 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.5 ready
Unicast socket on 192.168.0.5 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
****************************************
Mon Dec 17 11:27:40 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Agent Interfaces = (null)
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.4 ...
Multicast (IPv4) socket on 192.168.0.4 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.4 ready
Unicast socket on 192.168.0.4 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.0.4 ...
Multicast (IPv4) socket on 192.168.0.4 ready
SLPv1 DA Discovery Multicast socket on 192.168.0.4 ready
Unicast socket on 192.168.0.4 ready
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
****************************************
Mon Dec 17 21:58:22 2007
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Agent Interfaces = 12.40.111.236
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 12.40.111.236 ...
Multicast (IPv4) socket on 12.40.111.236 ready
SLPv1 DA Discovery Multicast socket on 12.40.111.236 ready
Unicast socket on 12.40.111.236 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 169.254.33.218 ...
Multicast (IPv4) socket on 169.254.33.218 ready
SLPv1 DA Discovery Multicast socket on 169.254.33.218 ready
Unicast socket on 169.254.33.218 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.2.2 ...
Multicast (IPv4) socket on 192.168.2.2 ready
SLPv1 DA Discovery Multicast socket on 192.168.2.2 ready
Unicast socket on 192.168.2.2 ready

Goes on and on. Ive shortened it to fit.
Last log is:


****************************************
Sat Mar 08 10:02:34 2008
SLPD daemon started
****************************************
Command line = slpd
Using configuration file = C:\WINDOWS\slp.conf
Using registration file = C:\WINDOWS\slp.reg
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Agent Interfaces = 192.168.1.100
Startup complete entering main run loop ...

Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Network changing, re-initializing sockets and re-discovering
Listening on loopback TCP...
Listening on loopback UDP...
Listening on 192.168.1.100 ...
Multicast (IPv4) socket on 192.168.1.100 ready
SLPv1 DA Discovery Multicast socket on 192.168.1.100 ready
Unicast socket on 192.168.1.100 ready
 
Hi

Ok, those seem to be fine.

We need first to disable TeaTimer that it doesn't interfere with fixes. You can re-enable it when you're clean again:

1. Run Spybot-S&D in Advanced Mode.
2. If it is not already set to do this Go to the Mode menu select "Advanced Mode"
3. On the left hand side, Click on Tools
4. Then click on the Resident Icon in the List
5. Uncheck "Resident TeaTimer" and OK any prompts.
6. Restart your computer.

Open notepad and copy/paste the text in the quotebox below into it:

Code:
File::
C:\WINDOWS\system32\rpxpxhgd.ini
C:\WINDOWS\system32\giccddrx.ini

Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\awtrrrq]

[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tuspp]

Save this as "CFScript"

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

CFScript.gif


This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.

Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
 
Combo fix results:

ComboFix 08-03-07.4 - Owner 2008-03-09 12:42:34.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.218 [GMT -4:00]
Running from: C:\Documents and Settings\Owner\Desktop\Combo-Fix.exe
Command switches used :: C:\Documents and Settings\Owner\Desktop\CFScript.txt
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

FILE ::
C:\WINDOWS\system32\giccddrx.ini
C:\WINDOWS\system32\rpxpxhgd.ini
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\system32\giccddrx.ini
C:\WINDOWS\system32\rpxpxhgd.ini

.
((((((((((((((((((((((((( Files Created from 2008-02-09 to 2008-03-09 )))))))))))))))))))))))))))))))
.

2008-03-06 12:14 . 2008-03-06 12:14 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-03-06 12:14 . 2008-03-06 12:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-03-06 10:51 . 2008-03-06 10:52 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-03-05 12:28 . 2008-03-05 12:28 <DIR> d-------- C:\Program Files\Sun
2008-03-05 12:28 . 2008-02-22 03:33 69,632 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-03-05 12:24 . 2008-03-05 12:28 <DIR> d-------- C:\Program Files\Java
2008-03-05 12:24 . 2008-03-05 12:24 <DIR> d-------- C:\Program Files\Common Files\Java
2008-03-03 22:37 . 2008-03-03 22:37 <DIR> d-------- C:\Program Files\Alwil Software
2008-03-03 22:37 . 2007-12-04 09:04 837,496 --a------ C:\WINDOWS\system32\aswBoot.exe
2008-03-03 22:37 . 2004-01-09 05:13 380,928 --a------ C:\WINDOWS\system32\actskin4.ocx
2008-03-03 22:37 . 2007-12-04 08:54 95,608 --a------ C:\WINDOWS\system32\AvastSS.scr
2008-03-03 22:37 . 2007-12-04 10:55 94,544 --a------ C:\WINDOWS\system32\drivers\aswmon2.sys
2008-03-03 22:37 . 2007-12-04 10:56 93,264 --a------ C:\WINDOWS\system32\drivers\aswmon.sys
2008-03-03 22:37 . 2007-12-04 10:51 42,912 --a------ C:\WINDOWS\system32\drivers\aswTdi.sys
2008-03-03 22:37 . 2007-12-04 10:49 26,624 --a------ C:\WINDOWS\system32\drivers\aavmker4.sys
2008-03-03 22:37 . 2007-12-04 10:53 23,152 --a------ C:\WINDOWS\system32\drivers\aswRdr.sys
2008-03-03 22:23 . 2008-03-08 12:00 <DIR> d-------- C:\Program Files\SpywareGuard
2008-03-03 22:20 . 2008-03-03 22:20 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\TEMP
2008-03-03 21:19 . 2008-03-03 22:19 1,302,502 --ahs---- C:\WINDOWS\system32\aggvvvyv.ini
2008-02-27 13:14 . 2008-02-27 13:14 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Move Networks
2008-02-23 15:42 . 2008-02-23 15:47 <DIR> d-------- C:\Program Files\Virtual SmartFade
2008-02-23 15:14 . 2008-02-23 16:08 <DIR> d-------- C:\congo
2008-02-23 15:14 . 2006-08-25 15:41 36,864 --a------ C:\WINDOWS\system32\CongoShell.exe
2008-02-23 15:05 . 2006-02-28 11:08 118,784 --a------ C:\WINDOWS\system32\AppMux.exe
2008-02-23 15:05 . 2008-01-10 17:43 102,400 --a------ C:\WINDOWS\system32\slpd.exe
2008-02-23 15:05 . 2008-01-10 17:43 69,632 --a------ C:\WINDOWS\system32\slptool.exe
2008-02-23 15:05 . 2007-11-20 16:52 13,786 -ra------ C:\WINDOWS\system32\2055.keys
2008-02-23 15:05 . 2007-11-20 16:51 13,696 -ra------ C:\WINDOWS\system32\1031.keys
2008-02-23 15:05 . 2007-11-20 16:53 13,606 -ra------ C:\WINDOWS\system32\1040.keys
2008-02-23 15:05 . 2007-11-20 16:51 11,792 -ra------ C:\WINDOWS\system32\1033.keys
2008-02-23 15:05 . 2007-11-20 16:53 11,752 -ra------ C:\WINDOWS\system32\1049.keys
2008-02-23 15:05 . 2007-05-22 17:04 9,238 --------- C:\WINDOWS\slp.conf

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-03-09 16:19 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-03-09 06:14 --------- d-----w C:\Program Files\Flying Pig Systems
2008-03-04 02:22 --------- d-----w C:\Program Files\SpywareBlaster
2008-02-28 13:36 --------- d-----w C:\Program Files\palmOne
2008-02-23 19:14 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-02-23 19:06 --------- d-----w C:\Program Files\ETC
2008-02-19 00:17 --------- d-----w C:\Program Files\ENTTEC LightFactory
2008-02-18 23:34 --------- d-----w C:\Program Files\RegCleaner
2008-01-30 04:03 --------- d-----w C:\Documents and Settings\Owner\Application Data\AdobeUM
2008-01-29 02:00 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
2008-01-27 21:04 --------- d-----w C:\Program Files\VectorWorks 11
2008-01-27 17:44 --------- d-----w C:\Program Files\VectorWorks 11.5.1
2008-01-27 17:40 --------- d-----w C:\Program Files\QuickTime
2008-01-19 23:53 --------- d-----w C:\Documents and Settings\Owner\Application Data\Nero
2008-01-19 23:43 --------- d-----w C:\Program Files\Common Files\Nero
2008-01-19 23:40 --------- d-----w C:\Program Files\Nero
2008-01-19 23:40 --------- d-----w C:\Documents and Settings\All Users\Application Data\Nero
2008-01-14 23:31 --------- d-----w C:\Program Files\Hewlett-Packard
2007-12-14 00:09 972,072 ----a-w C:\WINDOWS\UNNeroMediaHome.exe
2006-09-05 22:09 25,600 ----a-w C:\Documents and Settings\Owner\usbsermptxp.sys
2006-09-05 22:09 22,768 ----a-w C:\Documents and Settings\Owner\usbsermpt.sys
.

((((((((((((((((((((((((((((( snapshot@2008-03-07_20.01.13.87 )))))))))))))))))))))))))))))))))))))))))
.
+ 2005-10-20 16:02:28 163,328 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-8-2008\ERDNT.EXE
+ 2008-03-08 15:03:17 9,252,864 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-8-2008\Users\00000001\ntuser.dat
+ 2008-03-08 15:03:18 405,504 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-8-2008\Users\00000002\UsrClass.dat
+ 2005-10-20 16:02:28 163,328 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-9-2008\ERDNT.EXE
+ 2008-03-09 16:23:05 9,265,152 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-9-2008\Users\00000001\ntuser.dat
+ 2008-03-09 16:23:06 405,504 ----a-w C:\WINDOWS\ERDNT\AutoBackup\3-9-2008\Users\00000002\UsrClass.dat
- 2000-08-31 13:00:00 163,328 ----a-w C:\WINDOWS\ERDNT\Hiv-backup\ERDNT.EXE
+ 2000-08-31 12:00:00 163,328 ----a-w C:\WINDOWS\ERDNT\Hiv-backup\ERDNT.EXE
- 2000-08-31 13:00:00 28,160 ----a-w C:\WINDOWS\Nircmd.exe
+ 2000-08-31 12:00:00 28,160 ----a-w C:\WINDOWS\Nircmd.exe
- 2007-11-04 22:09:53 61,284 ----a-w C:\WINDOWS\system32\perfc009.dat
+ 2008-03-09 16:26:40 61,284 ----a-w C:\WINDOWS\system32\perfc009.dat
- 2007-11-04 22:09:53 400,090 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2008-03-09 16:26:40 400,090 ----a-w C:\WINDOWS\system32\perfh009.dat
- 2000-08-31 13:00:00 161,792 ----a-w C:\WINDOWS\system32\swreg.exe
+ 2000-08-31 12:00:00 161,792 ----a-w C:\WINDOWS\system32\swreg.exe
+ 2008-03-09 16:22:16 16,384 ----atw C:\WINDOWS\temp\Perflib_Perfdata_62c.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 00:56 15360]
"NVIEW"="nview.dll" [2003-10-17 17:02 852039 C:\WINDOWS\system32\nview.dll]
"AIM"="C:\Program Files\AIM\aim.exe" [2005-08-05 15:08 67160]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Tpwrtray"="TPWRTRAY.EXE" [2002-01-31 14:00 196608 C:\WINDOWS\system32\TPWRTRAY.EXE]
"TosHKCW.exe"="C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe" [2002-01-22 22:20 49152]
"TMESRV.EXE"="C:\Program Files\TOSHIBA\TME3\TMESRV31.exe" [2002-02-04 19:36 118784]
"TMESBS.EXE"="C:\Program Files\TOSHIBA\TME3\TMESBS32.exe" [2001-12-14 22:39 73728]
"TMERzCtl.EXE"="C:\Program Files\TOSHIBA\TME3\TMERzCtl.exe" [2002-02-04 20:54 77824]
"TMEEJME.EXE"="C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE" [2002-02-05 13:30 65536]
"TFNF5"="TFNF5.exe" [2001-08-03 21:08 73728 C:\WINDOWS\system32\TFNF5.exe]
"QAGENT"="C:\quickenw\QAGENT.EXE" [2000-09-19 21:28 94208]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2001-11-14 06:37 147456]
"nwiz"="nwiz.exe" [2003-10-17 17:02 323584 C:\WINDOWS\system32\nwiz.exe]
"NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2003-10-17 17:02 4866048]
"Logitech Utility"="Logi_MwX.Exe" [2003-12-17 09:50 19968 C:\WINDOWS\LOGI_MWX.EXE]
"googletalk"="C:\Program Files\Google\Google Talk\googletalk.exe" [2007-01-01 17:22 3739648]
"00THotkey"="C:\WINDOWS\System32\00THotkey.exe" [2002-01-30 19:57 249856]
"000StTHK"="000StTHK.exe" [2001-06-24 00:28 24576 C:\WINDOWS\system32\000StTHK.exe]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2007-11-15 14:11 267048]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2008-01-27 13:40 98304]
"avast!"="C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe" [2007-12-04 09:00 79224]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 05:25 144784]

C:\Documents and Settings\Owner\Start Menu\Programs\Startup\
ERUNT AutoBackup.lnk - C:\Program Files\ERUNT\AUTOBACK.EXE [2005-10-20 12:04:08 38912]
SpywareGuard.lnk - C:\Program Files\SpywareGuard\sgmain.exe [2003-08-29 20:05:35 360448]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2006-08-09 17:05:46 113664]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 23:05:26 29696]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\VectorWorks 11\\VectorWorks.exe"=
"C:\\Program Files\\AIM\\aim.exe"=
"C:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA 3D\\GrandMA 3D.exe"=
"C:\\Program Files\\myTunes Redux\\mDNSResponder.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideoAdmin.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA video\\grandMAVideo.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\launcher-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\critical-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\livecache-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\ob2000-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\server-win32-golden.exe"=
"C:\\Program Files\\Flying Pig Systems\\Hog3PC\\desktop-win32-golden.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\WINDOWS\\System32\\slpd.exe"=
"C:\\WINDOWS\\system32\\java.exe"=
"C:\\Documents and Settings\\Owner\\Desktop\\grandMA FTP\\grandMAftp.exe"=
"C:\\Program Files\\Avolites\\Pearl 2004 Simulator\\Pearl.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA Offline 5.810\\gmaOffline.exe"=
"C:\\Program Files\\MA Lighting Technologies\\GMA Remote Emulator 5.700\\GmaREmu.exe"=
"C:\\Program Files\\ENTTEC LightFactory\\sl.exe"=
"C:\\Program Files\\Capture 2005\\Capture.exe"=
"C:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"C:\\Program Files\\Jands\\Vista\\vista.exe"=
"C:\\Program Files\\Internet Explorer\\iexplore.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.828\\gmaOnPC.exe"=
"C:\\Program Files\\Macromedia\\Dreamweaver 8\\Dreamweaver.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=
"C:\\Program Files\\MA Lighting Technologies\\grandMA\\grandMA onPC 5.831\\gmaOnPC.exe"=
"C:\\Program Files\\HighEnd\\Content Management Application\\ContentManagementApplication.exe"=
"C:\\Program Files\\VectorWorks 11.5.1\\VectorWorks.exe"=
"C:\\Program Files\\ETC\\Eos\\Eos.exe"=
"C:\\WINDOWS\\System32\\Appmux.exe"=
"C:\\congo\\congo.exe"=

R0 tosrfec;Bluetooth ACPI from Toshiba;C:\WINDOWS\system32\DRIVERS\tosrfec.sys [2001-07-13 07:26]
R0 TVALG;Toshiba Value Added Logical and General Purpose Device Driver;C:\WINDOWS\system32\DRIVERS\TVALG.SYS [2001-09-13 23:53]
R1 TMEI3E;TMEI3E;C:\WINDOWS\system32\Drivers\TMEI3E.SYS [2002-01-08 18:44]
R2 io;io;C:\WINDOWS\system32\drivers\io.sys [2006-11-29 23:13]
R2 mrtRate;mrtRate;C:\WINDOWS\system32\drivers\mrtRate.sys [2000-05-31 18:20]
R2 slpd;Service Location Protocol;C:\WINDOWS\system32\slpd.exe [2008-01-10 17:43]
R2 taskmon;taskmon;C:\Program Files\uICE\taskmon.sys [2002-11-16 19:57]
R2 Tmesbs;Tmesbs32;"C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service []
R3 SOFTXG;YAMAHA XG WDM SoftSynthesizer;C:\WINDOWS\system32\drivers\sxgxgwdm.sys [2001-07-09 19:20]
R3 TOSHIBASoftModem;TOSHIBA Software Modem;C:\WINDOWS\system32\DRIVERS\LTSM.sys [2001-09-27 00:34]
R3 tsdhd;TOSHIBA SD Card Host Controller Driver;C:\WINDOWS\system32\DRIVERS\tsdhd.sys [2002-01-07 05:02]
S2 NSLSVC;Network System Logon;"C:\WINDOWS\Cursors\netmsvc.exe" []
S3 BrScnUsb;Brother USB Still Image driver;C:\WINDOWS\system32\Drivers\BrScnUsb.sys [2004-10-15 12:50]
S3 dcddrv;dcddrv;C:\Program Files\uICE\devices\dcddrv.sys [2002-11-16 20:13]
S3 DMXGenerator;DMXGenerator;C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe [2006-09-15 16:49]
S3 MaxExtMidi;MaxExtMidiService;"C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe" [2005-12-06 14:12]
S3 MaxxyzResourceTransportService;Maxxyz Resource Transport;c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe [2006-10-17 17:45]
S3 pciSd;pciSd;C:\WINDOWS\system32\DRIVERS\tossdpci.sys [2002-01-07 22:16]
S3 SBExtigyIR;SBExtigyIR;C:\WINDOWS\system32\drivers\sbextigy.sys [2002-11-17 19:35]
S3 toslane;Toshiba BT-LANE;C:\WINDOWS\system32\DRIVERS\TOSRFLAN.sys [2002-02-07 20:24]
S4 MSSQL$MAXXYZ;MSSQL$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlservr.exe" -sMAXXYZ []
S4 SQLAgent$MAXXYZ;SQLAgent$MAXXYZ;"C:\Program Files\Microsoft SQL Server\MSSQL$MAXXYZ\Binn\sqlagent.EXE" -i MAXXYZ []

.
Contents of the 'Scheduled Tasks' folder
"2008-02-26 23:49:00 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-09 12:46:44
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\DMXGenerator]
"ImagePath"="C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe /startedbyscm:CD78F72B-40E2F1D2-DMXGenerator"
.
Completion time: 2008-03-09 12:47:50
ComboFix-quarantined-files.txt 2008-03-09 16:47:29
ComboFix2.txt 2008-03-08 01:01:46
.
2008-02-13 06:11:49 --- E O F ---
 
HJT Report:

Logfile of HijackThis v1.99.1
Scan saved at 12:51:34 PM, on 3/9/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\WINDOWS\system32\mrtMngr.EXE
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\toshiba\ivp\ism\ivpsvmgr.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Setups\hijackthis\ttocsic.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)
 
Hi

Open HijackThis, click do a system scan only and checkmark this:

O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)

Close all windows including browser and press fix checked.

Reboot.

Delete if present:

C:\WINDOWS\Cursors\netmsvc.exe

Empty Recycle Bin.

Re-scan with kaspersky.

Post:

- a fresh HijackThis log
- kaspersky report
 
Kaspersky scan took longer than expected because it scanned my network drive as well. I stopped the scan before it finished the network drive but it did complete the local drive.


Log too long for post. Also too large to attach.

HJT:

Logfile of HijackThis v1.99.1
Scan saved at 12:18:00 PM, on 3/10/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\slpd.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
C:\WINDOWS\system32\TFNF5.exe
C:\quickenw\QAGENT.EXE
C:\toshiba\ivp\ism\pinger.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\WINDOWS\system32\mrtMngr.EXE
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\System32\00THotkey.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\palmOne\Palm.exe
C:\Setups\hijackthis\ttocsic.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [QAGENT] C:\quickenw\QAGENT.EXE
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect /keeploaded
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DMXGenerator - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\GeneratorService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MaxExtMidiService (MaxExtMidi) - Unknown owner - C:\Program Files\Martin Professional\Maxxyz\Win32\MaxExtMidiService.exe
O23 - Service: Maxxyz Resource Transport (MaxxyzResourceTransportService) - R&D International NV - c:\program files\martin professional\maxxyz\clr\maxxyzresourcetransportservice.exe
O23 - Service: Network System Logon (NSLSVC) - Unknown owner - C:\WINDOWS\Cursors\netmsvc.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Service Location Protocol (slpd) - Unknown owner - C:\WINDOWS\system32\slpd.exe
O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)
 
Back
Top