Hello,

I am pretty sure I have accidentally downloaded and run a Trojan. Since then, IE opens by itself and is directed to some strange URL. Then multiple tabs open. Then other windows of IE open...

I read the posts at http://www.daniweb.com/forums/thread214920.html, which discuss the same problem. I've downloaded and run some of the programs recommended in those threads but unfortunately the problem is still there.

Anyone with experience can please give me a hand? That would be so much appreciated! Thank you!

F

Hi, Welcome to Daniweb,
What programs have you used and where are the logs? We really can't advise anything until we get a bit more info, especially the logs of the programs you have run.

Hello, I am new to Daniweb - apologies if I am wrong to say this, had something similar posted myself a few days ago and it turned out to be my keyboard.

Hello, I am new to Daniweb - apologies if I am wrong to say this, had something similar posted myself a few days ago and it turned out to be my keyboard.

No - You're fine to post that. After all, they linked to your thread, so probably a good idea to post that...

I was going to post something similar, but figured Judy had it covered.

This is most likely malware with the misdirection to strange url and then the multiple IE opening....

PP :)

Sorry PP, didn't get back here. fabianslo, you need to post those logs for us Ok? Especially the MBA-M log, if you ran it, and HiJackThis.

goto google dwn laod trojan remover www.simplysup.com/ it will give you 30 days to remove your trojans

johnzzz.57 realize you want to help but the poster has not posted logs from programs all ready run. We need to see THOSE logs before deciding on how to proceed further.
fabianslo, please do not run any other programs. We need to see the logs from the ones you have run all ready and need more information on your system itself before deciding how to go further.
Judy

Dear all,

Thank you so much for all your answers. I really appreciate that you are taking the time to help a complete stranger. You guys are great!

Last night I left a few anti-malware programs running. I think one of them got the Trojan. At the very least two things are true: 1. The anti-malware program claims to have found and deleted a Trojan and 2. The problem has not recurred during the whole day today (Yesterday not 10 minutes would go by without IE starting up on its own).

I understand that I should not run into concluding the problem is solved, right? Do you guys think I should still re-run the tests and post the logs (unfortunately i did not keep the logs from my first run of tests)? My notebook is my main tool for work and I need to be able to trust it is gonna work OK. For example, I am going to an international conference next week and I need to know I will be able to run my presentation safely without IE starting up in the middle of it.

Please let me repeat how much I appreciate your help. Thank you!

Best,
Fabian

johnzzz.57 realize you want to help but the poster has not posted logs from programs all ready run. We need to see THOSE logs before deciding on how to proceed further.
fabianslo, please do not run any other programs. We need to see the logs from the ones you have run all ready and need more information on your system itself before deciding how to go further.
Judy

I understand that I should not run into concluding the problem is solved, right? Do you guys think I should still re-run the tests and post the logs (unfortunately i did not keep the logs from my first run of tests)?

Fabian, we can't give you any answers because we have no idea the names of the programs you actually ran. If you ran the program from the link you gave then evidently it was combofix, which is most definitely a program that SHOULD NOT be run without first being told to run it. PP made that very clear in that thread. That is the only program noted in that thread. If this is the one you did run the log can be found at C:\ComboFix.txt.
You say you ran PROGRAMS...What programs? You, for some reason, are not being forthcoming here on what you have done. I have no idea why but we cannot offer ANY suggestions or conclusions until we know EXACTLY what was done. Just saying programs tells us absolutely nothing. There are good programs and bad programs out there, many of both, but we have no idea of even one that you ran. We will not offer advice until we see the logs or know the exact names of the programs you ran.
So NO I will not say your computer is clean.

Fabian, we can't give you any answers because we have no idea the names of the programs you actually ran. If you ran the program from the link you gave then evidently it was combofix, which is most definitely a program that SHOULD NOT be run without first being told to run it. PP made that very clear in that thread. That is the only program noted in that thread. If this is the one you did run the log can be found at C:\ComboFix.txt.
You say you ran PROGRAMS...What programs? You, for some reason, are not being forthcoming here on what you have done. I have no idea why but we cannot offer ANY suggestions or conclusions until we know EXACTLY what was done. Just saying programs tells us absolutely nothing. There are good programs and bad programs out there, many of both, but we have no idea of even one that you ran. We will not offer advice until we see the logs or know the exact names of the programs you ran.
So NO I will not say your computer is clean.

Here is the log from Malwarebytes' Anti-malware (this is the program that I think took care of the problem):

Malwarebytes' Anti-Malware 1.40
Database version: 2735
Windows 6.0.6001 Service Pack 1

9/4/2009 11:23:48 AM
mbam-log-2009-09-04 (11-23-48).txt

Scan type: Full Scan (C:\|D:\|F:\|)
Objects scanned: 435891
Time elapsed: 8 hour(s), 23 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\ByteLinker (PUP.BitSpirit) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
F:\Maxtor backup\FABIAN-PC\C\Users\Fabian\AppData\Local\VirtualStore\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe -startup (Trojan.Downloader) -> Quarantined and deleted successfully.
F:\Maxtor backup\FABIAN-PC\History\Level2\C\Users\Fabian\AppData\Local\VirtualStore\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe -startup (Trojan.Downloader) -> Quarantined and deleted successfully.
F:\Stuff Stored\Software\Acbat\Keygen.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

Thanks, now I need to see a NEW HiJackThis log. From what I see on the MBA-M log there may be other programs you will need to run but I need to see the HJT log.
What OTHER programs did you run? I won't need those logs yet but need to know what they were.

Thanks, now I need to see a NEW HiJackThis log. From what I see on the MBA-M log there may be other programs you will need to run but I need to see the HJT log.
What OTHER programs did you run? I won't need those logs yet but need to know what they were.

OK. Below you can find the log that resulted from a NEW run of HJT. Yesterday I also ran the MS Malicious Software Removal Tool (it found nothing), Spybot (nothing), McAfee antivirus (nothing), CCleaner (run from the trash can, as indicated in the previous thread), and Combofix (I finally located the log from this one, so I can show it to you if you need it. However, it is from before the problem disappeared)

Thank you!
Fabian

Log from HJT follows:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:16:27 PM, on 9/4/2009
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18294)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\System32\WLTRAY.EXE
C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe
C:\Program Files\Roxio\Drag-to-Disc\DrgToDsc.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\Program Files\Common Files\logishrd\LComMgr\Communications_Helper.exe
C:\Program Files\Logitech\QuickCam10\QuickCam10.exe
C:\Program Files\McAfee\Common Framework\UdaterUI.exe
C:\Program Files\Maxtor\OneTouch Status\MaxMenuMgr.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Windows\sttray.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Microsoft Firewall Client 2004\FwcMgmt.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\Common Files\LogiShrd\LComMgr\LVComSX.exe
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSHelpRunner.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Stata10\wmpstata.exe
C:\Program Files\WinEdt Team\WinEdt 5.5\WinEdt.exe
C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrobat.exe
C:\Users\Fabian\Desktop\imabunny.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = CP2:8080
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: Google Web Accelerator Helper - {69A87B7D-DE56-4136-9655-716BA50C19C7} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan Enterprise\scriptcl.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.1.1309.3572\swg.dll
O2 - BHO: Browser Address Error Redirector - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - C:\Program Files\BAE\BAE.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Broadcom Wireless Manager UI] C:\Windows\system32\WLTRAY.exe
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [RoxWatchTray] "C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe"
O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Drag-to-Disc\DrgToDsc.exe"
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe"
O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Program Files\Logitech\QuickCam10\QuickCam10.exe" /hide
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\McAfee\Common Framework\UdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [mxomssmenu] "C:\Program Files\Maxtor\OneTouch Status\maxmenumgr.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Acrobat Assistant 8.0] "C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [SigmatelSysTrayApp] sttray.exe
O4 - HKLM\..\Run: [TrojanScanner] C:\Program Files\Trojan Remover\Trjscan.exe /boot
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Global Startup: Digital Line Detect.lnk = C:\Program Files\Digital Line Detect\DLG.exe
O4 - Global Startup: Microsoft Firewall Client Management.lnk = C:\Program Files\Microsoft Firewall Client 2004\FwcMgmt.exe
O4 - Global Startup: QuickSet.lnk = ?
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O16 - DPF: {001EE746-A1F9-460E-80AD-269E088D6A01} (Infotl Control) - http://libproxy.smith.edu:3149/lib/smithcollege/support/plugins/ebraryRdr.cab
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5) - http://upload.facebook.com/controls/FacebookPhotoUploader5.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAVA/Secure/HPGetDownloadManager.ocx
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GoogleDesktopNetwork3.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Desktop Manager 5.7.806.10245 (GoogleDesktopManager-061008-081103) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Update Service (gupdate1c9d0e15d189180) (gupdate1c9d0e15d189180) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - c:\program files\common files\logishrd\lvmvfm\LVPrcSrv.exe
O23 - Service: LVSrvLauncher - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\SrvLnch\SrvLnch.exe
O23 - Service: MATLAB Server (matlabserver) - Unknown owner - C:\Program Files\MATLAB71\webserver\bin\win32\matlabserver.exe
O23 - Service: Maxtor Service (Maxtor Sync Service) - Seagate Technology LLC - C:\Program Files\Maxtor\Sync\SyncServices.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - McAfee, Inc. - C:\Program Files\McAfee\Common Framework\FrameworkService.exe
O23 - Service: McAfee McShield (McShield) - McAfee, Inc. - C:\Program Files\McAfee\VirusScan Enterprise\mcshield.exe
O23 - Service: McAfee Task Manager (McTaskManager) - McAfee, Inc. - C:\Program Files\McAfee\VirusScan Enterprise\vstskmgr.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exe
O23 - Service: Web Update Wizard Service V4 (WebUpdate4) - Data Perceptions / PowerProgrammer - C:\Windows\system32\WebUpdateSvc4.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\Windows\System32\WLTRYSVC.EXE
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 11288 bytes

Yes, I would like to see that Combofix log.
You also need to Turn Off that TeaTimer portion of SpyBot, it often will interfere with fixes done or attempted.
* Run Spybot-S&D in Advanced Mode
* If it is not already set to do this, go to the Mode menu
select
Advanced Mode
* On the left hand side, click on Tools
* Then click on the Resident icon in the list
* Uncheck
Resident TeaTimer
and OK any prompts.
* Restart your computer

Here is the log from Malwarebytes' Anti-malware (this is the program that I think took care of the problem):

Malwarebytes' Anti-Malware 1.40
Database version: 2735
Windows 6.0.6001 Service Pack 1

9/4/2009 11:23:48 AM
mbam-log-2009-09-04 (11-23-48).txt

Scan type: Full Scan (C:\|D:\|F:\|)
Objects scanned: 435891
Time elapsed: 8 hour(s), 23 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\ByteLinker (PUP.BitSpirit) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
F:\Maxtor backup\FABIAN-PC\C\Users\Fabian\AppData\Local\VirtualStore\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe -startup (Trojan.Downloader) -> Quarantined and deleted successfully.
F:\Maxtor backup\FABIAN-PC\History\Level2\C\Users\Fabian\AppData\Local\VirtualStore\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe -startup (Trojan.Downloader) -> Quarantined and deleted successfully.
F:\Stuff Stored\Software\Acbat\Keygen.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

I removed the Spybot resident as instructed. Here is the log from Combofix:

ComboFix 09-09-02.02 - Fabian 09/03/2009 18:02.2.2 - NTFSx86
Microsoft® Windows Vista™ Home Basic 6.0.6001.1.1252.1.1033.18.2046.1213 [GMT 4:00]
Running from: c:\users\Fabian\Downloads\ComboFix.exe
AV: McAfee VirusScan Enterprise *On-access scanning enabled* (Updated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

F:\Autorun.inf

.
((((((((((((((((((((((((( Files Created from 2009-08-03 to 2009-09-03 )))))))))))))))))))))))))))))))
.

2009-09-03 14:14 . 2009-09-03 14:14 -------- d-----w- c:\users\Public\AppData\Local\temp
2009-09-03 14:14 . 2009-09-03 14:14 -------- d-----w- c:\users\Default\AppData\Local\temp
2009-09-03 13:53 . 2006-06-19 09:01 69632 ----a-w- c:\windows\system32\ztvcabinet.dll
2009-09-03 13:53 . 2006-05-25 11:52 162304 ----a-w- c:\windows\system32\ztvunrar36.dll
2009-09-03 13:53 . 2005-08-25 21:50 77312 ----a-w- c:\windows\system32\ztvunace26.dll
2009-09-03 13:53 . 2003-02-02 16:06 153088 ----a-w- c:\windows\system32\UNRAR3.dll
2009-09-03 13:53 . 2002-03-05 21:00 75264 ----a-w- c:\windows\system32\unacev2.dll
2009-09-03 13:53 . 2009-09-03 13:54 -------- d-----w- c:\program files\Trojan Remover
2009-09-03 13:53 . 2009-09-03 13:53 -------- d-----w- c:\users\Fabian\AppData\Roaming\Simply Super Software
2009-09-03 13:53 . 2009-09-03 13:53 -------- d-----w- c:\programdata\Simply Super Software
2009-09-03 12:47 . 2009-09-03 12:47 -------- d-----w- c:\program files\CCleaner
2009-09-03 11:37 . 2009-09-03 11:55 -------- d-----w- c:\programdata\DriverScanner
2009-09-03 11:26 . 2009-09-03 11:56 -------- d-----w- c:\program files\Uniblue
2009-09-03 11:22 . 2009-09-03 12:44 -------- d-----w- c:\program files\SpywareGuard
2009-09-03 10:07 . 2009-09-03 10:07 -------- d-----w- C:\PerfLogs
2009-09-03 08:24 . 2009-09-03 08:26 -------- d-----w- C:\58732679e37988fa96
2009-09-03 05:55 . 2009-06-22 10:22 2048 ----a-w- c:\windows\system32\tzres.dll
2009-09-03 05:38 . 2008-06-20 01:17 97800 ----a-w- c:\windows\system32\infocardapi.dll
2009-09-03 05:38 . 2008-06-20 01:18 105016 ----a-w- c:\windows\system32\PresentationCFFRasterizerNative_v0300.dll
2009-09-03 05:38 . 2008-06-20 01:17 622080 ----a-w- c:\windows\system32\icardagt.exe
2009-09-03 05:38 . 2008-06-20 01:18 43544 ----a-w- c:\windows\system32\PresentationHostProxy.dll
2009-09-03 05:38 . 2008-06-20 01:17 11264 ----a-w- c:\windows\system32\icardres.dll
2009-09-03 05:38 . 2008-06-20 01:18 781344 ----a-w- c:\windows\system32\PresentationNative_v0300.dll
2009-09-03 05:37 . 2008-06-20 01:18 326160 ----a-w- c:\windows\system32\PresentationHost.exe
2009-09-03 05:19 . 2008-07-27 18:00 96760 ----a-w- c:\windows\system32\dfshim.dll
2009-09-03 05:19 . 2008-07-27 18:00 282112 ----a-w- c:\windows\system32\mscoree.dll
2009-09-03 05:19 . 2008-07-27 18:00 41984 ----a-w- c:\windows\system32\netfxperf.dll
2009-09-03 05:18 . 2008-07-27 18:00 158720 ----a-w- c:\windows\system32\mscorier.dll
2009-09-03 05:18 . 2008-07-27 18:00 83968 ----a-w- c:\windows\system32\mscories.dll
2009-09-01 09:39 . 2009-09-01 09:39 -------- d-----w- c:\program files\Hewlett-Packard
2009-08-28 16:37 . 2009-08-28 16:37 47 ---h--r- c:\windows\ghdc.dat
2009-08-28 16:37 . 2009-09-03 11:52 -------- d-----w- c:\program files\EViews5
2009-08-28 10:17 . 2009-08-28 10:17 45 ---h--r- c:\windows\pjd_user.dat
2009-08-28 10:17 . 2009-08-28 10:17 -------- d-----w- c:\users\Fabian\AppData\Roaming\Quantitative Micro Software
2009-08-27 18:22 . 2009-08-27 18:22 -------- d-----w- c:\program files\DjVuZone
2009-08-27 14:21 . 1998-04-08 01:04 1000 ----a-w- c:\windows\svdt.dat
2009-08-27 14:14 . 1995-02-28 07:16 211488 ----a-w- c:\windows\system32\BWCC32.DLL
2009-08-27 14:12 . 2009-08-28 15:16 -------- d-----w- c:\program files\Eviews3
2009-08-27 14:12 . 1997-08-26 08:06 315904 ----a-w- c:\windows\IsUninst.exe
2009-08-26 15:03 . 2009-08-29 18:13 -------- d-----w- c:\users\Fabian\.ebrary
2009-08-25 18:31 . 2009-08-27 14:28 -------- d-----w- c:\programdata\Norton
2009-08-25 18:31 . 2009-08-25 18:31 -------- d-----w- c:\programdata\NortonInstaller
2009-08-25 12:27 . 2009-08-25 12:27 -------- d-----w- c:\windows\system32\Adobe
2009-08-22 13:57 . 2009-08-22 13:57 -------- d-----w- c:\windows\system32\IOSUBSYS
2009-08-20 14:05 . 2009-08-20 14:05 -------- d-----w- c:\users\Fabian\AppData\Roaming\Red Chair Software
2009-08-20 14:05 . 2009-09-03 11:30 -------- d-----w- c:\program files\Red Chair Software
2009-08-18 11:27 . 2009-07-17 14:35 71680 ----a-w- c:\windows\system32\atl.dll
2009-08-18 11:27 . 2009-06-10 12:12 160256 ----a-w- c:\windows\system32\wkssvc.dll
2009-08-18 11:26 . 2009-06-04 12:34 2066432 ----a-w- c:\windows\system32\mstscax.dll
2009-08-18 11:26 . 2008-01-19 07:36 53248 ----a-w- c:\windows\system32\tsgqec.dll
2009-08-18 11:26 . 2008-01-19 07:33 136192 ----a-w- c:\windows\system32\aaclient.dll
2009-08-18 11:26 . 2009-06-10 12:07 91136 ----a-w- c:\windows\system32\avifil32.dll
2009-08-18 11:26 . 2008-01-19 07:35 31232 ----a-w- c:\windows\system32\msvidc32.dll
2009-08-18 11:26 . 2008-01-19 07:35 123904 ----a-w- c:\windows\system32\msvfw32.dll
2009-08-18 11:26 . 2009-07-14 13:00 313344 ----a-w- c:\windows\system32\wmpdxm.dll
2009-08-18 11:26 . 2009-07-14 12:58 7680 ----a-w- c:\windows\system32\spwmp.dll
2009-08-18 11:26 . 2009-07-14 12:59 4096 ----a-w- c:\windows\system32\dxmasf.dll
2009-08-18 11:26 . 2009-07-14 10:59 8147456 ----a-w- c:\windows\system32\wmploc.DLL
2009-08-18 09:43 . 2009-08-18 09:43 -------- d-----w- c:\program files\Microsoft Firewall Client 2004
2009-08-13 08:12 . 2009-08-13 08:12 -------- d-----w- c:\users\Fabian\AppData\Roaming\QuosaDDM
2009-08-12 13:57 . 2009-08-15 12:07 -------- d-----w- c:\users\Fabian\AppData\Roaming\skypePM
2009-08-12 13:56 . 2009-08-15 13:56 -------- d-----w- c:\users\Fabian\AppData\Roaming\Skype
2009-08-12 13:36 . 2009-08-12 13:36 -------- d-----w- c:\program files\Common Files\Skype
2009-08-12 13:36 . 2009-08-12 13:37 -------- d-----r- c:\program files\Skype
2009-08-12 13:36 . 2009-08-12 13:36 -------- d-----w- c:\programdata\Skype

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-09-03 13:14 . 2008-11-04 01:58 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2009-09-03 12:03 . 2008-11-04 01:58 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-09-03 11:55 . 2008-03-26 00:16 -------- d-----w- c:\users\Fabian\AppData\Roaming\Uniblue
2009-09-03 11:52 . 2007-02-05 10:21 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-09-03 10:13 . 2006-11-02 12:35 -------- d-----w- c:\program files\Windows Calendar
2009-09-03 10:13 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2009-09-03 10:13 . 2006-11-02 12:35 -------- d-----w- c:\program files\Windows Sidebar
2009-09-03 10:13 . 2006-11-02 12:35 -------- d-----w- c:\program files\Windows Collaboration
2009-09-03 10:13 . 2006-11-02 12:35 -------- d-----w- c:\program files\Windows Photo Gallery
2009-09-03 10:13 . 2006-11-02 12:35 -------- d-----w- c:\program files\Windows Defender
2009-09-03 08:58 . 2006-11-02 10:32 101888 ----a-w- c:\windows\system32\ifxcardm.dll
2009-09-03 08:58 . 2006-11-02 10:32 82432 ----a-w- c:\windows\system32\axaltocm.dll
2009-09-02 21:39 . 2009-05-09 20:03 -------- d-----w- c:\programdata\Google Updater
2009-09-02 07:55 . 2008-08-04 19:41 -------- d-----w- c:\users\Fabian\AppData\Roaming\WinEdt
2009-09-01 08:09 . 2008-04-10 22:42 -------- d-----w- c:\program files\Stata10
2009-08-31 14:04 . 2007-02-13 17:05 128336 ----a-w- c:\users\Fabian\AppData\Local\GDIPFONTCACHEV1.DAT
2009-08-28 16:27 . 2007-02-05 10:32 -------- d-----w- c:\programdata\Roxio
2009-08-27 14:31 . 2007-02-05 10:40 -------- d-----w- c:\program files\Google
2009-08-25 18:31 . 2007-02-05 10:35 -------- d-----w- c:\programdata\Symantec
2009-08-25 12:39 . 2007-02-05 10:21 -------- d-----w- c:\program files\Java
2009-08-12 13:57 . 2009-08-12 13:57 48 ---ha-w- c:\programdata\ezsidmv.dat
2009-08-12 13:22 . 2008-08-18 01:28 -------- d-----w- c:\program files\Microsoft Silverlight
2009-08-11 14:25 . 2007-02-05 10:41 -------- d-----w- c:\program files\Microsoft Works
2009-07-31 19:23 . 2007-04-01 00:11 -------- d-----w- c:\programdata\McAfee
2009-07-25 01:23 . 2009-07-31 19:25 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-07-18 16:06 . 2009-07-29 06:02 827904 ----a-w- c:\windows\system32\wininet.dll
2009-07-18 16:01 . 2009-07-29 06:02 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-07-18 09:46 . 2009-07-29 06:02 26624 ----a-w- c:\windows\system32\ieUnatt.exe
2009-06-15 15:24 . 2009-07-22 18:15 156672 ----a-w- c:\windows\system32\t2embed.dll
2009-06-15 15:20 . 2009-07-22 18:15 72704 ----a-w- c:\windows\system32\fontsub.dll
2009-06-15 15:20 . 2009-07-22 18:15 10240 ----a-w- c:\windows\system32\dciman32.dll
2009-06-15 12:52 . 2009-07-22 18:15 289792 ----a-w- c:\windows\system32\atmfd.dll
2008-08-07 00:49 . 2008-08-07 00:49 122880 ----a-w- c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
2007-02-05 18:05 . 2007-02-05 18:05 8192 --sha-w- c:\windows\Users\Default\NTUSER.DAT
.

((((((((((((((((((((((((((((( SnapShot@2009-09-03_12.31.41 )))))))))))))))))))))))))))))))))))))))))
.
+ 2007-02-05 10:56 . 2009-09-03 13:33 49506 c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
+ 2006-11-02 13:02 . 2009-09-03 13:33 63288 c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
+ 2007-02-13 17:06 . 2009-09-03 13:33 10616 c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-2928492467-2777089629-2887363301-1001_UserData.bin
- 2006-11-02 10:25 . 2006-11-02 09:46 17408 c:\windows\System32\PJLMON.DLL
+ 2006-11-02 10:25 . 2008-01-19 07:36 17408 c:\windows\System32\PJLMON.DLL
+ 2007-02-13 17:01 . 2009-09-03 14:00 16384 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2007-02-13 17:01 . 2009-09-03 12:16 16384 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2007-02-13 17:01 . 2009-09-03 14:00 32768 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2007-02-13 17:01 . 2009-09-03 12:16 32768 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2007-02-13 17:01 . 2009-09-03 14:00 16384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2007-02-13 17:01 . 2009-09-03 12:16 16384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2009-09-03 13:29 . 2009-09-03 13:29 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
- 2009-09-03 10:22 . 2009-09-03 10:22 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
+ 2009-09-03 13:29 . 2009-09-03 13:29 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2009-09-03 10:22 . 2009-09-03 10:22 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
+ 2006-11-02 10:33 . 2009-09-03 13:38 595684 c:\windows\System32\perfh009.dat
- 2006-11-02 10:33 . 2009-09-03 10:29 595684 c:\windows\System32\perfh009.dat
- 2006-11-02 10:33 . 2009-09-03 10:29 101350 c:\windows\System32\perfc009.dat
+ 2006-11-02 10:33 . 2009-09-03 13:38 101350 c:\windows\System32\perfc009.dat
- 2006-11-02 10:22 . 2009-09-03 10:32 6291456 c:\windows\System32\SMI\Store\Machine\SCHEMA.DAT
+ 2006-11-02 10:22 . 2009-09-03 13:08 6291456 c:\windows\System32\SMI\Store\Machine\SCHEMA.DAT
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-11-17 815104]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2006-11-27 1540096]
"ATICCC"="c:\program files\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-07-11 90112]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-10-03 81920]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2006-11-05 221184]
"RoxioDragToDisc"="c:\program files\Roxio\Drag-to-Disc\DrgToDsc.exe" [2006-08-17 1116920]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-08-07 29744]
"ECenter"="c:\dell\E-Center\EULALauncher.exe" [2009-08-28 26112]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2006-10-03 221184]
"LogitechCommunicationsManager"="c:\program files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe" [2006-12-22 497176]
"LogitechQuickCamRibbon"="c:\program files\Logitech\QuickCam10\QuickCam10.exe" [2006-12-22 756248]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\UdaterUI.exe" [2006-11-17 136768]
"ShStatEXE"="c:\program files\McAfee\VirusScan Enterprise\SHSTAT.EXE" [2009-01-28 111952]
"mxomssmenu"="c:\program files\Maxtor\OneTouch Status\maxmenumgr.exe" [2008-07-21 169312]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-09-06 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-10-01 289576]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]
"Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe" [2008-10-15 623992]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-07-25 149280]
"TrojanScanner"="c:\program files\Trojan Remover\Trjscan.exe" [2009-08-04 1068424]
"SigmatelSysTrayApp"="sttray.exe" - c:\windows\sttray.exe [2006-12-01 303104]

c:\users\Fabian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
SpywareGuard.lnk - c:\program files\SpywareGuard\sgmain.exe [2003-8-29 360448]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2007-2-5 50688]
Microsoft Firewall Client Management.lnk - c:\program files\Microsoft Firewall Client 2004\FwcMgmt.exe [2006-12-9 117568]
QuickSet.lnk - c:\windows\Installer\{53A01CC6-14B0-4512-A2E7-10D39BF83DC4}\NewShortcut2_53A01CC614B04512A2E710D39BF83DC4.exe [2007-2-5 45056]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Google\GOOGLE~1\GoogleDesktopNetwork3.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{830A2310-A725-47CD-8C8B-0076BCE7C7F3}"= c:\program files\MSN Messenger\livecall.exe:Windows Live Messenger 8.1 (Phone)
"{ACF07A20-7A12-48D3-8460-6B4F28448A6D}"= UDP:c:\program files\McAfee\Common Framework\FrameworkService.exe:McAfee Framework Service
"{72EF3889-75C3-414A-889A-D2FA7ED823B8}"= TCP:c:\program files\McAfee\Common Framework\FrameworkService.exe:McAfee Framework Service
"TCP Query User{EDA76732-9884-4DE6-86DB-0AA02E0E1208}c:\\program files\\internet explorer\\iexplore.exe"= UDP:c:\program files\internet explorer\iexplore.exe:Internet Explorer
"UDP Query User{164C5F8B-4E79-4291-A730-3C95F9B55764}c:\\program files\\internet explorer\\iexplore.exe"= TCP:c:\program files\internet explorer\iexplore.exe:Internet Explorer
"TCP Query User{AFA2958E-70DF-422A-8ACA-2784F6259685}c:\\program files\\mozilla firefox\\firefox.exe"= UDP:c:\program files\mozilla firefox\firefox.exe:Firefox
"UDP Query User{0D3F3321-09E4-4F5D-9E3B-C03DC50ABA78}c:\\program files\\mozilla firefox\\firefox.exe"= TCP:c:\program files\mozilla firefox\firefox.exe:Firefox
"TCP Query User{FD049FEA-0262-4654-A79D-862A5E202F51}c:\\program files\\mozilla firefox\\firefox.exe"= UDP:c:\program files\mozilla firefox\firefox.exe:Firefox
"UDP Query User{6D75435C-5DA0-4237-A078-4CD1679BE49E}c:\\program files\\mozilla firefox\\firefox.exe"= TCP:c:\program files\mozilla firefox\firefox.exe:Firefox
"{74A33EBD-F224-44D7-AE0C-C72BBA5697FD}"= Disabled:UDP:c:\users\Fabian\Desktop\d2d3290.exe:d2d3290
"{C7FE8140-D96A-4235-96D0-54769C95F6ED}"= Disabled:TCP:c:\users\Fabian\Desktop\d2d3290.exe:d2d3290
"TCP Query User{6F98E8EB-97E4-4A1A-82D3-4E0A72122508}c:\\program files\\bitspirit\\bitspirit.exe"= UDP:c:\program files\bitspirit\bitspirit.exe:The powerful and easy-to-use BitTorrent Client
"UDP Query User{E3B7E7AA-D277-4DF3-9DFC-AA550AAFF17F}c:\\program files\\bitspirit\\bitspirit.exe"= TCP:c:\program files\bitspirit\bitspirit.exe:The powerful and easy-to-use BitTorrent Client
"{F30F431D-C3CF-44FF-976B-81FB3C28CB82}"= UDP:c:\program files\Bonjour\mDNSResponder.exe:Bonjour
"{751D19F3-1DA4-4026-B119-4E55525949CE}"= TCP:c:\program files\Bonjour\mDNSResponder.exe:Bonjour
"{71AB2D60-D5B6-4286-9B1E-293E936F77A6}"= UDP:c:\program files\iTunes\iTunes.exe:iTunes
"{106A4246-4038-45AA-9B26-E3456B6D7FA1}"= TCP:c:\program files\iTunes\iTunes.exe:iTunes
"TCP Query User{49BB826C-DD54-4BC3-90A8-0E96D565FE9E}c:\\program files\\tvuplayer\\tvuplayer.exe"= UDP:c:\program files\tvuplayer\tvuplayer.exe:TVUPlayer Component
"UDP Query User{27F9E7BB-ACD6-4266-9BAA-ACC4DB52F849}c:\\program files\\tvuplayer\\tvuplayer.exe"= TCP:c:\program files\tvuplayer\tvuplayer.exe:TVUPlayer Component
"TCP Query User{D9D30C35-98E1-49ED-B258-D950586B8440}c:\\program files\\sopcast\\sopcast.exe"= UDP:c:\program files\sopcast\sopcast.exe:SopCast Main Application
"UDP Query User{51E0906D-77D6-4C6A-B716-75A13C840649}c:\\program files\\sopcast\\sopcast.exe"= TCP:c:\program files\sopcast\sopcast.exe:SopCast Main Application
"TCP Query User{229E5394-5A42-434F-95A8-9293402E8A7F}c:\\program files\\sopcast\\adv\\sopadver.exe"= UDP:c:\program files\sopcast\adv\sopadver.exe:SopCast Adver
"UDP Query User{1795D2FE-1A80-41F6-9FC1-6777034E299E}c:\\program files\\sopcast\\adv\\sopadver.exe"= TCP:c:\program files\sopcast\adv\sopadver.exe:SopCast Adver
"TCP Query User{AB08F459-A96C-46F0-BC31-72F89FADAE0E}c:\\program files\\tvants\\tvants.exe"= UDP:c:\program files\tvants\tvants.exe:TVAnts
"UDP Query User{2D381C55-F05F-4C1D-8502-A589CB116AA7}c:\\program files\\tvants\\tvants.exe"= TCP:c:\program files\tvants\tvants.exe:TVAnts
"TCP Query User{5DBB3FA5-7A5C-45FD-B5EA-81578768EC72}c:\\program files\\uusee\\uuseeplayer.exe"= UDP:c:\program files\uusee\uuseeplayer.exe:UUPlayer
"UDP Query User{99339244-75C2-450C-BE86-F16988787000}c:\\program files\\uusee\\uuseeplayer.exe"= TCP:c:\program files\uusee\uuseeplayer.exe:UUPlayer
"TCP Query User{9B32A77C-88E3-4405-9AE1-1ECCE50E9018}c:\\program files\\sopcast\\sopcast.exe"= UDP:c:\program files\sopcast\sopcast.exe:SopCast Main Application
"UDP Query User{9A115BD6-B775-469C-84FF-A1CD3ECA2E7B}c:\\program files\\sopcast\\sopcast.exe"= TCP:c:\program files\sopcast\sopcast.exe:SopCast Main Application
"TCP Query User{2E3D0CA3-43E8-47B5-9CA6-ACE5374C0E36}c:\\program files\\tvants\\tvants.exe"= UDP:c:\program files\tvants\tvants.exe:TVAnts
"UDP Query User{1678DE55-8C7D-45A9-83F8-E678030378FC}c:\\program files\\tvants\\tvants.exe"= TCP:c:\program files\tvants\tvants.exe:TVAnts
"{1C42F22A-B029-4CC9-BE53-CC036C4DF0DF}"= c:\program files\Skype\Phone\Skype.exe:Skype
"{4F416FCA-4598-4591-AB62-6EAD27D41CBC}"= Disabled:UDP:c:\program files\Red Chair Software\Anapod Explorer\anamgr.exe:Anapod Xtreamer
"{7C01A673-8171-4D2B-A017-E5973BDC4A0F}"= Disabled:TCP:c:\program files\Red Chair Software\Anapod Explorer\anamgr.exe:Anapod Xtreamer

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List]
"c:\\Program Files\\uusee\\UUSeePlayer.exe"= c:\program files\uusee\UUSeePlayer.exe:*:Enabled:UUPlayer

R2 FwcAgent;Firewall Client Agent;c:\program files\Microsoft Firewall Client 2004\FwcAgent.exe [12/9/2006 7:04 PM 128832]
R2 WebUpdate4;Web Update Wizard Service V4;c:\windows\System32\WebUpdateSvc4.exe [6/25/2007 8:19 PM 229592]
S2 gupdate1c9d0e15d189180;Google Update Service (gupdate1c9d0e15d189180);c:\program files\Google\Update\GoogleUpdate.exe [5/10/2009 12:04 AM 133104]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2/5/2007 2:40 PM 29744]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
Contents of the 'Scheduled Tasks' folder

2009-09-03 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-05-09 20:02]

2009-09-03 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-05-09 20:04]

2009-09-03 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-05-09 20:04]

2009-08-31 c:\windows\Tasks\Spybot - Search & Destroy - Scheduled Task.job
- c:\program files\Spybot - Search & Destroy\SpybotSD.exe [2009-09-02 11:31]

2009-09-03 c:\windows\Tasks\User_Feed_Synchronization-{7621E4C9-0CD7-4F23-AC17-179671320F40}.job
- c:\windows\system32\msfeedssync.exe [2008-09-17 07:33]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = <local>
uInternet Settings,ProxyServer = CP2:8080
LSP: c:\program files\Microsoft Firewall Client 2004\FwcWsp.dll
FF - ProfilePath - c:\users\Fabian\AppData\Roaming\Mozilla\Firefox\Profiles\tjl3k6w4.default\
FF - prefs.js: browser.startup.homepage - about:blank
FF - component: c:\program files\Mozilla Firefox\components\GoogleDesktopMozilla.dll
FF - plugin: c:\program files\Google\Google Earth Plugin\npgeplugin.dll
FF - plugin: c:\program files\Google\Google Updater\2.4.1536.6592\npCIDetect13.dll
FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\program files\Google\Update\1.2.183.7\npGoogleOneClick8.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npGoogleGadgetPluginFirefoxWin.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\NPInfotl.dll
FF - plugin: c:\users\Fabian\AppData\Roaming\Mozilla\Firefox\Profiles\tjl3k6w4.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmp071303000006.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-09-03 18:14
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-2928492467-2777089629-2887363301-1001\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{37EBAB41-A3E1-B180-FF44-0BDBCF753535}*]
"dagfddon"=hex:64,62,66,64,6a,70,6f,65,63,6d,6a,62,65,6e,61,64,63,61,61,6d,68,
61,6e,67,67,69,70,6e,65,67,6e,69,66,66,6a,69,66,6f,61,69,00,00
"iajdfomgflfmgakppj"=hex:6a,61,6e,6b,6c,66,6d,70,6e,61,69,65,6c,68,6b,6d,62,6b,
65,66,00,00
"haddnnjcagpfolig"=hex:6b,61,6f,6b,6d,66,66,68,63,6b,61,70,68,6e,6e,61,6b,6d,
61,65,61,69,00,00

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2009-09-03 18:17
ComboFix-quarantined-files.txt 2009-09-03 14:17
ComboFix2.txt 2009-09-03 12:35

Pre-Run: 8,193,552,384 bytes free
Post-Run: 8,147,013,632 bytes free

292 --- E O F --- 2009-09-03 09:05

THANKS

Sorry it has taken me so long to get back to you. I apologize. I was out of town for part of the weekend and then...just missed your post.
I see parts of Two anti-virus programs there on both the HJT log and the Combofix log. You said you are running McAfee, but there ARE files from Norton/Symantec showing there. You need to FULLY Uninstall this. Norton has a removal tool you should run.
There are also other programs which really need to go also.
They really are unnecessary.
Can you run HiJackThis again but this time get me an Uninstall List and I will tell you which ones need to go.
To get the Uninstall list do the following:
1. Start HijackThis
2. Click on the Config button
3. Click on the Misc Tools button
4. Click on the Open Uninstall Manager button.
Click on the Save list... button and specify where you would like to save this file. When you press Save button a notepad will open with the contents of that file. Simply copy and paste the contents of that notepad into a reply

Sorry it has taken me so long to get back to you. I apologize. I was out of town for part of the weekend and then...just missed your post.
I see parts of Two anti-virus programs there on both the HJT log and the Combofix log. You said you are running McAfee, but there ARE files from Norton/Symantec showing there. You need to FULLY Uninstall this. Norton has a removal tool you should run.
There are also other programs which really need to go also.
They really are unnecessary.
Can you run HiJackThis again but this time get me an Uninstall List and I will tell you which ones need to go.
To get the Uninstall list do the following:
1. Start HijackThis
2. Click on the Config button
3. Click on the Misc Tools button
4. Click on the Open Uninstall Manager button.
Click on the Save list... button and specify where you would like to save this file. When you press Save button a notepad will open with the contents of that file. Simply copy and paste the contents of that notepad into a reply

Thanks again for your help. I have run the symantec uninstaller and it worked fine. This is the uninstall list from HJT:

ABC Amber EPS Converter
ActivePerl 5.10.0 Build 1004
Adobe Acrobat 8.1.4 Professional
Adobe Flash Player 10 Plugin
Adobe Flash Player ActiveX
Adobe Reader 8.1.6
Adobe Shockwave Player 11.5
AFPL Ghostscript 8.54
AFPL Ghostscript Fonts
Apple Mobile Device Support
Apple Software Update
ATI Catalyst Control Center Ex
BitSpirit v3.3.2.352 Stable
Bonjour
CCleaner (remove only)
Compatibility Pack for the 2007 Office system
Conexant HDA D110 MDC V.92 Modem
Corel Snapfire Plus
Dell Wireless WLAN Card
DellSupport
Digital Line Detect
DivX Converter
DivX Player
DivX Web Player
DjVuLibre+DjView
ESET Online Scanner v3
EViews 3
Global Development Finance 2004
Google Desktop
Google Earth Plugin
Google Toolbar for Internet Explorer
Google Toolbar for Internet Explorer
Google Update Helper
Google Updater
Google Web Accelerator
GPL Ghostscript 8.60
GPL Ghostscript 8.63
GPL Ghostscript Fonts
GSview 4.9
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
HP Driver Diagnostics
InfraRecorder
Inkscape 0.46
International Monetary Fund - IFS
iTunes
Java(TM) 6 Update 15
Java(TM) SE Runtime Environment 6
Logitech QuickCam
Malwarebytes' Anti-Malware
Mathematica 5
MATLAB 7.1
Maxtor Manager
Maxtor Manager
McAfee VirusScan Enterprise
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1
Microsoft Firewall Client
Microsoft Office Professional Edition 2003
Microsoft Office Small Business Edition 2003
Microsoft Silverlight
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
Microsoft Visual C++ 2005 Redistributable
Microsoft Works
MiKTeX 2.7
Modem Diagnostic Tool
Mozilla Firefox (3.5.2)
MSXML 4.0 SP2 (KB925672)
MSXML 4.0 SP2 (KB927978)
MSXML 4.0 SP2 (KB936181)
MSXML 4.0 SP2 (KB941833)
MSXML 4.0 SP2 (KB954430)
NetWaiting
PeaZip 1.9.2
Perl Express 2.5
Picasa 3
QuickSet
QuickTime
R for Windows 2.6.2
Rhapsody Player Engine
Roxio Creator Audio
Roxio Creator BDAV Plugin
Roxio Creator Copy
Roxio Creator Data
Roxio Creator DE
Roxio Creator Tools
Roxio Drag-to-Disc
Roxio Express Labeler
Roxio MyDVD DE
Roxio Update Manager
Security Update for CAPICOM (KB931906)
Security Update for CAPICOM (KB931906)
SigmaTel Audio
Skypeâ„¢ 4.1
Sonic Activation Module
Spelling Dictionaries Support For Adobe Reader 8
Spybot - Search & Destroy
Stat/Transfer Nine
Stata 10
Synaptics Pointing Device Driver
Tar-1.13 Binaries (GnuWin32)
Tar-1.13 Sources (GnuWin32)
Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
URL Assistant
User's Guides
Web Update Wizard (Redistributable) 4.0
Windows Live Messenger
Windows Live Sign-in Assistant
Windows Media Player Firefox Plugin
WinSCP 3.8.2
World Development Indicators 2004

Looking at ALL the logs again, ALL of the infections appear to be or have been in your "F" drive, none of them have been found on your "C" drive.
Is "F" your backup drive?
I have seen this recently, with a much more infected computer. The person was backing up everything to his external drive BEFORE running his security programs. So the computer would of course be cleaned if there was infection there but the backup drive contained the infections and so would reinfect the computer. Is this how you are doing things?

Looking at ALL the logs again, ALL of the infections appear to be or have been in your "F" drive, none of them have been found on your "C" drive.
Is "F" your backup drive?
I have seen this recently, with a much more infected computer. The person was backing up everything to his external drive BEFORE running his security programs. So the computer would of course be cleaned if there was infection there but the backup drive contained the infections and so would reinfect the computer. Is this how you are doing things?

I have an external drive that automatically backups my files every day (F drive). So I guess you are right. How bad is the infection? Is there something to be done? The computer seems to be working fine now... Thanks

Well there has to be a better way backing up, that's for sure. You really need to maybe stop the automatic backups for one thing. Do it manually AFTER you are assured the computer is clean. Because really what you are doing is backing up infections.
I think one thing you MUST do right now is scan ONLY that backup drive with multiple programs and make sure it is clean.

The OTHER key thing here is obviously there is something you are doing to keep bringing in all these infections. Your security certainly has some holes in it.
Do you download a lot of things...music, pictures, games, etc? If so from WHERE? Legitimate web sites or is there a lot of P2P going on? That is absolutely the EASIEST way to get infected.
You know since I have seen this happen twice now in just a matter of days I really wonder if people are using these backups correctly. I will be honest, I have no way of doing this, I have no external drive. The only thing I actually back up are my personal files...pictures mainly and a few documents but I just save them to CD's . Probably not the way many would recommend but at this point it is what I am limited to doing. Having now seen two computers with backup external drives backing up infections, kind of makes me wonder.
I don't "believe" yours is a bad as the other fellows...his incorporated multiple computers, some he didn't even own anymore and a massive amount of personal files. ALL were compromised and he was forced to format that external drive lost everything he had on there as there was no way to risk moving possibly infected files to another medium or computer. There were so many...thousands, that to scan each one was totally impossible to do.

Well there has to be a better way backing up, that's for sure. You really need to maybe stop the automatic backups for one thing. Do it manually AFTER you are assured the computer is clean. Because really what you are doing is backing up infections.
I think one thing you MUST do right now is scan ONLY that backup drive with multiple programs and make sure it is clean.

The OTHER key thing here is obviously there is something you are doing to keep bringing in all these infections. Your security certainly has some holes in it.
Do you download a lot of things...music, pictures, games, etc? If so from WHERE? Legitimate web sites or is there a lot of P2P going on? That is absolutely the EASIEST way to get infected.
You know since I have seen this happen twice now in just a matter of days I really wonder if people are using these backups correctly. I will be honest, I have no way of doing this, I have no external drive. The only thing I actually back up are my personal files...pictures mainly and a few documents but I just save them to CD's . Probably not the way many would recommend but at this point it is what I am limited to doing. Having now seen two computers with backup external drives backing up infections, kind of makes me wonder.
I don't "believe" yours is a bad as the other fellows...his incorporated multiple computers, some he didn't even own anymore and a massive amount of personal files. ALL were compromised and he was forced to format that external drive lost everything he had on there as there was no way to risk moving possibly infected files to another medium or computer. There were so many...thousands, that to scan each one was totally impossible to do.

Thanks for all your help. Are you sure my backup drive is still infected? Maybe it is not anymore since the files get replaced every time I backup and the main drive seems to be ok? Anyway, please let me know concrete steps I can take. The backup system I have might not be perfect but it has saved me on a couple of occasions when I accidentally deleted files. And doing it automatically every night is the only way I've found not to forget doing it (one always has better things to do, right?).

You refer to several infectionS. Is there more than one? So far I thought all this trouble was about the script I ran that I should not have (there was a warning I ignored by someone who had downloaded the file before). I only seldom download stuff P2P. Sometimes I download software that I want to just try once or twice I know it is not worth buying. And sometimes the software is so expensive I am left with no alternative...

Are you sure my backup drive is still infected?

I cannot say for sure, this is why I told you that you should do multiple scans of that drive only to be sure that it is not. I am not sure why you are reluctant to do this, especially since you said that all you back ups are replaced with new ones each time you back up.
The choice is yours, I cannot offer a guarantee.
Yes, there were multiple infections present, three that I see, maybe four. The all came from the same source BitSpirit which is a BitTorrent program and was infected. This brought the others in.

WHEN did you install this program? It NEVER shows as being installed on the "C" drive, at least for the last three months according to the Combofix log. So it was actually installed onto the "F" drive. I believe if it had been INSTALLED on the "C" drive it would have shown, even if it had been Uninstalled at a later date. It never shows there.

There were two files with Trojan.Downloader's in them and another which was a Backdoor.Bot. Backdoor.Bot is a backdoor trojan that can give an attacker to gain remote access
on compromised computer without users knowledge. Backdoor.Bot can also further infect computers by downloading additional threat from a remote server. The file removed by Combofix from the "F" drive was AUTORUN.INF. which is a USB worm. USB worms work by creating a file called AUTORUN.INF on the root of USB drives. These INF files then use Autorun or Autoplay (not the same thing!) to execute themselves when the user double-clicks on the USB drive icon from My Computer. It is a hidden file usually.
Now those were ALL found on the external drive...I find this rather odd IF as you say all the previous backups are overwritten with the new backup each night. How can you say this for sure? With the USB worm on there it is very possible this was not the case.
With the backdoor trojan on there when you used the drive the backdoor trojan could connect to a remote server and download MORE. Now "maybe" you were lucky and all of this was caught at the beginning of the infection. Hopefully that was the case.

I only seldom download stuff P2P. Sometimes I download software that I want to just try once or twice I know it is not worth buying. And sometimes the software is so expensive I am left with no alternative...

Well the choice is yours. Your infections DID come onto the drive via P2P files. If you want to continue to take those chances I can't stop you but in recent days some of the worst infections we have seen on this forum have all been on computers using Torrents.
The choice is yours also whether to fully scan this drive, as I said I don't understand your reluctance but if you want to take those chances then go ahead. If you insist on automatic backups then fine but you should schedule your security programs to run also automatically every night BEFORE these backups are done and then shut down. Otherwise you could end up with even greater problems.

Hi, thank you so much! I will run full scans of the f: drive ASAP. What programs should I use to do this? I periodically run a spybot scan, and also my anti-virus (McAffee) automatically updates itself and scans ALL the drives every night (I am not sure about the timing though). I am of course not reluctant to follow your expert advice. I know just the basics about computers and programming. My questions were simply intended to clarify your excellent suggestions, for which I am extremely grateful. I mean this.

Best,
Fabian

I cannot say for sure, this is why I told you that you should do multiple scans of that drive only to be sure that it is not. I am not sure why you are reluctant to do this, especially since you said that all you back ups are replaced with new ones each time you back up.
The choice is yours, I cannot offer a guarantee.
Yes, there were multiple infections present, three that I see, maybe four. The all came from the same source BitSpirit which is a BitTorrent program and was infected. This brought the others in.

WHEN did you install this program? It NEVER shows as being installed on the "C" drive, at least for the last three months according to the Combofix log. So it was actually installed onto the "F" drive. I believe if it had been INSTALLED on the "C" drive it would have shown, even if it had been Uninstalled at a later date. It never shows there.

There were two files with Trojan.Downloader's in them and another which was a Backdoor.Bot. Backdoor.Bot is a backdoor trojan that can give an attacker to gain remote access
on compromised computer without users knowledge. Backdoor.Bot can also further infect computers by downloading additional threat from a remote server. The file removed by Combofix from the "F" drive was AUTORUN.INF. which is a USB worm. USB worms work by creating a file called AUTORUN.INF on the root of USB drives. These INF files then use Autorun or Autoplay (not the same thing!) to execute themselves when the user double-clicks on the USB drive icon from My Computer. It is a hidden file usually.
Now those were ALL found on the external drive...I find this rather odd IF as you say all the previous backups are overwritten with the new backup each night. How can you say this for sure? With the USB worm on there it is very possible this was not the case.
With the backdoor trojan on there when you used the drive the backdoor trojan could connect to a remote server and download MORE. Now "maybe" you were lucky and all of this was caught at the beginning of the infection. Hopefully that was the case.


Well the choice is yours. Your infections DID come onto the drive via P2P files. If you want to continue to take those chances I can't stop you but in recent days some of the worst infections we have seen on this forum have all been on computers using Torrents.
The choice is yours also whether to fully scan this drive, as I said I don't understand your reluctance but if you want to take those chances then go ahead. If you insist on automatic backups then fine but you should schedule your security programs to run also automatically every night BEFORE these backups are done and then shut down. Otherwise you could end up with even greater problems.

One more thing. Bitspirit IS installed in my c: drive (actually I just uninstalled it, following your advice).

Hi, thank you so much! I will run full scans of the f: drive ASAP. What programs should I use to do this? I periodically run a spybot scan, and also my anti-virus (McAffee) automatically updates itself and scans ALL the drives every night (I am not sure about the timing though). I am of course not reluctant to follow your expert advice. I know just the basics about computers and programming. My questions were simply intended to clarify your excellent suggestions, for which I am extremely grateful. I mean this.

Best,
Fabian

One more thing. Bitspirit IS installed in my c: drive (actually I just uninstalled it, following your advice).

Yes, I see that now in the Uninstall list from HJT. I just missed it, I'm sorry about that one.

I would recommend that you scan both drives now, just to be safe since that Bitspirit was installed on "C", with your McAfee which probably won't find anything since it really isn't configured to find Trojans like the type you had, though you never know some of them it will. Then also Update MBA-M and do a Full System Scan with it on both drives too. Remove all that's found and save the log.

Also then do the following as an added precaution;
Run the ESET Online Scanner on BOTH drives and attach the ScanLog.

* You will need to use Internet Explorer to to complete this scan.
* You will need to temporarily Disable your current Anti-virus program.

* Be sure the option to Remove found threats is checked and the option to Scan unwanted applications is Checked.
* When you have completed that scan, a scanlog ought to have been created and located at C:\Program Files\EsetOnlineScanner\log.txt. Please post that log for us along with the MBA-M log...even if none of them find anything.
Since you said your McAfee scans every night I would say this scan is happening AFTER the backup is done, it needs to be scheduled BEFORE the backup is done. So you will have to set it up to allow enough time before the shutdown for the night so you are certain you aren't backing up infected files before they are removed from the "C" drive.

Alright. I did a full scan with MBA-M. Here is the log. I will conduct the other scan ASAP.

Malwarebytes' Anti-Malware 1.41
Database version: 2796
Windows 6.0.6001 Service Pack 1

9/15/2009 12:45:29 PM
mbam-log-2009-09-15 (12-45-29).txt

Scan type: Full Scan (C:\|D:\|F:\|)
Objects scanned: 440501
Time elapsed: 4 hour(s), 13 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{bd415a76-f3e8-45c7-8a2a-9705d9fbf529} (Rogue.Installer) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Program Files\Microsoft Works\cpitv11.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Program Files\Microsoft Works\pibase11.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\compiler\mcr\matlab\verctrl\verctrl.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\datafeed\datafeed\bbdatafeed.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\matlab\verctrl\verctrl.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\Microsoft Works\cpitv11.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Program Files\Microsoft Works\pibase11.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\compiler\mcr\matlab\verctrl\verctrl.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\datafeed\datafeed\bbdatafeed.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\matlab\verctrl\verctrl.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.

These look a lot like legitimate items to me. Very likely a bunch of False Positives.
You should probably hold off on any further action until Judy can have a closer look.

PP :)

fabianslo,
Can you update MBA-M again and rescan just like you did before? Post that log.
If these are found again I may have you do another type of MBA-M scan so it can be submitted to their crew over there for further study.

These look a lot like legitimate items to me. Very likely a bunch of False Positives.
You should probably hold off on any further action until Judy can have a closer look.

PP :)

I updated again and did a second run. Luckily nothing was found this time. Here's the log

Malwarebytes' Anti-Malware 1.41
Database version: 2804
Windows 6.0.6001 Service Pack 1

9/16/2009 9:28:51 AM
mbam-log-2009-09-16 (09-28-51).txt

Scan type: Full Scan (C:\|D:\|F:\|)
Objects scanned: 442006
Time elapsed: 4 hour(s), 10 minute(s), 9 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Did you do the ESET Online Scanner?

fabianslo,
You need to go back into MBA-M Quarantine Tab and restore ALL these files removed if possible;
:\Program Files\Microsoft Works\cpitv11.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Program Files\Microsoft Works\pibase11.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\compiler\mcr\matlab\verctrl\verctrl.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\datafeed\datafeed\bbdatafeed.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.
C:\Program Files\MATLAB71\toolbox\matlab\verctrl\verctrl.mexw32 (Malware.Packer) -> Quarantined and deleted successfully.

Then go to http://virusscan.jotti.org/en
Upload each of those files for scanning. Report back on what is found for each one.

Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.