Cannot remove bloodhound.exploit.19

Dell / STUDIO 1737
March 1, 2009 at 19:31:09
Specs: Microsoft Windows Vista Home Premium, 2 GHz / 3029 MB
Like so many others I've seen on here, I'm not able to get rid of the bloodhound.exploit.196 virus either. There are some times where it won't show up for a day or so, but since last week it's been at the point where it's being detected several hundred times per day and although it's being quarantined, I want it completely gone. My university requires using Symantec, but they havn't updated to the most recent version and therefore I can't scan in safe mode with it on my machine, which runs Vista. After checking other posts, it looks like many people have been helped with this same problem, but I'd like advice before I go ahead and do anything. Please help me get rid of this damn virus. Thanks in advance!

See More: Cannot remove bloodhound.exploit.19

Report •

March 1, 2009 at 20:03:40
Please download Malwarebytes' Anti-Malware from one of these sites:



Rename the setup file, mbam-setup.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename mbam-setup.exe to tool.exe> click save.

1. Double Click tool.exe to install the application.
2. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select "Perform Quick Scan", then click Scan. The scan may take some time to finish,so please be patient.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Make sure that everything found is checked, and click Remove Selected.
7. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
8. The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
9. Copy&Paste the entire report in your next reply.

If Malwarebytes installed but will not run navigate to this folder:

C:\Programs Files\Malwarebytes' AntiMalware

Rename all the .exe files in the MAlwarebytes' Anti-Malware folder and try to run it again.

Please download and install the latest version of HijackThis v2.0.2:

Download the "HijackThis" Installer from this link:
Hijack This

Rename the setup file, HJTInstall.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename HJTInstall.exe to tools.exe> click save.
1. Save " tools.exe" to your desktop.
2. Double click on tools.exe to run the program.
3. By default it will install to C:\Program Files\Trend Micro\HijackThis.
4. Accept the license agreement by clicking the "I Accept" button.
5.Click on the "Do a system scan and save a log file" button. It will scan and then ask you to save the log.
6. Click "Save log" to save the log file and then the log will open in Notepad.
7. Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
8. Paste the log in your next reply.
9. Do NOT have HijackThis fix anything yet! Most of what it finds will be harmless or even required.

Report •

March 1, 2009 at 22:41:03
Thanks for the quick response. Below are the MalwareBytes and HiJackThis log files.

MalwareBytes log file:

Malwarebytes' Anti-Malware 1.34
Database version: 1814
Windows 6.0.6001 Service Pack 1

3/2/2009 1:33:40 AM
mbam-log-2009-03-02 (01-33-40).txt

Scan type: Quick Scan
Objects scanned: 61731
Time elapsed: 4 minute(s), 46 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

HiJackThis log file:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:35:31 AM, on 3/2/2009
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\DellTPad\Apoint.exe
C:\Program Files\IDT\WDM\sttray.exe
C:\Program Files\Dell Webcam\Dell Webcam Central\WebcamDell.exe
C:\Program Files\Dell\MediaDirect\PCMService.exe
C:\Program Files\Dell DataSafe Online\DataSafeOnline.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Symantec AntiVirus\VPTray.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\DellTPad\Apntex.exe
C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
C:\Program Files\AIM6\aim6.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\Program Files\Internet Explorer\iexplore.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Internet Explorer provided by Dell
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.2.8.7.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: Browser Address Error Redirector - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - C:\Program Files\Dell\BAE\BAE.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [Apoint] C:\Program Files\DellTPad\Apoint.exe
O4 - HKLM\..\Run: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [Broadcom Wireless Manager UI] C:\Windows\system32\WLTRAY.exe
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [dscactivate] "C:\Program Files\Dell Support Center\gs_agent\custom\dsca.exe"
O4 - HKLM\..\Run: [Dell Webcam Central] "C:\Program Files\Dell Webcam\Dell Webcam Central\WebcamDell.exe" /mode2
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\MediaDirect\PCMService.exe"
O4 - HKLM\..\Run: [Dell DataSafe Online] "C:\Program Files\Dell DataSafe Online\DataSafeOnline.exe" /m
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "c:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\winampa.exe"
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Dell AIO Printer A940] "C:\Program Files\Dell AIO Printer A940\dlbabmgr.exe"
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - .DEFAULT User Startup: Dell Dock First Run.lnk = C:\Program Files\Dell\DellDock\DellDock.exe (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: QuickSet.lnk = C:\Program Files\Dell\QuickSet\quickset.exe
O8 - Extra context menu item: &D&ownload &with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
O8 - Extra context menu item: &D&ownload all video with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
O8 - Extra context menu item: &D&ownload all with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~1.0_0\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~1.0_0\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: BitComet - {D18A0B52-D63C-4ed0-AFC6-C1E3DC1AF43A} - res://C:\Program Files\BitComet\tools\BitCometBHO_1.2.8.7.dll/206 (file missing)
O13 - Gopher Prefix:
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL
O20 - Winlogon Notify: GoToAssist - C:\Program Files\Citrix\GoToAssist\514\G2AWinLogon.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Andrea ST Filters Service (AESTFilters) - Andrea Electronics Corporation - C:\Windows\System32\DriverStore\FileRepository\stwrt.inf_2ba5baa4\aestsrv.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Dock Login Service (DockLoginService) - Stardock Corporation - C:\Program Files\Dell\DellDock\DockLogin.exe
O23 - Service: Google Desktop Manager 5.8.809.23506 (GoogleDesktopManager-092308-165331) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: GoToAssist - Citrix Online, a division of Citrix Systems, Inc. - C:\Program Files\Citrix\GoToAssist\514\g2aservice.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\Windows\System32\LEXBCES.EXE
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Audio Service (STacSV) - IDT, Inc. - C:\Windows\System32\DriverStore\FileRepository\stwrt.inf_2ba5baa4\STacSV.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\Windows\System32\WLTRYSVC.EXE

End of file - 9624 bytes

Report •

March 2, 2009 at 19:24:35
Your java is out of date and may have been exploited.
Download the latest version of java from this link Java
Click on the JRE 6 Update 11 download button.
Check the box that says: "Accept License Agreement". The page will refresh.
Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
Close any programs you may have running - especially your web browser.
Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java. Check any item with Java Runtime Environment (JRE or J2SE) in the name. It should have the "coffee cup" icon next to it.
Click the Remove or Change/Remove button. Repeat as many times as necessary to remove each Java versions.
Reboot your computer once all Java components are removed
Then from your desktop double-click on jre-6u11-windows-i586-p.exe to install the newest version.

Please download ComboFix to the desktop from one of the following links:


Link 2

Link 3

Rename the setup file, combofix.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename combofix.exe to toolb.exe> click save.

Combofix is a powerful tool so follow the instructions exactly or you could damage your computer.

Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with Combofix and remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

In your case to run Combofix do the following:
1. Go offline turn off your Norton antivirus, Windows Defender< Ad-Aware and any other antispyware that you may have.
2. Run Combofix by double clicking the toolb.exe icon on your desktop and save its log.
3. Restart the computer to get the antivirus running again but leave the antispyware programs off until we get the computer cleaned.
4. Post the Combofix log.

Remember to re-enable the protection again afterwards before connecting to the Internet.

Report •

Related Solutions

March 2, 2009 at 20:36:48
Turned everything off and ran's the log:

ComboFix 09-03-02.01 - Ben 2009-03-02 23:23:11.1 - NTFSx86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.3030.1874 [GMT -5:00]
Running from: c:\users\Ben\Desktop\toolb.exe
AV: Symantec AntiVirus *On-access scanning disabled* (Updated)

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


----- BITS: Possible infected sites -----

((((((((((((((((((((((((( Files Created from 2009-02-03 to 2009-03-03 )))))))))))))))))))))))))))))))

2009-03-02 22:41 . 2009-03-02 22:55 410,984 --a------ c:\windows\System32\deploytk.dll
2009-03-02 00:53 . 2009-02-11 10:19 15,504 --a------ c:\windows\System32\drivers\mbam.sys
2009-03-02 00:52 . 2009-03-02 00:53 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-03-02 00:52 . 2009-02-11 10:19 38,496 --a------ c:\windows\System32\drivers\mbamswissarmy.sys
2009-03-01 17:53 . 2009-03-01 17:53 <DIR> d-------- c:\users\Ben\AppData\Roaming\Malwarebytes
2009-03-01 17:53 . 2009-03-01 17:53 <DIR> d-------- c:\users\All Users\Malwarebytes
2009-03-01 17:53 . 2009-03-01 17:53 <DIR> d-------- c:\programdata\Malwarebytes
2009-02-26 17:03 . 2008-12-15 22:29 8,147,456 --a------ c:\windows\System32\wmploc.DLL
2009-02-26 17:03 . 2008-12-16 00:31 7,680 --a------ c:\windows\System32\spwmp.dll
2009-02-26 17:03 . 2008-12-16 00:31 4,096 --a------ c:\windows\System32\msdxm.ocx
2009-02-26 17:03 . 2008-12-16 00:31 4,096 --a------ c:\windows\System32\dxmasf.dll
2009-02-16 18:55 . 2009-02-16 18:55 <DIR> d-------- c:\users\Ben\AppData\Roaming\Move Networks
2009-02-14 21:59 . 2009-02-14 21:59 <DIR> d-------- c:\users\All Users\Creative
2009-02-14 21:59 . 2009-02-14 21:59 <DIR> d-------- c:\programdata\Creative
2009-02-14 21:56 . 2009-02-14 21:56 <DIR> d-------- c:\users\Ben\AppData\Roaming\Creative
2009-02-11 17:16 . 2009-01-14 22:36 1,383,424 --a------ c:\windows\System32\mshtml.tlb
2009-02-11 17:15 . 2009-01-15 01:11 827,392 --a------ c:\windows\System32\wininet.dll
2009-02-11 17:14 . 2008-12-04 23:32 428,544 --a------ c:\windows\System32\EncDec.dll
2009-02-11 17:14 . 2008-12-04 23:32 293,376 --a------ c:\windows\System32\psisdecd.dll
2009-02-11 17:14 . 2008-12-04 23:31 217,088 --a------ c:\windows\System32\
2009-02-11 17:14 . 2008-12-04 23:31 177,664 --a------ c:\windows\System32\
2009-02-11 17:14 . 2008-12-04 23:31 80,896 --a------ c:\windows\System32\
2009-02-08 00:57 . 2004-02-17 10:11 53,248 --a------ c:\windows\System32\vp6dec_settings.cpl
2009-02-08 00:56 . 2009-02-08 00:57 <DIR> d-------- c:\program files\ACE Mega CoDecS Pack
2009-02-06 18:15 . 2009-02-06 18:15 <DIR> dr------- c:\windows\System32\config\systemprofile\Videos
2009-02-06 18:15 . 2009-02-06 18:15 <DIR> dr------- c:\windows\System32\config\systemprofile\Pictures
2009-02-06 18:15 . 2009-02-06 18:15 <DIR> dr------- c:\windows\System32\config\systemprofile\Music
2009-02-06 18:15 . 2009-02-06 18:15 <DIR> dr------- c:\windows\System32\config\systemprofile\Documents

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
2009-03-03 03:55 --------- d-----w c:\program files\Java
2009-03-02 19:16 --------- d-----w c:\program files\Microsoft Silverlight
2009-02-18 01:31 --------- d-----w c:\programdata\Roxio
2009-02-18 00:43 --------- d-----w c:\programdata\DVD Shrink
2009-02-11 22:14 --------- d-----w c:\programdata\Microsoft Help
2009-02-11 22:13 --------- d-----w c:\program files\Windows Mail
2009-01-17 02:16 --------- d-----w c:\program files\BitComet
2009-01-16 20:29 --------- d-----w c:\program files\Canon
2009-01-16 19:38 --------- d-----w c:\programdata\McAfee
2009-01-09 15:43 --------- d-----w c:\program files\Dell DataSafe Online
2008-12-08 22:09 51,716 ----a-w c:\windows\System32\pdf995mon.dll
2008-12-08 22:09 249,856 ----a-w c:\windows\System32\pdfmona.dll
2008-12-07 03:03 0 ----a-w c:\users\Ben\AppData\Roaming\wklnhst.dat
2008-01-21 02:43 174 --sha-w c:\program files\desktop.ini
2008-11-22 22:24 76 --sh--r c:\windows\CT4CET.bin

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
*Note* empty entries & legit default entries are not shown

"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-20 125952]

"Apoint"="c:\program files\DellTPad\Apoint.exe" [2008-08-25 200704]
"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2008-08-25 442460]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-09-03 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-09-03 178712]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-09-03 154136]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2008-08-05 3563520]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-11-22 30192]
"dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2008-03-11 16384]
"Dell Webcam Central"="c:\program files\Dell Webcam\Dell Webcam Central\WebcamDell.exe" [2008-02-19 438403]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2008-07-04 132392]
"Dell DataSafe Online"="c:\program files\Dell DataSafe Online\DataSafeOnline.exe" [2008-11-03 1745648]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2008-08-03 36352]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2007-08-24 33648]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-11-04 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-11-20 290088]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-11-22 107112]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-11-28 134808]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-02 136600]

c:\users\Ben\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Adobe Gamma.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2005-03-16 113664]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
QuickSet.lnk - c:\program files\Dell\QuickSet\quickset.exe [2008-07-31 1616976]

"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2008-11-22 17:28 10536 c:\program files\Citrix\GoToAssist\514\g2awinlogon.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.sl_anet"= c:\progra~1\ACEMEG~1\SystemS\sl_anet.acm
"vidc.yv12"= c:\progra~1\ACEMEG~1\SystemS\ATI\atiyuv12.DLL
"vidc.divx"= c:\progra~1\ACEMEG~1\SystemS\DivX\DivX520.dll
"vidc.iyuv"= c:\progra~1\ACEMEG~1\SystemS\Intel\iyuv_32.dll
"vidc.yvu9"= c:\progra~1\ACEMEG~1\SystemS\Intel\Iyvu9_32.dll
"vidc.uyvy"= c:\progra~1\ACEMEG~1\SystemS\MICROS~1\msyuv.dll
"vidc.yuy2"= c:\progra~1\ACEMEG~1\SystemS\MICROS~1\msyuv.dll
"vidc.yvyu"= c:\progra~1\ACEMEG~1\SystemS\MICROS~1\msyuv.dll
"msacm.msaudio1"= c:\progra~1\ACEMEG~1\SystemS\MICROS~1\msaud32.acm


[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"{98082EBF-CC30-4EE7-9857-AE86CE4D2BA4}"= UDP:c:\program files\Dell Video Chat\DellVideoChat.exe:Dell Video Chat
"{97A3A64B-F33C-4C8B-8736-DF8A2B480FC4}"= TCP:c:\program files\Dell Video Chat\DellVideoChat.exe:Dell Video Chat
"{8798508D-1CA8-449B-8D0F-A757DA32C6F4}"= c:\program files\Dell\MediaDirect\MediaDirect.exe:Dell MediaDirect
"{82A1DC06-F7E7-4321-8658-EF0428EB877D}"= c:\program files\Dell\MediaDirect\PCMService.exe:CyberLink PowerCinema Resident Program
"{4B9E9CDC-B3A9-4847-82D4-1DAA9ADA3D43}"= c:\program files\Dell\MediaDirect\Kernel\DMP\CLBrowserEngine.exe:Cyberlink Media Server Browser Engine
"{DE990F5D-9A53-416D-AA6C-47C7C3ABC223}"= c:\program files\Dell\MediaDirect\Kernel\DMS\CLMSService.exe:CyberLink Media Server
"{C4227716-B326-4167-A0BA-80D6DF10188B}"= UDP:c:\program files\Bonjour\mDNSResponder.exe:Bonjour
"{24BC8B7B-D525-4BB0-8909-881321FA5F66}"= TCP:c:\program files\Bonjour\mDNSResponder.exe:Bonjour
"{B09688AB-3A1D-4552-88CB-841A4B527663}"= UDP:c:\program files\Common Files\AOL\Loader\aolload.exe:AOL Loader
"{D583855C-DFA3-4E39-8CE0-9258CDEB91F2}"= TCP:c:\program files\Common Files\AOL\Loader\aolload.exe:AOL Loader
"{D4039379-2926-44C0-8D69-FE3A0BB426D2}"= UDP:c:\program files\AIM6\aim6.exe:AIM
"{764C6D6D-7B79-4213-A746-C7D778D22C87}"= TCP:c:\program files\AIM6\aim6.exe:AIM
"{F2401BDF-2882-4BEA-8C84-A70D2233A65C}"= TCP:6004|c:\program files\Microsoft Office\Office12\outlook.exe:Microsoft Office Outlook
"{645A0600-B87C-4F8F-96B1-E644C2A86A7C}"= UDP:c:\program files\Microsoft Office\Office12\GROOVE.EXE:Microsoft Office Groove
"{6EDD24AF-B419-422A-B064-ADE85382D855}"= TCP:c:\program files\Microsoft Office\Office12\GROOVE.EXE:Microsoft Office Groove
"{C833EC09-2137-4A3C-B91D-9FB83E561CE4}"= UDP:c:\program files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"{C95BE632-E33D-4104-AC60-47D528704654}"= TCP:c:\program files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"{95A843DB-3323-4913-96DB-59295B0AB817}"= UDP:c:\program files\iTunes\iTunes.exe:iTunes
"{AA26CB71-5575-4437-B0E8-B4A5B14A98F6}"= TCP:c:\program files\iTunes\iTunes.exe:iTunes
"{B6C54A7E-9EB9-44DE-AF8E-41F785D2907B}"= UDP:11553:BitComet 11553 TCP
"{0A9162E1-C023-4A6C-9663-FA5E34739373}"= TCP:11553:BitComet 11553 UDP
"{249A1961-25BA-40CB-BDC8-321BE580E0B1}"= UDP:11553:BitComet 11553 TCP
"{3370E143-2A8E-4302-8D8C-3D4AC38CDCE5}"= TCP:11553:BitComet 11553 UDP
"{7D9A90F2-3FA4-4935-BAD2-EA50B99E39EF}"= UDP:c:\program files\Symantec AntiVirus\Rtvscan.exe:Symantec Antivirus
"{8BC59B8C-4E07-4AB6-874C-EC7BBCA11FC4}"= TCP:c:\program files\Symantec AntiVirus\Rtvscan.exe:Symantec Antivirus
"{A12DF243-D3FE-4322-81C3-E1AC45F79E3F}"= UDP:c:\program files\Common Files\Symantec Shared\ccApp.exe:Symantec Email
"{78D7C75E-37BA-4F6B-B00F-E53AC6C42777}"= TCP:c:\program files\Common Files\Symantec Shared\ccApp.exe:Symantec Email
"TCP Query User{4A7491F6-A48B-4EFD-9848-2A220C858953}c:\\program files\\aim6\\aim6.exe"= UDP:c:\program files\aim6\aim6.exe:AIM
"UDP Query User{92923090-B49D-4BFB-AE6C-A3A8760AD9E6}c:\\program files\\aim6\\aim6.exe"= TCP:c:\program files\aim6\aim6.exe:AIM

"EnableFirewall"= 0 (0x0)

R2 AESTFilters;Andrea ST Filters Service;c:\windows\System32\DriverStore\FileRepository\stwrt.inf_2ba5baa4\AEstSrv.exe [2008-11-22 73728]
R2 DockLoginService;Dock Login Service;c:\program files\Dell\DellDock\DockLogin.exe [2008-09-23 155648]
R2 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2006-11-28 122008]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [2008-12-05 24652]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-02-27 101936]
R3 IntcHdmiAddService;Intel(R) High Definition Audio HDMI;c:\windows\System32\drivers\IntcHdmi.sys [2008-11-22 112128]
R3 itecir;ITECIR Infrared Receiver;c:\windows\System32\drivers\itecir.sys [2008-11-22 54784]
R3 k57nd60x;Broadcom NetLink (TM) Gigabit Ethernet - NDIS 6.0;c:\windows\System32\drivers\k57nd60x.sys [2008-11-22 203264]
R3 OA001Ufd;Creative Camera OA001 Upper Filter Driver;c:\windows\System32\drivers\OA001Ufd.sys [2008-11-22 144672]
R3 OA001Vid;Creative Camera OA001 Function Driver;c:\windows\System32\drivers\OA001Vid.sys [2008-11-22 277632]
S3 GoogleDesktopManager-092308-165331;Google Desktop Manager 5.8.809.23506;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2008-11-22 30192]

\shell\AutoRun\command - f:\wd_windows_tools\WDSetup.exe

\shell\AutoRun\command - f:\wd_windows_tools\setup.exe

\shell\AutoRun\command - f:\wd_windows_tools\WDSetup.exe
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Aim6 - (no file)
HKLM-Run-Dell AIO Printer A940 - c:\program files\Dell AIO Printer A940\dlbabmgr.exe

------- Supplementary Scan -------
uStart Page = hxxp://
uSearchMigratedDefaultURL = hxxp://{searchTerms}&sourceid=ie7&
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://
IE: &D&ownload &with BitComet - c:\program files\BitComet\BitComet.exe/AddLink.htm
IE: &D&ownload all video with BitComet - c:\program files\BitComet\BitComet.exe/AddVideo.htm
IE: &D&ownload all with BitComet - c:\program files\BitComet\BitComet.exe/AddAllLink.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000


catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer,
Rootkit scan 2009-03-02 23:25:44
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

c:\users\Ben\AppData\Local\Temp\catchme.dll 53248 bytes executable

scan completed successfully
hidden files: 1

Completion time: 2009-03-02 23:27:31
ComboFix-quarantined-files.txt 2009-03-03 04:27:28

Pre-Run: 192,074,047,488 bytes free
Post-Run: 192,923,549,696 bytes free

194 --- E O F --- 2009-03-02 19:22:26

Report •

March 4, 2009 at 14:24:56
Navigate to and delete this folder:

C:\Program Files\Dell\BAE

Are you still having problems?

Report •

March 4, 2009 at 16:08:31
As I was waiting for your last reply, I was looking around different forums and noticed that this virus seems to affect Adobe, so I removed all Adobe programs from my laptop and then ran my Symantec again and deleted all my temp files. Once everything appeared to be clean, I reinstalled my Adobe programs and since last night I havn't had a problem. I also just took your advice and deleted the BAE.dll file in the directory you listed. Hopefully these fixes are all it will take to finally get this problem taken care of. Thank you for all the help and I'll keep my fingers crossed. If anything comes up in the next couple days, I'll post again. Thanks again!

Report •

March 4, 2009 at 18:43:58
You should go through this clean up procedure.

Empty the restore folder. Go to start>control panel>system>system restore tab>check the box beside "turn off system restore>apply (takes a minute)>ok. Go back and uncheck the box to turn system restore back on>apply>ok.

Download ATF Cleaner from this link:
Run ATF-Cleaner
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Run an online scan with Kaspersky from the following link:
Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

1. Click Accept, when prompted to download and install the program files and database of malware definitions.
2. Click Run at the Security prompt.
The program will then begin downloading and installing and will also update the database.
Please be patient as this can take several minutes.
3.Once the update is complete, click on My Computer under the green Scan bar to the left to start the scan.
4. Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
5. Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
6. Click View scan report at the bottom.
7. Click the Save Report As... button.
8. Click the Save as Text button to save the file to your desktop so that you may post it in your next reply.

To optimize scanning time and produce a more sensible report for review:
Close any open programs.
Turn off the real-time scanner of all antivirus or antispyware programs while performing the online scan.
Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.

Report •

March 5, 2009 at 18:07:33
Well, I'm not really sure if my computer is clean at this point or not. Everything was fine through last night, however, when I got back to my office after lunch today, I saw that Symantec had quarantined 49 new occurances of the bloodhound.exploit.196. So whatever I had done with reinstalling the Adobe doesn't look like it was the solution. I ran the ATF Cleaner and then the Kaspersky Online Scan. Everything again appears to be clean, but I can't say that with any certainty. Here's the log for it:

Thursday, March 5, 2009
Operating System: Microsoft Windows Vista Home Premium Edition, 32-bit Service Pack 1 (build 6001)
Kaspersky Online Scanner 7 version:
Program database last update: Thursday, March 05, 2009 22:52:43
Records in database: 1872209

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:

Scan statistics:
Files scanned: 138361
Threat name: 0
Infected objects: 0
Suspicious objects: 0
Duration of the scan: 01:12:08

No malware has been detected. The scan area is clean.

The selected area was scanned.

Report •

March 5, 2009 at 18:33:14
Well that is clean, give it a day and let us know how the computer is operating.

Report •

March 6, 2009 at 13:16:31
Well I'm at a loss for what to do now. Again, everything was running fine last night and this morning, but in the early afternoon Symantec started finding the virus again (96 occurances this time). Hopefully you'll have some ideas jabuck, because I can't think of what else to do.

Report •

March 6, 2009 at 19:20:33
Please go to Virus Total and upload the following file for analysis:


Use the browse button at the site to find the file, once you find the file double click it and it should appear in the empty space to the left of the browse button> click "send file".

Post the results in your reply.

The Combofix log revealed this:

----- BITS: Possible infected sites -----


Do you know what that is?

Report •

March 11, 2009 at 14:54:49
I tried the Virus Total and the results came back negative (i.e. everything looked clean again). However, everyday at around 1:20-1:30, Symantec still finds more and more copies of the virus. I was talking with one of my university's IT guys yesterday and he said that he was just trying to figure out the same issue on another student's laptop and ended up formatting it. So, at this point I think that I'll just reformat my hard drive and start fresh. I have all my neccessary files backed up and I havn't had the computer very long, so it shouldn't be too much of a hassle to start over. Thanks for taking the time to help me with this virus, I really appreciate it.

Report •

Ask Question