Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

google and yahoo misdirects

MalwareRemoval.com provides free support for people with infected computers. Using plain language that anyone can understand, our community of volunteer experts will walk you through each step.

Re: google and yahoo misdirects

Unread postby b2thej1 » March 14th, 2009, 1:16 am

hey dan,
now i'll be able to sleep better...i was a little scared!!! so i'll keep the system running until i hear back from you.
thanx a million for all your hard work !!!!

b2thej1 :)
b2thej1
Regular Member
 
Posts: 71
Joined: March 8th, 2009, 11:19 pm
Advertisement
Register to Remove

Re: google and yahoo misdirects

Unread postby dan12 » March 14th, 2009, 5:37 am

Open malwarebytes click on the tab quarantined find HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
and click on restore.If it lists other files with userinit.exe let me know.
let me know when done,
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire

Re: google and yahoo misdirects

Unread postby b2thej1 » March 14th, 2009, 12:31 pm

dan,
i went to malwarebytes and i restored the quarantined file...i didn't see another file with userinit.

b2thej1 :cya:
b2thej1
Regular Member
 
Posts: 71
Joined: March 8th, 2009, 11:19 pm

Re: google and yahoo misdirects

Unread postby dan12 » March 14th, 2009, 1:20 pm

Can you check which version of malwarebytes you have for me.
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire

Re: google and yahoo misdirects

Unread postby b2thej1 » March 14th, 2009, 2:03 pm

hey dan,
malwarebytes version 1.34

thx, b2thej1 :cat:
b2thej1
Regular Member
 
Posts: 71
Joined: March 8th, 2009, 11:19 pm

Re: google and yahoo misdirects

Unread postby dan12 » March 14th, 2009, 2:20 pm

Your doing really well and being so patient :)


Submit a File For Analysis
We need to have the files below Scanned by Uploading them/it to Jotti

Please visit Jotti
Copy/paste the the following file path into the window
C:\WINDOWS\system32\userinit.exe

Click Submit/Send File
Please post back, to let me know the results.

If Jotti is too busy please try Virustotal

dan
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire

Re: google and yahoo misdirects

Unread postby b2thej1 » March 14th, 2009, 2:52 pm

dan,
here's the virustotal results for the file...jotti was too busy

Română | Türkçe | Nederlands | Ελληνικά | Français | Svenska | Português | Italiano | | | Magyar | Deutsch | Česky | Polski | Español
Virustotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines. More information...
File userinit.exe received on 03.14.2009 19:36:33 (CET)
Current status: finished

Result: 0/39 (0.00%)
Compact Print results
Antivirus Version Last Update Result
a-squared 4.0.0.101 2009.03.14 -
AhnLab-V3 5.0.0.2 2009.03.13 -
AntiVir 7.9.0.114 2009.03.13 -
Authentium 5.1.0.4 2009.03.14 -
Avast 4.8.1335.0 2009.03.13 -
AVG 8.0.0.237 2009.03.14 -
BitDefender 7.2 2009.03.14 -
CAT-QuickHeal 10.00 2009.03.14 -
ClamAV 0.94.1 2009.03.14 -
Comodo 1056 2009.03.14 -
DrWeb 4.44.0.09170 2009.03.14 -
eSafe 7.0.17.0 2009.03.12 -
eTrust-Vet 31.6.6388 2009.03.09 -
F-Prot 4.4.4.56 2009.03.13 -
F-Secure 8.0.14470.0 2009.03.14 -
Fortinet 3.117.0.0 2009.03.14 -
GData 19 2009.03.14 -
Ikarus T3.1.1.45.0 2009.03.14 -
K7AntiVirus 7.10.671 2009.03.14 -
Kaspersky 7.0.0.125 2009.03.14 -
McAfee 5553 2009.03.14 -
McAfee+Artemis 5553 2009.03.14 -
McAfee-GW-Edition 6.7.6 2009.03.13 -
Microsoft 1.4405 2009.03.14 -
NOD32 3935 2009.03.13 -
Norman 6.00.06 2009.03.13 -
nProtect 2009.1.8.0 2009.03.14 -
Panda 10.0.0.10 2009.03.14 -
PCTools 4.4.2.0 2009.03.14 -
Prevx1 V2 2009.03.14 -
Rising 21.20.52.00 2009.03.14 -
Sophos 4.39.0 2009.03.14 -
Sunbelt 3.2.1858.2 2009.03.13 -
Symantec 1.4.4.12 2009.03.14 -
TheHacker 6.3.3.0.281 2009.03.13 -
TrendMicro 8.700.0.1004 2009.03.13 -
VBA32 3.12.10.1 2009.03.14 -
ViRobot 2009.3.13.1648 2009.03.13 -
VirusBuster 4.6.5.0 2009.03.14 -
Additional information
File size: 24576 bytes
MD5...: 39b1ffb03c2296323832acbae50d2aff
SHA1..: e5aedcbe25a97c89101f1f3860ff846e94d70445
SHA256: 5b5d71718108e132d10bafb0c217f469a1e3cc13f79ff8d9cbe3bf4918aff7b7
SHA512: ae81b19b8d778a368cf460016a9678676dfd7b8bfdeb236e8f87ef9a6c755323
227b340924d0713698350ce30bb0b3d09789c90897710cd48b3fe84ddca4a551
ssdeep: 384:DNkhB/JD1CzaxzOV6s9cKmdPGFQ273eLXVBYkkjuv1hkNLdbaLa4CwUJuUCS
F4WL:gJDUaxgu5YEVBxkjuv7wbaLa4PU4b7

PEiD..: -
TrID..: File type identification
Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x50e5
timedatestamp.....: 0x41107b78 (Wed Aug 04 06:00:24 2004)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x4db8 0x4e00 6.01 16aee663ed180007a0bf5bf24b845096
.data 0x6000 0x14c 0x200 1.86 cbb599f9267bf53209039d14a3574eb1
.rsrc 0x7000 0xb60 0xc00 3.27 b388ab1541ccd9727979fb26a23f72e1

( 7 imports )
> USER32.dll: CreateWindowExW, DestroyWindow, RegisterClassExW, DefWindowProcW, LoadRemoteFonts, wsprintfW, GetSystemMetrics, GetKeyboardLayout, SystemParametersInfoW, GetDesktopWindow, LoadStringW, MessageBoxW, ExitWindowsEx, CharNextW
> ADVAPI32.dll: RegOpenKeyExA, ReportEventW, RegisterEventSourceW, DeregisterEventSource, OpenProcessToken, RegCreateKeyExW, RegSetValueExW, GetUserNameW, RegQueryValueExW, RegOpenKeyExW, RegQueryInfoKeyW, RegCloseKey, RegQueryValueExA
> CRYPT32.dll: CryptProtectData
> WINSPOOL.DRV: SpoolerInit
> ntdll.dll: RtlLengthSid, RtlCopySid, _itow, RtlFreeUnicodeString, DbgPrint, wcslen, wcscpy, wcscat, wcscmp, RtlInitUnicodeString, NtOpenKey, NtClose, _wcsicmp, memmove, NtQueryInformationToken, RtlConvertSidToUnicodeString
> msvcrt.dll: _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, __setusermatherr, __getmainargs, _acmdln, exit, _cexit, _XcptFilter, _exit, _c_exit, _initterm, _adjust_fdiv
> KERNEL32.dll: GetVersionExW, LocalFree, LocalAlloc, GetEnvironmentVariableW, SetEnvironmentVariableW, lstrlenW, lstrcpyW, FreeLibrary, GetProcAddress, LoadLibraryW, CompareFileTime, CloseHandle, lstrcatW, WaitForSingleObject, DelayLoadFailureHook, GetStartupInfoA, GetModuleHandleA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, LoadLibraryA, InterlockedCompareExchange, LocalReAlloc, GetSystemTime, lstrcmpW, GetCurrentThread, SetThreadPriority, CreateThread, GetFileAttributesExW, GetSystemDirectoryW, SetCurrentDirectoryW, FormatMessageW, lstrcmpiW, GetCurrentProcess, GetUserDefaultLangID, GetCurrentProcessId, ExpandEnvironmentStringsW, SetEvent, OpenEventW, Sleep, GetLastError, SearchPathW, CreateProcessW

( 0 exports )

ThreatExpert info: http://www.threatexpert.com/report.aspx ... bae50d2aff


ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware.

VirusTotal © Hispasec Sistemas - Blog - Contact: info@virustotal.com - Terms of Service & Privacy Policy
b2thej1
Regular Member
 
Posts: 71
Joined: March 8th, 2009, 11:19 pm

Re: google and yahoo misdirects

Unread postby dan12 » March 14th, 2009, 9:55 pm

Hi, sorry for delay but has been a bit of posting behind the scenes so to speak :)
I'd like to run eset once more,from this post as I want to see if it still targets the same file.
Apart from this issue how are things with the pc, you can boot on and off as normal now, as there shouldn't be a problem. :)
Let me know if that works ok!
dan
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire

Re: google and yahoo misdirects

Unread postby b2thej1 » March 15th, 2009, 1:26 am

hiya dan,
the system logs on and off just fine...tried google just to check before i even type anything it redirects to china sex art...i tried to get the web address but couldn't...so here's the eset logfile and i'll include a fresh hijack this 'cause you
wanted on last time...should i fix anything on the hijack this log?

eset log-1 threat:
# version=4
# OnlineScanner.ocx=1.0.0.635
# OnlineScannerDLLA.dll=1, 0, 0, 79
# OnlineScannerDLLW.dll=1, 0, 0, 78
# OnlineScannerUninstaller.exe=1, 0, 0, 49
# vers_standard_module=3937 (20090314)
# vers_arch_module=1.064 (20080214)
# vers_adv_heur_module=1.066 (20070917)
# EOSSerial=de78de06e278fa42a34520ad25bc03bf
# end=finished
# remove_checked=false
# unwanted_checked=true
# utc_time=2009-03-15 04:49:22
# local_time=2009-03-14 11:49:22 (-0600, Central Standard Time)
# country="United States"
# osver=5.1.2600 NT Service Pack 2
# scanned=263008
# found=1
# scan_time=1743
C:\_OTMoveIt\MovedFiles\03132009_210350\Documents and Settings\ABC STUDENT\Local Settings\Temp\ieA.tmp Win32/Agent.AEXS trojan 0374C796F4F9C03EF4CD86BB13C5A369

hijack this log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:21:00 AM, on 3/15/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0013)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\rpcnet.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\WINDOWS\stsystra.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\Program Files\SpyNoMore\SNM.exe
C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = www.google.com/ig/dell?hl=en&client=del ... bd=6080114
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL = www.google.com/ig/dell?hl=en&client=del ... bd=6080114
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: Browser protection - {FB9FFB4B-9680-4256-8178-5ECDB2C19B23} - C:\PROGRA~1\SPYNOM~1\SNMIEG~1.DLL
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [Broadcom Wireless Manager UI] C:\WINDOWS\system32\WLTRAY.exe
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [dscactivate] "%ProgramFiles%\Dell Support Center\gs_agent\custom\dsca.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SNM] C:\Program Files\SpyNoMore\SNM.exe /startup
O4 - HKCU\..\Run: [DellAutomatedPCTuneUp] "C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe" /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AdobeUpdater] "C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe"
O4 - HKCU\..\Run: [ErrorFix] C:\Program Files\ErrorFix\ErrorFix.exe -boot
O4 - Global Startup: Digital Line Detect.lnk = C:\Program Files\Digital Line Detect\DLG.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: DellAMBrokerService - Unknown owner - C:\Program Files\DellAutomatedPCTuneUp\brkrsvc.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Remote Procedure Call (RPC) Net (Rpcnet) - Absolute Software Corp. - C:\WINDOWS\system32\rpcnet.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE

--
End of file - 6253 bytes

thanks a milli !!! b2thej1 :cya:
b2thej1
Regular Member
 
Posts: 71
Joined: March 8th, 2009, 11:19 pm

Re: google and yahoo misdirects

Unread postby dan12 » March 15th, 2009, 4:02 am

Hi, pleased we sorted that out,thanks for your patients.
Let's move on :)


Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.

Double-click ATF Cleaner.exe to open it

Under Main choose:
Windows Temp
Current User Temp
All Users Temp
Cookies
Temporary Internet Files
Prefetch
Java Cache

*The other boxes are optional*
Then click the Empty Selected button.

If you use Firefox:
Click Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

If you use Opera:
Click Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

Click Exit on the Main menu to close the program.





Download and run Combofix
This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Image
Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Image
Click on Yes, to continue scanning for malware.
When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply along with a fresh HijackThis log.

If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix
----------------------------------------------
Post back:
Combofix report.
A new HijackThis log.
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire

Re: google and yahoo misdirects

Unread postby b2thej1 » March 15th, 2009, 1:59 pm

hiya dan:did atf cleaner (is that something i should do regularly? if so how often?)...also did combo fix see attached log,
and ran a fresh hijack this see attached log as well...as usual thanx for everything you guys do !!! :)

ps. is there anything i should be checking in hijack this on the "fix checked items" part?

ComboFix 09-03-14.01 - ABC STUDENT 2009-03-15 12:35:43.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.446.149 [GMT -5:00]
Running from: c:\documents and settings\ABC STUDENT\Desktop\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated)
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\program files\deskbar
c:\program files\deskbar\Deskbar\basis.xml
c:\program files\deskbar\Deskbar\deskbar.crc
c:\program files\deskbar\Deskbar\deskbar.dll
c:\program files\deskbar\Deskbar\deskbar.inf
c:\program files\deskbar\Deskbar\grandaccess.bmp
c:\program files\deskbar\Deskbar\icons.bmp
c:\program files\deskbar\Deskbar\mbback.bmp
c:\program files\deskbar\Deskbar\mbbigopen.bmp
c:\program files\deskbar\Deskbar\mbclose.bmp
c:\program files\deskbar\Deskbar\mbfwd.bmp
c:\program files\deskbar\Deskbar\mblogo.bmp
c:\program files\deskbar\Deskbar\mbsep.bmp
c:\program files\deskbar\Deskbar\version.txt
c:\windows\syssvc.exe

----- BITS: Possible infected sites -----

hxxp://vestepau.cn
.
((((((((((((((((((((((((( Files Created from 2009-02-15 to 2009-03-15 )))))))))))))))))))))))))))))))
.

2009-03-14 11:24 . 2009-03-14 11:24 <DIR> d-------- c:\documents and settings\ABC STUDENT\Application Data\MalwareRemovalBot
2009-03-13 21:03 . 2009-03-13 21:03 <DIR> d-------- C:\_OTMoveIt
2009-03-12 20:18 . 2009-03-14 23:20 <DIR> d-------- c:\program files\EsetOnlineScanner
2009-03-11 18:51 . 2009-03-11 18:50 410,984 --a------ c:\windows\system32\deploytk.dll
2009-03-11 18:51 . 2009-03-11 18:50 73,728 --a------ c:\windows\system32\javacpl.cpl
2009-03-11 18:42 . 2009-03-11 18:48 <DIR> d-------- c:\documents and settings\ABC STUDENT\.SunDownloadManager
2009-03-07 21:46 . 2009-03-07 21:46 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-03-07 21:46 . 2009-03-07 21:46 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-03-07 21:46 . 2009-03-07 21:46 <DIR> d-------- c:\documents and settings\ABC STUDENT\Application Data\Malwarebytes
2009-03-07 21:46 . 2009-02-11 11:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-03-07 21:46 . 2009-02-11 11:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-03-07 20:19 . 2009-03-07 20:21 <DIR> d-------- c:\program files\FileASSASSIN
2009-03-07 17:03 . 2009-03-07 17:04 <DIR> d-------- c:\documents and settings\ABC STUDENT\Application Data\ErrorFix
2009-03-07 16:55 . 2004-04-08 18:51 939,368 --a------ c:\windows\system32\Flash.ocx
2009-03-07 16:55 . 2003-11-19 15:59 512,688 --a------ c:\windows\system32\XceedCry.dll
2009-03-07 16:55 . 2004-05-11 11:56 423,784 --a------ c:\windows\system32\XceedBkp.dll
2009-03-07 16:55 . 2004-02-05 22:53 389,120 --a------ c:\windows\system32\ACTSKN43.OCX
2009-03-07 16:55 . 2004-01-09 12:54 188,416 --a------ c:\windows\system32\actsplash.ocx
2009-03-07 16:55 . 2004-03-09 01:00 131,856 --a------ c:\windows\system32\MSADODC.ocx
2009-03-07 16:55 . 2000-07-15 07:00 101,888 --a------ c:\windows\system32\VB6STKIT.DLL
2009-03-07 16:55 . 2001-03-29 00:02 89,088 --a------ c:\windows\system32\ProgressBar4.ocx
2009-03-07 16:55 . 1999-01-26 21:36 11,012 --a------ c:\windows\system32\threadapi.tlb
2009-03-07 01:22 . 2009-03-07 01:33 <DIR> d-------- c:\documents and settings\All Users\Application Data\SITEguard
2009-03-07 01:21 . 2009-03-07 01:21 <DIR> d-------- c:\program files\Common Files\iS3
2009-03-07 01:21 . 2009-03-07 01:43 <DIR> d-------- c:\documents and settings\All Users\Application Data\STOPzilla!
2009-03-06 23:07 . 2009-03-06 23:07 <DIR> d-------- c:\program files\Trend Micro
2009-03-06 22:35 . 2009-03-06 22:46 <DIR> d-a------ c:\documents and settings\All Users\Application Data\TEMP
2009-03-04 19:55 . 2009-03-14 02:00 <DIR> d-------- c:\program files\SpyNoMore
2009-03-04 19:55 . 2009-03-04 19:55 1,152 --a------ c:\windows\system32\windrv.sys
2009-03-04 19:54 . 2009-03-04 20:11 <DIR> d-------- c:\documents and settings\ABC STUDENT\Application Data\GetRightToGo
2009-03-02 22:49 . 2009-03-02 22:49 <DIR> d--hs---- c:\documents and settings\All Users\Application Data\82adf2c
2009-03-02 22:49 . 2009-03-02 22:49 55 --a------ c:\windows\system32\dllcache\SICKBOY.exe
2009-03-02 22:16 . 2004-08-04 06:00 24,576 --a------ c:\windows\system32\stu2.exe
2009-02-27 18:18 . 2007-03-01 19:37 38,400 --a------ c:\windows\system32\diag2.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-03-15 17:31 --------- d-----w c:\program files\Symantec AntiVirus
2009-03-15 15:27 47,104 ----a-w c:\windows\system32\rpcnet.dll
2009-03-15 15:27 17,408 ----a-w c:\windows\system32\rpcnetp.exe
2009-03-11 23:50 --------- d-----w c:\program files\Java
2009-03-10 02:28 --------- d-----w c:\documents and settings\ABC STUDENT\Application Data\dvdcss
2009-02-21 02:15 --------- d-----w c:\program files\Common Files\Symantec Shared
2009-02-21 00:21 17,408 ----a-w c:\windows\system32\rpcnetp.dll
2009-02-12 03:17 --------- d-----w c:\documents and settings\ABC STUDENT\Application Data\vlc
2009-02-12 03:13 --------- d-----w c:\program files\VideoLAN
2009-02-11 04:25 --------- d-----w c:\program files\Microsoft Silverlight
2009-02-09 04:41 --------- d-----w c:\program files\Google
2009-01-28 03:20 --------- d-----w c:\program files\Common Files\Adobe
2009-01-27 01:16 --------- d-----w c:\program files\Microsoft ActiveSync
2009-01-27 01:13 --------- d-----w c:\program files\Microsoft.NET
2009-01-27 00:36 --------- d-----w c:\program files\Symantec
2009-01-27 00:35 --------- d-----w c:\documents and settings\All Users\Application Data\Symantec
2008-10-15 18:06 0 ----a-w c:\documents and settings\ABC STUDENT\Application Data\wklnhst.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellAutomatedPCTuneUp"="c:\program files\DellAutomatedPCTuneUp\PTAgnt.exe" [2007-10-11 465136]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
"AdobeUpdater"="c:\program files\Common Files\Adobe\Updater5\AdobeUpdater.exe" [2009-02-11 2356088]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-04-27 851968]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-11 148888]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2007-07-20 1228800]
"ATICCC"="c:\program files\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-05-10 90112]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2007-10-09 2183168]
"dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2007-10-09 16384]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2005-06-02 48752]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2005-06-23 85696]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]
"SNM"="c:\program files\SpyNoMore\SNM.exe" [2009-03-04 1067984]
"SigmatelSysTrayApp"="stsystra.exe" [2007-04-23 c:\windows\stsystra.exe]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2008-01-14 50688]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=

R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [2008-01-14 3456]
R2 datunidr;DellAutomatedPCTuneUp UniDriver;c:\windows\system32\drivers\datunidr.sys [2007-08-23 5376]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2005-06-23 124608]

--- Other Services/Drivers In Memory ---

*Deregistered* - EraserUtilDrv10910
*Deregistered* - EraserUtilRebootDrv

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{48bc42ec-9499-11dd-974c-001d09bbe81a}]
\Shell\AutoRun\command - E:\Autorun.exe /run
\Shell\Shell00\Command - E:\Autorun.exe /run
\Shell\Shell01\Command - E:\Autorun.exe /action
\Shell\Shell02\Command - E:\Autorun.exe /uninstall

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{cb9aab01-cf71-11dc-9749-001644783aa4}]
\Shell\AutoRun\command - EdussTitle1_1_0_AddUser.exe
.
Contents of the 'Scheduled Tasks' folder

2009-03-15 c:\windows\Tasks\ErrorFix Scan.job
- c:\program files\ErrorFix\ErrorFix.exe []

2009-03-15 c:\windows\Tasks\ErrorFix Scan.job
- c:\program files\ErrorFix []

2009-03-14 c:\windows\Tasks\MalwareRemovalBot Scheduled Scan.job
- c:\program files\MalwareRemovalBot\MalwareRemovalBot.exe []

2009-03-14 c:\windows\Tasks\MalwareRemovalBot Scheduled Scan.job
- c:\program files\MalwareRemovalBot []
.
- - - - ORPHANS REMOVED - - - -

Toolbar-SITEguard - (no file)
HKCU-Run-ErrorFix - c:\program files\ErrorFix\ErrorFix.exe


.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uInternet Connection Wizard,ShellNext = hxxp://www.google.com/ig/dell?hl=en&cli ... bd=6080114
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\ABC STUDENT\Application Data\Mozilla\Firefox\Profiles\uq02s0i7.default\
FF - prefs.js: browser.search.selectedEngine - Wikipedia (en)
FF - prefs.js: browser.startup.homepage - hxxp://yahoo.com/
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava11.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava12.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava13.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava14.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava32.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJPI150_06.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPOJI610.dll
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-03-15 12:36:44
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(784)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2009-03-15 12:37:49
ComboFix-quarantined-files.txt 2009-03-15 17:37:42

Pre-Run: 51,998,420,992 bytes free
Post-Run: 51,997,167,616 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:53:26 PM, on 3/15/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0013)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\rpcnet.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\WINDOWS\stsystra.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL = www.google.com/ig/dell?hl=en&client=del ... bd=6080114
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: Browser protection - {FB9FFB4B-9680-4256-8178-5ECDB2C19B23} - C:\PROGRA~1\SPYNOM~1\SNMIEG~1.DLL
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [Broadcom Wireless Manager UI] C:\WINDOWS\system32\WLTRAY.exe
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [dscactivate] "%ProgramFiles%\Dell Support Center\gs_agent\custom\dsca.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SNM] C:\Program Files\SpyNoMore\SNM.exe /startup
O4 - HKCU\..\Run: [DellAutomatedPCTuneUp] "C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe" /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AdobeUpdater] "C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe"
O4 - Global Startup: Digital Line Detect.lnk = C:\Program Files\Digital Line Detect\DLG.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: DellAMBrokerService - Unknown owner - C:\Program Files\DellAutomatedPCTuneUp\brkrsvc.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Remote Procedure Call (RPC) Net (Rpcnet) - Absolute Software Corp. - C:\WINDOWS\system32\rpcnet.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE

--
End of file - 6277 bytes

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

185

hijackthis log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:53:26 PM, on 3/15/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0013)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\rpcnet.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\WINDOWS\stsystra.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL = www.google.com/ig/dell?hl=en&client=del ... bd=6080114
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: Browser protection - {FB9FFB4B-9680-4256-8178-5ECDB2C19B23} - C:\PROGRA~1\SPYNOM~1\SNMIEG~1.DLL
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [Broadcom Wireless Manager UI] C:\WINDOWS\system32\WLTRAY.exe
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [dscactivate] "%ProgramFiles%\Dell Support Center\gs_agent\custom\dsca.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SNM] C:\Program Files\SpyNoMore\SNM.exe /startup
O4 - HKCU\..\Run: [DellAutomatedPCTuneUp] "C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe" /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AdobeUpdater] "C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe"
O4 - Global Startup: Digital Line Detect.lnk = C:\Program Files\Digital Line Detect\DLG.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: DellAMBrokerService - Unknown owner - C:\Program Files\DellAutomatedPCTuneUp\brkrsvc.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Remote Procedure Call (RPC) Net (Rpcnet) - Absolute Software Corp. - C:\WINDOWS\system32\rpcnet.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE

--
End of file - 6277 bytes
thx, b2thej1 :cya:
b2thej1
Regular Member
 
Posts: 71
Joined: March 8th, 2009, 11:19 pm

Re: google and yahoo misdirects

Unread postby dan12 » March 15th, 2009, 2:52 pm

Hi, did you remove ErrorFix? you also had malwaremovalbot on the system as there are leftovers, this would of given you a lot of fake alerts.
In the process of putting a fix together.
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire

Re: google and yahoo misdirects

Unread postby dan12 » March 15th, 2009, 3:02 pm

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

Code: Select all
File::
c:\windows\Tasks\ErrorFix Scan.job
c:\windows\Tasks\MalwareRemovalBot Scheduled Scan.job
c:\windows\system32\Flash.ocx
c:\windows\system32\XceedCry.dll
c:\windows\system32\XceedBkp.dll
c:\windows\system32\ACTSKN43.OCX
c:\windows\system32\actsplash.ocx
c:\windows\system32\MSADODC.ocx
c:\windows\system32\VB6STKIT.DLL
c:\windows\system32\ProgressBar4.ocx
c:\windows\system32\threadapi.tlb
c:\windows\system32\dllcache\SICKBOY.exe
c:\windows\system32\stu2.exe
Folder::
c:\program files\MalwareRemovalBot
c:\program files\ErrorFix
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix
c:\documents and settings\ABC STUDENT\Application Data\MalwareRemovalBot
DirLook::
c:\documents and settings\All Users\Application Data\82adf2c
Registry::
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{48bc42ec-9499-11dd-974c-001d09bbe81a}]
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{cb9aab01-cf71-11dc-9749-001644783aa4}]

    


Save this as "CFScript.txt", and as Type: All Files (*.*) in the same location as ComboFix.exe


Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

Plus a fresh HJT log
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire

Re: google and yahoo misdirects

Unread postby b2thej1 » March 15th, 2009, 3:41 pm

hi dan: here's the new combofix log :)


ComboFix 09-03-14.02 - ABC STUDENT 2009-03-15 14:26:32.2 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.446.124 [GMT -5:00]
Running from: c:\documents and settings\ABC STUDENT\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\ABC STUDENT\Desktop\CFScript.txt
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated)
* Created a new restore point

FILE ::
c:\windows\system32\ACTSKN43.OCX
c:\windows\system32\actsplash.ocx
c:\windows\system32\dllcache\SICKBOY.exe
c:\windows\system32\Flash.ocx
c:\windows\system32\MSADODC.ocx
c:\windows\system32\ProgressBar4.ocx
c:\windows\system32\stu2.exe
c:\windows\system32\threadapi.tlb
c:\windows\system32\VB6STKIT.DLL
c:\windows\system32\XceedBkp.dll
c:\windows\system32\XceedCry.dll
c:\windows\Tasks\ErrorFix Scan.job
c:\windows\Tasks\MalwareRemovalBot Scheduled Scan.job
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\ABC STUDENT\Application Data\ErrorFix
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\Logs\2009-03-07 16-03-540.log
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\Logs\2009-03-07 18-32-090.log
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\Logs\2009-03-07 18-33-250.log
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\filelist.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-0.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-1.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-10.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-100.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-101.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-102.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-103.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-104.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-105.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-106.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-107.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-108.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-109.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-11.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-110.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-111.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-112.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-113.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-114.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-115.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-116.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-117.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-118.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-119.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-12.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-120.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-121.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-122.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-123.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-124.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-125.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-126.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-127.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-128.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-129.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-13.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-130.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-131.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-132.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-133.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-134.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-135.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-136.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-137.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-138.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-139.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-14.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-140.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-141.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-142.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-143.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-144.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-145.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-146.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-147.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-148.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-149.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-15.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-150.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-151.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-152.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-153.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-154.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-155.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-156.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-157.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-158.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-159.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-16.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-160.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-161.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-162.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-163.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-164.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-165.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-166.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-167.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-168.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-169.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-17.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-170.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-171.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-172.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-173.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-174.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-175.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-176.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-177.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-178.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-179.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-18.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-180.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-181.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-182.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-183.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-184.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-185.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-186.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-187.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-188.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-19.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-2.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-20.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-21.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-22.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-23.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-24.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-25.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-26.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-27.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-28.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-29.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-3.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-30.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-31.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-32.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-33.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-34.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-35.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-36.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-37.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-38.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-39.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-4.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-40.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-41.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-42.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-43.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-44.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-45.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-46.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-47.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-48.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-49.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-5.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-50.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-51.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-52.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-53.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-54.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-55.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-56.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-57.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-58.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-59.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-6.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-60.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-61.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-62.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-63.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-64.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-65.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-66.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-67.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-68.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-69.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-7.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-70.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-71.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-72.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-73.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-74.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-75.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-76.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-77.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-78.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-79.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-8.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-80.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-81.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-82.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-83.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-84.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-85.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-86.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-87.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-88.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-89.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-9.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-90.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-91.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-92.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-93.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-94.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-95.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-96.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-97.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-98.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\QuarantineW\2009-03-07 16-04-510\regb-99.db
c:\documents and settings\ABC STUDENT\Application Data\ErrorFix\resultsw.db
c:\windows\system32\ACTSKN43.OCX
c:\windows\system32\actsplash.ocx
c:\windows\system32\dllcache\SICKBOY.exe
c:\windows\system32\Flash.ocx
c:\windows\system32\MSADODC.ocx
c:\windows\system32\ProgressBar4.ocx
c:\windows\system32\stu2.exe
c:\windows\system32\threadapi.tlb
c:\windows\system32\VB6STKIT.DLL
c:\windows\system32\XceedBkp.dll
c:\windows\system32\XceedCry.dll
c:\windows\Tasks\ErrorFix Scan.job
c:\windows\Tasks\MalwareRemovalBot Scheduled Scan.job

.
((((((((((((((((((((((((( Files Created from 2009-02-15 to 2009-03-15 )))))))))))))))))))))))))))))))
.

2009-03-13 21:03 . 2009-03-13 21:03 <DIR> d-------- C:\_OTMoveIt
2009-03-12 20:18 . 2009-03-14 23:20 <DIR> d-------- c:\program files\EsetOnlineScanner
2009-03-11 18:51 . 2009-03-11 18:50 410,984 --a------ c:\windows\system32\deploytk.dll
2009-03-11 18:51 . 2009-03-11 18:50 73,728 --a------ c:\windows\system32\javacpl.cpl
2009-03-11 18:42 . 2009-03-11 18:48 <DIR> d-------- c:\documents and settings\ABC STUDENT\.SunDownloadManager
2009-03-07 21:46 . 2009-03-07 21:46 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-03-07 21:46 . 2009-03-07 21:46 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-03-07 21:46 . 2009-03-07 21:46 <DIR> d-------- c:\documents and settings\ABC STUDENT\Application Data\Malwarebytes
2009-03-07 21:46 . 2009-02-11 11:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-03-07 21:46 . 2009-02-11 11:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-03-07 20:19 . 2009-03-07 20:21 <DIR> d-------- c:\program files\FileASSASSIN
2009-03-07 01:22 . 2009-03-07 01:33 <DIR> d-------- c:\documents and settings\All Users\Application Data\SITEguard
2009-03-07 01:21 . 2009-03-07 01:21 <DIR> d-------- c:\program files\Common Files\iS3
2009-03-07 01:21 . 2009-03-07 01:43 <DIR> d-------- c:\documents and settings\All Users\Application Data\STOPzilla!
2009-03-06 23:07 . 2009-03-06 23:07 <DIR> d-------- c:\program files\Trend Micro
2009-03-06 22:35 . 2009-03-06 22:46 <DIR> d-a------ c:\documents and settings\All Users\Application Data\TEMP
2009-03-04 19:55 . 2009-03-15 13:43 <DIR> d-------- c:\program files\SpyNoMore
2009-03-04 19:55 . 2009-03-04 19:55 1,152 --a------ c:\windows\system32\windrv.sys
2009-03-04 19:54 . 2009-03-04 20:11 <DIR> d-------- c:\documents and settings\ABC STUDENT\Application Data\GetRightToGo
2009-03-02 22:49 . 2009-03-02 22:49 <DIR> d--hs---- c:\documents and settings\All Users\Application Data\82adf2c
2009-02-27 18:18 . 2007-03-01 19:37 38,400 --a------ c:\windows\system32\diag2.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-03-15 19:21 --------- d-----w c:\program files\Symantec AntiVirus
2009-03-15 18:46 47,104 ----a-w c:\windows\system32\rpcnet.dll
2009-03-15 18:46 17,408 ----a-w c:\windows\system32\rpcnetp.exe
2009-03-11 23:50 --------- d-----w c:\program files\Java
2009-03-10 02:28 --------- d-----w c:\documents and settings\ABC STUDENT\Application Data\dvdcss
2009-02-21 02:15 --------- d-----w c:\program files\Common Files\Symantec Shared
2009-02-21 00:21 17,408 ----a-w c:\windows\system32\rpcnetp.dll
2009-02-12 03:17 --------- d-----w c:\documents and settings\ABC STUDENT\Application Data\vlc
2009-02-12 03:13 --------- d-----w c:\program files\VideoLAN
2009-02-11 04:25 --------- d-----w c:\program files\Microsoft Silverlight
2009-02-09 04:41 --------- d-----w c:\program files\Google
2009-01-28 03:20 --------- d-----w c:\program files\Common Files\Adobe
2009-01-27 01:16 --------- d-----w c:\program files\Microsoft ActiveSync
2009-01-27 01:13 --------- d-----w c:\program files\Microsoft.NET
2009-01-27 00:36 --------- d-----w c:\program files\Symantec
2009-01-27 00:35 --------- d-----w c:\documents and settings\All Users\Application Data\Symantec
2008-10-15 18:06 0 ----a-w c:\documents and settings\ABC STUDENT\Application Data\wklnhst.dat
.

(((((((((((((((((((((((((((((((((((((((((((( Look )))))))))))))))))))))))))))))))))))))))))))))))))))))))))
.

---- Directory of c:\documents and settings\All Users\Application Data\82adf2c ----

2009-03-02 22:49 1907200 --a------ c:\documents and settings\All Users\Application Data\82adf2c\VMelt.exe
2009-03-02 22:49 11545 --a------ c:\documents and settings\All Users\Application Data\82adf2c\System Data\vd952342.bd
2009-01-20 00:08 710136 --a------ c:\documents and settings\All Users\Application Data\82adf2c\mozcrt19.dll
2009-01-20 00:08 395768 --a------ c:\documents and settings\All Users\Application Data\82adf2c\sqlite3.dll
2008-01-14 16:14 1618 --a------ c:\documents and settings\All Users\Application Data\82adf2c\BackUp\Digital Line Detect.lnk


((((((((((((((((((((((((((((( SnapShot@2009-03-15_12.36.59.48 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-03-15 18:46:12 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_750.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellAutomatedPCTuneUp"="c:\program files\DellAutomatedPCTuneUp\PTAgnt.exe" [2007-10-11 465136]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
"AdobeUpdater"="c:\program files\Common Files\Adobe\Updater5\AdobeUpdater.exe" [2009-02-11 2356088]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-04-27 851968]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-11 148888]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2007-07-20 1228800]
"ATICCC"="c:\program files\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-05-10 90112]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2007-10-09 2183168]
"dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2007-10-09 16384]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2005-06-02 48752]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2005-06-23 85696]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]
"SNM"="c:\program files\SpyNoMore\SNM.exe" [2009-03-04 1067984]
"SigmatelSysTrayApp"="stsystra.exe" [2007-04-23 c:\windows\stsystra.exe]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2008-01-14 50688]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=

R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [2008-01-14 3456]
R2 datunidr;DellAutomatedPCTuneUp UniDriver;c:\windows\system32\drivers\datunidr.sys [2007-08-23 5376]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2005-06-23 124608]

--- Other Services/Drivers In Memory ---

*Deregistered* - EraserUtilDrv10910
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uInternet Connection Wizard,ShellNext = hxxp://www.google.com/ig/dell?hl=en&cli ... bd=6080114
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\ABC STUDENT\Application Data\Mozilla\Firefox\Profiles\uq02s0i7.default\
FF - prefs.js: browser.search.selectedEngine - Wikipedia (en)
FF - prefs.js: browser.startup.homepage - hxxp://yahoo.com/
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava11.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava12.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava13.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava14.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava32.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJPI150_06.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPOJI610.dll
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-03-15 14:28:07
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(780)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2009-03-15 14:29:13
ComboFix-quarantined-files.txt 2009-03-15 19:29:06
ComboFix2.txt 2009-03-15 17:37:50

Pre-Run: 51,993,772,032 bytes free
Post-Run: 51,987,087,360 bytes free

361

fresh hijack this log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:40:40 PM, on 3/15/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0013)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\rpcnet.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\WINDOWS\stsystra.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\SpyNoMore\SNM.exe
C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL = www.google.com/ig/dell?hl=en&client=del ... bd=6080114
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: Browser protection - {FB9FFB4B-9680-4256-8178-5ECDB2C19B23} - C:\PROGRA~1\SPYNOM~1\SNMIEG~1.DLL
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [Broadcom Wireless Manager UI] C:\WINDOWS\system32\WLTRAY.exe
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [dscactivate] "%ProgramFiles%\Dell Support Center\gs_agent\custom\dsca.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SNM] C:\Program Files\SpyNoMore\SNM.exe /startup
O4 - HKCU\..\Run: [DellAutomatedPCTuneUp] "C:\Program Files\DellAutomatedPCTuneUp\PTAgnt.exe" /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AdobeUpdater] "C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe"
O4 - Global Startup: Digital Line Detect.lnk = C:\Program Files\Digital Line Detect\DLG.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: DellAMBrokerService - Unknown owner - C:\Program Files\DellAutomatedPCTuneUp\brkrsvc.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Remote Procedure Call (RPC) Net (Rpcnet) - Absolute Software Corp. - C:\WINDOWS\system32\rpcnet.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE

--
End of file - 6312 bytes
b2thej1
Regular Member
 
Posts: 71
Joined: March 8th, 2009, 11:19 pm

Re: google and yahoo misdirects

Unread postby dan12 » March 15th, 2009, 4:19 pm

how are things now?
User avatar
dan12
MRU Honors Grad Emeritus
 
Posts: 6123
Joined: March 30th, 2006, 3:22 am
Location: Leicestershire
Advertisement
Register to Remove

PreviousNext

  • Similar Topics
    Replies
    Views
    Last post

Return to Infected? Virus, malware, adware, ransomware, oh my!



Who is online

Users browsing this forum: No registered users and 42 guests

Contact us:

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.

Member site: UNITE Against Malware