Browsers Hijacked

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
Gonna try this again.
Fourth attempt to post and site keeps erroring.

First off, I did get a virus several weeks ago, which I beleive I clear most of.
It was something like Antivirus2009 or 2010.
It prevented me viewing anything on Explorer and Firefox giving my page contains hazardous content.
It totally killed Chrome and all I get is white pages and looks like it won't connect to interenet.
It also seems to stole login info which I think it takes when I log into sites. Facebook for one contacted me stating my account caused spam on their site.

I have XP SP3.

I have ran Spybot, Adaware, Malawarebytes, Super Antispyware, McAfee, Glary Utitlities, Registry Fix, all of which found issues and fixed.

I still can't use Chrome, and Firefox and Explorer continually open new browsers with a redirect to other sites which tells me my browsers are still bugged.
 

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
I am trying to post my HijackThis log, but everytime I submit, I get internet connection error.

I will have to attach it and maybe you can tell me why it can't be posted.
 

Attachments

NeonFx

Malware Specialist
Joined
Oct 22, 2008
Messages
4,811
Hello there :cool: Welcome to the TSG Forums.
My name is NeonFx. I'll be glad to help you with your computer problems. Logs can take some time to research, so please be patient with me.


Please note the following:
  • The fixes are specific to your problem and should only be used on this machine.
  • Please continue to review my answers until I tell you your machine appears to be clean. Absence of symptoms does not necessarily mean that the system is completely clean.
  • It's often worth reading through these instructions and printing them for ease of reference. I may ask you to boot into Safe Mode where you will be unable to follow my instructions online.
  • If you don't know or understand something, please don't hesitate to say or ask!! It's better to be sure and safe than sorry.
  • Please reply to this thread. Do not start a new topic.



Step 1

Download OTS to your Desktop

  • Close ALL OTHER PROGRAMS.
  • Double-click on OTS.exe to start the program.
  • Check the box that says Scan All Users
  • Under Basic Scans please change the radio button under Registry from Safe List to All.
  • Under Additional Scans check the following:
    • Reg - Desktop Components
    • Reg - Disabled MS Config Items
    • Reg - NetSvcs
    • Reg - Shell Spawning
    • Reg - Uninstall List
    • File - Lop Check
    • File - Purity Scan
    • Evnt - EvtViewer (last 10)
  • Please paste the contents of the following codebox into the Custom Scans box at the bottom
Code:
%SYSTEMDRIVE%\*.exe
/md5start
eventlog.dll
scecli.dll
netlogon.dll
cngaudit.dll
sceclt.dll
ntelogon.dll
logevent.dll
iaStor.sys
nvstor.sys
atapi.sys
IdeChnDr.sys
viasraid.sys
AGP440.sys
vaxscsi.sys
nvatabus.sys
viamraid.sys
nvata.sys
nvgts.sys
iastorv.sys
ViPrt.sys
eNetHook.dll
ahcix86.sys
KR10N.sys
nvstor32.sys
ahcix86s.sys
nvrd32.sys
symmpi.sys
adp3132.sys
mv61xx.sys
/md5stop
%systemroot%\*. /mp /s
CREATERESTOREPOINT
%systemroot%\system32\*.dll /lockedfiles
%systemroot%\Tasks\*.job /lockedfiles
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
  • Now click the Run Scan button on the toolbar.
  • Let it run unhindered until it finishes.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
Please attach the log in your next post. To do so click on the blue "Reply" button or "Go Advanced" and click on the "Manage Attachments" button

Step 2

GMER Rootkit Scanner
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs. Make sure you disable your security programs as well, as they may interfere with the program.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable your security programs when done.


If you have trouble running GMER, please try running it in Safe Mode. To get to Safe Mode you'll need to repeatedly tap the F8 key on your keyboard as you turn your computer on until a black and white menu appears with the option.

If you continue to have trouble with it, try running it without the "Files" scan checked.



Again, if the results are really long, please attach them using the instructions I gave you at the end of step 1. This is to avoid having to scroll down the page too much make the space cleaner.
 

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
Here's the OTS log attached.

I am still trying to do the GMER. I ran it over night, and 11 hours later, it was still scaning. Knowing whats on my PC, I have to estimate nearly 2 days to scan, and when I tried to stop it and give you the partial results, the computer became unresponsive.

Is it supposed to take so long?

Gonna try safe mode. F8 doesn't work on this PC. Will have to test the other F buttons.
 

Attachments

NeonFx

Malware Specialist
Joined
Oct 22, 2008
Messages
4,811
It can take a really long time sometimes but Safe Mode or running the scan without the "Files" option checked might speed it up.

Let me know if you have trouble.


Did you have trouble attaching OTS.txt as a text file and that's why you RAR'd it?
 

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
Never tried, but had problem with HijackThis log when I tried that, so just habit to zip it.

Will try it as txt next time.

Will also try the GMER with files off.
Should speed it up.
 

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
I couldn't get into safe mode.
My USB keyboard is dead when trying to select safe mode.

I turned off the Files selection, and was able to do the scan and save it.

Attached both logs.

After looking at the GMER log, specifically the last 2 lines, I compared the sizes of my files to the reported correct sizes.

atapi.sys - correct size should be 18.6kb - hxxp://www.pc1news.com/files/586993-atapi-sys.html
My size: 95kb
Also mentions it is a Vista item. I am using XP.

kbdhid.sys - correct size should be 13.5kb - hxxp://www.pc1news.com/files/16449-kbdhid-sys.html
My size: 15kb

The kbdhid.sys is for keyboards, and might explain why on about every second boot up, the keyboard is dead, and I need to reboot to get it to work.
 

Attachments

NeonFx

Malware Specialist
Joined
Oct 22, 2008
Messages
4,811
You are correct, those are the two files we need to deal with. atapi.sys is only infected in memory though so we'll only need to either disinfect or replace this file:

C:\WINDOWS\system32\DRIVERS\kbdhid.sys


Let's run the following to see if it will disinfect it automatically before we try any manual fixes:



NOTE: ComboFix should NOT be used without supervision by someone trained in its use. It does a whole lot more to a system than just remove infected files.

Download ComboFix from one of these locations:

Link 1
Link 2


* IMPORTANT !!! Save ComboFix.exe to your Desktop



  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Disabling Security Programs
  • Double click on ComboFix.exe & follow the prompts.

    Note: Combofix will run without the Recovery Console installed.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.


**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.




Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:




Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Notes:

1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.
3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you please let me know. A increasing number of infections are spreading using Autoplay and leaving it disabled is a good idea.
4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.
 

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
Combofix log attached.

Reported root activity and scanned on reboot.
It replaced the kbdhid.sys file.
kbdhid.sys still shows at 15kb

atapi.sys file wasn't changed.
 

Attachments

NeonFx

Malware Specialist
Joined
Oct 22, 2008
Messages
4,811
That infection has been taken care of :) The file sizes and md5 hashes are correct. Files are updated from time to time and the websites you mentioned earlier are outdated.

The sizes wouldn't change because the infection fools the system into believing the file is one size when it's actually another in an attempt to hide itself.


Please do this:

Run OTS and under the Custom Scans section copy and paste the following:

/md5start
sfcfiles.dll
/md5stop


Click on the None button at the top and then click on the Run Scan button. Copy and paste the results of this scan here for me.
 

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
Results:

Code:
OTS logfile created on: 5/11/2010 8:41:18 PM - Run 2
OTS by OldTimer - Version 3.1.30.1     Folder = C:\Documents and Settings\Administrator\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy
 
3.00 Gb Total Physical Memory | 2.00 Gb Available Physical Memory | 77.00% Memory free
5.00 Gb Paging File | 4.00 Gb Available in Paging File | 83.00% Paging File free
Paging file location(s): c:\pagefile.sys 2046 4092 [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 596.16 Gb Total Space | 411.95 Gb Free Space | 69.10% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
Drive F: | 931.51 Gb Total Space | 827.97 Gb Free Space | 88.88% Space Free | Partition Type: NTFS
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded
 
Computer Name: BRECK
Current User Name: Administrator
Logged in as Administrator.
 
Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
 
[Custom Scans]
< MD5 Scans Start>
< %systemdrive%\SFCFILES.DLL  /md5 /s >
 sfcfiles.dll : MD5=362BC5AF8EAF712832C58CC13AE05750 -> C:\WINDOWS\system32\sfcfiles.dll -> [2008/08/29 18:15:14 | 001,614,848 | ---- | M] (Microsoft Corporation)
< MD5 Scans End>
< End of report >
Just something else I forgot to mention, I also have been having "My Computer" page opened occasionally. Not sure, but it started as the same time as the browser issue. It just out of the blue, pops the page up.
 

NeonFx

Malware Specialist
Joined
Oct 22, 2008
Messages
4,811
That's odd about the My Computer page. Let me know if that continues to happen. Please do the following now:

1. Close any open open programs before running the fix.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open Notepad (Start > Programs > Accessories) and copy/paste the text in the codebox below into it:

Code:
SRPeek::
c:\windows\system32\sfcfiles.dll

Registry::
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"135:TCP"=-
"5000:TCP"=-
"5001:TCP"=-
"5002:TCP"=-
"5003:TCP"=-
"5004:TCP"=-
"5005:TCP"=-
"5006:TCP"=-
"5007:TCP"=-
"5008:TCP"=-
"5009:TCP"=-
"5010:TCP"=-
"5011:TCP"=-
"5012:TCP"=-
"5013:TCP"=-
"5014:TCP"=-
"5015:TCP"=-
"5016:TCP"=-
"5017:TCP"=-
"5018:TCP"=-
"5019:TCP"=-
"5020:TCP"=-


TDL::
c:\windows\system32\drivers\kbdhid.sys

MBR::
NOTE: Make sure WordWrap is unchecked in Notepad by clicking on the "Format" menu icon.

Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
 

breck68

Thread Starter
Joined
May 2, 2010
Messages
17
Root activity found.
Reboot and scanned.

Results:

ComboFix 10-05-11.05 - Administrator 05/12/2010 7:54.4.4 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3327.2693 [GMT -4:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
AV: McAfee Anti-Virus and Anti-Spyware *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
* Resident AV is active
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
Restored copy from - Kitty had a snack :p
Infected copy of c:\windows\system32\DRIVERS\kbdhid.sys was found and disinfected
Restored copy from - Kitty ate it :p
Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
Restored copy from - Kitty had a snack :p
Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
Restored copy from - Kitty had a snack :p
Infected copy of c:\windows\system32\DRIVERS\kbdhid.sys was found and disinfected
Restored copy from - Kitty ate it :p
Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
Restored copy from - Kitty had a snack :p
Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
Restored copy from - Kitty had a snack :p
Infected copy of c:\windows\system32\DRIVERS\kbdhid.sys was found and disinfected
Restored copy from - Kitty ate it :p
Infected copy of c:\windows\system32\drivers\kbdhid.sys was found and disinfected
Restored copy from - Kitty had a snack :p
.
((((((((((((((((((((((((( Files Created from 2010-04-12 to 2010-05-12 )))))))))))))))))))))))))))))))
.
2010-05-09 14:43 . 2010-05-09 14:48 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-05-06 02:14 . 2010-05-06 02:14 -------- d--h--r- c:\documents and settings\Administrator\Application Data\SecuROM
2010-05-06 02:06 . 2010-05-06 02:06 2434856 ----a-w- c:\windows\system32\pbsvc_bc2.exe
2010-05-05 23:10 . 2010-05-05 23:10 -------- d-----w- c:\documents and settings\All Users\Application Data\EA Core
2010-05-05 23:09 . 2010-05-05 23:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Electronic Arts
2010-05-05 23:09 . 2010-05-06 01:59 -------- d-----w- c:\program files\Electronic Arts
2010-05-02 17:47 . 2010-05-02 17:47 -------- d-----w- c:\program files\Trend Micro
2010-05-01 19:11 . 2010-05-01 19:12 -------- d-----w- c:\documents and settings\Administrator\Application Data\Netscape
2010-05-01 19:11 . 2010-05-01 19:11 -------- d-----w- c:\program files\Netscape
2010-04-28 00:50 . 2010-04-28 00:50 -------- d-----w- c:\documents and settings\All Users\Application Data\{7EE47FC9-0392-48AA-8A9D-FFAA175F923C}
2010-04-24 23:17 . 2010-04-24 23:17 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Zynga
2010-04-24 17:21 . 2010-04-24 17:21 -------- d-----w- c:\documents and settings\Breck Demers\Application Data\Epson
2010-04-24 00:35 . 2010-04-24 00:35 673280 ----a-w- c:\windows\is-TUOL5.exe
2010-04-21 11:59 . 2010-04-21 11:59 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Zynga
2010-04-21 11:59 . 2010-04-21 11:59 -------- d-----w- c:\program files\Zynga
2010-04-21 03:50 . 2009-07-01 15:55 701440 ----a-w- c:\windows\system32\cohelper.dll
2010-04-21 03:50 . 2009-07-01 04:42 485920 ----a-w- c:\windows\system32\nvunrm.exe
2010-04-20 21:57 . 2010-04-20 21:57 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Nem's Tools
2010-04-20 21:55 . 2010-04-20 21:55 -------- d-----w- c:\program files\Nem's Tools
2010-04-17 17:15 . 2010-04-17 17:16 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Temp
2010-04-16 21:11 . 2010-04-16 21:11 -------- d-----w- c:\program files\dumps
2010-04-15 11:51 . 2010-02-10 20:45 143360 ----a-w- c:\windows\system32\atiapfxx.exe
2010-04-15 02:56 . 2010-04-15 02:56 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-04-15 02:41 . 2010-04-15 02:41 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-04-15 02:41 . 2010-05-07 21:43 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-04-15 02:41 . 2010-04-15 02:41 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2010-04-15 02:33 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-15 02:33 . 2010-05-07 22:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-15 02:33 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-15 02:06 . 2010-04-15 02:06 -------- d-sh--w- c:\documents and settings\Breck Demers\IETldCache
2010-04-15 01:39 . 2010-04-15 01:39 -------- d-----w- c:\windows\system32\wbem\Repository
2010-04-15 01:38 . 2010-04-15 02:19 -------- d-----w- c:\program files\LimeWire
2010-04-15 01:35 . 2010-04-15 01:35 -------- d-----w- c:\documents and settings\All Users\Application Data\ATI
2010-04-14 23:28 . 2010-04-15 01:34 -------- d-----w- c:\documents and settings\All Users\Application Data\ATI(2)
2010-04-14 21:15 . 2010-04-14 21:15 -------- d-----w- C:\SWTOOLS
2010-04-14 20:52 . 2010-04-15 22:10 -------- d-----w- c:\program files\Lavasoft
2010-04-14 20:52 . 2010-04-15 22:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-04-14 20:42 . 2010-04-15 22:12 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-04-14 20:42 . 2010-04-15 20:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-14 20:33 . 2010-04-23 11:31 -------- d-----w- c:\program files\ATI
2010-04-14 20:19 . 2010-04-14 20:19 -------- d-----w- C:\AMD
2010-04-13 11:54 . 2010-04-13 11:54 62668 ---ha-w- c:\windows\system32\mlfcache.dat
2010-04-13 11:53 . 2010-04-15 01:36 -------- d-----w- c:\program files\Safari
2010-04-13 11:53 . 2010-04-15 01:40 -------- d-----w- c:\program files\Bonjour
2010-04-13 03:40 . 2010-04-13 03:40 -------- d-----w- c:\program files\Enigma Software Group
2010-04-13 03:30 . 2010-04-13 03:30 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-12 11:50 . 2008-04-13 19:09 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys
2010-05-12 03:30 . 2009-05-30 17:51 218808 ----a-w- c:\windows\system32\PnkBstrB.exe
2010-05-12 00:51 . 2009-05-30 17:51 137256 ----a-w- c:\windows\system32\drivers\PnkBstrK.sys
2010-05-12 00:51 . 2009-06-09 20:05 -------- d-----w- c:\program files\Steam
2010-05-11 12:20 . 2009-05-31 12:14 -------- d-----w- c:\program files\Glary Utilities
2010-05-10 21:35 . 2009-05-30 15:53 2644 ----a-w- c:\windows\system32\d3d9caps.dat
2010-05-08 17:48 . 2009-06-29 00:46 -------- d-----w- c:\program files\AA3AdminPanel
2010-05-07 23:34 . 2009-06-20 22:16 -------- d-----w- c:\documents and settings\Administrator\Application Data\FileZilla
2010-05-07 22:12 . 2010-05-07 22:12 63488 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-05-07 22:12 . 2010-04-15 02:43 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-05-07 22:10 . 2009-05-30 15:05 -------- d-----w- c:\documents and settings\All Users\Application Data\PCPitstop
2010-05-06 02:51 . 2009-05-30 15:13 -------- d-----w- c:\program files\MSI
2010-05-06 02:06 . 2009-06-18 00:22 138056 ----a-w- c:\documents and settings\Administrator\Application Data\PnkBstrK.sys
2010-05-06 02:06 . 2009-06-18 00:22 138056 ----a-w- c:\documents and settings\Administrator\Application Data\PnkBstrK.sys
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\ru\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\pl\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\ja\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\it\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\fr-fr\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\es\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\en-us\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\en-uk\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 1021312 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\loc\de\GDFBinary.dll
2010-05-06 01:55 . 2010-05-05 23:11 6819160 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\EADM\eadm-installer.exe
2010-05-06 01:54 . 2010-05-05 23:11 390416 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\Battlefield Bad Company 2_code.exe
2010-05-06 01:54 . 2010-05-05 23:11 365840 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\paul.dll
2010-05-06 01:54 . 2010-05-05 23:11 193808 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Support\Battlefield Bad Company 2_uninst.exe
2010-05-06 01:54 . 2010-05-05 23:11 2434856 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\PunkBuster\pbsvc_bc2.exe
2010-05-06 01:53 . 2010-05-05 23:11 525656 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\DirectX\DXSETUP.exe
2010-05-06 01:53 . 2010-05-05 23:11 1691464 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\DirectX\dsetup32.dll
2010-05-06 01:53 . 2010-05-05 23:11 94024 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\DirectX\DSETUP.dll
2010-05-06 01:52 . 2010-05-05 23:11 427392 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\Setup.exe
2010-05-05 23:11 . 2010-05-05 23:11 423304 ----a-w- c:\documents and settings\All Users\Application Data\EA Core\cache\EADM\{ }\bfbc2_dd\AutoRun.exe
2010-05-05 23:10 . 2009-05-31 11:51 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-05-05 23:10 . 2010-05-05 23:09 38784 ----a-w- c:\documents and settings\Administrator\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\airappinstaller\airappinstaller.exe
2010-05-01 14:30 . 2009-06-13 16:13 1086 ----a-w- c:\windows\checkip.dat
2010-05-01 14:29 . 2009-06-13 16:12 1211 ----a-w- c:\windows\ipconfig.dat
2010-04-28 00:50 . 2010-02-28 04:58 -------- d-----w- c:\program files\LiveZilla
2010-04-26 11:53 . 2010-04-28 00:50 575060 ----a-w- c:\documents and settings\All Users\Application Data\{7EE47FC9-0392-48AA-8A9D-FFAA175F923C}\mia.dll
2010-04-26 11:53 . 2010-04-28 00:50 2204306 ----a-w- c:\documents and settings\All Users\Application Data\{7EE47FC9-0392-48AA-8A9D-FFAA175F923C}\LiveZilla_3.1.8.6_Full.exe
2010-04-24 17:21 . 2009-06-26 03:02 76960 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-04-21 03:50 . 2009-05-30 15:17 -------- d-----w- c:\program files\NVIDIA Corporation
2010-04-21 03:14 . 2010-04-21 03:14 10134 ----a-r- c:\documents and settings\Administrator\Application Data\Microsoft\Installer\{24E2D11A-584E-3A8F-1F33-E3A266F18EE4}\ARPPRODUCTICON.exe
2010-04-19 11:31 . 2009-05-30 15:44 76960 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-04-17 17:17 . 2009-07-01 04:39 -------- d-----w- c:\program files\Google
2010-04-17 03:13 . 2010-03-30 01:51 -------- d-----w- c:\documents and settings\All Users\Application Data\{1C6FDDD8-FC9E-4C12-9FA5-1AAD377097B3}
2010-04-16 23:03 . 2010-04-16 23:03 49152 ----a-r- c:\documents and settings\Administrator\Application Data\Microsoft\Installer\{166E180E-9A3F-41AE-8B40-22D8FFF4AF87}\Icon49FA793C.exe
2010-04-16 20:35 . 2009-06-04 19:26 -------- d-----w- c:\program files\McAfee
2010-04-15 11:59 . 2009-05-31 10:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-04-15 11:51 . 2009-06-08 16:22 -------- d-----w- c:\program files\ATI Technologies
2010-04-15 02:43 . 2010-04-15 02:43 52224 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-04-15 02:40 . 2009-05-30 16:41 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-04-15 02:19 . 2010-01-24 23:35 -------- d-----w- c:\program files\LimeWire Plus
2010-04-15 02:09 . 2009-07-29 21:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2010-04-15 01:38 . 2009-10-01 03:10 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-04-15 01:37 . 2010-04-11 00:12 -------- d-----w- c:\program files\GCFScape
2010-04-15 01:36 . 2009-05-30 14:52 -------- d-----w- c:\program files\Opera
2010-04-15 01:34 . 2009-05-30 15:01 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-14 16:50 . 2009-10-10 13:36 9344 ----a-w- c:\windows\system32\drivers\mfeclnk.sys
2010-04-14 16:50 . 2009-09-11 11:59 95568 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
2010-04-14 16:50 . 2009-09-11 11:59 88480 ----a-w- c:\windows\system32\drivers\mfendisk.sys
2010-04-14 16:50 . 2009-09-11 11:59 83496 ----a-w- c:\windows\system32\drivers\mferkdet.sys
2010-04-14 16:50 . 2009-09-11 11:59 82952 ----a-w- c:\windows\system32\drivers\mfetdi2k.sys
2010-04-14 16:50 . 2009-09-11 11:59 55456 ----a-w- c:\windows\system32\drivers\cfwids.sys
2010-04-14 16:50 . 2009-09-11 11:59 51688 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2010-04-14 16:50 . 2009-09-11 11:59 385536 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2010-04-14 16:50 . 2009-09-11 11:59 312616 ----a-w- c:\windows\system32\drivers\mfefirek.sys
2010-04-14 16:50 . 2009-09-11 11:59 152320 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2010-04-13 11:54 . 2009-08-16 23:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\Apple Computer
2010-04-05 23:28 . 2009-06-02 20:22 -------- d-----w- c:\program files\Winsim
2010-04-03 06:41 . 2009-11-08 16:46 -------- d-----w- c:\documents and settings\Administrator\Application Data\HLSW
2010-04-03 04:22 . 2009-06-09 17:57 -------- d-----w- c:\program files\Full Tilt Poker
2010-04-02 13:27 . 2010-04-02 13:27 -------- d-----w- c:\documents and settings\Administrator\Application Data\Symantec
2010-03-30 22:17 . 2009-06-08 13:29 -------- d-----w- c:\documents and settings\Administrator\Application Data\mjusbsp
2010-03-30 03:21 . 2009-05-30 17:43 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2010-03-30 02:09 . 2009-06-12 21:17 -------- d-----w- c:\documents and settings\Administrator\Application Data\Azureus
2010-03-30 01:52 . 2010-03-30 01:52 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_GenericMount_01009.Wdf
2010-03-30 01:52 . 2010-03-30 01:52 0 ---ha-w- c:\windows\system32\drivers\MsftWdf_Kernel_01009_Coinstaller_Critical.Wdf
2010-03-27 23:15 . 2009-05-30 17:45 -------- d-----w- c:\documents and settings\Administrator\Application Data\Xfire
2010-03-27 22:58 . 2009-05-30 17:45 -------- d-----w- c:\program files\Xfire
2010-03-26 23:24 . 2010-03-26 22:23 -------- d-----w- c:\documents and settings\Administrator\Application Data\IBP
2010-03-25 00:24 . 2010-03-25 00:24 31032 ----a-w- c:\windows\system32\ntaccess_64.sys
2010-03-23 00:31 . 2009-12-13 03:51 -------- d-----w- c:\program files\FileZilla FTP Client
2010-03-21 20:25 . 2010-03-21 20:20 -------- d-----w- c:\program files\Test My Hardware
2010-03-19 21:56 . 2010-03-19 21:56 -------- d-----w- c:\program files\AVConverter
2010-03-19 21:36 . 2009-08-16 23:58 -------- d-----w- c:\program files\QuickTime
2010-03-19 21:14 . 2010-03-19 21:13 -------- d-----w- c:\program files\Unlocker
2010-03-19 20:29 . 2010-01-24 23:35 -------- d-----w- c:\documents and settings\Administrator\Application Data\LimeWirePlus
2010-03-17 18:47 . 2010-03-17 18:47 -------- d-----w- c:\program files\Pilot Group Ltd
2010-03-14 15:36 . 2010-02-19 12:35 -------- d-----w- c:\program files\Common Files\EPSON
2010-03-14 15:25 . 2010-02-19 12:32 -------- d-----w- c:\program files\Epson Software
2010-03-14 15:22 . 2010-02-19 12:31 -------- d-----w- c:\documents and settings\All Users\Application Data\EPSON
2010-03-10 06:15 . 2008-04-14 00:42 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-10 05:21 . 2009-05-30 17:18 1821944 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2010-03-05 00:11 . 2010-03-05 00:11 41872 ----a-w- c:\windows\system32\xfcodec.dll
2010-02-26 23:51 . 2010-02-26 23:51 138584 ----a-w- c:\documents and settings\Administrator\Application Data\mjusbsp\ug00000\magicJack.dll
2010-02-26 23:51 . 2010-03-30 22:16 6870864 ---ha-w- c:\documents and settings\Administrator\Application Data\mjusbsp\in00000\setup.exe
2010-02-26 23:51 . 2010-03-14 14:55 6870864 ---ha-w- c:\documents and settings\Administrator\Application Data\mjusbsp\Upgrade\setup1.exe
2010-02-26 23:51 . 2010-02-26 23:51 6870864 ----a-w- c:\documents and settings\Administrator\Application Data\mjusbsp\ug00000\setup.exe
2010-02-26 23:51 . 2010-02-26 23:51 705936 ----a-w- c:\documents and settings\Administrator\Application Data\mjusbsp\magicJackLoader.exe
2010-04-14 16:50 . 2010-02-20 01:14 24376 ----a-w- c:\program files\mozilla firefox\components\Scriptff.dll
2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
.
(((((((((((((((((((((((((((((((((((((((((( SR_Search ))))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
------- Sigcheck -------
[-] 2008-08-29 . 362BC5AF8EAF712832C58CC13AE05750 . 1614848 . . [5.1.2600.5512] . . c:\windows\system32\sfcfiles.dll
.
((((((((((((((((((((((((((((( [email protected]_12.22.47 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-05-12 12:07 . 2010-05-12 12:07 16384 c:\windows\Temp\Perflib_Perfdata_8a4.dat
+ 2010-05-12 12:07 . 2010-05-12 12:07 16384 c:\windows\Temp\Perflib_Perfdata_18c.dat
+ 2010-05-12 12:09 . 2010-05-12 12:09 16384 c:\windows\Temp\Perflib_Perfdata_1744.dat
- 2008-05-03 12:00 . 2010-05-11 12:10 86556 c:\windows\system32\perfc009.dat
+ 2008-05-03 12:00 . 2010-05-12 11:57 86556 c:\windows\system32\perfc009.dat
- 2008-04-13 19:09 . 2008-04-14 04:09 14592 c:\windows\system32\dllcache\kbdhid.sys
+ 2008-04-13 19:09 . 2010-05-12 11:50 14592 c:\windows\system32\dllcache\kbdhid.sys
- 2008-05-03 12:00 . 2010-05-11 12:10 486326 c:\windows\system32\perfh009.dat
+ 2008-05-03 12:00 . 2010-05-12 11:57 486326 c:\windows\system32\perfh009.dat
+ 2010-03-31 01:59 . 2010-05-12 12:07 224396 c:\windows\system32\inetsrv\MetaBase.bin
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{7b13ec3e-999a-4b70-b9cb-2617b8323822}"= "c:\program files\Zynga\tbZyng.dll" [2010-02-22 2353176]
[HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}]
2010-05-11 02:30 2515552 ----a-w- c:\program files\FTA_HELP\tbFTA0.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
2010-02-22 16:05 2353176 ----a-w- c:\program files\Zynga\tbZyng.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{e00d0d5c-8303-4b6e-a68e-9bed501e3861}]
2010-02-24 12:35 2349080 ----a-w- c:\program files\QUACK_Tool\tbQUA1.dll
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}"= "c:\program files\FTA_HELP\tbFTA0.dll" [2010-05-11 2515552]
"{e00d0d5c-8303-4b6e-a68e-9bed501e3861}"= "c:\program files\QUACK_Tool\tbQUA1.dll" [2010-02-24 2349080]
"{7b13ec3e-999a-4b70-b9cb-2617b8323822}"= "c:\program files\Zynga\tbZyng.dll" [2010-02-22 2353176]
[HKEY_CLASSES_ROOT\clsid\{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}]
[HKEY_CLASSES_ROOT\clsid\{e00d0d5c-8303-4b6e-a68e-9bed501e3861}]
[HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{33BC37AD-A9ED-4AC9-BFD6-A0B3509F484C}"= "c:\program files\FTA_HELP\tbFTA0.dll" [2010-05-11 2515552]
"{E00D0D5C-8303-4B6E-A68E-9BED501E3861}"= "c:\program files\QUACK_Tool\tbQUA1.dll" [2010-02-24 2349080]
"{7B13EC3E-999A-4B70-B9CB-2617B8323822}"= "c:\program files\Zynga\tbZyng.dll" [2010-02-22 2353176]
[HKEY_CLASSES_ROOT\clsid\{33bc37ad-a9ed-4ac9-bfd6-a0b3509f484c}]
[HKEY_CLASSES_ROOT\clsid\{e00d0d5c-8303-4b6e-a68e-9bed501e3861}]
[HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2010-05-07 2017280]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DelReg"="c:\program files\MSI\DualCoreCenter\DelReg.exe" [2008-05-13 196608]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2010-04-19 1193336]
"EEventManager"="c:\progra~1\EPSONS~1\EVENTM~1\EEventManager.exe" [2009-01-12 669520]
"LiveZilla"="c:\program files\LiveZilla\LiveZilla.exe" [2010-04-26 2640184]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-11 417792]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"nltide_2"="shell32" [X]
"nltide_3"="advpack.dll" [2009-03-08 128512]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
DualCoreCenter.lnk - c:\program files\MSI\DualCoreCenter\StartUpDualCoreCenter.exe [2009-10-28 192512]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"DisableCAD"= 1 (0x1)
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"MemCheckBoxInRunDlg"= 1 (0x1)
"StartMenuFavorites"= 0 (0x0)
"Start_ShowMyComputer"= 1 (0x1)
"Start_ShowMyDocs"= 1 (0x1)
"Start_ShowMyMusic"= 0 (0x0)
"Start_ShowRun"= 1 (0x1)
"Start_ShowSearch"= 0 (0x0)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoResolveTrack"= 1 (0x1)
"NoSMConfigurePrograms"= 1 (0x1)
"MemCheckBoxInRunDlg"= 1 (0x1)
[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)
"NoResolveTrack"= 1 (0x1)
"NoSMConfigurePrograms"= 1 (0x1)
"MemCheckBoxInRunDlg"= 1 (0x1)
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2009-07-20 16:28 72208 ----a-w- c:\program files\Common Files\Logishrd\Bluetooth\LBTWLgn.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PCANotify]
2007-04-27 16:10 18744 ----a-w- c:\windows\system32\PCANotify.dll
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\AFD]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Browser]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Dhcp]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\DnsCache]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ip6fw.sys]
@="Driver"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ipnat.sys]
@="Driver"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\LanmanServer]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\LanmanWorkstation]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\LmHosts]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Messenger]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NDIS]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NDIS Wrapper]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Ndisuio]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetBIOS]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetBIOSGroup]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetBT]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetDDEGroup]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetMan]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Network]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NetworkProvider]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NtLmSsp]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PNP_TDI]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rdpcdd.sys]
@="Driver"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rdpwd.sys]
@="Driver"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rdsessmgr]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SharedAccess]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Streams Drivers]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Tcpip]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\TDI]
@="Driver Group"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\tdpipe.sys]
@="Driver"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\tdtcp.sys]
@="Driver"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\termservice]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WZCSVC]
@="Service"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{1a3e09be-1e45-494b-9174-d7385b45bbf5}]
@=""
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E972-E325-11CE-BFC1-08002BE10318}]
@="Net"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E973-E325-11CE-BFC1-08002BE10318}]
@="NetClient"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E974-E325-11CE-BFC1-08002BE10318}]
@="NetService"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E975-E325-11CE-BFC1-08002BE10318}]
@="NetTrans"
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\Xfire\\Xfire.exe"=
"c:\\Program Files\\USArmy\\America's Army 2\\System\\ArmyOps.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\AdminPanel\\AdminPanel.exe"=
"c:\\Program Files\\Left4Dead\\left4dead.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\WINDOWS\\system32\\PnkBstrA.exe"=
"c:\\WINDOWS\\system32\\PnkBstrB.exe"=
"c:\\Program Files\\USArmy\\America's Army 3\\Binaries\\AA3Game.exe"=
"c:\\Documents and Settings\\All Users\\Application Data\\NexonUS\\NGM\\NGM.exe"=
"c:\nexon\Combat Arms\CombatArms.exe"= c:\nexon\Combat Arms\CombatArms.exe:*Enabled:CombatArms.exe
"c:\nexon\Combat Arms\Engine.exe"= c:\nexon\Combat Arms\Engine.exe:*Enabled:Engine.exe
"c:\\Nexon\\Combat Arms\\NMService.exe"=
"c:\\Program Files\\AA3AdminPanel\\pbucon.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\stalker shadow of chernobyl\\bin\\XR_3DA.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\battlefield 2\\BF2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\america's army 3\\Binaries\\AA3Game.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Documents and Settings\\Administrator\\Application Data\\mjusbsp\\magicJack.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Common Files\\McAfee\\McSvcHost\\McSvHost.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead 2\\bin\\SDKLauncher.exe"=
"c:\\Program Files\\Electronic Arts\\Battlefield Bad Company 2\\BFBC2Updater.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead 2\\left4dead2.exe"=
R1 mfetdi2k;McAfee Inc. mfetdi2k;c:\windows\system32\drivers\mfetdi2k.sys [9/11/2009 7:59 AM 82952]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2/17/2010 11:15 AM 68168]
R2 Apache2.2;Apache2.2;c:\xampp\apache\bin\httpd.exe [2/15/2010 12:50 AM 24636]
R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [6/8/2009 12:49 PM 10384]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;"c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [9/11/2009 7:59 AM 271480]
R2 McMPFSvc;McAfee Personal Firewall Service;"c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [9/11/2009 7:59 AM 271480]
R2 McNaiAnn;McAfee VirusScan Announcer;"c:\program files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [9/11/2009 7:59 AM 271480]
R2 mfefire;McAfee Firewall Core Service;c:\program files\Common Files\McAfee\SystemCore\mfefire.exe [10/10/2009 9:36 AM 188136]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\program files\Common Files\McAfee\SystemCore\mfevtps.exe [10/10/2009 9:36 AM 141792]
R2 TomTomHOMEService;TomTomHOMEService;c:\program files\TomTom HOME 2\TomTomHOMEService.exe [11/13/2009 7:31 AM 92008]
R3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [9/11/2009 7:59 AM 55456]
R3 COMMONFX.SYS;COMMONFX.SYS;c:\windows\system32\drivers\COMMONFX.sys [6/23/2009 1:34 PM 99352]
R3 CTAUDFX.SYS;CTAUDFX.SYS;c:\windows\system32\drivers\CTAUDFX.sys [6/23/2009 1:34 PM 555032]
R3 CTSBLFX.SYS;CTSBLFX.SYS;c:\windows\system32\drivers\CTSBLFX.sys [6/23/2009 1:34 PM 566296]
R3 DualCoreCenter;DualCoreCenter;c:\program files\MSI\DualCoreCenter\NTGLM7X.sys [10/28/2009 8:29 PM 28672]
R3 GenericMount;Generic Mount Driver;c:\windows\system32\drivers\GenericMount.sys [9/21/2009 8:26 PM 46192]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [9/11/2009 7:59 AM 312616]
R3 mfendiskmp;mfendiskmp;c:\windows\system32\drivers\mfendisk.sys [9/11/2009 7:59 AM 88480]
R3 Razerlow;Razerlow USB Filter Driver;c:\windows\system32\drivers\Razerlow.sys [4/24/2005 5:43 PM 13225]
R3 RushTopDevice2;RushTopDevice2;c:\program files\MSI\DualCoreCenter\RushTop.sys [10/28/2009 8:29 PM 55296]
S2 gupdate1c9fa0662b7e52;Google Update Service (gupdate1c9fa0662b7e52);c:\program files\Google\Update\GoogleUpdate.exe [7/1/2009 12:40 AM 133104]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [5/30/2009 11:35 AM 1684736]
S3 bulkadi;Razer Megalodon DFU;c:\windows\system32\drivers\bulkrazer.sys [1/25/2010 8:37 AM 19968]
S3 COMMONFX;COMMONFX;c:\windows\system32\drivers\COMMONFX.sys [6/23/2009 1:34 PM 99352]
S3 Creative Audio Engine Licensing Service;Creative Audio Engine Licensing Service;c:\program files\Common Files\Creative Labs Shared\Service\CTAELicensing.exe [8/28/2009 11:18 PM 79360]
S3 CTAUDFX;CTAUDFX;c:\windows\system32\drivers\CTAUDFX.sys [6/23/2009 1:34 PM 555032]
S3 CTERFXFX.SYS;CTERFXFX.SYS;c:\windows\system32\drivers\CTERFXFX.sys [6/23/2009 1:35 PM 100888]
S3 CTERFXFX;CTERFXFX;c:\windows\system32\drivers\CTERFXFX.sys [6/23/2009 1:35 PM 100888]
S3 CTSBLFX;CTSBLFX;c:\windows\system32\drivers\CTSBLFX.sys [6/23/2009 1:34 PM 566296]
S3 DrvAgent32;DrvAgent32;c:\windows\system32\drivers\DrvAgent32.sys [2/13/2010 4:08 PM 23456]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;c:\windows\system32\drivers\mfendisk.sys [9/11/2009 7:59 AM 88480]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [9/11/2009 7:59 AM 83496]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32.sys [5/30/2009 11:07 AM 39456]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2/17/2010 11:15 AM 12872]
S3 Symantec SymSnap VSS Provider;Symantec SymSnap VSS Provider;c:\windows\system32\dllhost.exe [4/13/2008 8:42 PM 5120]
--- Other Services/Drivers In Memory ---
*Deregistered* - mfeavfk01
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
getPlusHelper REG_MULTI_SZ getPlusHelper
.
Contents of the 'Scheduled Tasks' folder
2010-05-08 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]
2010-05-12 c:\windows\Tasks\GlaryInitialize.job
- c:\program files\Glary Utilities\initialize.exe [2009-05-31 01:36]
2010-05-12 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-07-01 04:39]
2010-05-12 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-01 04:40]
2010-05-12 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-01 04:40]
2010-05-12 c:\windows\Tasks\User_Feed_Synchronization-{6991B6E8-36FC-4AA3-896D-9B39794F2CA7}.job
- c:\windows\system32\msfeedssync.exe [2008-08-29 08:31]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
Trusted Zone: com\www.msi
Trusted Zone: com.tw\asia.msi
Trusted Zone: com.tw\global.msi
Trusted Zone: internet
Trusted Zone: mcafee.com
DPF: {784797A8-342D-4072-9486-03C8D0F2F0A1} - hxxps://www.battlefieldheroes.com/static/updater/BFHUpdater_4.0.27.0.cab
DPF: {8167C273-DF59-4416-B647-C8BB2C7EE83E} - hxxp://liveupdate.msi.com.tw/autobios/LOnline/install.cab
DPF: {94E5218F-9737-4FC2-8457-567B1FF23DC0} - hxxp://utilities.pcpitstop.com/Nirvana/controls/DiskMD3Ctrl.dll
DPF: {A553720A-BFED-4EA4-A71F-7EFCA690A1F7} - hxxp://utilities.pcpitstop.com/Nirvana/controls/pcpitstopAntiVirus.dll
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT1273885&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.search.selectedEngine - Americas Army Tool Customized Web Search
FF - prefs.js: browser.startup.homepage - hxxp://ca.my.msn.com/?lang=en-ca
FF - component: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{717b2e44-9be0-4e4d-a119-2c342d021ac1}\components\FFExternalAlert.dll
FF - component: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{717b2e44-9be0-4e4d-a119-2c342d021ac1}\components\RadioWMPCore.dll
FF - component: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{a7c6cf7f-112c-4500-a7ea-39801a327e5f}\platform\WINNT_x86-msvc\components\ipc.dll
FF - component: c:\program files\McAfee\SiteAdvisor\components\McFFPlg.dll
FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\{F8CC37C3-CBEB-4A00-8CBF-26A88693F0C5}\plugins\npagent.dll
FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\mdueh56n.default\extensions\[email protected]\platform\WINNT_x86-msvc\plugins\npBFHUpdater.dll
FF - plugin: c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\documents and settings\All Users\Application Data\NexonUS\NGM\npNxGameUS.dll
FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\Google\Google Updater\2.4.1601.7122\npCIDetect13.dll
FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiautoinstallpluginff.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npwachk.dll
FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-12 08:07
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
[HKEY_USERS\S-1-5-21-1409082233-879983540-1801674531-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,2b,8c,be,9b,9a,85,e8,4d,98,81,64,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,2b,8c,be,9b,9a,85,e8,4d,98,81,64,\
[HKEY_USERS\S-1-5-21-1409082233-879983540-1801674531-500\Software\SecuROM\License information*]
"datasecu"=hex:64,bb,28,14,f9,0b,9c,32,14,54,8f,2e,7f,b0,e7,19,66,9f,ac,ce,e0,
c4,e9,92,9b,d0,09,fb,92,f2,c9,b5,e2,9d,d3,bb,cb,2b,60,d4,ba,a1,67,c9,48,c7,\
"rkeysecu"=hex:c4,f3,a1,58,a2,64,6a,e8,74,ac,9c,75,a3,de,0d,4c
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(916)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\atiadlxx.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll
c:\windows\system32\PCANotify.dll
c:\program files\common files\logishrd\bluetooth\LBTServ.dll
- - - - - - - > 'explorer.exe'(5144)
c:\windows\system32\WININET.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\hnetcfg.dll
c:\windows\system32\jscript.dll
c:\windows\system32\ImgUtil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\wpdshserviceobj.dll
c:\windows\system32\portabledevicetypes.dll
c:\windows\system32\portabledeviceapi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Creative\Shared Files\CTAudSvc.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Google\Update\1.2.183.23\GoogleCrashHandler.exe
c:\program files\Common Files\EPSON\EBAPI\eEBSVC.exe
c:\windows\system32\CTsvcCDA.exe
c:\windows\system32\inetsrv\inetinfo.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\xampp\mysql\bin\mysqld.exe
c:\program files\NVIDIA Corporation\nTune\nTuneService.exe
c:\windows\system32\PnkBstrA.exe
c:\program files\Common Files\McAfee\SystemCore\mcshield.exe
.
**************************************************************************
.
Completion time: 2010-05-12 08:13:56 - machine was rebooted
ComboFix-quarantined-files.txt 2010-05-12 12:13
ComboFix2.txt 2010-05-01 02:44
Pre-Run: 442,137,522,176 bytes free
Post-Run: 442,149,900,288 bytes free
- - End Of File - - 9AF669DAFE45256BA2E7492676BA1236
 

NeonFx

Malware Specialist
Joined
Oct 22, 2008
Messages
4,811
Alright it worked this time :) The MBR scanner isn't showing anymore which means it's no longer hooked.


This file isn't being detected as valid:

c:\windows\system32\sfcfiles.dll


It could just be outdated. Just to be sure though, let's scan it online:

  • Make sure to use Internet Explorer for this
  • Please go to VirSCAN.org FREE on-line scan service
  • Copy and paste the following file path into the "Suspicious files to scan" box on the top of the page:

    c:\windows\system32\sfcfiles.dll
  • Click on the Upload button
  • If a pop-up appears saying the file has been scanned already, please select the ReScan button.
  • Once the Scan is completed, click on the "Copy to Clipboard" button. This will copy the link of the report into the Clipboard.
  • Paste the contents of the Clipboard in your next reply.
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top