1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

HiJackthis logfile hope to get help getting rid of keyloggers for World of Warcraft

Discussion in 'Virus & Other Malware Removal' started by VolvoTorgeir, Apr 15, 2010.

Thread Status:
Not open for further replies.
  1. VolvoTorgeir

    VolvoTorgeir Thread Starter

    Apr 15, 2010
    Some of the information in the logs are in Norwegian, I hope that is not any trouble.
    I was told to post my HiJackthis logfile and Malwarebytes' Anti-Malware logfile to maybe get help discover any keyloggers for World of Warcraft.

    So here it is.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 01:48:27, on 16.04.2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal
    Running processes:
    C:\Programfiler\Analog Devices\Core\smax4pnp.exe
    C:\Programfiler\Analog Devices\SoundMAX\Smax4.exe
    C:\Programfiler\Fellesfiler\Java\Java Update\jusched.exe
    C:\Programfiler\Logitech\Logitech WebCam Software\LWS.exe
    C:\Program Files\ASUS\SmartDoctor\SmartDoctor.exe
    C:\Programfiler\Windows Live\Messenger\msnmsgr.exe
    C:\Programfiler\Norton AntiVirus\Engine\\ccSvcHst.exe
    C:\Programfiler\Norton AntiVirus\Engine\\ccSvcHst.exe
    C:\Programfiler\Internet Explorer\iexplore.exe
    C:\Programfiler\Internet Explorer\iexplore.exe
    C:\Programfiler\Internet Explorer\iexplore.exe
    C:\Programfiler\Trend Micro\HijackThis\HijackThis.exe
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dagbladet.no/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Koblinger
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Programfiler\Fellesfiler\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Programfiler\Norton AntiVirus\Engine\\IPSBHO.DLL
    O2 - BHO: Påloggingshjelp for Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programfiler\Fellesfiler\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Programfiler\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Programfiler\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O2 - BHO: SingleInstance Class - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\YTSingleInstance.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [SoundMAXPnP] C:\Programfiler\Analog Devices\Core\smax4pnp.exe
    O4 - HKLM\..\Run: [SoundMAX] "C:\Programfiler\Analog Devices\SoundMAX\Smax4.exe" /tray
    O4 - HKLM\..\Run: [StartCCC] "C:\Programfiler\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programfiler\Fellesfiler\Java\Java Update\jusched.exe"
    O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Programfiler\Logitech\Logitech WebCam Software\LWS.exe" /hide
    O4 - HKLM\..\Run: [SSBkgdUpdate] "C:\Programfiler\Fellesfiler\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
    O4 - HKLM\..\Run: [PaperPort PTD] "C:\Programfiler\ScanSoft\PaperPort\pptd40nt.exe"
    O4 - HKLM\..\Run: [IndexSearch] "C:\Programfiler\ScanSoft\PaperPort\IndexSearch.exe"
    O4 - HKLM\..\Run: [PPort11reminder] "C:\Programfiler\ScanSoft\PaperPort\Ereg\Ereg.exe" -r "C:\Documents and Settings\All Users\Programdata\ScanSoft\PaperPort\11\Config\Ereg\Ereg.ini"
    O4 - HKLM\..\Run: [BrMfcWnd] C:\Programfiler\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
    O4 - HKLM\..\Run: [ControlCenter3] C:\Programfiler\Brother\ControlCenter3\brctrcen.exe /autorun
    O4 - HKCU\..\Run: [ASUS SmartDoctor] C:\Program Files\ASUS\SmartDoctor\SmartDoctor.exe /start
    O4 - HKCU\..\Run: [msnmsgr] "C:\Programfiler\Windows Live\Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\PROGRA~1\Yahoo!\MESSEN~1\YahooMessenger.exe" -quiet
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKAL TJENESTE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: E&ksporter til Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programfiler\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programfiler\Messenger\msmsgs.exe
    O15 - Trusted Zone: http://www.asus.no
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATK Keyboard Service (ATKKeyboardService) - ASUSTeK COMPUTER INC. - C:\WINDOWS\ATKKBService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programfiler\Fellesfiler\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Programfiler\Java\jre6\bin\jqs.exe
    O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Programfiler\Lavasoft\Ad-Aware\AAWService.exe
    O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Programfiler\Fellesfiler\LogiShrd\LVMVFM\LVPrcSrv.exe
    O23 - Service: Norton AntiVirus - Symantec Corporation - C:\Programfiler\Norton AntiVirus\Engine\\ccSvcHst.exe
    O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Programfiler\Yahoo!\SoftwareUpdate\YahooAUService.exe
    End of file - 7377 bytes

    Malwarebytes' Anti-Malware 1.45
    Databaseversjon: 3993
    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702
    16.04.2010 01:30:22
    mbam-log-2010-04-16 (01-30-22).txt
    Skanntype: Full skann (C:\|D:\|G:\|)
    Objekter skannet: 216808
    Tid tilbakelagt: 37 minutt(er), 25 sekund(er)
    Minneprosesser infisert: 0
    Minnemoduler infisert: 0
    Registernøkler infisert: 0
    Registerverdier infisert: 0
    Registerfiler infisert: 0
    Mapper infisert: 0
    Filer infisert 4
    Minneprosesser infisert:
    (Ingen skadelige objekter funnet)
    Minnemoduler infisert:
    (Ingen skadelige objekter funnet)
    Registernøkler infisert:
    (Ingen skadelige objekter funnet)
    Registerverdier infisert:
    (Ingen skadelige objekter funnet)
    Registerfiler infisert:
    (Ingen skadelige objekter funnet)
    Mapper infisert:
    (Ingen skadelige objekter funnet)
    Filer infisert
    G:\System Volume Information\_restore{AD8187CF-9C18-4F7D-B52D-9FC20A858CB7}\RP161\A0042452.exe (Adware.Gain) -> Quarantined and deleted successfully.
    G:\System Volume Information\_restore{AD8187CF-9C18-4F7D-B52D-9FC20A858CB7}\RP161\A0042465.exe (Rogue.Installer) -> Quarantined and deleted successfully.
    G:\WareZ\Internett Stuff\SpyWareNukerInstaller.exe (Rogue.Installer) -> Quarantined and deleted successfully.
    G:\WareZ\QuickTimeInstaller\KeYGeN.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
  2. NeonFx

    NeonFx Malware Specialist

    Oct 22, 2008
    Hello there :cool: Welcome to the TSG Forums.
    My name is NeonFx. I'll be glad to help you with your computer problems. Logs can take some time to research, so please be patient with me.

    Please note the following:
    • The fixes are specific to your problem and should only be used on this machine.
    • Please continue to review my answers until I tell you your machine appears to be clean. Absence of symptoms does not necessarily mean that the system is completely clean.
    • It's often worth reading through these instructions and printing them for ease of reference. I may ask you to boot into Safe Mode where you will be unable to follow my instructions online.
    • If you don't know or understand something, please don't hesitate to say or ask!! It's better to be sure and safe than sorry.
    • Please reply to this thread. Do not start a new topic.

    Step 1

    Download OTS to your Desktop

    • Double-click on OTS.exe to start the program.
    • Check the box that says Scan All Users
    • Under Basic Scans please change the radio button under Registry from Safe List to All.
    • Under Additional Scans check the following:
      • Reg - Desktop Components
      • Reg - Disabled MS Config Items
      • Reg - NetSvcs
      • Reg - Shell Spawning
      • Reg - Uninstall List
      • File - Lop Check
      • File - Purity Scan
      • Evnt - EvtViewer (last 10)
    • Please paste the contents of the following codebox into the Custom Scans box at the bottom
    %systemroot%\*. /mp /s
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\drivers\*.sys /lockedfiles
    • Now click the Run Scan button on the toolbar.
    • Let it run unhindered until it finishes.
    • When the scan is complete Notepad will open with the report file loaded in it.
    • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
    Please attach the log in your next post. To do so click on the blue "Reply" button or "Go Advanced" and click on the "Manage Attachments" button

    Step 2

    [​IMG] GMER Rootkit Scanner
    Please download GMER from one of the following locations and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zipped Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
    • Disconnect from the Internet and close all running programs. Make sure you disable your security programs as well, as they may interfere with the program.
    • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
    • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
    • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
    • Now click the Scan button. If you see a rootkit warning window, click OK.
    • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
    • Click the Copy button and paste the results into your next reply.
    • Exit GMER and re-enable your security programs when done.
  3. VolvoTorgeir

    VolvoTorgeir Thread Starter

    Apr 15, 2010
    Hallo again,

    Here is the two logs from the scans.. One copyed into the Thread, and the other as attachment as wanted.


    GMER - http://www.gmer.net
    Rootkit scan 2010-04-16 22:53:19
    Windows 5.1.2600 Service Pack 3
    Running: ez8ti8mi.exe; Driver: C:\DOCUME~1\Torgeir\LOKALE~1\Temp\kxtdqpob.sys

    ---- System - GMER 1.0.15 ----
    SSDT 896B21E0 ZwAlertResumeThread
    SSDT 89661998 ZwAlertThread
    SSDT 895F8738 ZwAllocateVirtualMemory
    SSDT 89896BF0 ZwAssignProcessToJobObject
    SSDT 896916D8 ZwConnectPort
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwCreateKey [0xAE5D4130]
    SSDT 89671D30 ZwCreateMutant
    SSDT 89652C70 ZwCreateSymbolicLinkObject
    SSDT 894C98A8 ZwCreateThread
    SSDT 89905EB8 ZwDebugActiveProcess
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteKey [0xAE5D43B0]
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey [0xAE5D4910]
    SSDT 8994CF40 ZwDuplicateObject
    SSDT 895F8618 ZwFreeVirtualMemory
    SSDT 897071E0 ZwImpersonateAnonymousToken
    SSDT 896B21A8 ZwImpersonateThread
    SSDT 89705140 ZwLoadDriver
    SSDT 89661AF0 ZwMapViewOfSection
    SSDT 89671CF8 ZwOpenEvent
    SSDT 894CBFC0 ZwOpenProcess
    SSDT 8950F508 ZwOpenProcessToken
    SSDT 898B7D18 ZwOpenSection
    SSDT 894CBF30 ZwOpenThread
    SSDT 898E9E90 ZwProtectVirtualMemory
    SSDT 894CB4D8 ZwResumeThread
    SSDT 89522448 ZwSetContextThread
    SSDT 89661A18 ZwSetInformationProcess
    SSDT 899968E0 ZwSetSystemInformation
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey [0xAE5D4B60]
    SSDT 89996B40 ZwSuspendProcess
    SSDT 895249A0 ZwSuspendThread
    SSDT 89516578 ZwTerminateProcess
    SSDT 89525370 ZwTerminateThread
    SSDT 8994CE78 ZwUnmapViewOfSection
    SSDT 895F86A8 ZwWriteVirtualMemory
    ---- Kernel code sections - GMER 1.0.15 ----
    ? SYMEFA.SYS Systemet finner ikke angitt fil. !
    .text C:\WINDOWS\system32\DRIVERS\ati2mtag.sys section is writeable [0xF64B9000, 0x212E37, 0xE8000020]
    init C:\WINDOWS\system32\drivers\Senfilt.sys entry point in "init" section [0xAE749A00]
    .text C:\WINDOWS\system32\DRIVERS\atksgt.sys section is writeable [0xAAAF9300, 0x3B6D8, 0xE8000020]
    .text C:\WINDOWS\system32\DRIVERS\lirsgt.sys section is writeable [0xF77E7300, 0x1BEE, 0xE8000020]
    ---- User IAT/EAT - GMER 1.0.15 ----
    IAT C:\WINDOWS\Explorer.EXE[1572] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateFile] [00DA2F20] C:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
    IAT C:\WINDOWS\Explorer.EXE[1572] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtDeviceIoControlFile] [00DA2C90] C:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
    IAT C:\WINDOWS\Explorer.EXE[1572] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtClose] [00DA2CF0] C:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
    IAT C:\WINDOWS\Explorer.EXE[1572] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtDuplicateObject] [00DA2CC0] C:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
    ---- Devices - GMER 1.0.15 ----
    AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
    ---- EOF - GMER 1.0.15 ----

    Attached Files:

    • OTS.Txt
      File size:
      175.1 KB
  4. NeonFx

    NeonFx Malware Specialist

    Oct 22, 2008
    Good job, let's do the following now:

    NOTE: ComboFix should NOT be used without supervision by someone trained in its use. It does a whole lot more to a system than just remove infected files.

    Download ComboFix from one of these locations:

    Link 1
    Link 2

    * IMPORTANT !!! Save ComboFix.exe to your Desktop

    • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Disabling Security Programs
    • Double click on ComboFix.exe & follow the prompts.

      Note: Combofix will run without the Recovery Console installed.
    • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
    • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


    Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:


    Click on Yes, to continue scanning for malware.

    When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.


    1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
    2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.
    3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you please let me know. A increasing number of infections are spreading using Autoplay and leaving it disabled is a good idea.
    4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.
  5. VolvoTorgeir

    VolvoTorgeir Thread Starter

    Apr 15, 2010
    I had to run Combofix twice, because it stall the first time after a reboot. I didn't do anything. Just started it again after rebooting the system manually. And 2nd time it work fine without reboot the system. So here is the log. Again there is some parts in Norwegian.

    ComboFix 10-04-15.05 - Torgeir 17.04.2010 14:49:13.2.2 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.47.1044.18.3327.2717 [GMT 2:00]
    Kjører fra: c:\documents and settings\Torgeir\Skrivebord\ComboFix.exe
    AV: Norton AntiVirus *On-access scanning disabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}
    ((((((((((((((((((((((((((((((((((((((( Andre slettinger )))))))))))))))))))))))))))))))))))))))))))))))))
    ---- Forrige skanning -------
    ((((((((((((((((((((((((((( Filer Opprettet Fra 2010-03-17 til 2010-04-17 )))))))))))))))))))))))))))))))))
    2010-04-17 12:35 . 2010-02-03 09:00 84912 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\NAVENG.SYS
    2010-04-17 12:35 . 2010-02-03 09:00 1324720 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\NAVEX15.SYS
    2010-04-17 12:35 . 2009-12-09 09:00 2747440 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\CCERASER.DLL
    2010-04-17 12:35 . 2009-09-24 08:00 259440 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\ECMSVR32.DLL
    2010-04-17 12:35 . 2009-09-05 08:00 371248 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\EECTRL.SYS
    2010-04-17 12:35 . 2009-09-05 08:00 177520 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\NAVENG32.DLL
    2010-04-17 12:35 . 2009-09-05 08:00 1647984 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\NAVEX32A.DLL
    2010-04-17 12:35 . 2009-09-05 08:00 102448 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20100416.038\ERASER.SYS
    2010-04-16 21:59 . 2009-10-28 22:37 343088 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100415.001\IDSvix86.sys
    2010-04-16 21:59 . 2009-10-28 22:37 329592 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100415.001\IDSXpx86.sys
    2010-04-16 21:59 . 2009-10-28 22:37 811896 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100415.001\Scxpx86.dll
    2010-04-16 21:59 . 2009-10-28 22:37 488312 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100415.001\IDSxpx86.dll
    2010-04-16 21:59 . 2009-10-28 22:37 466992 ----a-w- c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100415.001\IDSviA64.sys
    2010-04-15 23:48 . 2010-04-15 23:48 -------- d-----w- c:\programfiler\Trend Micro
    2010-04-15 22:48 . 2010-04-15 22:48 -------- d-----w- c:\documents and settings\Torgeir\Programdata\Malwarebytes
    2010-04-15 22:48 . 2010-03-29 22:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-04-15 22:48 . 2010-04-15 22:48 -------- d-----w- c:\programfiler\Malwarebytes' Anti-Malware
    2010-04-15 22:48 . 2010-04-15 22:48 -------- d-----w- c:\documents and settings\All Users\Programdata\Malwarebytes
    2010-04-15 22:48 . 2010-03-29 22:45 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-04-15 22:09 . 2010-04-15 22:44 -------- d-----w- c:\documents and settings\All Users\Programdata\Spybot - Search & Destroy
    2010-04-15 22:09 . 2010-04-15 22:25 -------- d-----w- c:\programfiler\Spybot - Search & Destroy
    2010-04-15 21:38 . 2010-04-15 20:05 15880 ----a-w- c:\windows\system32\lsdelete.exe
    2010-04-15 19:59 . 2010-04-15 19:59 -------- dc-h--w- c:\documents and settings\All Users\Programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
    2010-04-15 19:59 . 2010-02-04 15:53 2954656 -c--a-w- c:\documents and settings\All Users\Programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
    2010-04-15 19:59 . 2010-04-15 20:05 -------- d-----w- c:\documents and settings\All Users\Programdata\Lavasoft
    2010-04-15 19:59 . 2010-04-15 19:59 -------- d-----w- c:\programfiler\Lavasoft
    2010-04-15 19:42 . 2010-04-17 12:28 -------- d--h--r- c:\documents and settings\Torgeir\Siste
    2010-04-15 18:38 . 2010-04-15 18:38 -------- d-----w- c:\programfiler\CCleaner
    2010-04-05 21:58 . 2010-04-05 21:58 -------- d-----w- c:\programfiler\Microsoft Silverlight
    2010-04-04 10:00 . 2010-04-04 10:00 -------- d-----w- c:\programfiler\Fellesfiler\Java
    2010-04-04 09:59 . 2010-04-04 09:59 503808 ----a-w- c:\documents and settings\Torgeir\Programdata\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4a4ae0ed-n\msvcp71.dll
    2010-04-04 09:59 . 2010-04-04 09:59 499712 ----a-w- c:\documents and settings\Torgeir\Programdata\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4a4ae0ed-n\jmc.dll
    2010-04-04 09:59 . 2010-04-04 09:59 348160 ----a-w- c:\documents and settings\Torgeir\Programdata\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4a4ae0ed-n\msvcr71.dll
    2010-04-04 09:59 . 2010-04-04 09:59 61440 ----a-w- c:\documents and settings\Torgeir\Programdata\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-6c01e35f-n\decora-sse.dll
    2010-04-04 09:59 . 2010-04-04 09:59 12800 ----a-w- c:\documents and settings\Torgeir\Programdata\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-6c01e35f-n\decora-d3d.dll
    2010-04-01 17:14 . 2010-04-01 17:23 -------- d-----w- c:\documents and settings\All Users\Programdata\RegCure
    2010-04-01 17:14 . 2010-04-01 17:18 -------- d-----w- c:\programfiler\RegCure
    2010-03-28 12:08 . 2010-03-28 12:08 -------- d-----w- c:\documents and settings\Torgeir\Lokale innstillinger\Programdata\World in Conflict
    2010-03-28 12:07 . 2010-03-28 12:07 -------- d--h--r- c:\documents and settings\Torgeir\Programdata\SecuROM
    2010-03-28 12:07 . 2010-03-28 12:07 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
    2010-03-23 23:58 . 2001-08-17 20:51 23936 -c--a-w- c:\windows\system32\dllcache\sccmusbm.sys
    2010-03-23 23:58 . 2001-08-17 20:51 23936 ----a-w- c:\windows\system32\drivers\sccmusbm.sys
    2010-03-19 12:49 . 2010-03-19 12:49 -------- d-----w- c:\programfiler\MSXML 4.0
    2010-03-18 23:08 . 2010-03-18 23:08 -------- d-----w- c:\documents and settings\Torgeir\Lokale innstillinger\Programdata\Scansoft
    2010-03-18 22:35 . 2001-10-06 12:43 6784 -c--a-w- c:\windows\system32\dllcache\serscan.sys
    2010-03-18 22:35 . 2001-10-06 12:43 6784 ----a-w- c:\windows\system32\drivers\serscan.sys
    2010-03-18 22:35 . 2007-10-19 12:50 53760 ------w- c:\windows\system32\brinsstr.dll
    2010-03-18 22:27 . 2010-03-18 22:27 -------- d-----w- c:\documents and settings\Torgeir\Programdata\InstallShield
    2010-03-18 22:26 . 2010-03-18 22:26 10134 ----a-r- c:\documents and settings\Torgeir\Programdata\Microsoft\Installer\{2BC2781A-F7F6-452E-95EB-018A522F1B2C}\ARPPRODUCTICON.exe
    2010-03-18 22:26 . 2010-03-18 22:26 -------- d-----w- c:\programfiler\Nuance
    2010-03-18 22:25 . 2010-03-18 22:25 -------- d-----w- c:\documents and settings\All Users\Programdata\InstallShield
    2010-03-18 22:25 . 2010-03-18 22:25 -------- d-----w- c:\programfiler\Fellesfiler\ScanSoft Shared
    2010-03-18 22:25 . 2010-03-18 22:25 -------- d-----w- c:\documents and settings\All Users\Programdata\ScanSoft
    2010-03-18 22:25 . 2010-03-18 22:25 -------- d-----w- c:\programfiler\ScanSoft
    2010-03-18 22:20 . 2010-03-18 22:20 -------- d-----w- c:\documents and settings\All Users\Programdata\Brother
    2010-03-18 21:36 . 2010-03-18 21:36 -------- d-----r- c:\documents and settings\Torgeir\Programdata\Brother
    (((((((((((((((((((((((((((((((((((((((( Find3M Rapport ))))))))))))))))))))))))))))))))))))))))))))))))))))
    2010-04-17 12:24 . 2009-09-06 02:00 0 ----a-w- c:\windows\system32\drivers\lvuvc.hs
    2010-04-17 12:24 . 2009-09-06 01:59 0 ----a-w- c:\windows\system32\drivers\logiflt.iad
    2010-04-04 09:59 . 2009-09-11 14:17 -------- d-----w- c:\programfiler\Java
    2010-03-28 11:55 . 2009-09-06 01:05 -------- d--h--w- c:\programfiler\InstallShield Installation Information
    2010-03-28 11:53 . 2008-04-15 12:00 76462 ----a-w- c:\windows\system32\perfc014.dat
    2010-03-28 11:53 . 2008-04-15 12:00 438580 ----a-w- c:\windows\system32\perfh014.dat
    2010-03-27 20:50 . 2009-09-06 17:55 -------- d-----w- c:\documents and settings\Torgeir\Programdata\Yahoo!
    2010-03-18 23:08 . 2009-09-06 01:31 67288 ----a-w- c:\documents and settings\Torgeir\Lokale innstillinger\Programdata\GDIPFONTCACHEV1.DAT
    2010-03-18 22:35 . 2009-12-11 19:34 65 ----a-w- c:\windows\system32\BD7840W.DAT
    2010-03-18 22:35 . 2010-03-18 22:33 -------- d-----w- c:\programfiler\Brother
    2010-03-18 22:25 . 2009-09-06 01:05 -------- d-----w- c:\programfiler\Fellesfiler\InstallShield
    2010-03-10 06:17 . 2008-04-15 12:00 420352 ----a-w- c:\windows\system32\vbscript.dll
    2010-03-09 02:28 . 2009-09-11 14:17 411368 ----a-w- c:\windows\system32\deploytk.dll
    2010-02-25 06:20 . 2008-04-15 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
    2010-02-24 13:11 . 2008-04-15 12:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
    2010-02-16 19:10 . 2008-04-15 12:00 2148352 ----a-w- c:\windows\system32\ntoskrnl.exe
    2010-02-16 19:10 . 2008-04-14 08:53 2026496 ----a-w- c:\windows\system32\ntkrnlpa.exe
    2010-02-12 10:03 . 2010-03-16 16:41 293376 ------w- c:\windows\system32\browserchoice.exe
    2010-02-12 04:35 . 2008-04-15 12:00 100864 ----a-w- c:\windows\system32\6to4svc.dll
    2010-02-11 12:02 . 2008-04-15 12:00 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
    2010-02-04 15:53 . 2010-04-15 20:05 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
    (((((((((((((((((((((((((((((((( Oppstartspunkter I Registeret )))))))))))))))))))))))))))))))))))))))))))))
    *Merk* tomme oppføringer & gyldige standardoppføringer vises ikke
    "ASUS SmartDoctor"="c:\program files\ASUS\SmartDoctor\SmartDoctor.exe" [2009-03-18 1183744]
    "msnmsgr"="c:\programfiler\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]
    "Messenger (Yahoo!)"="c:\progra~1\Yahoo!\MESSEN~1\YahooMessenger.exe" [2010-03-19 5248312]
    "SoundMAXPnP"="c:\programfiler\Analog Devices\Core\smax4pnp.exe" [2008-03-16 1040384]
    "StartCCC"="c:\programfiler\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2009-03-03 61440]
    "SunJavaUpdateSched"="c:\programfiler\Fellesfiler\Java\Java Update\jusched.exe" [2010-02-18 248040]
    "LogitechQuickCamRibbon"="c:\programfiler\Logitech\Logitech WebCam Software\LWS.exe" [2009-10-14 2793304]
    "SSBkgdUpdate"="c:\programfiler\Fellesfiler\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
    "PaperPort PTD"="c:\programfiler\ScanSoft\PaperPort\pptd40nt.exe" [2007-10-11 29984]
    "IndexSearch"="c:\programfiler\ScanSoft\PaperPort\IndexSearch.exe" [2007-10-11 46368]
    "PPort11reminder"="c:\programfiler\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-08-31 328992]
    "BrMfcWnd"="c:\programfiler\Brother\Brmfcmon\BrMfcWnd.exe" [2007-11-05 741376]
    "ControlCenter3"="c:\programfiler\Brother\ControlCenter3\brctrcen.exe" [2007-10-30 77824]
    "CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-15 15360]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
    @="FSFilter Activity Monitor"
    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
    2010-03-24 18:17 952768 ----a-w- c:\programfiler\Fellesfiler\Adobe\ARM\1.0\AdobeARM.exe
    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
    2010-04-04 05:42 36272 ----a-w- c:\programfiler\Adobe\Reader 9.0\Reader\reader_sl.exe
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\Programfiler\\Windows Live\\Messenger\\msnmsgr.exe"=
    "d:\\Games\\Anno 1404\\Anno4.exe"=
    "d:\\Games\\Anno 1404\\tools\\Anno4Web.exe"=
    "d:\\Games\\World of Warcraft\\WoW-"=
    "d:\\Games\\World of Warcraft\\Launcher.exe"=
    "d:\\Games\\World of Warcraft\\WoW-"=
    "d:\\Games\\World of Warcraft\\WoW-"=
    "d:\\Games\\World of Warcraft\\WoW-"=
    "d:\\Games\\World of Warcraft\\BackgroundDownloader.exe"=
    "1119:TCP"= 1119:TCP:WOW: 1119
    "6112:TCP"= 6112:TCP:WOW: 6112
    "3724:TCP"= 3724:TCP:Blizzard Downloader: 3724
    "54925:UDP"= 54925:UDP:Brother Network Scanner
    R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [15.04.2010 22:05 64288]
    R0 mv61xx;mv61xx;c:\windows\system32\drivers\mv61xx.sys [06.09.2009 03:14 150568]
    R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\NAV\1008000.029\SymEFA.sys [28.01.2010 01:46 310320]
    R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\NAV\1008000.029\BHDrvx86.sys [28.01.2010 01:46 259632]
    R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\NAV\1008000.029\cchpx86.sys [28.01.2010 01:46 482432]
    R1 IDSxpx86;IDSxpx86;c:\documents and settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20100415.001\IDSXpx86.sys [16.04.2010 23:59 329592]
    R2 Norton AntiVirus;Norton AntiVirus;c:\programfiler\Norton AntiVirus\Engine\\ccSvcHst.exe [28.01.2010 01:46 117640]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\programfiler\Fellesfiler\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [06.09.2009 19:48 102448]
    S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\programfiler\Lavasoft\Ad-Aware\AAWService.exe [04.02.2010 17:52 1265264]
    S3 OMNUSB;Omnikey AG CardMan 2020 USB-smartkortleser;c:\windows\system32\drivers\sccmusbm.sys [24.03.2010 01:58 23936]
    Innholdet i mappen 'Scheduled Tasks' (planlagte oppgaver)
    2010-04-15 c:\windows\Tasks\Ad-Aware Update (Weekly).job
    - c:\programfiler\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-02-04 20:05]
    2010-04-17 c:\windows\Tasks\OGALogon.job
    - c:\windows\system32\OGAEXEC.exe [2009-08-03 13:07]
    2010-04-14 c:\windows\Tasks\RegCure Program Check.job
    - c:\programfiler\RegCure\RegCure.exe [2010-02-23 23:20]
    2010-04-17 c:\windows\Tasks\RegCure Startup.job
    - c:\programfiler\RegCure\RegCure.exe [2010-02-23 23:20]
    2010-04-04 c:\windows\Tasks\RegCure.job
    - c:\programfiler\RegCure\RegCure.exe [2010-02-23 23:20]
    2010-04-17 c:\windows\Tasks\User_Feed_Synchronization-{96113193-7786-4D57-948C-A1575A486E5F}.job
    - c:\windows\system32\msfeedssync.exe [2009-03-08 02:31]
    ------- Tilleggsskanning -------
    uStart Page = hxxp://www.dagbladet.no/
    IE: E&ksporter til Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
    Trusted Zone: asus.no\www
    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-04-17 14:51
    Windows 5.1.2600 Service Pack 3 NTFS
    skanner skjulte prosesser ...
    skanner skjulte autostart-oppføringer ...
    skanner skjulte filer ...
    skanning vellykket
    skjulte filer: 0
    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Norton AntiVirus]
    "ImagePath"="\"c:\programfiler\Norton AntiVirus\Engine\\ccSvcHst.exe\" /s \"Norton AntiVirus\" /m \"c:\programfiler\Norton AntiVirus\Engine\\diMaster.dll\" /prefetch:1"
    --------------------- DLL'er Lastet Av Kjørende Prosesser ---------------------
    - - - - - - - > 'winlogon.exe'(956)
    - - - - - - - > 'explorer.exe'(1344)
    Tidspunkt ferdig: 2010-04-17 14:52:46
    ComboFix-quarantined-files.txt 2010-04-17 12:52
    Pre-Run: 92 851 265 536 byte ledig
    Post-Run: 92 816 756 736 byte ledig
    - - End Of File - - 4F37A4904EC5EF83EC65EB1F5DDE9EE2
  6. NeonFx

    NeonFx Malware Specialist

    Oct 22, 2008
    I don't see anything and that's good. You probably removed it with one of the other programs you ran.

    Have you changed your World of Warcraft passwords yet? If you haven't you should.

    STEP 1

    Run OTS

    • Under the Paste Fix Here box on the right, paste in the contents of following code box

    [Unregister Dlls]
    [Files/Folders - Created Within 30 Days]
    NY ->  3 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
    NY ->  1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp
    [Files/Folders - Modified Within 30 Days]
    NY ->  lvuvc.hs -> C:\WINDOWS\System32\drivers\lvuvc.hs
    NY ->  logiflt.iad -> C:\WINDOWS\System32\drivers\logiflt.iad
    [Empty Temp Folders]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • This will create a log in C:\_OTS\MovedFiles\<date>_<time>.log where date and time are those of when the fix was run. Open it from there if it does not appear automatically on reboot. Please copy and paste or attach the contents of that file here.

    Note: You may receive some errors while running the fix. Just press Ok and the fix should continue normally.
    If it seems to get stuck, give it some time. It's probably still working.

    STEP 2

    [​IMG] Start MalwareBytes AntiMalware

    • Update it by clicking on the Update tab and then on the button.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Full Scan", then click Scan. Scan all of your harddrives.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy&Paste the entire report in your next reply.

    Extra Note:

    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediatly.

    STEP 3

    Using Internet Explorer or Firefox, visit Kaspersky Online Scanner

    1. Click Accept, when prompted to download and install the program files and database of malware definitions.

    2. To optimize scanning time and produce a more sensible report for review:
    • Close any open programs
    • Turn off the real time scanner of any existing antivirus program while performing the online scan. Click HERE to see how to disable the most common antivirus programs.
    3. Click Run at the Security prompt.

    The program will then begin downloading and installing and will also update the database.

    Please be patient as this can take quite a long time to download.
    • Once the update is complete, click on Settings.
    • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

      • [*]Spyware, adware, dialers, and other riskware
        [*]E-mail databases
    • Click on My Computer under the green Scan bar to the left to start the scan.
    • Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
    • Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
    • Click View report... at the bottom.
    • Click the Save report... button.

    • Change the Files of type dropdown box to Text file (.txt) and name the file KasReport.txt to save the file to your desktop so that you may post it in your next reply

    Let me know if you have trouble with the online scan, it can take quite a while so be patient. We can use a different scanner if you like though.
  7. VolvoTorgeir

    VolvoTorgeir Thread Starter

    Apr 15, 2010
    This seem to be going fine.
    First log is the OTS log.

    All Processes Killed
    [Files/Folders - Created Within 30 Days]
    C:\WINDOWS\SET3.tmp deleted successfully.
    C:\WINDOWS\SET4.tmp deleted successfully.
    C:\WINDOWS\SET8.tmp deleted successfully.
    C:\WINDOWS\System32\CONFIG.TMP deleted successfully.
    [Files/Folders - Modified Within 30 Days]
    C:\WINDOWS\System32\drivers\lvuvc.hs moved successfully.
    C:\WINDOWS\System32\drivers\logiflt.iad moved successfully.
    [Empty Temp Folders]

    User: All Users

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 67 bytes

    User: LocalService
    ->Temp folder emptied: 66016 bytes
    ->Temporary Internet Files folder emptied: 32902 bytes

    User: NetworkService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes

    User: Torgeir
    ->Temp folder emptied: 136646 bytes
    ->Temporary Internet Files folder emptied: 88814447 bytes
    ->Java cache emptied: 309706 bytes
    ->Flash cache emptied: 5005 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\dllcache .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 125947 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 85,00 mb


    User: All Users

    User: Default User

    User: LocalService

    User: NetworkService

    User: Torgeir
    ->Flash cache emptied: 0 bytes

    Total Flash Files Cleaned = 0,00 mb

    Restorepoints cleared and new OTS Restore Point set!
    < End of fix log >
    OTS by OldTimer - Version fix logfile created on 04182010_004758
    Files\Folders moved on Reboot...
    File\Folder C:\WINDOWS\temp\JETD1E6.tmp not found!
    File\Folder C:\WINDOWS\temp\Perflib_Perfdata_9b8.dat not found!
    Registry entries deleted on Reboot...

    -- end of OTS log.

    Malwarebytes' Anti-Malware 1.45
    Databaseversjon: 4003
    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702
    18.04.2010 01:28:06
    mbam-log-2010-04-18 (01-28-06).txt
    Skanntype: Full skann (C:\|D:\|G:\|)
    Objekter skannet: 212306
    Tid tilbakelagt: 33 minutt(er), 40 sekund(er)
    Minneprosesser infisert: 0
    Minnemoduler infisert: 0
    Registernøkler infisert: 0
    Registerverdier infisert: 0
    Registerfiler infisert: 0
    Mapper infisert: 0
    Filer infisert 0
    Minneprosesser infisert:
    (Ingen skadelige objekter funnet)
    Minnemoduler infisert:
    (Ingen skadelige objekter funnet)
    Registernøkler infisert:
    (Ingen skadelige objekter funnet)
    Registerverdier infisert:
    (Ingen skadelige objekter funnet)
    Registerfiler infisert:
    (Ingen skadelige objekter funnet)
    Mapper infisert:
    (Ingen skadelige objekter funnet)
    Filer infisert
    (Ingen skadelige objekter funnet)

    -- end of MBAM log

    KASPERSKY ONLINE SCANNER 7.0: scan report
    Sunday, April 18, 2010
    Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
    Kaspersky Online Scanner version:
    Last database update: Sunday, April 18, 2010 10:10:17
    Records in database: 3947522
    Scan settings:
    scan using the following database: extended
    Scan archives: yes
    Scan e-mail databases: yes
    Scan area - My Computer:
    Scan statistics:
    Objects scanned: 111436
    Threats found: 6
    Infected objects found: 6
    Suspicious objects found: 0
    Scan duration: 01:18:54

    File name / Threat / Threats count
    G:\WareZ\Internett Stuff\GameZ\Tomb Raider 3\CLSTR3.ACE Infected: Backdoor.Win32.SdBot.ofh 1
    G:\WareZ\Internett Stuff\GameZ\DethKarz - CLS\DK.ACE Infected: Backdoor.Win32.SdBot.nkv 1
    G:\WareZ\Screensavers\SETUPB~1.EXE Infected: Trojan-Downloader.Win32.Wren.r 1
    G:\WareZ\ErrorSafeSetup.exe Infected: Trojan.Win32.Genome.cwbo 1
    G:\WareZ\ErrorSafeSetup.exe Infected: Trojan.Win32.Genome.azmb 1
    G:\WareZ\ErrorSafeSetup.exe Infected: not-a-virus:FraudTool.Win32.BestSeller.ay 1
    Selected area has been scanned.
  8. NeonFx

    NeonFx Malware Specialist

    Oct 22, 2008
    Let's delete those items Kaspersky found:

    STEP 1

    Run OTS

    • Under the Paste Fix Here box on the right, paste in the contents of following code box

    [Kill Explorer]
    [Unregister Dlls]
    [Custom Items]
    G:\WareZ\Internett Stuff\GameZ\Tomb Raider 3\CLSTR3.ACE
    G:\WareZ\Internett Stuff\GameZ\DethKarz - CLS\DK.ACE
    [Start Explorer]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • This will create a log in C:\_OTS\MovedFiles\<date>_<time>.log where date and time are those of when the fix was run. Open it from there if it does not appear automatically on reboot. Please copy and paste or attach the contents of that file here.

    Note: You may receive some errors while running the fix. Just press Ok and the fix should continue normally.
    If it seems to get stuck, give it some time. It's probably still working.

    How's the computer running?
  9. VolvoTorgeir

    VolvoTorgeir Thread Starter

    Apr 15, 2010
    I ran OTS as you said, but why does the log say the files is moved, and not deleted?
    Yeah, the computer seem to be running fine. It even seem it is faster to boot.

    Here is the log.

    Process Explorer.EXE killed successfully!
    [Custom Items]
    ========== FILES ==========
    G:\WareZ\Internett Stuff\GameZ\Tomb Raider 3\CLSTR3.ACE moved successfully.
    G:\WareZ\Internett Stuff\GameZ\DethKarz - CLS\DK.ACE moved successfully.
    G:\WareZ\Screensavers\SETUPB~1.EXE moved successfully.
    G:\WareZ\ErrorSafeSetup.exe moved successfully.
    < End of fix log >
    OTS by OldTimer - Version fix logfile created on 04192010_012715
  10. NeonFx

    NeonFx Malware Specialist

    Oct 22, 2008
    Because we're going to delete everything when we clean up.

    Please let me know how the computer is running so that I can know if you're ready for those instructions.
  11. NeonFx

    NeonFx Malware Specialist

    Oct 22, 2008
    Sorry haha, here you go:

    Excellent. Let's cleanup.

    STEP 1

    The following will implement some cleanup procedures as well as reset System Restore points:

    Click Start > Run and copy/paste the following bolded text into the Run box and click OK:

    (If you use Vista or 7 just paste it into the text box that appears next to your start button)

    ComboFix /Uninstall

    Note: If you have trouble and it doesn't want to uninstall using the method described above, you can rename ComboFix.exe to Uninstall.exe and double click on it to uninstall it.

    STEP 2

    To clean up OldTimer's tools, along with a few others, do the following:

    • Run OTS.exe by double clicking on it
    • Click on the "CleanUp" button on the top.
    • You will be asked if you wish to reboot your system, select "Yes"

    STEP 3

    Remove any other tools or files we used by right-clicking on them or any folders they created, hold down the Shift key, and select "Delete" by clicking on it. This will delete the files without sending them to the RecycleBin.

    You can also uninstall the other programs (HijackThis or MalwareBytes if we used them) by going to Start > Control Panel > Add/Remove programs (The Control Panel is different in different versions of Windows. It will be Programs and Features in Vista and Programs > Uninstall a Program in 7)

    You might want to keep MalwareBytes AntiMalware though and that's fine :) Make sure you update it before you run the scans in the future.

    All Clean

    Congratulations!, [​IMG], your system is now clean. Now that your system is safe we would like you to keep it that way. Take the time to follow these instructions and it will greatly reduce the risk of further infections and greatly diminish the chances of you having to visit here again.

    Microsoft Windows Update
    Microsoft releases patches for Windows and Office products regularly to patch up Windows and Office products loopholes and fix any bugs found. Install the updates immediately if they are found.
    To update Windows
    Go to (Start) > (All) Programs > Windows Update
    To update Office
    Open up any Office program.
    Go to Help > Check for Updates

    Install WinPatrol
    Download it HERE
    You can find information about how WinPatrol works HERE and HERE

    Note: This program will work alongside all other security programs without conflicts. It might ask you to allow certain actions that security programs perform often, but if you tell Scotty to remember the action by checking the option, the alerts will lessen.

    Other Software Updates
    It is very important to update the other software on your computer to patch up any security issues you may have. Go HERE to scan your computer for any out of date software. In particular make sure you download the updates for Java and Adobe as these are subject to many security vulnerabilities.

    Setting up Automatic Updates
    So that it is not necessary to have to remember to update your computer regularly (something very important to securing your system), automatic updates should be configured on your computer. Microsoft has guides for XP and Vista on how to do this. See HERE for Windows 7.

    Read further information HERE, HERE, and HERE on how to prevent Malware infections and keep yourself clean.

    Please mark this thread as Solved by clicking on the button at the top of this page. Let me know if you need anything else.
  12. VolvoTorgeir

    VolvoTorgeir Thread Starter

    Apr 15, 2010
    Thank you very much for all your help.
    I couldn't done this without you.

    Kind Regards
  13. NeonFx

    NeonFx Malware Specialist

    Oct 22, 2008
    You're very welcome :)
  14. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/917178

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice