1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Browsers Hijacked

Discussion in 'Virus & Other Malware Removal' started by breck68, May 2, 2010.

Thread Status:
Not open for further replies.
Advertisement
  1. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    Gonna try this again.
    Fourth attempt to post and site keeps erroring.

    First off, I did get a virus several weeks ago, which I beleive I clear most of.
    It was something like Antivirus2009 or 2010.
    It prevented me viewing anything on Explorer and Firefox giving my page contains hazardous content.
    It totally killed Chrome and all I get is white pages and looks like it won't connect to interenet.
    It also seems to stole login info which I think it takes when I log into sites. Facebook for one contacted me stating my account caused spam on their site.

    I have XP SP3.

    I have ran Spybot, Adaware, Malawarebytes, Super Antispyware, McAfee, Glary Utitlities, Registry Fix, all of which found issues and fixed.

    I still can't use Chrome, and Firefox and Explorer continually open new browsers with a redirect to other sites which tells me my browsers are still bugged.
     
  2. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    I am trying to post my HijackThis log, but everytime I submit, I get internet connection error.

    I will have to attach it and maybe you can tell me why it can't be posted.
     

    Attached Files:

  3. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Hello there :cool: Welcome to the TSG Forums.
    My name is NeonFx. I'll be glad to help you with your computer problems. Logs can take some time to research, so please be patient with me.


    Please note the following:
    • The fixes are specific to your problem and should only be used on this machine.
    • Please continue to review my answers until I tell you your machine appears to be clean. Absence of symptoms does not necessarily mean that the system is completely clean.
    • It's often worth reading through these instructions and printing them for ease of reference. I may ask you to boot into Safe Mode where you will be unable to follow my instructions online.
    • If you don't know or understand something, please don't hesitate to say or ask!! It's better to be sure and safe than sorry.
    • Please reply to this thread. Do not start a new topic.



    Step 1

    Download OTS to your Desktop

    • Close ALL OTHER PROGRAMS.
    • Double-click on OTS.exe to start the program.
    • Check the box that says Scan All Users
    • Under Basic Scans please change the radio button under Registry from Safe List to All.
    • Under Additional Scans check the following:
      • Reg - Desktop Components
      • Reg - Disabled MS Config Items
      • Reg - NetSvcs
      • Reg - Shell Spawning
      • Reg - Uninstall List
      • File - Lop Check
      • File - Purity Scan
      • Evnt - EvtViewer (last 10)
    • Please paste the contents of the following codebox into the Custom Scans box at the bottom
    Code:
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    nvstor32.sys
    ahcix86s.sys
    nvrd32.sys
    symmpi.sys
    adp3132.sys
    mv61xx.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\drivers\*.sys /lockedfiles
    %systemroot%\System32\config\*.sav
    • Now click the Run Scan button on the toolbar.
    • Let it run unhindered until it finishes.
    • When the scan is complete Notepad will open with the report file loaded in it.
    • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
    Please attach the log in your next post. To do so click on the blue "Reply" button or "Go Advanced" and click on the "Manage Attachments" button

    Step 2

    [​IMG] GMER Rootkit Scanner
    Please download GMER from one of the following locations and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zipped Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
    • Disconnect from the Internet and close all running programs. Make sure you disable your security programs as well, as they may interfere with the program.
    • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
    • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

      [​IMG]
    • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
    • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
    • Now click the Scan button. If you see a rootkit warning window, click OK.
    • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
    • Click the Copy button and paste the results into your next reply.
    • Exit GMER and re-enable your security programs when done.


    If you have trouble running GMER, please try running it in Safe Mode. To get to Safe Mode you'll need to repeatedly tap the F8 key on your keyboard as you turn your computer on until a black and white menu appears with the option.

    If you continue to have trouble with it, try running it without the "Files" scan checked.



    Again, if the results are really long, please attach them using the instructions I gave you at the end of step 1. This is to avoid having to scroll down the page too much make the space cleaner.
     
  4. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    Here's the OTS log attached.

    I am still trying to do the GMER. I ran it over night, and 11 hours later, it was still scaning. Knowing whats on my PC, I have to estimate nearly 2 days to scan, and when I tried to stop it and give you the partial results, the computer became unresponsive.

    Is it supposed to take so long?

    Gonna try safe mode. F8 doesn't work on this PC. Will have to test the other F buttons.
     

    Attached Files:

    • OTS.rar
      File size:
      31.7 KB
      Views:
      0
  5. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    It can take a really long time sometimes but Safe Mode or running the scan without the "Files" option checked might speed it up.

    Let me know if you have trouble.


    Did you have trouble attaching OTS.txt as a text file and that's why you RAR'd it?
     
  6. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    Never tried, but had problem with HijackThis log when I tried that, so just habit to zip it.

    Will try it as txt next time.

    Will also try the GMER with files off.
    Should speed it up.
     
  7. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Alright.
     
  8. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    I couldn't get into safe mode.
    My USB keyboard is dead when trying to select safe mode.

    I turned off the Files selection, and was able to do the scan and save it.

    Attached both logs.

    After looking at the GMER log, specifically the last 2 lines, I compared the sizes of my files to the reported correct sizes.

    atapi.sys - correct size should be 18.6kb - hxxp://www.pc1news.com/files/586993-atapi-sys.html
    My size: 95kb
    Also mentions it is a Vista item. I am using XP.

    kbdhid.sys - correct size should be 13.5kb - hxxp://www.pc1news.com/files/16449-kbdhid-sys.html
    My size: 15kb

    The kbdhid.sys is for keyboards, and might explain why on about every second boot up, the keyboard is dead, and I need to reboot to get it to work.
     

    Attached Files:

    • OTS.Txt
      File size:
      277.3 KB
      Views:
      3
    • GMER.log
      File size:
      92.6 KB
      Views:
      1
  9. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    You are correct, those are the two files we need to deal with. atapi.sys is only infected in memory though so we'll only need to either disinfect or replace this file:

    C:\WINDOWS\system32\DRIVERS\kbdhid.sys


    Let's run the following to see if it will disinfect it automatically before we try any manual fixes:



    NOTE: ComboFix should NOT be used without supervision by someone trained in its use. It does a whole lot more to a system than just remove infected files.

    Download ComboFix from one of these locations:

    Link 1
    Link 2


    * IMPORTANT !!! Save ComboFix.exe to your Desktop



    • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Disabling Security Programs
    • Double click on ComboFix.exe & follow the prompts.

      Note: Combofix will run without the Recovery Console installed.
    • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
    • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.


    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


    [​IMG]


    Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    [​IMG]


    Click on Yes, to continue scanning for malware.

    When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

    Notes:

    1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
    2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.
    3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you please let me know. A increasing number of infections are spreading using Autoplay and leaving it disabled is a good idea.
    4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.
     
  10. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    Combofix log attached.

    Reported root activity and scanned on reboot.
    It replaced the kbdhid.sys file.
    kbdhid.sys still shows at 15kb

    atapi.sys file wasn't changed.
     

    Attached Files:

  11. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    That infection has been taken care of :) The file sizes and md5 hashes are correct. Files are updated from time to time and the websites you mentioned earlier are outdated.

    The sizes wouldn't change because the infection fools the system into believing the file is one size when it's actually another in an attempt to hide itself.


    Please do this:

    Run OTS and under the Custom Scans section copy and paste the following:

    /md5start
    sfcfiles.dll
    /md5stop


    Click on the None button at the top and then click on the Run Scan button. Copy and paste the results of this scan here for me.
     
  12. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    Results:

    Code:
    OTS logfile created on: 5/11/2010 8:41:18 PM - Run 2
    OTS by OldTimer - Version 3.1.30.1     Folder = C:\Documents and Settings\Administrator\Desktop
    Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
    Internet Explorer (Version = 8.0.6001.18702)
    Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy
     
    3.00 Gb Total Physical Memory | 2.00 Gb Available Physical Memory | 77.00% Memory free
    5.00 Gb Paging File | 4.00 Gb Available in Paging File | 83.00% Paging File free
    Paging file location(s): c:\pagefile.sys 2046 4092 [binary data]
     
    %SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
    Drive C: | 596.16 Gb Total Space | 411.95 Gb Free Space | 69.10% Space Free | Partition Type: NTFS
    D: Drive not present or media not loaded
    E: Drive not present or media not loaded
    Drive F: | 931.51 Gb Total Space | 827.97 Gb Free Space | 88.88% Space Free | Partition Type: NTFS
    G: Drive not present or media not loaded
    H: Drive not present or media not loaded
    I: Drive not present or media not loaded
     
    Computer Name: BRECK
    Current User Name: Administrator
    Logged in as Administrator.
     
    Current Boot Mode: Normal
    Scan Mode: Current user
    Company Name Whitelist: Off
    Skip Microsoft Files: Off
    File Age = 30 Days
     
    [Custom Scans]
    < MD5 Scans Start>
    < %systemdrive%\SFCFILES.DLL  /md5 /s >
     sfcfiles.dll : MD5=362BC5AF8EAF712832C58CC13AE05750 -> C:\WINDOWS\system32\sfcfiles.dll -> [2008/08/29 18:15:14 | 001,614,848 | ---- | M] (Microsoft Corporation)
    < MD5 Scans End>
    < End of report >
    
    Just something else I forgot to mention, I also have been having "My Computer" page opened occasionally. Not sure, but it started as the same time as the browser issue. It just out of the blue, pops the page up.
     
  13. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    That's odd about the My Computer page. Let me know if that continues to happen. Please do the following now:

    1. Close any open open programs before running the fix.

    2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    3. Open Notepad (Start > Programs > Accessories) and copy/paste the text in the codebox below into it:

    Code:
    SRPeek::
    c:\windows\system32\sfcfiles.dll
    
    Registry::
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "135:TCP"=-
    "5000:TCP"=-
    "5001:TCP"=-
    "5002:TCP"=-
    "5003:TCP"=-
    "5004:TCP"=-
    "5005:TCP"=-
    "5006:TCP"=-
    "5007:TCP"=-
    "5008:TCP"=-
    "5009:TCP"=-
    "5010:TCP"=-
    "5011:TCP"=-
    "5012:TCP"=-
    "5013:TCP"=-
    "5014:TCP"=-
    "5015:TCP"=-
    "5016:TCP"=-
    "5017:TCP"=-
    "5018:TCP"=-
    "5019:TCP"=-
    "5020:TCP"=-
    
    
    TDL::
    c:\windows\system32\drivers\kbdhid.sys
    
    MBR::
    NOTE: Make sure WordWrap is unchecked in Notepad by clicking on the "Format" menu icon.

    Save this as CFScript.txt, in the same location as ComboFix.exe


    [​IMG]

    Refering to the picture above, drag CFScript into ComboFix.exe

    When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
     
  14. breck68

    breck68 Thread Starter

    Joined:
    May 2, 2010
    Messages:
    17
    Root activity found.
    Reboot and scanned.

    Results:

    ComboFix 10-05-11.05 - Administrator 05/12/2010 7:54.4.4 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3327.2693 [GMT -4:00]
    Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
    AV: McAfee Anti-Virus and Anti-Spyware *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
    FW: McAfee Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
    * Resident AV is active
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
    Restored copy from - Kitty had a snack :p
    Infected copy of c:\windows\system32\DRIVERS\kbdhid.sys was found and disinfected
    Restored copy from - Kitty ate it :p
    Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
    Restored copy from - Kitty had a snack :p
    Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
    Restored copy from - Kitty had a snack :p
    Infected copy of c:\windows\system32\DRIVERS\kbdhid.sys was found and disinfected
    Restored copy from - Kitty ate it :p
    Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
    Restored copy from - Kitty had a snack :p
    Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
    Restored copy from - Kitty had a snack :p
    Infected copy of c:\windows\system32\DRIVERS\kbdhid.sys was found and disinfected
    Restored copy from - Kitty ate it :p
    Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
    Restored copy from - Kitty had a snack :p
    .
    ((((((((((((((((((((((((( Files Created from 2010-04-12 to 2010-05-12 )))))))))))))))))))))))))))))))
    .
    2010-05-09 14:43 . 2010-05-09 14:48 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
    2010-05-06 02:14 . 2010-05-06 02:14 -------- d--h--r- c:\documents and settings\Administrator\Application Data\SecuROM
    2010-05-06 02:06 . 2010-05-06 02:06 2434856 ----a-w- c:\windows\system32\pbsvc_bc2.exe
    2010-05-05 23:10 . 2010-05-05 23:10 -------- d-----w- c:\documents and settings\All Users\Application Data\EA Core
    2010-05-05 23:09 . 2010-05-05 23:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Electronic Arts
    2010-05-05 23:09 . 2010-05-06 01:59 -------- d-----w- c:\program files\Electronic Arts
    2010-05-02 17:47 . 2010-05-02 17:47 -------- d-----w- c:\program files\Trend Micro
    2010-05-01 19:11 . 2010-05-01 19:12 -------- d-----w- c:\documents and settings\Administrator\Application Data\Netscape
    2010-05-01 19:11 . 2010-05-01 19:11 -------- d-----w- c:\program files\Netscape
    2010-04-28 00:50 . 2010-04-28 00:50 -------- d-----w- c:\documents and settings\All Users\Application Data\{7EE47FC9-0392-48AA-8A9D-FFAA175F923C}
    2010-04-24 23:17 . 2010-04-24 23:17 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Zynga
    2010-04-24 17:21 . 2010-04-24 17:21 -------- d-----w- c:\documents and settings\Breck Demers\Application Data\Epson
    2010-04-24 00:35 . 2010-04-24 00:35 673280 ----a-w- c:\windows\is-TUOL5.exe
    2010-04-21 11:59 . 2010-04-21 11:59 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Zynga
    2010-04-21 11:59 . 2010-04-21 11:59 -------- d-----w- c:\program files\Zynga
    2010-04-21 03:50 . 2009-07-01 15:55 701440 ----a-w- c:\windows\system32\cohelper.dll
    2010-04-21 03:50 . 2009-07-01 04:42 485920 ----a-w- c:\windows\system32\nvunrm.exe
    2010-04-20 21:57 . 2010-04-20 21:57 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Nem's Tools
    2010-04-20 21:55 . 2010-04-20 21:55 -------- d-----w- c:\program files\Nem's Tools
    2010-04-17 17:15 . 2010-04-17 17:16 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Temp
    2010-04-16 21:11 . 2010-04-16 21:11 -------- d-----w- c:\program files\dumps
    2010-04-15 11:51 . 2010-02-10 20:45 143360 ----a-w- c:\windows\system32\atiapfxx.exe
    2010-04-15 02:56 . 2010-04-15 02:56 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
    2010-04-15 02:41 . 2010-04-15 02:41 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2010-04-15 02:41 . 2010-05-07 21:43 -------- d-----w- c:\program files\SUPERAntiSpyware
    2010-04-15 02:41 . 2010-04-15 02:41 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
    2010-04-15 02:33 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-04-15 02:33 . 2010-05-07 22:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-04-15 02:33 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-04-15 02:06 . 2010-04-15 02:06 -------- d-sh--w- c:\documents and settings\Breck Demers\IETldCache
    2010-04-15 01:39 . 2010-04-15 01:39 -------- d-----w- c:\windows\system32\wbem\Repository
    2010-04-15 01:38 . 2010-04-15 02:19 -------- d-----w- c:\program files\LimeWire
    2010-04-15 01:35 . 2010-04-15 01:35 -------- d-----w- c:\documents and settings\All Users\Application Data\ATI
    2010-04-14 23:28 . 2010-04-15 01:34 -------- d-----w- c:\documents and settings\All Users\Application Data\ATI(2)
    2010-04-14 21:15 . 2010-04-14 21:15 -------- d-----w- C:\SWTOOLS
    2010-04-14 20:52 . 2010-04-15 22:10 -------- d-----w- c:\program files\Lavasoft
    2010-04-14 20:52 . 2010-04-15 22:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
    2010-04-14 20:42 . 2010-04-15 22:12 -------- d-----w- c:\program files\Spybot - Search & Destroy
    2010-04-14 20:42 . 2010-04-15 20:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2010-04-14 20:33 . 2010-04-23 11:31 -------- d-----w- c:\program files\ATI
    2010-04-14 20:19 . 2010-04-14 20:19 -------- d-----w- C:\AMD
    2010-04-13 11:54 . 2010-04-13 11:54 62668 ---ha-w- c:\windows\system32\mlfcache.dat
    2010-04-13 11:53 . 2010-04-15 01:36 -------- d-----w- c:\program files\Safari
    2010-04-13 11:53 . 2010-04-15 01:40 -------- d-----w- c:\program files\Bonjour
    2010-04-13 03:40 . 2010-04-13 03:40 -------- d-----w- c:\program files\Enigma Software Group
    2010-04-13 03:30 . 2010-04-13 03:30 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-05-12 11:50 . 2008-04-13 19:09 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys
    2010-05-12 03:30 . 2009-05-30 17:51 218808 ----a-w- c:\windows\system32\PnkBstrB.exe
    2010-05-12 00:51 . 2009-05-30 17:51 137256 ----a-w- c:\windows\system32\drivers\PnkBstrK.sys
    2010-05-12 00:51 . 2009-06-09 20:05 -------- d-----w- c:\program files\Steam
    2010-05-11 12:20 . 2009-05-31 12:14 -------- d-----w- c:\program files\Glary Utilities
    2010-05-10 21:35 . 2009-05-30 15:53 2644 ----a-w- c:\windows\system32\d3d9caps.dat
    2010-05-08 17:48 . 2009-06-29 00:46 -------- d-----w- c:\program files\AA3AdminPanel
    2010-05-07 23:34 . 2009-06-20 22:16 -------- d-----w- c:\documents and settings\Administrator\Application Data\FileZilla
    2010-05-07 22:12 . 2010-05-07 22:12 63488 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
    2010-05-07 22:12 . 2010-04-15 02:43 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2010-05-07 22:10 . 2009-05-30 15:05 -------- d-----w- c:\documents and settings\All Users\Application Data\PCPitstop
    2010-05-06 02:51 . 2009-05-30 15:13 -------- d-----w- c:\program files\MSI
    2010-05-06 02:06 . 2009-06-18 00:22 138056 ----a-w- c:\documents and settings\Administrator\Application Data\PnkBstrK.sys
    2010-05-06 02:06 . 2009-06-18 00:22 138056 ----a-w- c:\documents and settings\Administrator\Application Data\PnkBstrK.sys
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\ru\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\pl\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\ja\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\it\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\fr-fr\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\es\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\en-us\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\en-uk\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\de\GDFBinary.dll
    2010-05-06 01:55 . 2010-05-05 23:11 6819160 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\EADM\eadm-installer.exe
    2010-05-06 01:54 . 2010-05-05 23:11 390416 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\Battlefield Bad Company 2_code.exe
    2010-05-06 01:54 . 2010-05-05 23:11 365840 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\paul.dll
    2010-05-06 01:54 . 2010-05-05 23:11 193808 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\Battlefield Bad Company 2_uninst.exe
    2010-05-06 01:54 . 2010-05-05 23:11 2434856 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\PunkBuster\pbsvc_bc2.exe
    2010-05-06 01:53 . 2010-05-05 23:11 525656 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\DirectX\DXSETUP.exe
    2010-05-06 01:53 . 2010-05-05 23:11 1691464 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\DirectX\dsetup32.dll
    2010-05-06 01:53 . 2010-05-05 23:11 94024 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\DirectX\DSETUP.dll
    2010-05-06 01:52 . 2010-05-05 23:11 427392 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Setup.exe
    2010-05-05 23:11 . 2010-05-05 23:11 423304 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\AutoRun.exe
    2010-05-05 23:10 . 2009-05-31 11:51 -------- d-----w- c:\program files\Common Files\Adobe AIR
    2010-05-05 23:10 . 2010-05-05 23:09 38784 ----a-w- c:\documents and settings\Administrator\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\airappinstaller\airappinstaller.exe
    2010-05-01 14:30 . 2009-06-13 16:13 1086 ----a-w- c:\windows\checkip.dat
    2010-05-01 14:29 . 2009-06-13 16:12 1211 ----a-w- c:\windows\ipconfig.dat
    2010-04-28 00:50 . 2010-02-28 04:58 -------- d-----w- c:\program files\LiveZilla
    2010-04-26 11:53 . 2010-04-28 00:50 575060 ----a-w- c:\documents and settings\All Users\Application Data\{7EE47FC9-0392-48AA-8A9D-FFAA175F923C}\mia.dll
    2010-04-26 11:53 . 2010-04-28 00:50 2204306 ----a-w- c:\documents and settings\All Users\Application Data\{7EE47FC9-0392-48AA-8A9D-FFAA175F923C}\LiveZilla_3.1.8.6_Full.exe
    2010-04-24 17:21 . 2009-06-26 03:02 76960 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2010-04-21 03:50 . 2009-05-30 15:17 -------- d-----w- c:\program files\NVIDIA Corporation
    2010-04-21 03:14 . 2010-04-21 03:14 10134 ----a-r- c:\documents and settings\Administrator\Application Data\Microsoft\Installer\{24E2D11A-584E-3A8F-1F33-E3A266F18EE4}\ARPPRODUCTICON.exe
    2010-04-19 11:31 . 2009-05-30 15:44 76960 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2010-04-17 17:17 . 2009-07-01 04:39 -------- d-----w- c:\program files\Google
    2010-04-17 03:13 . 2010-03-30 01:51 -------- d-----w- c:\documents and settings\All Users\Application Data\{1C6FDDD8-FC9E-4C12-9FA5-1AAD377097B3}
    2010-04-16 23:03 . 2010-04-16 23:03 49152 ----a-r- c:\documents and settings\Administrator\Application Data\Microsoft\Installer\{166E180E-9A3F-41AE-8B40-22D8FFF4AF87}\Icon49FA793C.exe
    2010-04-16 20:35 . 2009-06-04 19:26 -------- d-----w- c:\program files\McAfee
    2010-04-15 11:59 . 2009-05-31 10:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
    2010-04-15 11:51 . 2009-06-08 16:22 -------- d-----w- c:\program files\ATI Technologies
    2010-04-15 02:43 . 2010-04-15 02:43 52224 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
    2010-04-15 02:40 . 2009-05-30 16:41 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-04-15 02:19 . 2010-01-24 23:35 -------- d-----w- c:\program files\LimeWire Plus
    2010-04-15 02:09 . 2009-07-29 21:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
    2010-04-15 01:38 . 2009-10-01 03:10 -------- d-----w- c:\program files\Common Files\Symantec Shared
    2010-04-15 01:37 . 2010-04-11 00:12 -------- d-----w- c:\program files\GCFScape
    2010-04-15 01:36 . 2009-05-30 14:52 -------- d-----w- c:\program files\Opera
    2010-04-15 01:34 . 2009-05-30 15:01 -------- d--h--w- c:\program files\InstallShield Installation Information
    2010-04-14 16:50 . 2009-10-10 13:36 9344 ----a-w- c:\windows\system32\drivers\mfeclnk.sys
    2010-04-14 16:50 . 2009-09-11 11:59 95568 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
    2010-04-14 16:50 . 2009-09-11 11:59 88480 ----a-w- c:\windows\system32\drivers\mfendisk.sys
    2010-04-14 16:50 . 2009-09-11 11:59 83496 ----a-w- c:\windows\system32\drivers\mferkdet.sys
    2010-04-14 16:50 . 2009-09-11 11:59 82952 ----a-w- c:\windows\system32\drivers\mfetdi2k.sys
    2010-04-14 16:50 . 2009-09-11 11:59 55456 ----a-w- c:\windows\system32\drivers\cfwids.sys
    2010-04-14 16:50 . 2009-09-11 11:59 51688 ----a-w- c:\windows\system32\drivers\mfebopk.sys
    2010-04-14 16:50 . 2009-09-11 11:59 385536 ----a-w- c:\windows\system32\drivers\mfehidk.sys
    2010-04-14 16:50 . 2009-09-11 11:59 312616 ----a-w- c:\windows\system32\drivers\mfefirek.sys
    2010-04-14 16:50 . 2009-09-11 11:59 152320 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
    2010-04-13 11:54 . 2009-08-16 23:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\Apple Computer
    2010-04-05 23:28 . 2009-06-02 20:22 -------- d-----w- c:\program files\Winsim
    2010-04-03 06:41 . 2009-11-08 16:46 -------- d-----w- c:\documents and settings\Administrator\Application Data\HLSW
    2010-04-03 04:22 . 2009-06-09 17:57 -------- d-----w- c:\program files\Full Tilt Poker
    2010-04-02 13:27 . 2010-04-02 13:27 -------- d-----w- c:\documents and settings\Administrator\Application Data\Symantec
    2010-03-30 22:17 . 2009-06-08 13:29 -------- d-----w- c:\documents and settings\Administrator\Application Data\mjusbsp
    2010-03-30 03:21 . 2009-05-30 17:43 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
    2010-03-30 02:09 . 2009-06-12 21:17 -------- d-----w- c:\documents and settings\Administrator\Application Data\Azureus
    2010-03-30 01:52 . 2010-03-30 01:52 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_GenericMount_01009.Wdf
    2010-03-30 01:52 . 2010-03-30 01:52 0 ---ha-w- c:\windows\system32\drivers\MsftWdf_Kernel_01009_Coinstaller_Critical.Wdf
    2010-03-27 23:15 . 2009-05-30 17:45 -------- d-----w- c:\documents and settings\Administrator\Application Data\Xfire
    2010-03-27 22:58 . 2009-05-30 17:45 -------- d-----w- c:\program files\Xfire
    2010-03-26 23:24 . 2010-03-26 22:23 -------- d-----w- c:\documents and settings\Administrator\Application Data\IBP
    2010-03-25 00:24 . 2010-03-25 00:24 31032 ----a-w- c:\windows\system32\ntaccess_64.sys
    2010-03-23 00:31 . 2009-12-13 03:51 -------- d-----w- c:\program files\FileZilla FTP Client
    2010-03-21 20:25 . 2010-03-21 20:20 -------- d-----w- c:\program files\Test My Hardware
    2010-03-19 21:56 . 2010-03-19 21:56 -------- d-----w- c:\program files\AVConverter
    2010-03-19 21:36 . 2009-08-16 23:58 -------- d-----w- c:\program files\QuickTime
    2010-03-19 21:14 . 2010-03-19 21:13 -------- d-----w- c:\program files\Unlocker
    2010-03-19 20:29 . 2010-01-24 23:35 -------- d-----w- c:\documents and settings\Administrator\Application Data\LimeWirePlus
    2010-03-17 18:47 . 2010-03-17 18:47 -------- d-----w- c:\program files\Pilot Group Ltd
    2010-03-14 15:36 . 2010-02-19 12:35 -------- d-----w- c:\program files\Common Files\EPSON
    2010-03-14 15:25 . 2010-02-19 12:32 -------- d-----w- c:\program files\Epson Software
    2010-03-14 15:22 . 2010-02-19 12:31 -------- d-----w- c:\documents and settings\All Users\Application Data\EPSON
    2010-03-10 06:15 . 2008-04-14 00:42 420352 ----a-w- c:\windows\system32\vbscript.dll
    2010-03-10 05:21 . 2009-05-30 17:18 1821944 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
    2010-03-05 00:11 . 2010-03-05 00:11 41872 ----a-w- c:\windows\system32\xfcodec.dll
    2010-02-26 23:51 . 2010-02-26 23:51 138584 ----a-w- c:\documents and settings\Administrator\Application Data\mjusbsp\ug00000\magicJack.dll
    2010-02-26 23:51 . 2010-03-30 22:16 6870864 ---ha-w- c:\documents and settings\Administrator\Application Data\mjusbsp\in00000\setup.exe
    2010-02-26 23:51 . 2010-03-14 14:55 6870864 ---ha-w- c:\documents and settings\Administrator\Application Data\mjusbsp\Upgrade\setup1.exe
    2010-02-26 23:51 . 2010-02-26 23:51 6870864 ----a-w- c:\documents and settings\Administrator\Application Data\mjusbsp\ug00000\setup.exe
    2010-02-26 23:51 . 2010-02-26 23:51 705936 ----a-w- c:\documents and settings\Administrator\Application Data\mjusbsp\magicJackLoader.exe
    2010-04-14 16:50 . 2010-02-20 01:14 24376 ----a-w- c:\program files\mozilla firefox\components\Scriptff.dll
    2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
    2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
    .
    (((((((((((((((((((((((((((((((((((((((((( SR_Search ))))))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    ------- Sigcheck -------
    [-] 2008-08-29 . 362BC5AF8EAF712832C58CC13AE05750 . 1614848 . . [5.1.2600.5512] . . c:\windows\system32\sfcfiles.dll
    .
    ((((((((((((((((((((((((((((( [email protected]_12.22.47 )))))))))))))))))))))))))))))))))))))))))
    .
    + 2010-05-12 12:07 . 2010-05-12 12:07 16384 c:\windows\Temp\Perflib_Perfdata_8a4.dat
    + 2010-05-12 12:07 . 2010-05-12 12:07 16384 c:\windows\Temp\Perflib_Perfdata_18c.dat
    + 2010-05-12 12:09 . 2010-05-12 12:09 16384 c:\windows\Temp\Perflib_Perfdata_1744.dat
    - 2008-05-03 12:00 . 2010-05-11 12:10 86556 c:\windows\system32\perfc009.dat
    + 2008-05-03 12:00 . 2010-05-12 11:57 86556 c:\windows\system32\perfc009.dat
    - 2008-04-13 19:09 . 2008-04-14 04:09 14592 c:\windows\system32\dllcache\kbdhid.sys
    + 2008-04-13 19:09 . 2010-05-12 11:50 14592 c:\windows\system32\dllcache\kbdhid.sys
    - 2008-05-03 12:00 . 2010-05-11 12:10 486326 c:\windows\system32\perfh009.dat
    + 2008-05-03 12:00 . 2010-05-12 11:57 486326 c:\windows\system32\perfh009.dat
    + 2010-03-31 01:59 . 2010-05-12 12:07 224396 c:\windows\system32\inetsrv\MetaBase.bin
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
    "{7b13ec3e-999a-4b70-b9cb-2617b8323822}"= "c:\program files\Zynga\tbZyng.dll" [2010-02-22 2353176]
    [HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}]
    2010-05-11 02:30 2515552 ----a-w- c:\program files\FTA_HELP\tbFTA0.dll
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
    2010-02-22 16:05 2353176 ----a-w- c:\program files\Zynga\tbZyng.dll
    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{e00d0d5c-8303-4b6e-a68e-9bed501e3861}]
    2010-02-24 12:35 2349080 ----a-w- c:\program files\QUACK_Tool\tbQUA1.dll
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}"= "c:\program files\FTA_HELP\tbFTA0.dll" [2010-05-11 2515552]
    "{e00d0d5c-8303-4b6e-a68e-9bed501e3861}"= "c:\program files\QUACK_Tool\tbQUA1.dll" [2010-02-24 2349080]
    "{7b13ec3e-999a-4b70-b9cb-2617b8323822}"= "c:\program files\Zynga\tbZyng.dll" [2010-02-22 2353176]
    [HKEY_CLASSES_ROOT\clsid\{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}]
    [HKEY_CLASSES_ROOT\clsid\{e00d0d5c-8303-4b6e-a68e-9bed501e3861}]
    [HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
    "{33BC37AD-A9ED-4AC9-BFD6-A0B3509F484C}"= "c:\program files\FTA_HELP\tbFTA0.dll" [2010-05-11 2515552]
    "{E00D0D5C-8303-4B6E-A68E-9BED501E3861}"= "c:\program files\QUACK_Tool\tbQUA1.dll" [2010-02-24 2349080]
    "{7B13EC3E-999A-4B70-B9CB-2617B8323822}"= "c:\program files\Zynga\tbZyng.dll" [2010-02-22 2353176]
    [HKEY_CLASSES_ROOT\clsid\{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}]
    [HKEY_CLASSES_ROOT\clsid\{e00d0d5c-8303-4b6e-a68e-9bed501e3861}]
    [HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2010-05-07 2017280]
    "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "DelReg"="c:\program files\MSI\DualCoreCenter\DelReg.exe" [2008-05-13 196608]
    "mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2010-04-19 1193336]
    "EEventManager"="c:\progra~1\EPSONS~1\EVENTM~1\EEventManager.exe" [2009-01-12 669520]
    "LiveZilla"="c:\program files\LiveZilla\LiveZilla.exe" [2010-04-26 2640184]
    "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-11 417792]
    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
    "nltide_2"="shell32" [X]
    "nltide_3"="advpack.dll" [2009-03-08 128512]
    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    DualCoreCenter.lnk - c:\program files\MSI\DualCoreCenter\StartUpDualCoreCenter.exe [2009-10-28 192512]
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "DisableCAD"= 1 (0x1)
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
    "MemCheckBoxInRunDlg"= 1 (0x1)
    "StartMenuFavorites"= 0 (0x0)
    "Start_ShowMyComputer"= 1 (0x1)
    "Start_ShowMyDocs"= 1 (0x1)
    "Start_ShowMyMusic"= 0 (0x0)
    "Start_ShowRun"= 1 (0x1)
    "Start_ShowSearch"= 0 (0x0)
    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
    "NoResolveTrack"= 1 (0x1)
    "NoSMConfigurePrograms"= 1 (0x1)
    "MemCheckBoxInRunDlg"= 1 (0x1)
    [HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
    "ForceClassicControlPanel"= 1 (0x1)
    "NoResolveTrack"= 1 (0x1)
    "NoSMConfigurePrograms"= 1 (0x1)
    "MemCheckBoxInRunDlg"= 1 (0x1)
    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
    2009-07-20 16:28 72208 ----a-w- c:\program files\Common Files\Logishrd\Bluetooth\LBTWLgn.dll
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PCANotify]
    2007-04-27 16:10 18744 ----a-w- c:\windows\system32\PCANotify.dll
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\AFD]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Browser]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Dhcp]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\DnsCache]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ip6fw.sys]
    @="Driver"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ipnat.sys]
    @="Driver"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\LanmanServer]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\LanmanWorkstation]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\LmHosts]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
    @=""
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
    @=""
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Messenger]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NDIS]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NDIS Wrapper]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Ndisuio]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetBIOS]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetBIOSGroup]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetBT]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetDDEGroup]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetMan]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Network]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetworkProvider]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NtLmSsp]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PNP_TDI]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rdpcdd.sys]
    @="Driver"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rdpwd.sys]
    @="Driver"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rdsessmgr]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SharedAccess]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Streams Drivers]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Tcpip]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\TDI]
    @="Driver Group"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\tdpipe.sys]
    @="Driver"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\tdtcp.sys]
    @="Driver"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\termservice]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
    @="Driver"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
    @=""
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WZCSVC]
    @="Service"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{1a3e09be-1e45-494b-9174-d7385b45bbf5}]
    @=""
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E972-E325-11CE-BFC1-08002BE10318}]
    @="Net"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E973-E325-11CE-BFC1-08002BE10318}]
    @="NetClient"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E974-E325-11CE-BFC1-08002BE10318}]
    @="NetService"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E975-E325-11CE-BFC1-08002BE10318}]
    @="NetTrans"
    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
    "DisableMonitoring"=dword:00000001
    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
    "DisableMonitoring"=dword:00000001
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "%windir%\\system32\\sessmgr.exe"=
    "c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
    "c:\\Program Files\\Xfire\\Xfire.exe"=
    "c:\\Program Files\\USArmy\\America's Army 2\\System\\ArmyOps.exe"=
    "c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
    "c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
    "c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
    "c:\\Program Files\\AdminPanel\\AdminPanel.exe"=
    "c:\\Program Files\\Left4Dead\\left4dead.exe"=
    "c:\\Program Files\\Vuze\\Azureus.exe"=
    "c:\\WINDOWS\\system32\\PnkBstrA.exe"=
    "c:\\WINDOWS\\system32\\PnkBstrB.exe"=
    "c:\\Program Files\\USArmy\\America's Army 3\\Binaries\\AA3Game.exe"=
    "c:\\Documents and Settings\\All Users\\Application Data\\NexonUS\\NGM\\NGM.exe"=
    "c:\nexon\Combat Arms\CombatArms.exe"= c:\nexon\Combat Arms\CombatArms.exe:*Enabled:CombatArms.exe
    "c:\nexon\Combat Arms\Engine.exe"= c:\nexon\Combat Arms\Engine.exe:*Enabled:Engine.exe
    "c:\\Nexon\\Combat Arms\\NMService.exe"=
    "c:\\Program Files\\AA3AdminPanel\\pbucon.exe"=
    "c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\stalker shadow of chernobyl\\bin\\XR_3DA.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\battlefield 2\\BF2.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\america's army 3\\Binaries\\AA3Game.exe"=
    "c:\\Program Files\\LimeWire\\LimeWire.exe"=
    "c:\\Documents and Settings\\Administrator\\Application Data\\mjusbsp\\magicJack.exe"=
    "c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
    "c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
    "c:\\Program Files\\Common Files\\McAfee\\McSvcHost\\McSvHost.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead 2\\bin\\SDKLauncher.exe"=
    "c:\\Program Files\\Electronic Arts\\Battlefield Bad Company 2\\BFBC2Updater.exe"=
    "c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead 2\\left4dead2.exe"=
    R1 mfetdi2k;McAfee Inc. mfetdi2k;c:\windows\system32\drivers\mfetdi2k.sys [9/11/2009 7:59 AM 82952]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25 AM 12872]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2/17/2010 11:15 AM 68168]
    R2 Apache2.2;Apache2.2;c:\xampp\apache\bin\httpd.exe [2/15/2010 12:50 AM 24636]
    R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [6/8/2009 12:49 PM 10384]
    R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;"c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [9/11/2009 7:59 AM 271480]
    R2 McMPFSvc;McAfee Personal Firewall Service;"c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [9/11/2009 7:59 AM 271480]
    R2 McNaiAnn;McAfee VirusScan Announcer;"c:\program files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [9/11/2009 7:59 AM 271480]
    R2 mfefire;McAfee Firewall Core Service;c:\program files\Common Files\McAfee\SystemCore\mfefire.exe [10/10/2009 9:36 AM 188136]
    R2 mfevtp;McAfee Validation Trust Protection Service;c:\program files\Common Files\McAfee\SystemCore\mfevtps.exe [10/10/2009 9:36 AM 141792]
    R2 TomTomHOMEService;TomTomHOMEService;c:\program files\TomTom HOME 2\TomTomHOMEService.exe [11/13/2009 7:31 AM 92008]
    R3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [9/11/2009 7:59 AM 55456]
    R3 COMMONFX.SYS;COMMONFX.SYS;c:\windows\system32\drivers\COMMONFX.sys [6/23/2009 1:34 PM 99352]
    R3 CTAUDFX.SYS;CTAUDFX.SYS;c:\windows\system32\drivers\CTAUDFX.sys [6/23/2009 1:34 PM 555032]
    R3 CTSBLFX.SYS;CTSBLFX.SYS;c:\windows\system32\drivers\CTSBLFX.sys [6/23/2009 1:34 PM 566296]
    R3 DualCoreCenter;DualCoreCenter;c:\program files\MSI\DualCoreCenter\NTGLM7X.sys [10/28/2009 8:29 PM 28672]
    R3 GenericMount;Generic Mount Driver;c:\windows\system32\drivers\GenericMount.sys [9/21/2009 8:26 PM 46192]
    R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [9/11/2009 7:59 AM 312616]
    R3 mfendiskmp;mfendiskmp;c:\windows\system32\drivers\mfendisk.sys [9/11/2009 7:59 AM 88480]
    R3 Razerlow;Razerlow USB Filter Driver;c:\windows\system32\drivers\Razerlow.sys [4/24/2005 5:43 PM 13225]
    R3 RushTopDevice2;RushTopDevice2;c:\program files\MSI\DualCoreCenter\RushTop.sys [10/28/2009 8:29 PM 55296]
    S2 gupdate1c9fa0662b7e52;Google Update Service (gupdate1c9fa0662b7e52);c:\program files\Google\Update\GoogleUpdate.exe [7/1/2009 12:40 AM 133104]
    S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [5/30/2009 11:35 AM 1684736]
    S3 bulkadi;Razer Megalodon DFU;c:\windows\system32\drivers\bulkrazer.sys [1/25/2010 8:37 AM 19968]
    S3 COMMONFX;COMMONFX;c:\windows\system32\drivers\COMMONFX.sys [6/23/2009 1:34 PM 99352]
    S3 Creative Audio Engine Licensing Service;Creative Audio Engine Licensing Service;c:\program files\Common Files\Creative Labs Shared\Service\CTAELicensing.exe [8/28/2009 11:18 PM 79360]
    S3 CTAUDFX;CTAUDFX;c:\windows\system32\drivers\CTAUDFX.sys [6/23/2009 1:34 PM 555032]
    S3 CTERFXFX.SYS;CTERFXFX.SYS;c:\windows\system32\drivers\CTERFXFX.sys [6/23/2009 1:35 PM 100888]
    S3 CTERFXFX;CTERFXFX;c:\windows\system32\drivers\CTERFXFX.sys [6/23/2009 1:35 PM 100888]
    S3 CTSBLFX;CTSBLFX;c:\windows\system32\drivers\CTSBLFX.sys [6/23/2009 1:34 PM 566296]
    S3 DrvAgent32;DrvAgent32;c:\windows\system32\drivers\DrvAgent32.sys [2/13/2010 4:08 PM 23456]
    S3 mfendisk;McAfee Core NDIS Intermediate Filter;c:\windows\system32\drivers\mfendisk.sys [9/11/2009 7:59 AM 88480]
    S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [9/11/2009 7:59 AM 83496]
    S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des -service --> c:\windows\system32\GameMon.des -service [?]
    S3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32.sys [5/30/2009 11:07 AM 39456]
    S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2/17/2010 11:15 AM 12872]
    S3 Symantec SymSnap VSS Provider;Symantec SymSnap VSS Provider;c:\windows\system32\dllhost.exe [4/13/2008 8:42 PM 5120]
    --- Other Services/Drivers In Memory ---
    *Deregistered* - mfeavfk01
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    getPlusHelper REG_MULTI_SZ getPlusHelper
    .
    Contents of the 'Scheduled Tasks' folder
    2010-05-08 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]
    2010-05-12 c:\windows\Tasks\GlaryInitialize.job
    - c:\program files\Glary Utilities\initialize.exe [2009-05-31 01:36]
    2010-05-12 c:\windows\Tasks\Google Software Updater.job
    - c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-07-01 04:39]
    2010-05-12 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2009-07-01 04:40]
    2010-05-12 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2009-07-01 04:40]
    2010-05-12 c:\windows\Tasks\User_Feed_Synchronization-{6991B6E8-36FC-4AA3-896D-9B39794F2CA7}.job
    - c:\windows\system32\msfeedssync.exe [2008-08-29 08:31]
    .
    .
    ------- Supplementary Scan -------
    .
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
    Trusted Zone: com\www.msi
    Trusted Zone: com.tw\asia.msi
    Trusted Zone: com.tw\global.msi
    Trusted Zone: internet
    Trusted Zone: mcafee.com
    DPF: {784797A8-342D-4072-9486-03C8D0F2F0A1} - hxxps://www.battlefieldheroes.com/static/updater/BFHUpdater_4.0.27.0.cab
    DPF: {8167C273-DF59-4416-B647-C8BB2C7EE83E} - hxxp://liveupdate.msi.com.tw/autobios/LOnline/install.cab
    DPF: {94E5218F-9737-4FC2-8457-567B1FF23DC0} - hxxp://utilities.pcpitstop.com/Nirvana/controls/DiskMD3Ctrl.dll
    DPF: {A553720A-BFED-4EA4-A71F-7EFCA690A1F7} - hxxp://utilities.pcpitstop.com/Nirvana/controls/pcpitstopAntiVirus.dll
    FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\
    FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT1273885&SearchSource=3&q={searchTerms}
    FF - prefs.js: browser.search.selectedEngine - Americas Army Tool Customized Web Search
    FF - prefs.js: browser.startup.homepage - hxxp://ca.my.msn.com/?lang=en-ca
    FF - component: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{717b2e44-9be0-4e4d-a119-2c342d021ac1}\components\FFExternalAlert.dll
    FF - component: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{717b2e44-9be0-4e4d-a119-2c342d021ac1}\components\RadioWMPCore.dll
    FF - component: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{a7c6cf7f-112c-4500-a7ea-39801a327e5f}\platform\WINNT_x86-msvc\components\ipc.dll
    FF - component: c:\program files\McAfee\SiteAdvisor\components\McFFPlg.dll
    FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{F8CC37C3-CBEB-4A00-8CBF-26A88693F0C5}\plugins\npagent.dll
    FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\[email protected]\platform\WINNT_x86-msvc\plugins\npBFHUpdater.dll
    FF - plugin: c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\1.2.183.23\npGoogleOneClick8.dll
    FF - plugin: c:\documents and settings\All Users\Application Data\NexonUS\NGM\npNxGameUS.dll
    FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
    FF - plugin: c:\program files\Google\Google Updater\2.4.1601.7122\npCIDetect13.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiautoinstallpluginff.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npwachk.dll
    FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
    ---- FIREFOX POLICIES ----
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
    .
    **************************************************************************
    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-05-12 08:07
    Windows 5.1.2600 Service Pack 3 NTFS
    scanning hidden processes ...
    scanning hidden autostart entries ...
    scanning hidden files ...
    scan completed successfully
    hidden files: 0
    **************************************************************************
    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
    "ImagePath"="c:\windows\system32\GameMon.des -service"
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------
    [HKEY_USERS\S-1-5-21-1409082233-879983540-1801674531-500\Software\Microsoft\Internet Explorer\User Preferences]
    @Denied: (2) (Administrator)
    "88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,2b,8c,be,9b,9a,85,e8,4d,98,81,64,\
    "2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,2b,8c,be,9b,9a,85,e8,4d,98,81,64,\
    [HKEY_USERS\S-1-5-21-1409082233-879983540-1801674531-500\Software\SecuROM\License information*]
    "datasecu"=hex:64,bb,28,14,f9,0b,9c,32,14,54,8f,2e,7f,b0,e7,19,66,9f,ac,ce,e0,
    c4,e9,92,9b,d0,09,fb,92,f2,c9,b5,e2,9d,d3,bb,cb,2b,60,d4,ba,a1,67,c9,48,c7,\
    "rkeysecu"=hex:c4,f3,a1,58,a2,64,6a,e8,74,ac,9c,75,a3,de,0d,4c
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------
    - - - - - - - > 'winlogon.exe'(916)
    c:\program files\SUPERAntiSpyware\SASWINLO.dll
    c:\windows\system32\WININET.dll
    c:\windows\system32\Ati2evxx.dll
    c:\windows\system32\atiadlxx.dll
    c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
    c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll
    c:\windows\system32\PCANotify.dll
    c:\program files\common files\logishrd\bluetooth\LBTServ.dll
    - - - - - - - > 'explorer.exe'(5144)
    c:\windows\system32\WININET.dll
    c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\mshtml.dll
    c:\windows\system32\msls31.dll
    c:\windows\system32\hnetcfg.dll
    c:\windows\system32\jscript.dll
    c:\windows\system32\ImgUtil.dll
    c:\windows\system32\pngfilt.dll
    c:\windows\system32\webcheck.dll
    c:\windows\system32\wpdshserviceobj.dll
    c:\windows\system32\portabledevicetypes.dll
    c:\windows\system32\portabledeviceapi.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\Ati2evxx.exe
    c:\program files\Creative\Shared Files\CTAudSvc.exe
    c:\windows\system32\Ati2evxx.exe
    c:\program files\Google\Update\1.2.183.23\GoogleCrashHandler.exe
    c:\program files\Common Files\EPSON\EBAPI\eEBSVC.exe
    c:\windows\system32\CTsvcCDA.exe
    c:\windows\system32\inetsrv\inetinfo.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\xampp\mysql\bin\mysqld.exe
    c:\program files\NVIDIA Corporation\nTune\nTuneService.exe
    c:\windows\system32\PnkBstrA.exe
    c:\program files\Common Files\McAfee\SystemCore\mcshield.exe
    .
    **************************************************************************
    .
    Completion time: 2010-05-12 08:13:56 - machine was rebooted
    ComboFix-quarantined-files.txt 2010-05-12 12:13
    ComboFix2.txt 2010-05-01 02:44
    Pre-Run: 442,137,522,176 bytes free
    Post-Run: 442,149,900,288 bytes free
    - - End Of File - - 9AF669DAFE45256BA2E7492676BA1236
     
  15. NeonFx

    NeonFx Malware Specialist

    Joined:
    Oct 22, 2008
    Messages:
    4,811
    Alright it worked this time :) The MBR scanner isn't showing anymore which means it's no longer hooked.


    This file isn't being detected as valid:

    c:\windows\system32\sfcfiles.dll


    It could just be outdated. Just to be sure though, let's scan it online:

    • Make sure to use Internet Explorer for this
    • Please go to VirSCAN.org FREE on-line scan service
    • Copy and paste the following file path into the "Suspicious files to scan" box on the top of the page:

      c:\windows\system32\sfcfiles.dll
    • Click on the Upload button
    • If a pop-up appears saying the file has been scanned already, please select the ReScan button.
    • Once the Scan is completed, click on the "Copy to Clipboard" button. This will copy the link of the report into the Clipboard.
    • Paste the contents of the Clipboard in your next reply.
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Similar Threads - Browsers Hijacked
  1. genubi
    Replies:
    0
    Views:
    320
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/920618

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice