WiredWX Christian Hobby Weather Tools
Would you like to react to this message? Create an account in a few clicks or log in to continue.

WiredWX Christian Hobby Weather ToolsLog in

 


descriptionMalware Doctor and Various Trojans EmptyMalware Doctor and Various Trojans

more_horiz
Usually, I have the patients to go get help for this, but I'm totally fed up with this and finally came here Smile...
My internet is totally jacked up, various firefox problems now, stupid malware doctor, taskmgr disabled, and regedit disabled.

From hijack:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:38:08 AM, on 6/14/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\AlienGUIse\wbload.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\sm56hlpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\PowerISO\PWRISOVM.EXE
C:\Documents and Settings\LocalService.NT AUTHORITY\Application Data\1361538659.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\RocketDock\RocketDock.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\WINDOWS\System32\avast!Antivirus.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Documents and Settings\Administrator.RYAN-6B315B7922\Desktop\hijackgpthis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\sdra64.exe,C:\WINDOWS\system32\twex.exe,
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: (no name) - {1B93F651-49A9-4961-A605-355986AB883A} - c:\windows\system32\ojrjxyd.dll
O2 - BHO: C:\WINDOWS\system32\yhafd78auhd.dll - {c6c7b2a1-00f3-42bd-f434-00aaba2c8953} - C:\WINDOWS\system32\yhafd78auhd.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAShCut.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [SMSERIAL] sm56hlpr.exe
O4 - HKLM\..\Run: [SynTPEnh] "C:\Program Files\Synaptics\SynTP\SynTPEnh.exe"
O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [PWRISOVM.EXE] C:\Program Files\PowerISO\PWRISOVM.EXE
O4 - HKLM\..\Run: [Malware Doctor] C:\Documents and Settings\LocalService.NT AUTHORITY\Application Data\1361538659.exe
O4 - HKLM\..\RunOnce: [Spybot - Search & Destroy] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\RunOnce: [SpybotDeletingA3123] command /c del "C:\WINDOWS\system32\twain32\user.ds"
O4 - HKLM\..\RunOnce: [SpybotDeletingC5008] cmd /c del "C:\WINDOWS\system32\twain32\user.ds"
O4 - HKLM\..\RunOnce: [SpybotDeletingA9807] command /c del "C:\WINDOWS\system32\twain32\local.ds"
O4 - HKLM\..\RunOnce: [SpybotDeletingC3150] cmd /c del "C:\WINDOWS\system32\twain32\local.ds"
O4 - HKCU\..\Run: [IpWins] C:\Program Files\Ipwindows\ipwins.exe
O4 - HKCU\..\Run: [Insider] C:\Program Files\Insider\Insider.exe
O4 - HKCU\..\Run: [Fwjlyjx] "C:\Documents and Settings\Administrator.RYAN-6B315B7922\Application Data\?asks\w?nspool.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [kernel] C:\Program Files\kernel\kernel.exe
O4 - HKCU\..\Run: [RocketDock] "C:\Program Files\RocketDock\RocketDock.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [Malware Doctor] C:\Documents and Settings\LocalService.NT AUTHORITY\Application Data\1361538659.exe
O4 - HKCU\..\RunOnce: [SpybotDeletingB6128] command /c del "C:\WINDOWS\system32\twain32\user.ds"
O4 - HKCU\..\RunOnce: [SpybotDeletingD7349] cmd /c del "C:\WINDOWS\system32\twain32\user.ds"
O4 - HKCU\..\RunOnce: [SpybotDeletingB5032] command /c del "C:\WINDOWS\system32\twain32\local.ds"
O4 - HKCU\..\RunOnce: [SpybotDeletingD2207] cmd /c del "C:\WINDOWS\system32\twain32\local.ds"
O4 - HKUS\.DEFAULT\..\Run: [WinProtect] C:\Documents and Settings\LocalService.NT AUTHORITY\Application Data\bootcfg.exe srv (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\FlashUtil9b.exe (User 'Default user')
O4 - .DEFAULT Startup: Yahoo! Widget Engine.lnk = C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe (User 'Default user')
O4 - Startup: Yahoo! Widget Engine.lnk = C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\Administrator.RYAN-6B315B7922\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D0C0F75C-683A-4390-A791-1ACFD5599AB8} (Oberon Flash Game Host) - http://games.myspace.com/Gameshell/GameHost/1.0/OberonGameHost.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://myspace.oberon-media.com/gameshell/games/channel--110343720/lc--en/room--d27757f0-3c81-45df-8ada-0de3e805bfeb/online/zuma_new/en/popcaploader_v10.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O20 - Winlogon Notify: uymeityu - C:\WINDOWS\SYSTEM32\ojrjxyd.dll
O20 - Winlogon Notify: __c0012b6c - C:\WINDOWS\system32\__c0012B6C.dat
O22 - SharedTaskScheduler: gsf87hfunf98398jd - {C6C7B2A1-00F3-42BD-F434-00AABA2C8953} - C:\WINDOWS\system32\yhafd78auhd.dll
O23 - Service: avast!Antivirus - Unknown owner - C:\WINDOWS\System32\avast!Antivirus.exe
O23 - Service: avast!AVSControlService - Unknown owner - C:\WINDOWS\System32\avast!AVSControlService.exe
O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PACSPTISVR - Unknown owner - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: Automatic Updates (wuauserv) - Unknown owner - C:\WINDOWS\
O24 - Desktop Component 0: (no name) - C:\Program Files\MSN Gaming Zone\pronyka.html

--
End of file - 10842 bytes

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz

  • Open HijackThis.
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\sdra64.exe,C:\WINDOWS\system32\twex.exe,
    O2 - BHO: (no name) - {1B93F651-49A9-4961-A605-355986AB883A} - c:\windows\system32\ojrjxyd.dll
    O2 - BHO: C:\WINDOWS\system32\yhafd78auhd.dll - {c6c7b2a1-00f3-42bd-f434-00aaba2c8953} - C:\WINDOWS\system32\yhafd78auhd.dll
    O4 - HKLM\..\Run: [Malware Doctor] C:\Documents and Settings\LocalService.NT AUTHORITY\Application Data\1361538659.exe
    O4 - HKCU\..\Run: [IpWins] C:\Program Files\Ipwindows\ipwins.exe
    O4 - HKCU\..\Run: [Insider] C:\Program Files\Insider\Insider.exe
    O4 - HKCU\..\Run: [Fwjlyjx] "C:\Documents and Settings\Administrator.RYAN-6B315B7922\Application Data\?asks\w?nspool.exe"
    O4 - HKCU\..\Run: [kernel] C:\Program Files\kernel\kernel.exe
    O4 - HKCU\..\Run: [Malware Doctor] C:\Documents and Settings\LocalService.NT AUTHORITY\Application Data\1361538659.exe
    O4 - HKUS\.DEFAULT\..\Run: [WinProtect] C:\Documents and Settings\LocalService.NT AUTHORITY\Application Data\bootcfg.exe srv (User 'Default user')
    O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
    O20 - Winlogon Notify: uymeityu - C:\WINDOWS\SYSTEM32\ojrjxyd.dll
    O20 - Winlogon Notify: __c0012b6c - C:\WINDOWS\system32\__c0012B6C.dat
    O23 - Service: avast!Antivirus - Unknown owner - C:\WINDOWS\System32\avast!Antivirus.exe
    O23 - Service: avast!AVSControlService - Unknown owner - C:\WINDOWS\System32\avast!AVSControlService.exe



  • Press "Fix Checked"
  • Close Hijack This.





Please download Ice Sword from HERE

  1. Download the zip to your desktop and extract it.
  2. Open the Ice Sword folder and then launch IceSword.exe.
  3. Then look in the left hand bottom of the program and press "Registry"
  4. When the registry list opens, drag the line between the two windows so you can see which registry hive you need.
  5. Next, open the HKEY_LOCAL_MACHINE, and navigate to the following key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  6. Now look in the right side pane for two run values that are just random numbers.
  7. Once you have found the value(s), right click it and press "Delete"
  8. Okay the prompt and close IceSword.

............................................................................................

While my help is always free, please consider donating to keep this site alive: Donate

Malware Doctor and Various Trojans 2wg6fte

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
When I went through Ice Sword and went through the steps you said, I finally got to "\Run" no apparent random numbers values came about, just regular files.

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
Ok, lets do the following:




1. If you are using Firefox, make sure that your download settings are as follows:

* Tools->Options->Main tab
* Set to "Always ask me where to Save the files".

2. During the download, rename Combofix to Combo-Fix as follows:

Malware Doctor and Various Trojans CF_download_FF

Malware Doctor and Various Trojans CF_download_rename

3. It is important you rename Combofix during the download, but not after.
4. Please do not rename Combofix to other names, but only to the one indicated.
5. Close any open browsers.
6. We need to disable your local AV (Anti-virus) before running Combofix.

  • See HERE for how to disable your AV. (Mcafee)
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***
  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.

............................................................................................

While my help is always free, please consider donating to keep this site alive: Donate

Malware Doctor and Various Trojans 2wg6fte

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
ComboFix 09-06-13.09 - Administrator 06/14/2009 12:29.1 - NTFSx86
Running from: c:\documents and settings\Administrator.RYAN-6B315B7922\Desktop\Combo-Fix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users.WINDOWS\Application Data\11570154
c:\documents and settings\All Users.WINDOWS\Application Data\91580146
C:\hcpjmkup.exe
C:\hcpjmkup.exe.dat
C:\kortcale.exe
C:\kortcale.exe.dat
c:\progra~1\COMMON~1\{3C9AB~1
c:\progra~1\COMMON~1\{CC9AB~1
c:\program files\Common Files\asembl~1
c:\program files\Common Files\smbols~1
c:\program files\Common Files\sstem3~1
c:\program files\Insider
c:\program files\Temporary
c:\program files\Words
c:\windows\racle~1
c:\windows\system32\121973
c:\windows\system32\crosof~1.net
c:\windows\system32\Drivers\79d0b3df.sys
c:\windows\system32\lowsec
c:\windows\system32\scurit~1
c:\windows\system32\twain32
c:\windows\system32\twain32\local.ds
c:\windows\system32\twain32\user.ds
c:\docume~1\ADMINI~1.RYA\LOCALS~1\Temp\lsass.exe
c:\docume~1\ADMINI~1.RYA\LOCALS~1\Temp\services.exe
c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\wiaserva.log
c:\documents and settings\Administrator.RYAN-6B315B7922\Local Settings\Temporary Internet Files\bestwiner.stt
c:\documents and settings\Administrator.RYAN-6B315B7922\Local Settings\Temporary Internet Files\CPV.stt
c:\documents and settings\All Users.WINDOWS\Application Data\11570154\11570154.exe
c:\documents and settings\All Users.WINDOWS\Application Data\11570154\11570154.glu
c:\documents and settings\All Users.WINDOWS\Application Data\11570154\pc11570154cnf
c:\documents and settings\All Users.WINDOWS\Application Data\11570154\pc11570154ins
c:\documents and settings\All Users.WINDOWS\Application Data\91580146\91580146.exe
c:\documents and settings\LocalService.NT AUTHORITY\Application Data\1301700638.exe
c:\documents and settings\LocalService.NT AUTHORITY\Application Data\1361538659.exe
c:\documents and settings\LocalService.NT AUTHORITY\Application Data\1458931097.exe
c:\documents and settings\LocalService.NT AUTHORITY\Application Data\615289520.exe
c:\documents and settings\LocalService.NT AUTHORITY\Application Data\755020800.exe
c:\documents and settings\LocalService.NT AUTHORITY\Local Settings\Temporary Internet Files\CPV.stt
C:\orrx.exe
c:\progra~1\COMMON~1\{CC9AB~1\system.dll
c:\program files\Insider\Insider.exe
c:\program files\Insider\UnInstall.exe
c:\program files\Internet Explorer\setupapi.dll
c:\program files\Mozilla Firefox\setupapi.dll
c:\program files\MSN Gaming Zone\pronyka.html
c:\program files\Words\list.txt
c:\windows\IE4 Error Log.txt
c:\windows\ld08.exe
c:\windows\system32\__c0012B6C.dat
c:\windows\system32\__c005C25E.dat
c:\windows\system32\121973\121973.dll
c:\windows\system32\9.tmp
c:\windows\system32\avast!Antivirus.exe
c:\windows\system32\avast!AVSControlService.exe
c:\windows\system32\C.tmp
c:\windows\system32\drivers\79d0b3df.sys
c:\windows\system32\drivers\core.cache(2).dsk
c:\windows\system32\drivers\core.cache(3).dsk
c:\windows\system32\drivers\gadchnux.sys
c:\windows\system32\drivers\services.exe
c:\windows\system32\drivers\ymkgeeud.sys
c:\windows\system32\G3B34.tmp.exe
c:\windows\system32\G673A.tmp.exe
c:\windows\system32\GBC05.tmp.exe
c:\windows\system32\GC5DC.tmp.exe
c:\windows\system32\jbnmck.dll
c:\windows\system32\lowsec\local.ds . . . . failed to delete
c:\windows\system32\lowsec\user.ds . . . . failed to delete
c:\windows\system32\lowsec\user.ds.lll
c:\windows\system32\mssrv32.exe
c:\windows\system32\ojrjxyd.dll
c:\windows\system32\ojrjxyd.dll . . . . failed to delete
c:\windows\system32\sdra64.exe . . . . failed to delete
c:\windows\system32\sft.res
c:\windows\system32\SYSDLL.exe
c:\windows\system32\twex.exe . . . . failed to delete
c:\windows\system32\umymeztc.dll
c:\windows\Temp\1016026928.exe
c:\windows\Temp\1027120744.exe
c:\windows\Temp\1043550290.exe
c:\windows\Temp\112826782.exe
c:\windows\Temp\1143425514.exe
c:\windows\Temp\1152963800.exe
c:\windows\Temp\1194574746.exe
c:\windows\Temp\1229217658.exe
c:\windows\Temp\126167050.exe
c:\windows\Temp\1318070184.exe
c:\windows\Temp\137176304.exe
c:\windows\Temp\1464327756.exe
c:\windows\Temp\1499066000.exe
c:\windows\Temp\1510614750.exe
c:\windows\Temp\1523364800.exe
c:\windows\Temp\1540628500.exe
c:\windows\Temp\1550788240.exe
c:\windows\Temp\1567354804.exe
c:\windows\Temp\1574417528.exe
c:\windows\Temp\1591315568.exe
c:\windows\Temp\1603753646.exe
c:\windows\Temp\1667582202.exe
c:\windows\Temp\1679602558.exe
c:\windows\Temp\1684895240.exe
c:\windows\Temp\1688848536.exe
c:\windows\Temp\1710130648.exe
c:\windows\Temp\1771828180.exe
c:\windows\Temp\17932582.exe
c:\windows\Temp\179443796.exe
c:\windows\Temp\1813905948.exe
c:\windows\Temp\1815911898.exe
c:\windows\Temp\1851536742.exe
c:\windows\Temp\1855106004.exe
c:\windows\Temp\1951631934.exe
c:\windows\Temp\1970158460.exe
c:\windows\Temp\2007358670.exe
c:\windows\Temp\2160021788.exe
c:\windows\Temp\2167724190.exe
c:\windows\Temp\2212776332.exe
c:\windows\Temp\2340629268.exe
c:\windows\Temp\2349867836.exe
c:\windows\Temp\2401511374.exe
c:\windows\Temp\2424722480.exe
c:\windows\Temp\244032006.exe
c:\windows\Temp\2481308782.exe
c:\windows\Temp\2525385178.exe
c:\windows\Temp\2564084712.exe
c:\windows\Temp\2621097138.exe
c:\windows\Temp\2638637068.exe
c:\windows\Temp\2760331286.exe
c:\windows\Temp\279617376.exe
c:\windows\Temp\2843331860.exe
c:\windows\Temp\2858583236.exe
c:\windows\Temp\2925232450.exe
c:\windows\Temp\2995445614.exe
c:\windows\Temp\302469572.exe
c:\windows\Temp\3072644008.exe
c:\windows\Temp\31415752.exe
c:\windows\Temp\3390777346.exe
c:\windows\Temp\3411744272.exe
c:\windows\Temp\3416782766.exe
c:\windows\Temp\3493512410.exe
c:\windows\Temp\349718878.exe
c:\windows\Temp\3518459910.exe
c:\windows\Temp\35330846.exe
c:\windows\Temp\3585336520.exe
c:\windows\Temp\3706960892.exe
c:\windows\Temp\373770286.exe
c:\windows\Temp\3794628036.exe
c:\windows\Temp\3798371000.exe
c:\windows\Temp\3854629082.exe
c:\windows\Temp\3859676482.exe
c:\windows\Temp\3876911026.exe
c:\windows\Temp\3891863982.exe
c:\windows\Temp\4033648242.exe
c:\windows\Temp\407011716.exe
c:\windows\Temp\4079236892.exe
c:\windows\Temp\4082268092.exe
c:\windows\Temp\4120647410.exe
c:\windows\Temp\4142841536.exe
c:\windows\Temp\4146965540.exe
c:\windows\Temp\4154781988.exe
c:\windows\Temp\4208481522.exe
c:\windows\Temp\4230329294.exe
c:\windows\Temp\4286104804.exe
c:\windows\Temp\4289558938.exe
c:\windows\Temp\432386022.exe
c:\windows\Temp\438389976.exe
c:\windows\Temp\475221818.exe
c:\windows\Temp\538397268.exe
c:\windows\Temp\544465718.exe
c:\windows\Temp\585090718.exe
c:\windows\Temp\58535288.exe
c:\windows\Temp\607471564.exe
c:\windows\Temp\693557378.exe
c:\windows\Temp\7274416.exe
c:\windows\Temp\738578140.exe
c:\windows\Temp\752682328.exe
c:\windows\Temp\787227474.exe
c:\windows\Temp\831602898.exe
c:\windows\Temp\833427008.exe
c:\windows\Temp\847931030.exe
c:\windows\Temp\899465930.exe
c:\windows\Temp\917316924.exe
c:\windows\Temp\934766034.exe
c:\windows\Temp\939971454.exe
c:\windows\Temp\943394040.exe
c:\windows\Temp\951936504.exe
c:\windows\Temp\96270396.exe
C:\xcrashdump.dat

Infected copy of c:\windows\system32\userinit.exe was found and disinfected
Restored copy from - c:\windows\system32\dllcache\userinit.exe

Infected copy of c:\windows\system32\drivers\ndis.sys was found and disinfected
Restored copy from - The cat ate it Smile...
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_AVAST!ANTIVIRUS
-------\Legacy_COM+_MESSAGES
-------\Legacy_gfubvwof
-------\Legacy_msupdate
-------\Legacy_NETWORK_MONITOR
-------\Legacy_ymkgeeud
-------\Service_avast!Antivirus
-------\Service_gfubvwof
-------\Service_ymkgeeud
-------\Legacy_avast!AVSControlService
-------\Service_avast!AVSControlService


((((((((((((((((((((((((( Files Created from 2009-05-14 to 2009-06-14 )))))))))))))))))))))))))))))))
.

2010-10-10 16:13 . 2010-10-10 16:13 -------- d-----w- c:\program files\MSXML 6.0
2010-10-10 15:28 . 2010-10-10 15:28 -------- d-----w- c:\documents and settings\All Users.WINDOWS\SonicStage
2010-10-10 15:23 . 2005-10-31 15:46 36679 -c----w- c:\windows\system32\drivers\NETMD052.sys
2010-10-10 15:23 . 2003-11-10 17:31 36232 -c----w- c:\windows\system32\drivers\NETMD033.sys
2010-10-10 15:23 . 2003-04-01 23:55 35319 -c----w- c:\windows\system32\drivers\NETMD031.sys
2010-10-10 15:23 . 2002-08-08 20:51 38951 -c----w- c:\windows\system32\drivers\NETMDUSB.sys
2010-10-10 15:23 . 2001-09-13 07:15 90112 -c----w- c:\windows\snymsico.dll
2010-10-10 15:23 . 2007-01-13 13:24 770048 -c--a-w- c:\windows\system32\CDDBUISony.dll
2010-10-10 15:23 . 2007-01-13 13:25 532480 -c--a-w- c:\windows\system32\CddbPlaylist2Sony.dll
2010-10-10 15:23 . 2007-01-13 13:24 73728 -c--a-w- c:\windows\system32\CddbLinkSony.dll
2010-10-10 15:23 . 2007-01-13 13:22 589824 -c--a-w- c:\windows\system32\CddbMusicIDSony.dll
2010-10-10 15:23 . 2007-01-13 13:22 655360 -c--a-w- c:\windows\system32\CDDBControlSony.dll
2010-10-10 15:22 . 2010-10-10 15:22 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Sony Corporation
2010-10-10 15:21 . 2008-10-13 22:50 -------- d-----w- c:\program files\Sony
2010-10-10 15:21 . 2010-10-10 15:28 -------- d-----w- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Sony Corporation
2010-10-10 15:21 . 2010-10-10 15:21 -------- d-----w- c:\program files\Common Files\Sony Shared
2009-06-14 06:02 . 2009-06-14 06:02 -------- d-----w- c:\documents and settings\Administrator.RYAN-6B315B7922\Local Settings\Application Data\mnrqponb
2009-06-14 06:02 . 2009-06-14 06:02 -------- d-----w- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\mnrqponb
2009-06-14 03:50 . 2009-06-14 03:50 -------- d-----w- c:\documents and settings\NetworkService.NT AUTHORITY\Local Settings\Application Data\mnrqponb
2009-06-14 03:34 . 2009-06-14 06:13 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-06-14 03:19 . 2007-03-02 00:54 21056 ----a-w- c:\windows\system32\drivers\sskbfd.sys
2009-06-12 23:04 . 2009-06-14 17:39 99422 ----a-w- c:\windows\system32\drivers\5080c6fd.sys
2009-06-12 21:59 . 2009-06-12 22:02 -------- d-----w- c:\documents and settings\TEMP
2009-06-10 22:31 . 2009-06-10 22:31 -------- d-----w- c:\program files\PowerISO
2009-06-10 19:27 . 2008-09-05 02:17 447752 ----a-w- c:\windows\system32\vp6vfw.dll
2009-06-10 19:27 . 2009-06-10 19:27 10134 ----a-r- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Microsoft\Installer\{E3E71D07-CD27-46CB-8448-16D4FB29AA13}\ARPPRODUCTICON.exe
2009-06-10 19:27 . 2009-06-10 19:27 -------- d-----w- c:\program files\Microsoft WSE
2009-06-10 19:27 . 2006-09-28 21:05 2414360 ----a-w- c:\windows\system32\d3dx9_31.dll
2009-06-10 19:27 . 2009-06-10 19:27 -------- d-----w- c:\windows\Logs
2009-06-10 18:43 . 2009-06-10 18:43 -------- d-----w- c:\program files\Electronic Arts
2009-06-10 18:30 . 2009-06-10 18:30 -------- d-----w- c:\windows\A8B9466986544126BD28D0D2412CDED6.TMP
2009-05-28 01:24 . 1997-01-02 06:00 27136 ----a-w- c:\windows\system\WAVMIX16.DLL
2009-05-28 01:24 . 1997-01-02 06:00 92208 ----a-w- c:\windows\system32\WING.DLL
2009-05-28 01:24 . 1997-01-02 06:00 6736 ----a-w- c:\windows\system32\WINGDIB.DRV
2009-05-28 01:24 . 1997-01-02 06:00 188960 ----a-w- c:\windows\system32\WINGDE.DLL
2009-05-28 01:24 . 1997-01-02 06:00 12800 ----a-w- c:\windows\system32\WING32.DLL
2009-05-28 01:24 . 1997-01-02 06:00 27136 ----a-w- c:\windows\system32\WAVMIX16.DLL
2009-05-24 19:27 . 2009-05-24 19:27 190976 ----a-w- C:\jotvxhh.exe
2009-05-24 19:23 . 2009-05-29 23:20 0 ----a-w- c:\windows\system32\drivers\591f701e.sys
2009-05-24 19:22 . 2009-05-24 19:22 15000 ----a-w- c:\windows\system32\yhafd78auhd.dll
2009-05-17 04:16 . 2009-05-24 05:17 -------- d-----w- c:\windows\system32\Adobe

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-10-10 15:21 . 2006-12-18 16:18 -------- d-----w- c:\program files\Common Files\InstallShield
2009-06-14 17:34 . 2004-10-08 12:01 182912 ----a-w- c:\windows\system32\drivers\ndis.sys
2009-06-14 07:24 . 2005-12-03 23:11 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2009-06-14 03:32 . 2006-12-18 16:19 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-06-13 05:51 . 2007-02-09 00:10 -------- d-----w- c:\program files\Warcraft III
2009-06-13 01:12 . 2009-06-14 16:38 58880 ----a-w- c:\windows\system32\4C.tmp
2009-06-10 22:42 . 2007-02-10 04:31 48456 -c--a-w- c:\documents and settings\Administrator.RYAN-6B315B7922\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-06-10 22:29 . 2007-11-23 20:11 -------- d-----w- c:\program files\AutoCAD 2008
2009-06-10 22:29 . 2007-11-23 20:11 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Autodesk
2009-06-10 05:03 . 2009-03-22 16:02 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Symantec
2009-06-10 05:03 . 2009-03-22 15:47 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-04-24 03:25 . 2009-04-24 03:25 -------- d-----w- c:\program files\Common Files\xing shared
2009-04-24 03:25 . 2007-04-19 02:55 -------- d-----w- c:\program files\Common Files\Real
2009-04-24 03:25 . 2003-02-21 09:42 348160 ----a-w- c:\windows\system32\msvcr71.dll
2009-04-06 23:28 . 2009-04-06 23:28 390664 ----a-w- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Real\RealPlayer\Update\RealPlayer11.exe
2009-03-24 12:51 . 2009-03-24 12:51 88704 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\Symantec\SRTSP\Quarantine\AP232ABB25.sys
2009-03-22 03:28 . 2007-02-09 00:15 78518 -c--a-w- c:\windows\War3Unin.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{1b93f651-49a9-4961-a605-355986ab883a}]
2004-10-08 12:01 103936 ----a-w- c:\windows\system32\ojrjxyd.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-10-08 15360]
"RocketDock"="c:\program files\RocketDock\RocketDock.exe" [2007-09-02 495616]
"Yahoo! Pager"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2007-08-30 4670704]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-06-21 68856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2004-08-10 59392]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2005-08-25 737369]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-01-31 7405568]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"SunJavaUpdateSched"="c:\program files\Java\jre1.6.0_02\bin\jusched.exe" [2007-07-12 132496]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-04-27 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-12 39792]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-04-24 198160]
"PWRISOVM.EXE"="c:\program files\PowerISO\PWRISOVM.EXE" [2008-03-14 233472]
"High Definition Audio Property Page Shortcut"="HDAShCut.exe" - c:\windows\system32\HdAShCut.exe [2005-01-07 61952]
"RTHDCPL"="RTHDCPL.EXE" - c:\windows\RTHDCPL.exe [2005-12-09 15691264]
"SMSERIAL"="sm56hlpr.exe" - c:\windows\sm56hlpr.exe [2005-09-16 557056]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2007-01-31 1519616]

c:\documents and settings\Administrator.RYAN-6B315B7922\Start Menu\Programs\Startup\
Yahoo! Widget Engine.lnk - c:\program files\Yahoo!\Widgets\YahooWidgetEngine.exe [2007-7-20 2913584]

c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-3-6 113664]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"DisallowRun"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WB]
2001-12-21 05:34 24576 ----a-w- c:\program files\AlienGUIse\fastload.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\wbsys.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Warcraft III\\Warcraft III.exe"=
"c:\\Program Files\\Warcraft III\\War3.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\Program Files\\MSN Messenger\\livecall.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\BitTornado\\btdownloadgui.exe"=
"c:\\StubInstaller.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Documents and Settings\\LocalService.NT AUTHORITY\\Application Data\\bootcfg.exe"=

S1 591f701e;591f701e;c:\windows\system32\drivers\591f701e.sys [5/24/2009 2:23 PM 0]
S3 jgameenp;jgameenp;\??\c:\docume~1\ADMINI~1.RYA\LOCALS~1\Temp\jgameenp.sys --> c:\docume~1\ADMINI~1.RYA\LOCALS~1\Temp\jgameenp.sys [?]
S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [8/2/2005 4:10 PM 32512]
.
Contents of the 'Scheduled Tasks' folder

2009-06-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-01-10 20:42]

2009-06-12 c:\windows\Tasks\At1.job
- c:\windows\system32\ojrjxyd.dll [2004-10-08 12:01]
.
- - - - ORPHANS REMOVED - - - -

HKU-Default-RunOnce-FlashPlayerUpdate - c:\windows\system32\Macromed\Flash\FlashUtil9b.exe
Notify-__c0012b6c - c:\windows\system32\__c0012B6C.dat


.
------- Supplementary Scan -------
.
uStart Page = hxxp://securityresponse.symantec.com/avcenter/fix_homepage/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride =
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: {{d9288080-1baa-4bc4-9cf8-a92d743db949} - c:\documents and settings\Administrator.RYAN-6B315B7922\Start Menu\Programs\IMVU\Run IMVU.lnk
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
FF - prefs.js: network.proxy.http - localhost
FF - prefs.js: network.proxy.http_port - 7171
FF - prefs.js: network.proxy.type - 4
FF - component: c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\extensions\{463F6CA5-EE3C-4be1-B7E6-7FEE11953374}\platform\WINNT\components\FoxyTunes.dll
FF - component: c:\program files\Real\RealPlayer\browserrecord\components\nprpbrowserrecordplugin.dll
FF - plugin: c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\extensions\justintvpublisher@justin.tv\platform\WINNT_x86-msvc\plugins\npjustintvpublish.dll
FF - plugin: c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmp071101000055.dll
FF - plugin: c:\program files\kSolo\npAVX.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npyaxmpb.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-14 12:37
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\5080c6fd]
"ImagePath"="\SystemRoot\System32\drivers\5080c6fd.sys"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\s-1-5-21-606747145-287218729-839522115-500\Software\Google\Google Toolbar\Bran3***]
@Allowed: (Read) (RestrictedCode)
"sent"=dword:00000001

[HKEY_USERS\s-1-5-21-606747145-287218729-839522115-500\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID]
@Denied: (Full) (LocalSystem)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1000)
c:\program files\AlienGUIse\fastload.dll

- - - - - - - > 'explorer.exe'(4076)
c:\program files\RocketDock\RocketDock.dll
c:\windows\system32\mshtml.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\ehome\ehRecvr.exe
c:\windows\ehome\ehSched.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\wdfmgr.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\CF21481.exe
c:\windows\system32\wscntfy.exe
c:\windows\ehome\ehmsas.exe
c:\program files\Yahoo!\Messenger\Ymsgr_tray.exe
.
**************************************************************************
.
Completion time: 2009-06-14 12:44 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-14 17:43

Pre-Run: 13,050,052,608 bytes free
Post-Run: 13,224,574,976 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect

425 --- E O F --- 2009-05-20 05:01

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
Now open a new notepad file.
Input this into the notepad file:

KILLALL::

Driver::
591f701e
jgameenp

File::
c:\windows\system32\drivers\5080c6fd.sys
C:\jotvxhh.exe
c:\windows\system32\drivers\591f701e.sys
c:\windows\system32\yhafd78auhd.dll
c:\windows\Tasks\At1.job

Folder::
c:\windows\system32\lowsec

Rootkit::
c:\windows\system32\sdra64.exe
c:\windows\system32\twex.exe
c:\windows\system32\ojrjxyd.dll

Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{1b93f651-49a9-4961-a605-355986ab883a}]
[-HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\BitTornado\\btdownloadgui.exe"=-
"c:\\StubInstaller.exe"=-
"c:\\Documents and Settings\\LocalService.NT AUTHORITY\\Application Data\\bootcfg.exe"=-
[-HKEY_LOCAL_MACHINE\System\ControlSet002\Services\5080c6fd]

Firefox::
FF - ProfilePath - c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\
FF - prefs.js: network.proxy.http - localhost
FF - prefs.js: network.proxy.http_port - 7171
FF - prefs.js: network.proxy.type - 4


Save this as CFScript.txt, save it to your desktop also.
Then drag and drop CFScript.txt into combofix as seen below:
Malware Doctor and Various Trojans Sfxdaw

This will open combofix again, agree to it's terms and allow it to run.
It may want to reboot after it's done. (It will warn you if it wants to)
Post the resulting log back here.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
Malware Doctor and Various Trojans DXwU4
Malware Doctor and Various Trojans VvYDg

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
ComboFix 09-06-13.09 - Administrator 06/14/2009 13:58.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.203 [GMT -5:00]
Running from: c:\documents and settings\Administrator.RYAN-6B315B7922\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\Administrator.RYAN-6B315B7922\Desktop\CFScript.txt

FILE ::
"C:\jotvxhh.exe"
"c:\windows\system32\drivers\5080c6fd.sys"
"c:\windows\system32\drivers\591f701e.sys"
"c:\windows\system32\yhafd78auhd.dll"
"c:\windows\Tasks\At1.job"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\drivers\5080c6fd.sys
c:\windows\system32\drivers\gadchnux.sys
c:\windows\system32\drivers\ymkgeeud.sys
c:\windows\system32\sdra64.exe
c:\windows\system32\twex.exe
C:\jotvxhh.exe
c:\program files\Internet Explorer\setupapi.dll
c:\program files\Mozilla Firefox\setupapi.dll
c:\windows\system32\drivers\591f701e.sys
c:\windows\system32\ojrjxyd.dll
c:\windows\system32\sdra64.exe
c:\windows\system32\twex.exe
c:\windows\system32\yhafd78auhd.dll
c:\windows\Tasks\At1.job

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_JGAMEENP
-------\Service_591f701e
-------\Service_gfubvwof
-------\Service_jgameenp
-------\Legacy_ymkgeeud
-------\Service_5080c6fd
-------\Service_ymkgeeud


((((((((((((((((((((((((( Files Created from 2009-05-14 to 2009-06-14 )))))))))))))))))))))))))))))))
.

2010-10-10 16:13 . 2010-10-10 16:13 -------- d-----w- c:\program files\MSXML 6.0
2010-10-10 15:28 . 2010-10-10 15:28 -------- d-----w- c:\documents and settings\All Users.WINDOWS\SonicStage
2010-10-10 15:23 . 2005-10-31 15:46 36679 -c----w- c:\windows\system32\drivers\NETMD052.sys
2010-10-10 15:23 . 2003-11-10 17:31 36232 -c----w- c:\windows\system32\drivers\NETMD033.sys
2010-10-10 15:23 . 2003-04-01 23:55 35319 -c----w- c:\windows\system32\drivers\NETMD031.sys
2010-10-10 15:23 . 2002-08-08 20:51 38951 -c----w- c:\windows\system32\drivers\NETMDUSB.sys
2010-10-10 15:23 . 2001-09-13 07:15 90112 -c----w- c:\windows\snymsico.dll
2010-10-10 15:23 . 2007-01-13 13:24 770048 -c--a-w- c:\windows\system32\CDDBUISony.dll
2010-10-10 15:23 . 2007-01-13 13:25 532480 -c--a-w- c:\windows\system32\CddbPlaylist2Sony.dll
2010-10-10 15:23 . 2007-01-13 13:24 73728 -c--a-w- c:\windows\system32\CddbLinkSony.dll
2010-10-10 15:23 . 2007-01-13 13:22 589824 -c--a-w- c:\windows\system32\CddbMusicIDSony.dll
2010-10-10 15:23 . 2007-01-13 13:22 655360 -c--a-w- c:\windows\system32\CDDBControlSony.dll
2010-10-10 15:22 . 2010-10-10 15:22 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Sony Corporation
2010-10-10 15:21 . 2008-10-13 22:50 -------- d-----w- c:\program files\Sony
2010-10-10 15:21 . 2010-10-10 15:28 -------- d-----w- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Sony Corporation
2010-10-10 15:21 . 2010-10-10 15:21 -------- d-----w- c:\program files\Common Files\Sony Shared
2009-06-14 06:02 . 2009-06-14 06:02 -------- d-----w- c:\documents and settings\Administrator.RYAN-6B315B7922\Local Settings\Application Data\mnrqponb
2009-06-14 06:02 . 2009-06-14 06:02 -------- d-----w- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\mnrqponb
2009-06-14 03:50 . 2009-06-14 03:50 -------- d-----w- c:\documents and settings\NetworkService.NT AUTHORITY\Local Settings\Application Data\mnrqponb
2009-06-14 03:34 . 2009-06-14 06:13 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-06-14 03:19 . 2007-03-02 00:54 21056 ----a-w- c:\windows\system32\drivers\sskbfd.sys
2009-06-12 21:59 . 2009-06-12 22:02 -------- d-----w- c:\documents and settings\TEMP
2009-06-10 22:31 . 2009-06-10 22:31 -------- d-----w- c:\program files\PowerISO
2009-06-10 19:27 . 2008-09-05 02:17 447752 ----a-w- c:\windows\system32\vp6vfw.dll
2009-06-10 19:27 . 2009-06-10 19:27 10134 ----a-r- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Microsoft\Installer\{E3E71D07-CD27-46CB-8448-16D4FB29AA13}\ARPPRODUCTICON.exe
2009-06-10 19:27 . 2009-06-10 19:27 -------- d-----w- c:\program files\Microsoft WSE
2009-06-10 19:27 . 2006-09-28 21:05 2414360 ----a-w- c:\windows\system32\d3dx9_31.dll
2009-06-10 19:27 . 2009-06-10 19:27 -------- d-----w- c:\windows\Logs
2009-06-10 18:43 . 2009-06-10 18:43 -------- d-----w- c:\program files\Electronic Arts
2009-06-10 18:30 . 2009-06-10 18:30 -------- d-----w- c:\windows\A8B9466986544126BD28D0D2412CDED6.TMP
2009-05-28 01:24 . 1997-01-02 06:00 27136 ----a-w- c:\windows\system\WAVMIX16.DLL
2009-05-28 01:24 . 1997-01-02 06:00 92208 ----a-w- c:\windows\system32\WING.DLL
2009-05-28 01:24 . 1997-01-02 06:00 6736 ----a-w- c:\windows\system32\WINGDIB.DRV
2009-05-28 01:24 . 1997-01-02 06:00 188960 ----a-w- c:\windows\system32\WINGDE.DLL
2009-05-28 01:24 . 1997-01-02 06:00 12800 ----a-w- c:\windows\system32\WING32.DLL
2009-05-28 01:24 . 1997-01-02 06:00 27136 ----a-w- c:\windows\system32\WAVMIX16.DLL
2009-05-17 04:16 . 2009-05-24 05:17 -------- d-----w- c:\windows\system32\Adobe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-10-10 15:21 . 2006-12-18 16:18 -------- d-----w- c:\program files\Common Files\InstallShield
2009-06-14 17:34 . 2004-10-08 12:01 182912 ----a-w- c:\windows\system32\drivers\ndis.sys
2009-06-14 07:24 . 2005-12-03 23:11 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2009-06-14 03:32 . 2006-12-18 16:19 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-06-13 05:51 . 2007-02-09 00:10 -------- d-----w- c:\program files\Warcraft III
2009-06-13 01:12 . 2009-06-14 16:38 58880 ----a-w- c:\windows\system32\4C.tmp
2009-06-10 22:42 . 2007-02-10 04:31 48456 -c--a-w- c:\documents and settings\Administrator.RYAN-6B315B7922\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-06-10 22:29 . 2007-11-23 20:11 -------- d-----w- c:\program files\AutoCAD 2008
2009-06-10 22:29 . 2007-11-23 20:11 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Autodesk
2009-06-10 05:03 . 2009-03-22 16:02 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Symantec
2009-06-10 05:03 . 2009-03-22 15:47 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-04-24 03:25 . 2009-04-24 03:25 -------- d-----w- c:\program files\Common Files\xing shared
2009-04-24 03:25 . 2007-04-19 02:55 -------- d-----w- c:\program files\Common Files\Real
2009-04-24 03:25 . 2003-02-21 09:42 348160 ----a-w- c:\windows\system32\msvcr71.dll
2009-04-06 23:28 . 2009-04-06 23:28 390664 ----a-w- c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Real\RealPlayer\Update\RealPlayer11.exe
2009-03-24 12:51 . 2009-03-24 12:51 88704 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\Symantec\SRTSP\Quarantine\AP232ABB25.sys
2009-03-22 03:28 . 2007-02-09 00:15 78518 -c--a-w- c:\windows\War3Unin.dat
.

((((((((((((((((((((((((((((( SnapShot@2009-06-14_17.38.28 )))))))))))))))))))))))))))))))))))))))))
.
- 2004-10-08 12:01 . 2009-06-14 07:32 64448 c:\windows\system32\perfc009.dat
+ 2004-10-08 12:01 . 2009-06-14 17:42 64448 c:\windows\system32\perfc009.dat
+ 2004-10-08 12:01 . 2004-10-08 12:01 4608 c:\windows\temp\spksluvv.dat
+ 2004-10-08 12:01 . 2009-06-14 17:42 407772 c:\windows\system32\perfh009.dat
- 2004-10-08 12:01 . 2009-06-14 07:32 407772 c:\windows\system32\perfh009.dat

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-10-08 15360]
"RocketDock"="c:\program files\RocketDock\RocketDock.exe" [2007-09-02 495616]
"Yahoo! Pager"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2007-08-30 4670704]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-06-21 68856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2004-08-10 59392]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2005-08-25 737369]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-01-31 7405568]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"SunJavaUpdateSched"="c:\program files\Java\jre1.6.0_02\bin\jusched.exe" [2007-07-12 132496]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-04-27 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-12 39792]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-04-24 198160]
"PWRISOVM.EXE"="c:\program files\PowerISO\PWRISOVM.EXE" [2008-03-14 233472]
"High Definition Audio Property Page Shortcut"="HDAShCut.exe" - c:\windows\system32\HdAShCut.exe [2005-01-07 61952]
"RTHDCPL"="RTHDCPL.EXE" - c:\windows\RTHDCPL.exe [2005-12-09 15691264]
"SMSERIAL"="sm56hlpr.exe" - c:\windows\sm56hlpr.exe [2005-09-16 557056]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2007-01-31 1519616]

c:\documents and settings\Administrator.RYAN-6B315B7922\Start Menu\Programs\Startup\
Yahoo! Widget Engine.lnk - c:\program files\Yahoo!\Widgets\YahooWidgetEngine.exe [2007-7-20 2913584]

c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-3-6 113664]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WB]
2001-12-21 05:34 24576 ----a-w- c:\program files\AlienGUIse\fastload.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\wbsys.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Warcraft III\\Warcraft III.exe"=
"c:\\Program Files\\Warcraft III\\War3.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\Program Files\\MSN Messenger\\livecall.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [8/2/2005 4:10 PM 32512]
.
Contents of the 'Scheduled Tasks' folder

2009-06-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-01-10 20:42]
.
- - - - ORPHANS REMOVED - - - -

BHO-{1b93f651-49a9-4961-a605-355986ab883a} - (no file)


.
------- Supplementary Scan -------
.
uStart Page = hxxp://securityresponse.symantec.com/avcenter/fix_homepage/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride =
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: {{d9288080-1baa-4bc4-9cf8-a92d743db949} - c:\documents and settings\Administrator.RYAN-6B315B7922\Start Menu\Programs\IMVU\Run IMVU.lnk
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
FF - component: c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\extensions\{463F6CA5-EE3C-4be1-B7E6-7FEE11953374}\platform\WINNT\components\FoxyTunes.dll
FF - component: c:\program files\Real\RealPlayer\browserrecord\components\nprpbrowserrecordplugin.dll
FF - plugin: c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\extensions\justintvpublisher@justin.tv\platform\WINNT_x86-msvc\plugins\npjustintvpublish.dll
FF - plugin: c:\documents and settings\Administrator.RYAN-6B315B7922\Application Data\Mozilla\Firefox\Profiles\w62z0s2p.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmp071101000055.dll
FF - plugin: c:\program files\kSolo\npAVX.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npyaxmpb.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-14 14:07
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-606747145-287218729-839522115-500\Software\Google\Google Toolbar\Bran3***]
@Allowed: (Read) (RestrictedCode)
"sent"=dword:00000001

[HKEY_USERS\S-1-5-21-606747145-287218729-839522115-500\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID]
@Denied: (Full) (LocalSystem)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(996)
c:\program files\AlienGUIse\fastload.dll

- - - - - - - > 'explorer.exe'(296)
c:\program files\RocketDock\RocketDock.dll
c:\progra~1\COMMON~1\MICROS~1\WEBCOM~1\10\OWC10.DLL
c:\windows\system32\mshtml.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\ehome\ehRecvr.exe
c:\windows\ehome\ehSched.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\wdfmgr.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\wscntfy.exe
c:\windows\ehome\ehmsas.exe
c:\program files\Yahoo!\Messenger\Ymsgr_tray.exe
.
**************************************************************************
.
Completion time: 2009-06-14 14:13 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-14 19:12
ComboFix2.txt 2009-06-14 17:44

Pre-Run: 13,333,241,856 bytes free
Post-Run: 13,312,045,056 bytes free

232 --- E O F --- 2009-05-20 05:01

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
Please download and run this tool.

Download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.

............................................................................................

While my help is always free, please consider donating to keep this site alive: Donate

Malware Doctor and Various Trojans 2wg6fte

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
Malwarebytes' Anti-Malware 1.37
Database version: 2182
Windows 5.1.2600 Service Pack 2

6/14/2009 3:23:44 PM
mbam-log-2009-06-14 (15-23-44).txt

Scan type: Quick Scan
Objects scanned: 105361
Time elapsed: 5 minute(s), 12 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Twain (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\xInsiDERexe (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NWCWorkstation (Backdoor.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Twain (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
c:\documents and settings\localservice.nt authority\application data\bootcfg.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\ClickToFindandFixErrors_US.ico (Malware.Trace) -> Quarantined and deleted successfully.






[I would like put a word of thanks to you guys! Things are moving smoothly, if there is more steps, I will continue. | Best service and very patient.]

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
Click Start > Run and copy/paste the following bolded text into the Run box and click OK:

ComboFix /u

Malware Doctor and Various Trojans CF_Cleanup

This will also reset your restore points.

How is the machine running now?

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
Malware Doctor and Various Trojans DXwU4
Malware Doctor and Various Trojans VvYDg

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
The machine is running real smooth now.
Now just hoping not receiving this problem again!

Thanks! Let me see if my proxy/ports work now.

**EDIT**

Works perfect! Hooray!

Thanks for everything! Never thought this would be a long process!

Problem Solved!

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
Hello.
Before you go, need you to run this otherwise your automatic updates won't work.

These services needs resetting back to their default value.

O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: Automatic Updates (wuauserv) - Unknown owner - C:\WINDOWS\

Please download this fix tool from here.

Double click it to run it.
Allow it to run if protection programs stop it.
The services should now be back to default value and no longer appear in Hijack This.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
Malware Doctor and Various Trojans DXwU4
Malware Doctor and Various Trojans VvYDg

descriptionMalware Doctor and Various Trojans EmptyRe: Malware Doctor and Various Trojans

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum