Mebroot trojan

View previous topic View next topic Go down

Mebroot trojan

Post by hemp22 on 6th January 2010, 7:29 pm

This popped up when i ran symantec and I have no idea how to rid myself of this #$%^&*(

Scan type: Manual Scan
Event: Risk Found!
Risk: Boot.Mebroot
File: Master Boot Record for Physical drive number 1
Location: Boot Record
Computer: ERIC-D5SHXRG1
User: CLC\eric
Action taken: Clean failed : Quarantine failed
Date found: Wednesday, January 06, 2010 2:00:31 PM

I also ran Malwarebytes per this thread
[You must be registered and logged in to see this link.]

and it did not show up ( I did quick scan then a full scan)


Any ideas would be helpful.

Thanks Guys/Girls


Last edited by hemp22 on 6th January 2010, 8:41 pm; edited 1 time in total

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 6th January 2010, 8:00 pm

Please download [You must be registered and logged in to see this link.] to your desktop.
Double click on the MBR.exe to run it. A log will be produced, named MBR.log.
Please open this log in Notepad and post it's contents in your next reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 6th January 2010, 8:04 pm

Thanks for the quick reply

here is the log:



Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, [You must be registered and logged in to see this link.]

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 6th January 2010, 9:23 pm

Please download the current version of HijackThis from [You must be registered and logged in to see this link.]

  • Double click and run the installer.
  • It will install to C:\Program Files\Trend Micro\HijackThis\hijackthis.exe
  • After installing, you should get the user agreement, press accept and Hijack This will run.
  • Select Do a system scan and save a log file. This will open a notepad file of everything Hijack This found, copy and paste it back here.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 6th January 2010, 9:26 pm

Logfile of Trend Micro HijackThis v2.0.3 (BETA)
Scan saved at 4:23:20 PM, on 1/6/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\LogMeIn\x86\LMIGuardian.exe
C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\WINDOWS\system32\STacSV.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\OEM02Mon.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\Common Files\Logitech\LCD Manager\LCDMon.exe
C:\Program Files\SigmaTel\C-Major Audio\WDM\stsystra.exe
C:\WINDOWS\system32\KADxMain.exe
C:\Program Files\Dell\MediaDirect\PCMService.exe
C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe
C:\Program Files\Common Files\Logitech\LCD Manager\Applets\LCDClock.exe
C:\Program Files\Common Files\Logitech\LCD Manager\Applets\LCDMedia.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\I8kfanGUI\I8kfanGUI.exe
C:\Program Files\LogMeIn\x86\LMIGuardian.exe
C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext =
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [NVHotkey] rundll32.exe nvHotkey.dll,Start
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [OEM02Mon.exe] C:\WINDOWS\OEM02Mon.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [IntelZeroConfig] "C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe"
O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [Launch LCDMon] "C:\Program Files\Common Files\Logitech\LCD Manager\LCDMon.exe"
O4 - HKLM\..\Run: [SigmatelSysTrayApp] %ProgramFiles%\SigmaTel\C-Major Audio\WDM\stsystra.exe
O4 - HKLM\..\Run: [KADxMain] C:\WINDOWS\system32\KADxMain.exe
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\MediaDirect\PCMService.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [LogMeIn GUI] "C:\Program Files\LogMeIn\x86\LogMeInSystray.exe"
O4 - HKLM\..\Run: [hpbdfawep] C:\Program Files\HP\Dfawep\bin\hpbdfawep.exe 1
O4 - HKCU\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [i8kfangui] C:\Program Files\I8kfanGUI\I8kfanGUI.exe /startup
O4 - Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O8 - Extra context menu item: Google Sidewiki... - [You must be registered and logged in to see this link.] Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - [You must be registered and logged in to see this link.]
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = clc.local
O17 - HKLM\Software\..\Telephony: DomainName = clc.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = clc.local
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = clc.local
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: NICCONFIGSVC - Dell Inc. - C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\WINDOWS\system32\STacSV.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Intel(R) PROSet/Wireless SSO Service (WLANKEEPER) - Intel(R) Corporation - C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe

--
End of file - 11557 bytes

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 6th January 2010, 10:03 pm

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 6th January 2010, 11:43 pm

MB still does not see it, I ran symantec after and it is still there

Malwarebytes' Anti-Malware 1.43
Database version: 3505
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

1/6/2010 6:37:25 PM
mbam-log-2010-01-06 (18-37-25).txt

Scan type: Quick Scan
Objects scanned: 159106
Time elapsed: 2 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 6th January 2010, 11:43 pm

Hello.

  • Download combofix from here
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]

    1. If you are using Firefox, make sure that your download settings are as follows:

    * Tools->Options->Main tab
    * Set to "Always ask me where to Save the files".

    2. During the download, rename Combofix to Combo-Fix as follows:





    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

  • We need to disable your local AV (Anti-virus) before running Combofix.
  • See [You must be registered and logged in to see this link.] for how to disable your AV.
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will automatically proceed with its scan.


  • The Recovery Console provides a recovery/repair mode should a problem occur during a Combofix run.



  • Allow ComboFix to download the Recovery Console.
  • Accept the End-User License Agreement.
  • The Recovery Console will be installed.
  • You will then get this next prompt that asks if you want to continue the malware scan, select yes



  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 12:13 am

ComboFix 10-01-04.01 - eric 01/06/2010 19:05:18.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3070.2214 [GMT -5:00]
Running from: c:\documents and settings\Eric.CLC\Desktop\combo-Fix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\AegisP.inf

.
((((((((((((((((((((((((( Files Created from 2009-12-07 to 2010-01-07 )))))))))))))))))))))))))))))))
.

2010-01-06 21:23 . 2010-01-06 21:23 388096 ----a-r- c:\documents and settings\Eric.CLC\Application Data\Microsoft\Installer\{0761C9A8-8F3A-4216-B4A7-B7AFBF24A24A}\HiJackThis.exe
2010-01-06 21:23 . 2010-01-06 21:23 -------- d-----w- c:\program files\TrendMicro
2010-01-06 16:12 . 2010-01-06 16:12 84912 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\NAVENG.SYS
2010-01-06 16:12 . 2010-01-06 16:12 177520 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\NAVENG32.DLL
2010-01-06 16:12 . 2010-01-06 16:12 1647984 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\NAVEX32A.DLL
2010-01-06 16:12 . 2010-01-06 16:12 1323568 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\NAVEX15.SYS
2010-01-06 16:12 . 2010-01-06 16:12 371248 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\EECTRL.SYS
2010-01-06 16:12 . 2010-01-06 16:12 2747440 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\CCERASER.DLL
2010-01-06 16:12 . 2010-01-06 16:12 259440 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\ECMSVR32.DLL
2010-01-06 16:12 . 2010-01-06 16:12 102448 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304a13.vdb\ERASER.SYS
2010-01-06 07:42 . 2009-08-07 00:23 274288 ----a-w- c:\windows\system32\mucltui.dll
2010-01-06 05:34 . 2010-01-06 05:34 -------- d-----w- c:\documents and settings\Eric.CLC\Application Data\Malwarebytes
2010-01-06 05:34 . 2009-12-30 19:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-06 05:34 . 2010-01-06 05:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-01-06 05:34 . 2010-01-06 23:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-06 05:34 . 2009-12-30 19:54 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-06 03:03 . 2010-01-06 03:03 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\PunkBuster
2010-01-06 02:25 . 2007-02-16 09:05 14464 ----a-w- c:\windows\system32\drivers\fanio.sys
2010-01-06 02:25 . 2010-01-06 02:25 -------- d-----w- c:\program files\I8kfanGUI
2010-01-06 01:23 . 2010-01-06 03:19 138576 ----a-w- c:\windows\system32\drivers\PnkBstrK.sys
2010-01-06 01:23 . 2010-01-06 01:23 22328 ----a-w- c:\documents and settings\Eric.CLC\Application Data\PnkBstrK.sys
2010-01-06 01:22 . 2010-01-06 05:00 215104 ----a-w- c:\windows\system32\PnkBstrB.exe
2010-01-06 01:22 . 2010-01-06 03:03 75064 ----a-w- c:\windows\system32\PnkBstrA.exe
2010-01-06 01:22 . 2010-01-06 01:22 -------- d-----w- c:\windows\system32\LogFiles
2010-01-06 01:05 . 2010-01-06 01:05 -------- d-----w- c:\program files\Activision
2010-01-06 01:03 . 2010-01-06 01:03 -------- d-sh--w- c:\windows\ftpcache
2010-01-06 00:48 . 2004-07-09 09:27 79360 ----a-w- c:\windows\system32\dllcache\dpwsockx.dll
2010-01-06 00:14 . 2010-01-06 01:01 -------- d-----w- c:\program files\Call of Duty Game of the Year Edition
2010-01-06 00:13 . 2010-01-06 00:13 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\Apple Computer
2010-01-05 19:24 . 2010-01-05 19:24 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
2010-01-05 19:19 . 2010-01-05 19:19 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2010-01-05 19:19 . 2010-01-06 19:24 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\Google
2010-01-05 19:18 . 2010-01-05 19:19 -------- d-----w- c:\program files\Google
2010-01-05 18:46 . 2010-01-05 18:46 -------- d-sh--w- c:\documents and settings\Eric.CLC\IECompatCache
2010-01-05 17:08 . 2010-01-05 17:08 -------- d-----w- c:\documents and settings\All Users\Application Data\HPSSUPPLY
2010-01-05 17:08 . 2010-01-05 18:20 -------- d-----w- c:\program files\HP
2010-01-05 17:08 . 2009-09-22 16:50 293888 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\HP1006S.DLL
2010-01-05 17:08 . 2008-05-08 19:52 65536 ----a-w- c:\windows\system32\HPPLVS.dll
2010-01-05 17:08 . 2009-09-22 16:50 284160 ----a-w- c:\windows\system32\HP1006LM.DLL
2010-01-05 16:29 . 2010-01-05 17:08 -------- d--h--w- c:\program files\Avago-HP
2010-01-05 16:26 . 2010-01-05 17:07 -------- d-----w- C:\hp_P1000_P1500_Full_Solution
2010-01-05 16:02 . 2001-08-17 18:48 12160 ----a-w- c:\windows\system32\drivers\mouhid.sys
2010-01-05 16:02 . 2001-08-17 18:48 12160 ----a-w- c:\windows\system32\dllcache\mouhid.sys
2010-01-05 15:58 . 2010-01-06 20:42 69232 ----a-w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-01-05 15:58 . 2008-04-13 18:47 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2010-01-05 15:58 . 2008-04-13 18:47 25856 ----a-w- c:\windows\system32\dllcache\usbprint.sys
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-----w- c:\documents and settings\administrator.CLC\Local Settings\Application Data\Symantec
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-----w- c:\documents and settings\administrator.CLC\Local Settings\Application Data\LogMeIn
2010-01-05 15:42 . 2010-01-05 15:42 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-----w- c:\program files\Microsoft Windows Small Business Server
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-sh--w- c:\documents and settings\administrator.CLC\IETldCache
2010-01-05 15:42 . 2009-11-20 11:08 38784 ----a-w- c:\documents and settings\administrator.CLC\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2010-01-05 14:18 . 2010-01-05 14:18 -------- d-----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2010-01-05 14:18 . 2010-01-05 14:18 -------- d-----w- c:\documents and settings\Eric.CLC\Application Data\Office Genuine Advantage
2010-01-05 14:15 . 2010-01-05 14:15 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\LogMeIn
2010-01-05 14:15 . 2010-01-05 14:15 -------- d-----w- c:\documents and settings\All Users\Application Data\LogMeIn
2010-01-05 14:15 . 2010-01-05 14:15 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\ICS
2010-01-05 14:15 . 2009-09-29 00:34 83288 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2010-01-05 14:15 . 2009-09-29 00:34 47416 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\LMIproc.dll
2010-01-05 14:15 . 2009-09-29 00:34 28984 ----a-w- c:\windows\system32\LMIport.dll
2010-01-05 14:15 . 2008-08-11 17:41 47640 ----a-w- c:\windows\system32\drivers\LMIRfsDriver.sys
2010-01-05 14:14 . 2009-09-29 00:34 87352 ----a-w- c:\windows\system32\LMIinit.dll
2010-01-05 14:14 . 2010-01-06 08:25 -------- d-----w- c:\program files\LogMeIn
2010-01-05 14:09 . 2010-01-05 14:11 -------- d-----w- c:\windows\system32\NtmsData
2010-01-05 13:56 . 2010-01-05 13:56 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\Microsoft Help
2010-01-05 13:51 . 2010-01-05 13:51 -------- d-----w- c:\documents and settings\Eric.CLC\XES
2010-01-05 13:49 . 2010-01-05 13:49 -------- d-----w- c:\program files\AccXES
2010-01-05 13:48 . 2010-01-05 13:49 -------- d--h--w- c:\program files\Zero G Registry
2010-01-05 13:48 . 2010-01-05 13:48 -------- d--h--w- c:\documents and settings\Eric.CLC\InstallAnywhere
2010-01-05 13:44 . 2010-01-05 13:45 48768 ----a-w- c:\windows\system32\S32EVNT1.DLL
2010-01-05 13:44 . 2010-01-05 13:45 110952 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-01-05 13:43 . 2010-01-06 23:58 -------- d-----w- c:\program files\Symantec AntiVirus
2010-01-05 13:38 . 2008-04-13 18:45 26368 ----a-w- c:\windows\system32\dllcache\usbstor.sys
2010-01-05 13:30 . 2010-01-05 13:30 -------- d-sh--w- c:\documents and settings\Eric.CLC\PrivacIE
2010-01-05 13:24 . 2010-01-05 13:24 69232 ----a-w- c:\documents and settings\Eric\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-01-05 02:33 . 2010-01-05 02:33 -------- d-----w- c:\documents and settings\Eric\Local Settings\Application Data\Symantec
2010-01-05 02:32 . 2010-01-05 13:45 -------- d-----w- c:\program files\Symantec
2010-01-05 02:32 . 2010-01-05 13:43 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2010-01-05 02:32 . 2010-01-05 13:43 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-01-05 02:20 . 2010-01-05 02:20 -------- d-sh--w- c:\documents and settings\Eric\IECompatCache
2010-01-05 02:20 . 2010-01-05 02:20 -------- d-sh--w- c:\documents and settings\Eric\PrivacIE
2010-01-05 02:16 . 2010-01-05 02:16 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
2010-01-05 02:16 . 2010-01-05 02:16 -------- d-sh--w- c:\documents and settings\Eric\IETldCache
2010-01-05 02:12 . 2009-10-29 07:45 12800 ------w- c:\windows\system32\dllcache\xpshims.dll
2010-01-05 02:12 . 2009-10-29 07:45 594432 ------w- c:\windows\system32\dllcache\msfeeds.dll
2010-01-05 02:12 . 2009-10-29 07:45 55296 ------w- c:\windows\system32\dllcache\msfeedsbs.dll
2010-01-05 02:12 . 2009-10-29 07:45 246272 ------w- c:\windows\system32\dllcache\ieproxy.dll
2010-01-05 02:12 . 2009-10-29 07:45 1985536 ------w- c:\windows\system32\dllcache\iertutil.dll
2010-01-05 02:12 . 2009-10-29 07:45 11069952 ------w- c:\windows\system32\dllcache\ieframe.dll
2010-01-05 02:12 . 2010-01-05 02:12 -------- d-----w- c:\windows\ie8updates
2010-01-05 02:12 . 2009-10-02 04:44 92160 ------w- c:\windows\system32\dllcache\iecompat.dll
2010-01-05 02:11 . 2010-01-05 02:11 -------- dc-h--w- c:\windows\ie8
2010-01-05 02:07 . 2009-11-21 15:51 471552 ------w- c:\windows\system32\dllcache\aclayers.dll
2010-01-05 02:03 . 2008-06-13 11:05 272128 ------w- c:\windows\system32\dllcache\bthport.sys
2010-01-05 02:03 . 2008-05-08 14:02 203136 ------w- c:\windows\system32\dllcache\rmcast.sys
2010-01-05 02:03 . 2008-10-24 11:21 455296 ------w- c:\windows\system32\dllcache\mrxsmb.sys
2010-01-05 02:03 . 2008-05-01 14:33 331776 ------w- c:\windows\system32\dllcache\msadce.dll
2010-01-05 02:02 . 2008-04-11 19:04 691712 ------w- c:\windows\system32\dllcache\inetcomm.dll
2010-01-05 02:00 . 2009-07-31 04:35 1172480 ------w- c:\windows\system32\dllcache\msxml3.dll
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\system32\scripting
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\l2schemas
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\system32\en
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\system32\bits
2010-01-05 01:42 . 2008-04-14 00:12 73796 ------w- c:\windows\system32\slserv.exe
2010-01-05 01:30 . 2009-08-07 00:24 44768 ----a-w- c:\windows\system32\wups2.dll
2010-01-05 01:27 . 2008-11-10 16:41 32656 ----a-w- c:\windows\system32\msonpmon.dll
2010-01-05 01:14 . 2010-01-05 01:14 -------- d-----w- c:\documents and settings\All Users\Application Data\CyberLink
2010-01-05 01:14 . 2007-10-30 17:21 198144 ----a-w- c:\windows\system32\_psisdecd.dll
2010-01-05 01:14 . 2010-01-05 01:14 -------- d-----w- c:\program files\CyberLink
2010-01-05 01:14 . 2007-03-22 01:33 503808 ----a-w- c:\windows\system32\MSVCP71.DLL
2010-01-05 01:14 . 2007-03-22 01:33 348160 ----a-w- c:\windows\system32\MSVCR71.DLL
2010-01-05 01:13 . 2008-04-14 00:12 221184 ----a-w- c:\windows\system32\wmpns.dll
2010-01-05 01:13 . 2010-01-05 01:13 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Logitech
2010-01-05 01:11 . 2010-01-05 01:11 -------- dc----w- c:\windows\system32\DRVSTORE
2010-01-05 01:09 . 2010-01-05 01:09 21393 ----a-w- c:\windows\system32\drivers\AegisP.sys
2010-01-05 01:09 . 2010-01-05 01:09 21393 ----a-w- c:\windows\AegisP.sys
2010-01-05 01:07 . 2010-01-05 01:07 -------- d-----w- c:\program files\Common Files\Java
2010-01-05 01:06 . 2010-01-05 01:07 -------- d-----w- c:\program files\Common Files\Adobe
2010-01-05 01:06 . 2009-11-20 11:08 38784 ----a-w- c:\documents and settings\Eric\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2010-01-05 01:06 . 2010-01-05 01:06 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-01-05 01:06 . 2008-04-13 18:40 10240 ------w- c:\windows\system32\drivers\sffp_mmc.sys
2010-01-05 01:05 . 2010-01-05 01:05 -------- d-----w- c:\documents and settings\Eric\Local Settings\Application Data\Adobe
2010-01-05 01:05 . 2010-01-05 01:05 86016 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\arh.exe
2010-01-05 01:05 . 2006-12-14 13:45 981760 ------w- c:\windows\system32\dllcache\mfc42u.dll
2010-01-05 01:05 . 2010-01-05 01:05 -------- d-----w- c:\windows\system32\Adobe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-06 08:10 . 2010-01-05 01:22 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-01-06 08:06 . 2010-01-05 01:27 -------- d-----w- c:\program files\Microsoft Works
2010-01-06 01:41 . 2010-01-05 01:10 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-01-06 00:38 . 2010-01-05 01:09 -------- d-----w- c:\program files\Common Files\InstallShield
2010-01-05 13:45 . 2010-01-05 13:44 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-01-05 13:45 . 2010-01-05 13:44 8014 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-01-05 01:58 . 2010-01-05 01:03 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2010-01-05 01:52 . 2004-08-11 23:14 87939 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-01-05 01:27 . 2010-01-05 01:27 -------- d-----w- c:\program files\MSBuild
2010-01-05 01:26 . 2010-01-05 01:26 -------- d-----w- c:\program files\Microsoft.NET
2010-01-05 01:14 . 2010-01-05 01:14 -------- d-----w- c:\program files\MSECache
2010-01-05 01:14 . 2010-01-05 01:10 -------- d-----w- c:\program files\Dell
2010-01-05 01:12 . 2010-01-05 01:12 -------- d-----w- c:\program files\Sigmatel
2010-01-05 01:09 . 2010-01-05 01:09 356352 ----a-w- c:\windows\system32\AegisI5Installer.exe
2010-01-05 01:09 . 2010-01-05 01:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Intel
2010-01-05 01:09 . 2010-01-05 01:09 -------- d-----w- c:\program files\Intel
2010-01-05 01:09 . 2010-01-05 01:09 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-01-05 01:09 . 2010-01-05 01:07 -------- d-----w- c:\program files\Java
2010-01-05 01:08 . 2010-01-05 01:08 152576 ----a-w- c:\documents and settings\Eric\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2010-01-05 01:08 . 2010-01-05 01:08 79488 ----a-w- c:\documents and settings\Eric\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-01-05 01:04 . 2010-01-05 01:03 1956528 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\install_flash_player_ax.exe
2010-01-05 01:00 . 2010-01-05 01:00 -------- d-----w- c:\program files\MSXML 6.0
2010-01-05 00:59 . 2010-01-05 00:59 -------- d-----w- c:\program files\MSXML 4.0
2010-01-05 00:50 . 2010-01-05 00:50 -------- d-----w- c:\program files\Synaptics
2009-12-31 07:39 . 2009-12-31 07:39 8171 ----a-w- c:\windows\system32\drivers\1028_Dell_XPS_M1730.mrk
2009-11-21 15:51 . 2004-08-11 23:00 471552 ----a-w- c:\windows\AppPatch\aclayers.dll
2009-11-20 11:08 . 2010-01-05 14:17 38784 ----a-w- c:\documents and settings\LogMeInRemoteUser\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2009-11-20 11:08 . 2010-01-05 13:31 38784 ----a-w- c:\documents and settings\cadnet\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2009-11-20 11:08 . 2010-01-05 13:29 38784 ----a-w- c:\documents and settings\Eric.CLC\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2009-10-29 07:45 . 2004-08-11 23:00 916480 ----a-w- c:\windows\system32\wininet.dll
2009-10-21 05:38 . 2004-08-11 23:00 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38 . 2004-08-11 23:00 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-20 16:20 . 2004-08-04 05:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2009-10-13 10:30 . 2004-08-11 23:00 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38 . 2004-08-11 23:00 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38 . 2004-08-11 23:00 79872 ----a-w- c:\windows\system32\raschap.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2010-01-05 39408]
"i8kfangui"="c:\program files\I8kfanGUI\I8kfanGUI.exe" [2007-02-16 856064]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-03-27 1024000]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-11-06 8491008]
"nwiz"="nwiz.exe" [2007-11-06 1626112]
"NVHotkey"="nvHotkey.dll" [2007-11-06 81920]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-11-06 81920]
"OEM02Mon.exe"="c:\windows\OEM02Mon.exe" [2007-08-28 36864]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2010-01-05 149280]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2007-07-25 823296]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2007-07-25 974848]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2008-02-22 1245184]
"Launch LCDMon"="c:\program files\Common Files\Logitech\LCD Manager\LCDMon.exe" [2007-07-18 775952]
"SigmatelSysTrayApp"="c:\program files\SigmaTel\C-Major Audio\WDM\stsystra.exe" [2008-03-28 405504]
"KADxMain"="c:\windows\system32\KADxMain.exe" [2006-11-02 282624]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-11-01 189736]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-09-04 935288]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-05-29 52840]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2007-10-08 125368]
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe" [2008-08-11 63048]
"hpbdfawep"="c:\program files\HP\Dfawep\bin\hpbdfawep.exe" [2007-04-25 954368]

c:\documents and settings\Eric.CLC\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoWelcomeScreen"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2009-09-29 00:34 87352 ----a-w- c:\windows\system32\LMIinit.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"FirewallOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Dell\\MediaDirect\\PCMService.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\PnkBstrA.exe"=
"c:\\WINDOWS\\system32\\PnkBstrB.exe"=
"c:\\Program Files\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R1 fanio;FanIO driver;c:\windows\system32\drivers\fanio.sys [1/5/2010 9:25 PM 14464]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [8/11/2008 12:41 PM 12856]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [1/5/2010 9:15 AM 47640]
R2 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [10/7/2007 8:48 PM 116664]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\eengine\EraserUtilRebootDrv.sys [1/4/2010 9:40 PM 102448]
R3 physX32;physX32;c:\windows\system32\drivers\physX32.sys [12/31/2009 2:41 AM 117888]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [1/5/2010 2:19 PM 135664]
S4 LMIRfsClientNP;LMIRfsClientNP; [x]

--- Other Services/Drivers In Memory ---

*Deregistered* - MBAMSwissArmy
.
Contents of the 'Scheduled Tasks' folder

2010-01-05 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2010-01-06 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-05 19:19]

2010-01-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-05 19:19]
.
.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = [You must be registered and logged in to see this link.]
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2010-01-06 19:07
Windows 5.1.2600 Service Pack 3 NTFS

scanning hȋdden processes ...

scanning hȋdden autostart entries ...

scanning hȋdden files ...

scan completed successfully
hȋdden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(916)
c:\windows\system32\LMIinit.dll
c:\windows\system32\LMIRfsClientNP.dll
.
Completion time: 2010-01-06 19:09:05
ComboFix-quarantined-files.txt 2010-01-07 00:09

Pre-Run: 163,065,131,008 bytes free
Post-Run: 163,244,793,856 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - BBE5D2847B92A3E44871E24BB16CB1A8

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 7th January 2010, 12:16 am

Hello.
Do you still receive the warning from Symantec?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 12:17 am

Yes it is still there Sad tearing

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 7th January 2010, 12:19 am

Please close all anti virus, anti malware and any other open programs/windows so they do not interfere with the running of RootRepeal.

  • Please download RootRepeal.zip from [You must be registered and logged in to see this link.].
  • Extract the program file to your Desktop.
  • Run the program RootRepeal.exe and go to the Report tab and click on the Scan button.


  • Select ALL of the checkboxes and then click OK and it will start scanning your system.

  • If you have multiple drives you only need to check the C: drive or the one Windows is installed on.
  • When done, click on Save Report
  • Save it to the Desktop.
  • Please copy/paste the contents of the report in your next reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 12:28 am

ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/01/06 19:20
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: catchme.sys
Image Path: C:\DOCUME~1\Eric.CLC\LOCALS~1\Temp\catchme.sys
Address: 0xBA468000 Size: 31744 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB682D000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA652000 Size: 8192 File Visible: No Signed: -
Status: -

Name: PROCEXP113.SYS
Image Path: C:\WINDOWS\system32\Drivers\PROCEXP113.SYS
Address: 0xBA5EC000 Size: 7872 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB4475000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: c:\documents and settings\eric.clc\local settings\temp\~df63a2.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\eric.clc\local settings\temp\~df7236.tmp
Status: Allocation size mismatch (API: 196608, Raw: 16384)

Path: C:\Program Files\Common Files\Symantec Shared\VirusDefs\20100104.004\EraserUtilRebootDrv.sys
Status: Locked to the Windows API!

SSDT
-------------------
#: 012 Function Name: NtAlertResumeThread
Status: Hooked by "" at address 0x8ab14108

#: 013 Function Name: NtAlertThread
Status: Hooked by "" at address 0x8aaf6478

#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "" at address 0x8ac057d0

#: 031 Function Name: NtConnectPort
Status: Hooked by "" at address 0x8ab0d320

#: 043 Function Name: NtCreateMutant
Status: Hooked by "" at address 0x8ac270a8

#: 053 Function Name: NtCreateThread
Status: Hooked by "" at address 0x8ac14fc0

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xb6cf5350

#: 083 Function Name: NtFreeVirtualMemory
Status: Hooked by "" at address 0x85ee83e0

#: 089 Function Name: NtImpersonateAnonymousToken
Status: Hooked by "" at address 0x8adfa0a8

#: 091 Function Name: NtImpersonateThread
Status: Hooked by "" at address 0x87f9f6e8

#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "" at address 0x8ab0fe10

#: 114 Function Name: NtOpenEvent
Status: Hooked by "" at address 0x8ab97c40

#: 123 Function Name: NtOpenProcessToken
Status: Hooked by "" at address 0x8aaee398

#: 129 Function Name: NtOpenThreadToken
Status: Hooked by "" at address 0x8aca6c58

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "" at address 0x8abc1f58

#: 206 Function Name: NtResumeThread
Status: Hooked by "" at address 0x8aaeb258

#: 213 Function Name: NtSetContextThread
Status: Hooked by "" at address 0x8ac241c0

#: 228 Function Name: NtSetInformationProcess
Status: Hooked by "" at address 0x8ab8a380

#: 229 Function Name: NtSetInformationThread
Status: Hooked by "" at address 0x8aae05e0

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xb6cf5580

#: 253 Function Name: NtSuspendProcess
Status: Hooked by "" at address 0x8ac46db0

#: 254 Function Name: NtSuspendThread
Status: Hooked by "" at address 0x8aaf65f0

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "" at address 0x8aaed9d0

#: 258 Function Name: NtTerminateThread
Status: Hooked by "" at address 0x8aaec260

#: 267 Function Name: NtUnmapViewOfSection
Status: Hooked by "" at address 0x8ab299f0

#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "" at address 0x8ac14828

==EOF==

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 7th January 2010, 12:37 am

I'm gonna talk to a colleague, I'll be back with you soon.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 12:39 am

OK Thanks

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 11:31 am

I ran a full scan of malwarebytes and it found one item but it was not Mebroot (symanecs stiil shows it)
Here is the log


Malwarebytes' Anti-Malware 1.43
Database version: 3505
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

1/7/2010 6:26:18 AM
mbam-log-2010-01-07 (06-26-18).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 363009
Time elapsed: 2 hour(s), 4 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{46DE8921-1D39-44D2-A9E9-64119261F211}\RP25\A0006397.sys (Malware.Trace) -> Quarantined and deleted successfully.

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 7th January 2010, 1:57 pm

Hello.
I don't think there is an actual MBR rootkit here. To fix the MBR completely, we need to enter the Recovery Console.

When booting, you now have an extra option menu, boot Windows normally from the HDD, or enter the Recovery Console. Choose to enter the console.

One you have entered the RC, type in the administrator password, then type: fixmbr, then select y.

See here:
[You must be registered and logged in to see this link.]


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 2:49 pm

Ok I'll give it a try thanks

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 2:58 pm

Its still there Sad tearing

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 7th January 2010, 4:33 pm

Hmm, lets try this.

  1. Close any open browsers.
  2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  3. Open notepad and copy/paste the text in the quotebox below into it:

    MBR::
  4. Save this as CFScript.txt, in the same location as ComboFix.exe



  5. Referring to the picture above, drag CFScript into ComboFix.exe
  6. When finished, it shall produce a log for you at C:\ComboFix.txt
  7. Please post the contents of the log in your next reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 7:42 pm

ComboFix 10-01-04.01 - eric 01/07/2010 14:29:25.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3070.2200 [GMT -5:00]
Running from: c:\documents and settings\Eric.CLC\Desktop\combo-Fix.exe
Command switches used :: c:\documents and settings\Eric.CLC\Desktop\CFScript.txt
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.

((((((((((((((((((((((((( Files Created from 2009-12-07 to 2010-01-07 )))))))))))))))))))))))))))))))
.

2010-01-07 13:23 . 2010-01-06 09:00 259440 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\ECMSVR32.DLL
2010-01-07 13:23 . 2009-12-08 00:01 2747440 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\CCERASER.DLL
2010-01-07 13:23 . 2009-11-10 22:48 1647984 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\NAVEX32A.DLL
2010-01-07 13:23 . 2009-11-10 22:48 84912 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\NAVENG.SYS
2010-01-07 13:23 . 2009-11-10 22:48 177520 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\NAVENG32.DLL
2010-01-07 13:23 . 2009-11-10 22:48 1323568 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\NAVEX15.SYS
2010-01-07 13:23 . 2009-08-18 00:15 102448 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\ERASER.SYS
2010-01-07 13:23 . 2009-08-18 00:15 371248 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd304c02.vdb\EECTRL.SYS
2010-01-06 21:23 . 2010-01-06 21:23 388096 ----a-r- c:\documents and settings\Eric.CLC\Application Data\Microsoft\Installer\{0761C9A8-8F3A-4216-B4A7-B7AFBF24A24A}\HiJackThis.exe
2010-01-06 21:23 . 2010-01-06 21:23 -------- d-----w- c:\program files\TrendMicro
2010-01-06 07:42 . 2009-08-07 00:23 274288 ----a-w- c:\windows\system32\mucltui.dll
2010-01-06 05:34 . 2010-01-06 05:34 -------- d-----w- c:\documents and settings\Eric.CLC\Application Data\Malwarebytes
2010-01-06 05:34 . 2009-12-30 19:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-06 05:34 . 2010-01-06 05:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-01-06 05:34 . 2010-01-06 23:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-06 05:34 . 2009-12-30 19:54 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-06 03:03 . 2010-01-06 03:03 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\PunkBuster
2010-01-06 02:25 . 2007-02-16 09:05 14464 ----a-w- c:\windows\system32\drivers\fanio.sys
2010-01-06 02:25 . 2010-01-06 02:25 -------- d-----w- c:\program files\I8kfanGUI
2010-01-06 01:23 . 2010-01-07 03:01 138576 ----a-w- c:\windows\system32\drivers\PnkBstrK.sys
2010-01-06 01:23 . 2010-01-06 01:23 22328 ----a-w- c:\documents and settings\Eric.CLC\Application Data\PnkBstrK.sys
2010-01-06 01:22 . 2010-01-07 04:28 215104 ----a-w- c:\windows\system32\PnkBstrB.exe
2010-01-06 01:22 . 2010-01-06 03:03 75064 ----a-w- c:\windows\system32\PnkBstrA.exe
2010-01-06 01:22 . 2010-01-06 01:22 -------- d-----w- c:\windows\system32\LogFiles
2010-01-06 01:05 . 2010-01-06 01:05 -------- d-----w- c:\program files\Activision
2010-01-06 01:03 . 2010-01-06 01:03 -------- d-sh--w- c:\windows\ftpcache
2010-01-06 00:48 . 2004-07-09 09:27 79360 ----a-w- c:\windows\system32\dllcache\dpwsockx.dll
2010-01-06 00:14 . 2010-01-06 01:01 -------- d-----w- c:\program files\Call of Duty Game of the Year Edition
2010-01-06 00:13 . 2010-01-06 00:13 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\Apple Computer
2010-01-05 19:24 . 2010-01-05 19:24 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
2010-01-05 19:19 . 2010-01-05 19:19 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2010-01-05 19:19 . 2010-01-06 19:24 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\Google
2010-01-05 19:18 . 2010-01-05 19:19 -------- d-----w- c:\program files\Google
2010-01-05 18:46 . 2010-01-05 18:46 -------- d-sh--w- c:\documents and settings\Eric.CLC\IECompatCache
2010-01-05 17:08 . 2010-01-05 17:08 -------- d-----w- c:\documents and settings\All Users\Application Data\HPSSUPPLY
2010-01-05 17:08 . 2010-01-05 18:20 -------- d-----w- c:\program files\HP
2010-01-05 17:08 . 2009-09-22 16:50 293888 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\HP1006S.DLL
2010-01-05 17:08 . 2008-05-08 19:52 65536 ----a-w- c:\windows\system32\HPPLVS.dll
2010-01-05 17:08 . 2009-09-22 16:50 284160 ----a-w- c:\windows\system32\HP1006LM.DLL
2010-01-05 16:29 . 2010-01-05 17:08 -------- d--h--w- c:\program files\Avago-HP
2010-01-05 16:26 . 2010-01-05 17:07 -------- d-----w- C:\hp_P1000_P1500_Full_Solution
2010-01-05 16:02 . 2001-08-17 18:48 12160 ----a-w- c:\windows\system32\drivers\mouhid.sys
2010-01-05 16:02 . 2001-08-17 18:48 12160 ----a-w- c:\windows\system32\dllcache\mouhid.sys
2010-01-05 15:58 . 2010-01-06 20:42 69232 ----a-w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-01-05 15:58 . 2008-04-13 18:47 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2010-01-05 15:58 . 2008-04-13 18:47 25856 ----a-w- c:\windows\system32\dllcache\usbprint.sys
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-----w- c:\documents and settings\administrator.CLC\Local Settings\Application Data\Symantec
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-----w- c:\documents and settings\administrator.CLC\Local Settings\Application Data\LogMeIn
2010-01-05 15:42 . 2010-01-05 15:42 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-----w- c:\program files\Microsoft Windows Small Business Server
2010-01-05 15:42 . 2010-01-05 15:42 -------- d-sh--w- c:\documents and settings\administrator.CLC\IETldCache
2010-01-05 15:42 . 2009-11-20 11:08 38784 ----a-w- c:\documents and settings\administrator.CLC\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2010-01-05 14:18 . 2010-01-05 14:18 -------- d-----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2010-01-05 14:18 . 2010-01-05 14:18 -------- d-----w- c:\documents and settings\Eric.CLC\Application Data\Office Genuine Advantage
2010-01-05 14:15 . 2010-01-05 14:15 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\LogMeIn
2010-01-05 14:15 . 2010-01-05 14:15 -------- d-----w- c:\documents and settings\All Users\Application Data\LogMeIn
2010-01-05 14:15 . 2010-01-05 14:15 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\ICS
2010-01-05 14:15 . 2009-09-29 00:34 83288 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2010-01-05 14:15 . 2009-09-29 00:34 47416 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\LMIproc.dll
2010-01-05 14:15 . 2009-09-29 00:34 28984 ----a-w- c:\windows\system32\LMIport.dll
2010-01-05 14:15 . 2008-08-11 17:41 47640 ----a-w- c:\windows\system32\drivers\LMIRfsDriver.sys
2010-01-05 14:14 . 2009-09-29 00:34 87352 ----a-w- c:\windows\system32\LMIinit.dll
2010-01-05 14:14 . 2010-01-07 11:29 -------- d-----w- c:\program files\LogMeIn
2010-01-05 14:09 . 2010-01-05 14:11 -------- d-----w- c:\windows\system32\NtmsData
2010-01-05 13:56 . 2010-01-05 13:56 -------- d-----w- c:\documents and settings\Eric.CLC\Local Settings\Application Data\Microsoft Help
2010-01-05 13:51 . 2010-01-05 13:51 -------- d-----w- c:\documents and settings\Eric.CLC\XES
2010-01-05 13:49 . 2010-01-05 13:49 -------- d-----w- c:\program files\AccXES
2010-01-05 13:48 . 2010-01-05 13:49 -------- d--h--w- c:\program files\Zero G Registry
2010-01-05 13:48 . 2010-01-05 13:48 -------- d--h--w- c:\documents and settings\Eric.CLC\InstallAnywhere
2010-01-05 13:44 . 2010-01-05 13:45 48768 ----a-w- c:\windows\system32\S32EVNT1.DLL
2010-01-05 13:44 . 2010-01-05 13:45 110952 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-01-05 13:43 . 2010-01-07 19:34 -------- d-----w- c:\program files\Symantec AntiVirus
2010-01-05 13:38 . 2008-04-13 18:45 26368 ----a-w- c:\windows\system32\dllcache\usbstor.sys
2010-01-05 13:30 . 2010-01-05 13:30 -------- d-sh--w- c:\documents and settings\Eric.CLC\PrivacIE
2010-01-05 13:24 . 2010-01-05 13:24 69232 ----a-w- c:\documents and settings\Eric\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-01-05 02:33 . 2010-01-05 02:33 -------- d-----w- c:\documents and settings\Eric\Local Settings\Application Data\Symantec
2010-01-05 02:32 . 2010-01-05 13:45 -------- d-----w- c:\program files\Symantec
2010-01-05 02:32 . 2010-01-05 13:43 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2010-01-05 02:32 . 2010-01-05 13:43 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-01-05 02:20 . 2010-01-05 02:20 -------- d-sh--w- c:\documents and settings\Eric\IECompatCache
2010-01-05 02:20 . 2010-01-05 02:20 -------- d-sh--w- c:\documents and settings\Eric\PrivacIE
2010-01-05 02:16 . 2010-01-05 02:16 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
2010-01-05 02:16 . 2010-01-05 02:16 -------- d-sh--w- c:\documents and settings\Eric\IETldCache
2010-01-05 02:12 . 2009-10-29 07:45 12800 ------w- c:\windows\system32\dllcache\xpshims.dll
2010-01-05 02:12 . 2009-10-29 07:45 594432 ------w- c:\windows\system32\dllcache\msfeeds.dll
2010-01-05 02:12 . 2009-10-29 07:45 55296 ------w- c:\windows\system32\dllcache\msfeedsbs.dll
2010-01-05 02:12 . 2009-10-29 07:45 246272 ------w- c:\windows\system32\dllcache\ieproxy.dll
2010-01-05 02:12 . 2009-10-29 07:45 1985536 ------w- c:\windows\system32\dllcache\iertutil.dll
2010-01-05 02:12 . 2009-10-29 07:45 11069952 ------w- c:\windows\system32\dllcache\ieframe.dll
2010-01-05 02:12 . 2010-01-05 02:12 -------- d-----w- c:\windows\ie8updates
2010-01-05 02:12 . 2009-10-02 04:44 92160 ------w- c:\windows\system32\dllcache\iecompat.dll
2010-01-05 02:11 . 2010-01-05 02:11 -------- dc-h--w- c:\windows\ie8
2010-01-05 02:07 . 2009-11-21 15:51 471552 ------w- c:\windows\system32\dllcache\aclayers.dll
2010-01-05 02:03 . 2008-06-13 11:05 272128 ------w- c:\windows\system32\dllcache\bthport.sys
2010-01-05 02:03 . 2008-05-08 14:02 203136 ------w- c:\windows\system32\dllcache\rmcast.sys
2010-01-05 02:03 . 2008-10-24 11:21 455296 ------w- c:\windows\system32\dllcache\mrxsmb.sys
2010-01-05 02:03 . 2008-05-01 14:33 331776 ------w- c:\windows\system32\dllcache\msadce.dll
2010-01-05 02:02 . 2008-04-11 19:04 691712 ------w- c:\windows\system32\dllcache\inetcomm.dll
2010-01-05 02:00 . 2009-07-31 04:35 1172480 ------w- c:\windows\system32\dllcache\msxml3.dll
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\system32\scripting
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\l2schemas
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\system32\en
2010-01-05 01:50 . 2010-01-05 01:50 -------- d-----w- c:\windows\system32\bits
2010-01-05 01:42 . 2008-04-14 00:12 73796 ------w- c:\windows\system32\slserv.exe
2010-01-05 01:30 . 2009-08-07 00:24 44768 ----a-w- c:\windows\system32\wups2.dll
2010-01-05 01:27 . 2008-11-10 16:41 32656 ----a-w- c:\windows\system32\msonpmon.dll
2010-01-05 01:14 . 2010-01-05 01:14 -------- d-----w- c:\documents and settings\All Users\Application Data\CyberLink
2010-01-05 01:14 . 2007-10-30 17:21 198144 ----a-w- c:\windows\system32\_psisdecd.dll
2010-01-05 01:14 . 2010-01-05 01:14 -------- d-----w- c:\program files\CyberLink
2010-01-05 01:14 . 2007-03-22 01:33 503808 ----a-w- c:\windows\system32\MSVCP71.DLL
2010-01-05 01:14 . 2007-03-22 01:33 348160 ----a-w- c:\windows\system32\MSVCR71.DLL
2010-01-05 01:13 . 2008-04-14 00:12 221184 ----a-w- c:\windows\system32\wmpns.dll
2010-01-05 01:13 . 2010-01-05 01:13 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Logitech
2010-01-05 01:11 . 2010-01-05 01:11 -------- dc----w- c:\windows\system32\DRVSTORE
2010-01-05 01:09 . 2010-01-05 01:09 21393 ----a-w- c:\windows\system32\drivers\AegisP.sys
2010-01-05 01:09 . 2010-01-05 01:09 21393 ----a-w- c:\windows\AegisP.sys
2010-01-05 01:07 . 2010-01-05 01:07 -------- d-----w- c:\program files\Common Files\Java
2010-01-05 01:06 . 2010-01-05 01:07 -------- d-----w- c:\program files\Common Files\Adobe
2010-01-05 01:06 . 2009-11-20 11:08 38784 ----a-w- c:\documents and settings\Eric\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2010-01-05 01:06 . 2010-01-05 01:06 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-01-05 01:06 . 2008-04-13 18:40 10240 ------w- c:\windows\system32\drivers\sffp_mmc.sys
2010-01-05 01:05 . 2010-01-05 01:05 -------- d-----w- c:\documents and settings\Eric\Local Settings\Application Data\Adobe
2010-01-05 01:05 . 2010-01-05 01:05 86016 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\arh.exe
2010-01-05 01:05 . 2006-12-14 13:45 981760 ------w- c:\windows\system32\dllcache\mfc42u.dll
2010-01-05 01:05 . 2010-01-05 01:05 -------- d-----w- c:\windows\system32\Adobe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-06 08:10 . 2010-01-05 01:22 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-01-06 08:06 . 2010-01-05 01:27 -------- d-----w- c:\program files\Microsoft Works
2010-01-06 01:41 . 2010-01-05 01:10 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-01-06 00:38 . 2010-01-05 01:09 -------- d-----w- c:\program files\Common Files\InstallShield
2010-01-05 13:45 . 2010-01-05 13:44 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-01-05 13:45 . 2010-01-05 13:44 8014 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-01-05 01:58 . 2010-01-05 01:03 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2010-01-05 01:52 . 2004-08-11 23:14 87939 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-01-05 01:27 . 2010-01-05 01:27 -------- d-----w- c:\program files\MSBuild
2010-01-05 01:26 . 2010-01-05 01:26 -------- d-----w- c:\program files\Microsoft.NET
2010-01-05 01:14 . 2010-01-05 01:14 -------- d-----w- c:\program files\MSECache
2010-01-05 01:14 . 2010-01-05 01:10 -------- d-----w- c:\program files\Dell
2010-01-05 01:12 . 2010-01-05 01:12 -------- d-----w- c:\program files\Sigmatel
2010-01-05 01:09 . 2010-01-05 01:09 356352 ----a-w- c:\windows\system32\AegisI5Installer.exe
2010-01-05 01:09 . 2010-01-05 01:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Intel
2010-01-05 01:09 . 2010-01-05 01:09 -------- d-----w- c:\program files\Intel
2010-01-05 01:09 . 2010-01-05 01:09 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-01-05 01:09 . 2010-01-05 01:07 -------- d-----w- c:\program files\Java
2010-01-05 01:08 . 2010-01-05 01:08 152576 ----a-w- c:\documents and settings\Eric\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2010-01-05 01:08 . 2010-01-05 01:08 79488 ----a-w- c:\documents and settings\Eric\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-01-05 01:04 . 2010-01-05 01:03 1956528 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\install_flash_player_ax.exe
2010-01-05 01:00 . 2010-01-05 01:00 -------- d-----w- c:\program files\MSXML 6.0
2010-01-05 00:59 . 2010-01-05 00:59 -------- d-----w- c:\program files\MSXML 4.0
2010-01-05 00:50 . 2010-01-05 00:50 -------- d-----w- c:\program files\Synaptics
2009-12-31 07:39 . 2009-12-31 07:39 8171 ----a-w- c:\windows\system32\drivers\1028_Dell_XPS_M1730.mrk
2009-11-21 15:51 . 2004-08-11 23:00 471552 ----a-w- c:\windows\AppPatch\aclayers.dll
2009-11-20 11:08 . 2010-01-05 14:17 38784 ----a-w- c:\documents and settings\LogMeInRemoteUser\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2009-11-20 11:08 . 2010-01-05 13:31 38784 ----a-w- c:\documents and settings\cadnet\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2009-11-20 11:08 . 2010-01-05 13:29 38784 ----a-w- c:\documents and settings\Eric.CLC\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2009-10-29 07:45 . 2004-08-11 23:00 916480 ------w- c:\windows\system32\wininet.dll
2009-10-21 05:38 . 2004-08-11 23:00 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38 . 2004-08-11 23:00 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-20 16:20 . 2004-08-04 05:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2009-10-13 10:30 . 2004-08-11 23:00 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38 . 2004-08-11 23:00 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38 . 2004-08-11 23:00 79872 ----a-w- c:\windows\system32\raschap.dll
.

((((((((((((((((((((((((((((( [You must be registered and logged in to see this link.] )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-01-07 19:34 . 2010-01-07 19:34 16384 c:\windows\Temp\Perflib_Perfdata_1a8.dat
+ 2004-08-11 23:00 . 2010-01-07 14:56 54682 c:\windows\system32\perfc009.dat
- 2004-08-11 23:00 . 2010-01-06 08:30 54682 c:\windows\system32\perfc009.dat
+ 2010-01-05 00:51 . 2010-01-07 04:28 69608 c:\windows\system32\nvModes.dat
- 2010-01-05 00:51 . 2010-01-06 05:02 69608 c:\windows\system32\nvModes.dat
+ 2004-08-11 23:00 . 2010-01-07 14:56 385164 c:\windows\system32\perfh009.dat
- 2004-08-11 23:00 . 2010-01-06 08:30 385164 c:\windows\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2010-01-05 39408]
"i8kfangui"="c:\program files\I8kfanGUI\I8kfanGUI.exe" [2007-02-16 856064]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-03-27 1024000]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-11-06 8491008]
"nwiz"="nwiz.exe" [2007-11-06 1626112]
"NVHotkey"="nvHotkey.dll" [2007-11-06 81920]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-11-06 81920]
"OEM02Mon.exe"="c:\windows\OEM02Mon.exe" [2007-08-28 36864]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2010-01-05 149280]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2007-07-25 823296]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2007-07-25 974848]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2008-02-22 1245184]
"Launch LCDMon"="c:\program files\Common Files\Logitech\LCD Manager\LCDMon.exe" [2007-07-18 775952]
"SigmatelSysTrayApp"="c:\program files\SigmaTel\C-Major Audio\WDM\stsystra.exe" [2008-03-28 405504]
"KADxMain"="c:\windows\system32\KADxMain.exe" [2006-11-02 282624]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-11-01 189736]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-09-04 935288]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-05-29 52840]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2007-10-08 125368]
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe" [2008-08-11 63048]
"hpbdfawep"="c:\program files\HP\Dfawep\bin\hpbdfawep.exe" [2007-04-25 954368]

c:\documents and settings\Eric.CLC\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoWelcomeScreen"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2009-09-29 00:34 87352 ----a-w- c:\windows\system32\LMIinit.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"FirewallOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Dell\\MediaDirect\\PCMService.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\PnkBstrA.exe"=
"c:\\WINDOWS\\system32\\PnkBstrB.exe"=
"c:\\Program Files\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R1 fanio;FanIO driver;c:\windows\system32\drivers\fanio.sys [1/5/2010 9:25 PM 14464]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [8/11/2008 12:41 PM 12856]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [1/5/2010 9:15 AM 47640]
R2 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [10/7/2007 8:48 PM 116664]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\eengine\EraserUtilRebootDrv.sys [1/4/2010 9:40 PM 102448]
R3 physX32;physX32;c:\windows\system32\drivers\physX32.sys [12/31/2009 2:41 AM 117888]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [1/5/2010 2:19 PM 135664]
S4 LMIRfsClientNP;LMIRfsClientNP; [x]
.
Contents of the 'Scheduled Tasks' folder

2010-01-05 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2010-01-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-05 19:19]

2010-01-07 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-05 19:19]
.
.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = [You must be registered and logged in to see this link.]
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2010-01-07 14:35
Windows 5.1.2600 Service Pack 3 NTFS

scanning hȋdden processes ...

scanning hȋdden autostart entries ...

scanning hȋdden files ...

scan completed successfully
hȋdden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(916)
c:\windows\system32\LMIinit.dll

- - - - - - - > 'explorer.exe'(2952)
c:\windows\system32\WININET.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\LogMeIn\x86\RaMaint.exe
c:\program files\LogMeIn\x86\LogMeIn.exe
c:\program files\LogMeIn\x86\LMIGuardian.exe
c:\program files\Dell\QuickSet\NICCONFIGSVC.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\PnkBstrA.exe
c:\windows\system32\PnkBstrB.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\windows\system32\STacSV.exe
c:\windows\System32\spool\DRIVERS\W32X86\3\HP1006MC.EXE
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\program files\Intel\Wireless\Bin\WLKeeper.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\rundll32.exe
c:\windows\system32\RUNDLL32.EXE
c:\program files\Common Files\Logitech\LCD Manager\Applets\LCDClock.exe
c:\program files\Common Files\Logitech\LCD Manager\Applets\LCDMedia.exe
c:\program files\Intel\Wireless\Bin\Dot1XCfg.exe
c:\program files\LogMeIn\x86\LMIGuardian.exe
c:\\?\c:\windows\system32\WBEM\WMIADAP.EXE
.
**************************************************************************
.
Completion time: 2010-01-07 14:38:35 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-07 19:38
ComboFix2.txt 2010-01-07 00:09

Pre-Run: 161,303,482,368 bytes free
Post-Run: 161,402,732,544 bytes free

- - End Of File - - 6270BDB2FC72301036430FAE4DC38957

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 7th January 2010, 11:16 pm

Still getting the warning?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 7th January 2010, 11:27 pm

Yes sir

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 7th January 2010, 11:32 pm

Don't think there's much we can do, it's leftover malicious code from previous rootkit that infected the MBR. If you want to a full fix, a format if what you need.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 8th January 2010, 12:09 am

ahhhhhhhhhhhhhh
Say it ain't so

Thanks for trying tho

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 8th January 2010, 12:10 am

It's not active malware, it's just a leftover malicious code that your AV wasn't able to remove, it's essentially dead.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 8th January 2010, 12:30 am

Thanks Chris

I noticed it is not affecting any programs so I can live with that.

But Thank you for all the help and I will be making a donation you guys do great work.

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 8th January 2010, 12:33 am

Hehe, guess you read our team thread, no one else knows my real name apart from our staff. Goofy


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Mebroot trojan

Post by hemp22 on 8th January 2010, 12:36 am

Smile I found you on another site lol

[You must be registered and logged in to see this link.]

Thanks again

Eric

hemp22
Novice
Novice

Posts Posts : 41
Joined Joined : 2009-10-16
OS OS : xp
Points Points : 26512
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Mebroot trojan

Post by Belahzur on 8th January 2010, 12:39 am

Hah, HMOS, we are partnered with them, it's Jays website. Big Grin


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum