1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Browser Hijacked

Discussion in 'Virus & Other Malware Removal' started by hammosplace, May 2, 2010.

Thread Status:
Not open for further replies.
Advertisement
  1. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Hi
    I've recently been experiencing annoying Hijacking of my browser - I use IE and my page is randomly redirected to numerous sites including K Directory . A Casino , several other search type sites . I have installed Adaware , A Squared , MalwareBytes and AVG and ran all several times . I had 4 high Risk entries and have removed those ( A2'd ) but the hijacking still persists . I have run HijackThis and included the log below as I do not feel confident in resolving this issue on my own . Hopefully I can get some help here . I ran a system restore yesterday, turned it off and restarted after a scan , have emptied temp internet files , deleted cookies -- my ignorance is not bliss. Any help would be most appreciated .

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:44:38 AM, on 5/3/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\AVG\AVG9\avgchsvx.exe
    C:\Program Files\AVG\AVG9\avgrsx.exe
    C:\Program Files\AVG\AVG9\avgcsrvx.exe
    C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\RTHDCPL.EXE
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe
    C:\PROGRA~1\AVG\AVG9\avgtray.exe
    C:\Program Files\BillP Studios\WinPatrol\winpatrol.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\YourWare Solutions\FreeRAM XP Pro\FreeRAM XP Pro.exe
    C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\Program Files\Windows Desktop Search\WindowsSearch.exe
    C:\Program Files\a-squared Free\a2service.exe
    C:\Program Files\AVG\AVG9\avgwdsvc.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\CDBurnerXP\NMSAccessU.exe
    C:\Program Files\AVG\AVG9\avgnsx.exe
    C:\WINDOWS\system32\svchost.exe
    c:\WINDOWS\system32\ZuneBusEnum.exe
    C:\WINDOWS\system32\SearchIndexer.exe
    C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R3 - URLSearchHook: DeviceVM Url Search Hook - {0063BF63-BFFF-4B8F-9D26-4267DF7F17DD} - C:\WINDOWS\system32\dvmurl.dll
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O2 - BHO: GrabberObj Class - {FF7C3CF0-4B15-11D1-ABED-709549C10000} - C:\PROGRA~1\SPEEDB~1\Toolbar\grabber.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
    O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [Google Quick Search Box] "C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe" /autorun
    O4 - HKLM\..\Run: [AVG9_TRAY] C:\PROGRA~1\AVG\AVG9\avgtray.exe
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
    O4 - HKLM\..\Run: [WinPatrol] C:\Program Files\BillP Studios\WinPatrol\winpatrol.exe -expressboot
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [FreeRAM XP] "C:\Program Files\YourWare Solutions\FreeRAM XP Pro\FreeRAM XP Pro.exe" -win
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
    O4 - Global Startup: Windows Search.lnk = C:\Program Files\Windows Desktop Search\WindowsSearch.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - http://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
    O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
    O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.5.0.cab
    O16 - DPF: {5D637FAD-E202-48D1-8F18-5B9C459BD1E3} - http://www.fujifilmimagine.com/imagine/ax/ImageUploader5.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1244927609593
    O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
    O16 - DPF: {DE625294-70E6-45ED-B895-CFFA13AEB044} (AxisMediaControlEmb Class) - http://194.244.146.56/activex/AMC.cab
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll
    O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
    O23 - Service: a-squared Free Service (a2free) - Emsi Software GmbH - C:\Program Files\a-squared Free\a2service.exe
    O23 - Service: AVG Free WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exe
    O23 - Service: GEST Service for program management. (GEST Service) - Unknown owner - C:\Program Files\GIGABYTE\EnergySaver\GSvr.exe
    O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
    O23 - Service: NMSAccessU - Unknown owner - C:\Program Files\CDBurnerXP\NMSAccessU.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

    --
    End of file - 8189 bytes
     
  2. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Hello there :cool: Welcome to the TSG Forums.
    My name is NeonFx. I'll be glad to help you with your computer problems. Logs can take some time to research, so please be patient with me.


    Please note the following:
    • The fixes are specific to your problem and should only be used on this machine.
    • Please continue to review my answers until I tell you your machine appears to be clean. Absence of symptoms does not necessarily mean that the system is completely clean.
    • It's often worth reading through these instructions and printing them for ease of reference. I may ask you to boot into Safe Mode where you will be unable to follow my instructions online.
    • If you don't know or understand something, please don't hesitate to say or ask!! It's better to be sure and safe than sorry.
    • Please reply to this thread. Do not start a new topic.



    Step 1

    Download OTS to your Desktop

    • Close ALL OTHER PROGRAMS.
    • Double-click on OTS.exe to start the program.
    • Check the box that says Scan All Users
    • Under Basic Scans please change the radio button under Registry from Safe List to All.
    • Under Additional Scans check the following:
      • Reg - Desktop Components
      • Reg - Disabled MS Config Items
      • Reg - NetSvcs
      • Reg - Shell Spawning
      • Reg - Uninstall List
      • File - Lop Check
      • File - Purity Scan
      • Evnt - EvtViewer (last 10)
    • Please paste the contents of the following codebox into the Custom Scans box at the bottom
    Code:
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    nvstor32.sys
    ahcix86s.sys
    nvrd32.sys
    symmpi.sys
    adp3132.sys
    mv61xx.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\drivers\*.sys /lockedfiles
    %systemroot%\System32\config\*.sav
    • Now click the Run Scan button on the toolbar.
    • Let it run unhindered until it finishes.
    • When the scan is complete Notepad will open with the report file loaded in it.
    • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
    Please attach the log in your next post. To do so click on the blue "Reply" button or "Go Advanced" and click on the "Manage Attachments" button

    Step 2

    [​IMG] GMER Rootkit Scanner
    Please download GMER from one of the following locations and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zipped Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
    • Disconnect from the Internet and close all running programs. Make sure you disable your security programs as well, as they may interfere with the program.
    • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
    • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

      [​IMG]
    • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
    • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
    • Now click the Scan button. If you see a rootkit warning window, click OK.
    • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
    • Click the Copy button and paste the results into your next reply.
    • Exit GMER and re-enable your security programs when done.


    If you have trouble running GMER, please try running it in Safe Mode. To get to Safe Mode you'll need to repeatedly tap the F8 key on your keyboard as you turn your computer on until a black and white menu appears with the option.

    If you continue to have trouble with it, try running it without the "Files" scan checked.



    Again, if the results are really long, please attach them using the instructions I gave you at the end of step 1. This is to avoid having to scroll down the page too much make the space cleaner.
     
  3. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Thanks so much for the reply - I have called in home from work ( its 3.02 pm here in Australia ) and will do as you have advised as soon as I can tonight .
    thanks again
     
  4. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Alright. Take your time and let me know if you have trouble.
     
  5. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Dear NeonFx
    I hope I have attatched the OTS results file properly .I will now do the GMER Scanner , which might take a bit longer for me to do .
    thanks for your patience - this is a bit of a struggle .
     

    Attached Files:

    • OTS.Txt
      File size:
      177.7 KB
      Views:
      2
  6. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Take your time. Let me know if you have trouble.
     
  7. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Hi again NeonFx

    I have pasted the GMER result here and also attatched it , although it doesnt seem that big . Apologies for the delay - I had to use safe mode as you suggested and it was very slow. I hope this helps find the solution to my hijack. Thanks again for all your help - it is much appreciated.

    GMER 1.0.15.15281 - http://www.gmer.net
    Rootkit scan 2010-05-03 22:43:42
    Windows 5.1.2600 Service Pack 3
    Running: lovnfg34.exe; Driver: C:\DOCUME~1\peter\LOCALS~1\Temp\uwtdipoc.sys


    ---- System - GMER 1.0.15 ----

    SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwCreateKey [0xF764787E]
    SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwSetValueKey [0xF7647BFE]

    ---- Kernel code sections - GMER 1.0.15 ----

    .rsrc C:\WINDOWS\system32\drivers\dmio.sys entry point in ".rsrc" section [0xF74D4B14]

    ---- User code sections - GMER 1.0.15 ----

    .text C:\WINDOWS\Explorer.EXE[828] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00B6000A
    .text C:\WINDOWS\Explorer.EXE[828] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00C0000A
    .text C:\WINDOWS\Explorer.EXE[828] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00B5000C
    .text C:\WINDOWS\system32\svchost.exe[852] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0099000A
    .text C:\WINDOWS\system32\svchost.exe[852] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 009A000A
    .text C:\WINDOWS\system32\svchost.exe[852] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 0098000C

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

    Device -> \Driver\atapi \Device\Harddisk0\DR0 8A24BEE4

    ---- Registry - GMER 1.0.15 ----

    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected]_DLLs
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected] 15
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected] 10000
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected] yes
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected]
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected] 90
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected] 10000
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\[email protected]_DLLs 1

    ---- Files - GMER 1.0.15 ----

    File C:\WINDOWS\system32\drivers\dmio.sys suspicious modification
    File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

    ---- EOF - GMER 1.0.15 ----
     

    Attached Files:

  8. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Here's our culprit:

    Let's do this:


    NOTE: ComboFix should NOT be used without supervision by someone trained in its use. It does a whole lot more to a system than just remove infected files.

    Download ComboFix from one of these locations:

    Link 1
    Link 2


    * IMPORTANT !!! Save ComboFix.exe to your Desktop



    • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Disabling Security Programs
    • Double click on ComboFix.exe & follow the prompts.

      Note: Combofix will run without the Recovery Console installed.
    • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
    • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.


    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


    [​IMG]


    Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    [​IMG]


    Click on Yes, to continue scanning for malware.

    When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

    Notes:

    1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
    2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.
    3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you please let me know. A increasing number of infections are spreading using Autoplay and leaving it disabled is a good idea.
    4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.
     
  9. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Hi NeonFx
    Thanks again for the ongoing help .
    I have attatched the combofix results and pasted them below also .
    Hope this is ok .

    ComboFix 10-05-03.03 - peter 05/04/2010 7:35.1.2 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3326.2944 [GMT 10:00]
    Running from: c:\documents and settings\peter\Desktop\ComboFix.exe
    AV: avast! Antivirus *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\documents and settings\peter\Application Data\ACD Systems\ACDSee\ImageDB.ddf
    c:\documents and settings\peter\Application Data\inst.exe
    c:\documents and settings\peter\Local Settings\Temporary Internet Files\HcriKB.jpg
    c:\documents and settings\peter\Local Settings\Temporary Internet Files\I0W8kY.jpg
    c:\documents and settings\peter\Local Settings\Temporary Internet Files\P80HPJDI.jpg
    c:\documents and settings\peter\Local Settings\Temporary Internet Files\qxE48.jpg
    c:\program files\SpeedBit Video Downloader\Toolbar\tbhelper.dll
    c:\program files\WindowsUpdate
    c:\windows\jestertb.dll

    Infected copy of c:\windows\system32\drivers\dmio.sys was found and disinfected
    Restored copy from - Kitty had a snack :p
    .
    ((((((((((((((((((((((((( Files Created from 2010-04-03 to 2010-05-03 )))))))))))))))))))))))))))))))
    .

    2010-05-03 13:37 . 2010-04-14 16:31 19024 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
    2010-05-03 13:37 . 2010-04-14 16:35 162768 ----a-w- c:\windows\system32\drivers\aswSP.sys
    2010-05-03 13:37 . 2010-04-14 16:31 23376 ----a-w- c:\windows\system32\drivers\aswRdr.sys
    2010-05-03 13:37 . 2010-04-14 16:35 46672 ----a-w- c:\windows\system32\drivers\aswTdi.sys
    2010-05-03 13:37 . 2010-04-14 16:31 100432 ----a-w- c:\windows\system32\drivers\aswmon2.sys
    2010-05-03 13:37 . 2010-04-14 16:31 94800 ----a-w- c:\windows\system32\drivers\aswmon.sys
    2010-05-03 13:37 . 2010-04-14 16:30 28880 ----a-w- c:\windows\system32\drivers\aavmker4.sys
    2010-05-03 13:37 . 2010-04-14 16:47 38848 ----a-w- c:\windows\system32\avastSS.scr
    2010-05-03 13:37 . 2010-04-14 16:47 153184 ----a-w- c:\windows\system32\aswBoot.exe
    2010-05-03 13:37 . 2010-05-03 13:37 -------- d-----w- c:\program files\Alwil Software
    2010-05-03 13:37 . 2010-05-03 13:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software
    2010-05-03 08:44 . 2010-05-03 08:44 -------- d-----w- c:\documents and settings\peter\Application Data\AVG9
    2010-05-03 08:38 . 2010-05-03 08:38 -------- d-----w- C:\AVGTemp
    2010-05-03 08:22 . 2010-05-03 08:23 -------- d-----w- c:\program files\Startup Manager
    2010-05-03 08:22 . 2010-05-03 08:22 -------- d-----w- c:\documents and settings\All Users\Application Data\Startup Manager
    2010-05-02 13:50 . 2010-05-02 13:50 6153352 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
    2010-05-02 02:32 . 2010-04-12 07:29 411368 ----a-w- c:\windows\system32\deployJava1.dll
    2010-05-02 02:31 . 2010-05-02 02:31 79488 ----a-w- c:\documents and settings\peter\Application Data\Sun\Java\jre1.6.0_20\gtapi.dll
    2010-05-01 23:46 . 2010-05-02 04:31 -------- d-----w- c:\program files\a-squared Free
    2010-05-01 22:45 . 2010-05-01 22:50 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
    2010-05-01 22:45 . 2010-05-02 13:30 664 ----a-w- c:\windows\system32\d3d9caps.dat
    2010-04-30 10:49 . 2010-04-30 09:33 15880 ----a-w- c:\windows\system32\lsdelete.exe
    2010-04-30 09:39 . 2010-04-30 09:39 -------- d-----w- c:\documents and settings\LocalService\Application Data\Share-to-Web Upload Folder
    2010-04-30 09:33 . 2010-02-04 15:53 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
    2010-04-30 09:33 . 2010-04-30 09:33 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
    2010-04-30 09:33 . 2010-04-30 09:33 95024 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\SBREDrv.sys
    2010-04-30 09:33 . 2010-04-30 09:33 566432 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\EmailScanner.dll
    2010-04-30 09:33 . 2010-04-30 09:33 893952 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\threatwork.exe
    2010-04-30 09:33 . 2010-04-30 09:33 566608 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\sbap.dll
    2010-04-30 09:33 . 2010-04-30 09:33 15880 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lsdelete.exe
    2010-04-30 09:33 . 2010-04-30 09:33 211600 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavamessage.dll
    2010-04-30 09:31 . 2010-04-30 09:31 866224 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareCommand.exe
    2010-04-30 09:31 . 2010-04-30 09:31 871320 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareAdmin.exe
    2010-04-30 09:31 . 2010-04-30 09:31 1598464 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
    2010-04-30 09:31 . 2010-04-30 09:31 755096 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWWSC.exe
    2010-04-30 09:31 . 2010-04-30 09:31 834248 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWTray.exe
    2010-04-30 09:31 . 2010-04-30 09:31 1285864 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWService.exe
    2010-04-30 09:27 . 2010-04-30 09:27 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
    2010-04-30 09:27 . 2010-02-04 15:53 2954656 -c--a-w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
    2010-04-30 09:27 . 2010-04-30 09:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
    2010-04-30 09:27 . 2010-04-30 09:27 -------- d-----w- c:\program files\Lavasoft
    2010-04-30 08:50 . 2010-04-30 08:50 -------- d-----w- c:\documents and settings\peter\Local Settings\Application Data\Threat Expert
    2010-04-30 08:11 . 2010-04-30 08:11 -------- d-----w- c:\windows\system32\wbem\Repository
    2010-04-29 23:27 . 2010-04-29 23:27 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
    2010-04-13 03:46 . 2010-04-13 03:47 -------- d-----w- c:\program files\FrostWire
    2010-04-13 03:46 . 2010-05-02 02:32 -------- d-----w- c:\program files\Java
    2010-04-12 23:29 . 2010-04-12 23:29 -------- d-----w- c:\program files\LimeWire
    2010-04-12 23:29 . 2010-04-12 23:29 -------- d-----w- c:\documents and settings\peter\Application Data\LimeWire
    2010-04-12 22:44 . 2010-04-12 23:29 -------- d-----w- c:\program files\FrostWire(2)
    2010-04-12 22:44 . 2010-04-12 23:29 -------- d-----w- c:\program files\Java(2)
    2010-04-12 22:29 . 2010-04-12 23:29 -------- d-----w- c:\program files\FrostWire 4.28

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-05-03 21:34 . 2009-06-13 07:34 16608 ----a-w- c:\windows\gdrv.sys
    2010-05-03 13:23 . 2009-11-09 04:40 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
    2010-05-02 13:50 . 2010-03-05 21:12 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-05-02 04:01 . 2010-01-27 19:22 -------- d-----w- c:\program files\BearShareTb
    2010-04-30 09:33 . 2010-04-30 09:32 397480 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavalicense.dll
    2010-04-30 09:32 . 2010-04-30 09:32 574632 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\aawapi.dll
    2010-04-30 09:32 . 2010-04-30 09:32 17632 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\WSCUpdate.dll
    2010-04-30 09:32 . 2010-04-30 09:32 221920 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\VipreBridge.dll
    2010-04-30 09:32 . 2010-04-30 09:32 443344 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\UpdateManager.dll
    2010-04-30 09:32 . 2010-04-30 09:32 167824 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\ShellExt.dll
    2010-04-30 09:32 . 2010-04-30 09:32 1230160 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\SBTE.dll
    2010-04-30 09:32 . 2010-04-30 09:32 247120 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\SBRE.dll
    2010-04-30 09:32 . 2010-04-30 09:32 6306640 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Resources.dll
    2010-04-30 09:32 . 2010-04-30 09:32 335728 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\RPAPI.dll
    2010-04-30 09:32 . 2010-04-30 09:32 95248 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\PrivacyClean.dll
    2010-04-30 09:32 . 2010-04-30 09:32 16456 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\EmailScannerBridge.dll
    2010-04-30 09:32 . 2010-04-30 09:31 967640 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\CEAPI.dll
    2010-04-30 08:57 . 2009-06-14 08:36 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
    2010-04-30 08:11 . 2009-06-13 08:22 -------- d-----w- c:\program files\IdealDVDCopy
    2010-04-29 05:39 . 2010-03-05 21:12 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-04-29 05:39 . 2010-03-05 21:12 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-04-28 06:10 . 2009-06-14 04:54 -------- d-----w- c:\documents and settings\All Users\Application Data\DVD Shrink
    2010-04-28 00:52 . 2009-06-13 08:22 -------- d-----w- c:\documents and settings\peter\Application Data\Vso
    2010-04-16 13:03 . 2009-06-15 13:17 -------- d-----w- c:\program files\Google
    2010-04-14 22:35 . 2010-02-16 04:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
    2010-04-13 03:51 . 2009-06-15 06:56 -------- d-----w- c:\documents and settings\peter\Application Data\FrostWire
    2010-04-13 03:46 . 2009-08-15 22:32 152576 ----a-w- c:\documents and settings\peter\Application Data\Sun\Java\jre1.6.0_15\lzma.dll
    2010-03-10 06:15 . 2004-08-04 12:00 420352 ----a-w- c:\windows\system32\vbscript.dll
    2010-03-07 11:40 . 2010-03-05 04:43 -------- d-----w- c:\program files\QuickTime
    2010-03-05 21:12 . 2010-03-05 21:12 -------- d-----w- c:\documents and settings\peter\Application Data\Malwarebytes
    2010-03-05 21:12 . 2010-03-05 21:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2010-03-05 21:09 . 2010-03-05 21:09 -------- d-----w- c:\documents and settings\peter\Application Data\WinPatrol
    2010-03-05 21:09 . 2010-03-05 21:09 -------- d-----w- c:\program files\BillP Studios
    2010-02-25 06:24 . 2004-08-04 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
    2010-02-24 13:11 . 2004-08-04 12:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
    2010-02-20 23:29 . 2009-06-13 07:56 69232 ----a-w- c:\documents and settings\peter\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2010-02-16 14:08 . 2004-08-04 12:00 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
    2010-02-16 13:25 . 2004-08-03 22:59 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
    2010-02-12 04:33 . 2004-08-04 12:00 100864 ----a-w- c:\windows\system32\6to4svc.dll
    2010-02-11 12:02 . 2004-08-04 12:00 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
    2004-08-04 12:00 . 2004-08-04 12:00 94784 --sh--w- c:\windows\twain.dll
    2008-04-14 00:12 . 2004-08-04 12:00 50688 --sh--w- c:\windows\twain_32.dll
    2008-04-14 00:11 . 2004-08-04 12:00 1028096 --sh--w- c:\windows\system32\mfc42.dll
    2008-04-14 00:12 . 2004-08-04 12:00 57344 --sh--w- c:\windows\system32\msvcirt.dll
    2008-04-14 00:12 . 2004-08-04 12:00 413696 --sh--w- c:\windows\system32\msvcp60.dll
    2008-04-14 00:12 . 2004-08-04 12:00 343040 --sh--w- c:\windows\system32\msvcrt.dll
    2008-04-14 00:12 . 2004-08-04 12:00 551936 --sh--w- c:\windows\system32\oleaut32.dll
    2008-04-14 00:12 . 2004-08-04 12:00 84992 --sh--w- c:\windows\system32\olepro32.dll
    2008-04-14 00:12 . 2004-08-04 12:00 11776 --sh--w- c:\windows\system32\regsvr32.exe
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "FreeRAM XP"="c:\program files\YourWare Solutions\FreeRAM XP Pro\FreeRAM XP Pro.exe" [2006-03-22 1591808]
    "BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Ahead\lib\NMBgMonitor.exe" [2005-09-08 94208]
    "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-06-15 39408]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "RTHDCPL"="RTHDCPL.EXE" [2009-01-13 18084864]
    "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-03-27 13684736]
    "nwiz"="nwiz.exe" [2009-03-27 1657376]
    "NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2009-03-27 86016]
    "Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-06-15 68592]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-04-04 36272]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-03-24 952768]
    "WinPatrol"="c:\program files\BillP Studios\WinPatrol\winpatrol.exe" [2009-10-10 320832]
    "avast5"="c:\progra~1\ALWILS~1\Avast5\avastUI.exe" [2010-04-14 2790472]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    Windows Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2008-5-26 123904]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-24 304128]

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
    @="Service"

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
    @="Driver"

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
    @="Service"

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\Program Files\\FrostWire\\FrostWire.exe"=
    "c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=

    R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [4/30/2010 7:33 PM 64288]
    R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [5/3/2010 11:37 PM 162768]
    R2 a2free;a-squared Free Service;c:\program files\a-squared Free\a2service.exe [5/2/2010 9:46 AM 1872320]
    R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [5/3/2010 11:37 PM 19024]
    R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2/5/2010 1:52 AM 1285864]
    S2 GEST Service;GEST Service for program management.;c:\program files\GIGABYTE\EnergySaver\GSvr.exe [6/13/2009 5:35 PM 68136]
    S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/6/2010 6:44 AM 135664]
    .
    Contents of the 'Scheduled Tasks' folder

    2010-05-02 c:\windows\Tasks\Ad-Aware Update (Weekly).job
    - c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-02-04 09:31]

    2009-09-14 c:\windows\Tasks\FRU Task 2004-06-17 01:06ewlett-Packard2004-06-17 01:06p psc 1200 seriesD66655067F78228D3716D2BFC2C61DA319188DBF244936560.job
    - c:\program files\Hewlett-Packard\Digital Imaging\Bin\hpqfrucl.exe [2004-06-16 08:06]

    2010-05-03 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-05 20:44]

    2010-05-03 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-05 20:44]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://google.com/
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
    IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
    DPF: {DE625294-70E6-45ED-B895-CFFA13AEB044} - hxxp://194.244.146.56/activex/AMC.cab
    .
    - - - - ORPHANS REMOVED - - - -

    WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)
    HKLM-Run-SunJavaUpdateSched - c:\program files\Java\jre6\bin\jusched.exe
    Notify-avgrsstarter - avgrsstx.dll
    SafeBoot-WudfPf
    SafeBoot-WudfRd



    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-05-04 07:43
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2010-05-04 07:45:21
    ComboFix-quarantined-files.txt 2010-05-03 21:45

    Pre-Run: 477,942,009,856 bytes free
    Post-Run: 479,206,584,320 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    - - End Of File - - 0AC39FFADF693BFA4909CF3A272F68FB
     

    Attached Files:

  10. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Good :) Let's clean up a bit and run a couple scans:

    STEP 1

    Run OTS

    • Under the Paste Fix Here box on the right, paste in the contents of following code box

    Code:
    [Unregister Dlls]
    [Registry - All]
    < MountPoints2 [HKEY_CURRENT_USER] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
    YN -> \{cf2e4d3c-f7e2-11de-8db4-00241d1cbb88} -> 
    YN -> \{f30a80c1-2411-11df-8dfa-00241d1cbb88} -> 
    [Files/Folders - Created Within 30 Days]
    NY ->  Sun -> C:\Documents and Settings\LocalService\Application Data\Sun
    NY ->  Adobe -> C:\Documents and Settings\NetworkService\Local Settings\Application Data\Adobe
    NY ->  Sun -> C:\Documents and Settings\NetworkService\Application Data\Sun
    NY ->  Macromedia -> C:\Documents and Settings\LocalService\Application Data\Macromedia
    NY ->  Adobe -> C:\Documents and Settings\LocalService\Application Data\Adobe
    NY ->  Share-to-Web Upload Folder -> C:\Documents and Settings\LocalService\Application Data\Share-to-Web Upload Folder
    NY ->  Adobe -> C:\Documents and Settings\NetworkService\Application Data\Adobe
    NY ->  Macromedia -> C:\Documents and Settings\NetworkService\Application Data\Macromedia
    [Files/Folders - Modified Within 30 Days]
    NY ->  5 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
    NY ->  17 C:\WINDOWS\Temp\*.tmp files -> C:\WINDOWS\Temp\*.tmp
    NY ->  1262 C:\Documents and Settings\peter\Local Settings\Temp\*.tmp files -> C:\Documents and Settings\peter\Local Settings\Temp\*.tmp
    NY ->  1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp
    [Files - No Company Name]
    NY ->  aB6G3tn -> C:\Documents and Settings\peter\Local Settings\Application Data\aB6G3tn
    NY ->  aB6G3tn -> C:\Documents and Settings\All Users\Application Data\aB6G3tn
    [Empty Temp Folders]
    [EmptyFlash]
    [ClearAllRestorePoints]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • This will create a log in C:\_OTS\MovedFiles\<date>_<time>.log where date and time are those of when the fix was run. Open it from there if it does not appear automatically on reboot. Please copy and paste or attach the contents of that file here.

    Note: You may receive some errors while running the fix. Just press Ok and the fix should continue normally.
    If it seems to get stuck, give it some time. It's probably still working.


    STEP 2

    [​IMG] Please run Malwarebytes' Anti-Malware

    • Update it by clicking on the Update tab and then on the button.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Full Scan", then click Scan. Scan all of your harddrives.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy&Paste the entire report in your next reply.

    Extra Note:

    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediatly.



    STEP 3


    Using Internet Explorer or Firefox, visit Kaspersky Online Scanner

    1. Click Accept, when prompted to download and install the program files and database of malware definitions.



    2. To optimize scanning time and produce a more sensible report for review:
    • Close any open programs
    • Turn off the real time scanner of any existing antivirus program while performing the online scan. Click HERE to see how to disable the most common antivirus programs.
    3. Click Run at the Security prompt.


    The program will then begin downloading and installing and will also update the database.


    Please be patient as this can take quite a long time to download.
    • Once the update is complete, click on Settings.
    • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

      • [*]Spyware, adware, dialers, and other riskware
        [*]Archives
        [*]E-mail databases
    • Click on My Computer under the green Scan bar to the left to start the scan.
    • Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
    • Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
    • Click View report... at the bottom.
    • Click the Save report... button.

      [​IMG]
    • Change the Files of type dropdown box to Text file (.txt) and name the file KasReport.txt to save the file to your desktop so that you may post it in your next reply
     
  11. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Hi again and thanks again .
    Here is the scan . I hope this is what you wanted ..I will now continue with the other instructions.
     

    Attached Files:

  12. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Here is the Malwarebytes scan -- says no malicious files found ?

    Malwarebytes' Anti-Malware 1.46
    www.malwarebytes.org

    Database version: 4063

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702

    5/4/2010 5:02:42 PM
    mbam-log-2010-05-04 (17-02-42).txt

    Scan type: Full scan (A:\|C:\|D:\|E:\|)
    Objects scanned: 185082
    Time elapsed: 30 minute(s), 25 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)
     
  13. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Good :) Let me know if you have trouble with the last one.

    Also, let me know how the computer is running.
     
  14. hammosplace

    hammosplace Thread Starter

    Joined:
    Mar 17, 2005
    Messages:
    18
    Hi again
    Here is the report -- it seems OK?
     
  15. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Was nothing found? I can't see the results.


    And are you ready for my cleanup instructions?
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/920672

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice