Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected With Purityscan


  • This topic is locked This topic is locked
11 replies to this topic

#1 cherio39

cherio39

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:01:08 PM

Posted 31 January 2008 - 02:58 PM

When I removed purityscan it comes back on reboot. Thank you in advance for your help.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:23, on 2008-01-31
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Verizon Online\bin\mpbtn.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\a-squared Free\a2service.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://bestbuy.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
O2 - BHO: (no name) - {8C6F8E56-1053-4CCD-BC00-F6081472A667} - C:\Program Files\MSN\mevozuC:\WINDOWS\system32\winzs6\renamd83122.exe.dll (file missing)
O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKLM\..\RunOnce: [SpybotDeletingA8242] command /c del "C:\WINDOWS\system32\drivers\core.cache.dsk"
O4 - HKLM\..\RunOnce: [SpybotDeletingC2731] cmd /c del "C:\WINDOWS\system32\drivers\core.cache.dsk"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\RunOnce: [SpybotDeletingB5467] command /c del "C:\WINDOWS\system32\drivers\core.cache.dsk"
O4 - HKCU\..\RunOnce: [SpybotDeletingD2694] cmd /c del "C:\WINDOWS\system32\drivers\core.cache.dsk"
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Verizon Online Support Center.lnk = C:\Program Files\Verizon Online\bin\matcli.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.net\PartyPokerNet\RunPF.exe
O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.net\PartyPokerNet\RunPF.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O23 - Service: a-squared Free Service (a2free) - Emsi Software GmbH - C:\Program Files\a-squared Free\a2service.exe
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: lxcc_device - Lexmark International, Inc. - C:\WINDOWS\system32\lxcccoms.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: Security Service (XBGG) - Unknown owner - C:\WINDOWS\system32\svcd\svchost.exe (file missing)

--
End of file - 7273 bytes

BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:08 PM

Posted 31 January 2008 - 05:17 PM

Hi and welcome to Bleeping Computer! My name is Sam and I will be helping you. :thumbsup:

Please download ComboFix and save it to your desktop.

Prior to running Combofix.exe you should disable your antivirus program and disconnect from the internet.

Double click combofix.exe and follow the prompts.
When it's done running it will produce a log for you. Please post that log in your next reply.

Important Note - Do not mouseclick combofix's window whilst it's running. That may cause it to stall.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 cherio39

cherio39
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:01:08 PM

Posted 31 January 2008 - 06:03 PM

Thank you Sam. Here is the log as requested.

ComboFix 08-02.01.1 - Owner 2008-01-31 17:47:41.3 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.538 [GMT -5:00]
Running from: C:\Documents and Settings\Owner\Desktop\ComboFix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\temp\tn3
C:\WINDOWS\system32\drivers\core.cache.dsk . . . . failed to delete

.
((((((((((((((((((((((((( Files Created from 2008-01-01 to 2008-02-01 )))))))))))))))))))))))))))))))
.

2008-02-01 17:49 . 2008-02-01 17:49 <DIR> d-------- C:\Temp\tn3
2008-01-31 13:46 . 2008-01-31 13:46 <DIR> d-------- C:\ISeeYouXP
2008-01-31 12:46 . 2008-01-31 12:46 <DIR> d-------- C:\Program Files\ExplorerXP
2008-01-31 12:45 . 2008-01-31 12:53 <DIR> d-------- C:\Program Files\a-squared Free
2008-01-31 12:44 . 2008-01-31 12:44 <DIR> d-------- C:\Program Files\Trend Micro
2008-01-31 12:44 . 2008-01-31 12:44 <DIR> d-------- C:\Program Files\a-squared HiJackFree
2008-01-29 23:10 . 2008-01-29 23:10 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Webroot
2008-01-29 21:09 . 2008-01-29 21:09 <DIR> d-------- C:\Program Files\Windows Defender
2008-01-29 18:56 . 2008-01-29 18:56 <DIR> d-------- C:\Documents and Settings\LocalService\Application Data\Webroot
2008-01-27 23:03 . 2008-01-28 19:45 <DIR> d-------- C:\Program Files\a-squared Anti-Malware
2008-01-27 22:30 . 2008-01-28 19:45 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-01-27 12:09 . 2007-12-14 01:59 69,632 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-01-27 12:08 . 2008-01-27 12:09 <DIR> d-------- C:\Program Files\Java
2008-01-27 12:08 . 2008-01-27 12:08 <DIR> d-------- C:\Program Files\Common Files\Java
2008-01-27 09:03 . 2008-01-27 09:17 <DIR> d-a------ C:\Documents and Settings\All Users\Application Data\TEMP
2008-01-26 22:17 . 2008-01-26 23:13 <DIR> d-------- C:\WINDOWS\BDOSCAN8
2008-01-26 20:46 . 2008-01-26 22:16 <DIR> d-------- C:\Documents and Settings\Owner\.housecall6.6
2008-01-26 17:44 . 2008-01-26 17:44 <DIR> d-------- C:\Program Files\Avira
2008-01-26 17:44 . 2008-01-26 17:44 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
2008-01-26 17:28 . 2005-01-13 22:41 11,254 --a------ C:\WINDOWS\system32\locate.com
2008-01-26 17:27 . 2008-01-26 17:29 <DIR> d-------- C:\MGtools
2008-01-26 17:27 . 2008-01-26 17:29 42,728 --a------ C:\MGlogs.zip
2008-01-26 15:25 . 2008-01-30 10:53 293 --a------ C:\WINDOWS\wininit.ini
2008-01-26 14:14 . 2008-01-26 14:14 <DIR> d-------- C:\WINDOWS\system32\LogFiles
2008-01-26 13:36 . 2008-01-26 13:36 <DIR> d--h----- C:\Program Files\Uninstall Information
2008-01-26 12:26 . 2007-08-13 18:54 33,792 --a--c--- C:\WINDOWS\system32\dllcache\custsat.dll
2008-01-26 12:11 . 2008-01-27 10:11 167,545 --a------ C:\WINDOWS\system32\drivers\core.cache.dsk
2008-01-26 11:51 . 2008-01-26 11:51 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
2008-01-26 11:50 . 2008-01-26 11:50 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-01-26 11:44 . 2008-01-26 11:51 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-01-26 11:30 . 2008-01-26 11:30 <DIR> d-------- C:\Program Files\CCleaner
2008-01-23 16:07 . 2008-01-23 16:13 664 --a------ C:\WINDOWS\system32\d3d9caps.dat
2008-01-22 16:30 . 2008-01-26 17:24 <DIR> d-------- C:\WINDOWS\system32\winzs6
2008-01-22 16:30 . 2008-01-23 20:09 <DIR> d-------- C:\WINDOWS\system32\nui4
2008-01-22 16:30 . 2008-01-29 03:47 <DIR> d-------- C:\WINDOWS\system32\nGpxx13
2008-01-22 16:30 . 2008-01-22 16:30 <DIR> d-------- C:\WINDOWS\system32\extz1
2008-01-22 16:30 . 2008-01-23 20:09 <DIR> d-------- C:\WINDOWS\system32\dob3
2008-01-22 16:30 . 2008-01-23 20:09 <DIR> d-------- C:\WINDOWS\system32\comm7
2008-01-22 16:30 . 2008-01-22 16:30 <DIR> d-------- C:\WINDOWS\leioajgq
2008-01-22 16:30 . 2008-01-22 16:30 86,016 --a------ C:\WINDOWS\system32\drivers\mrxsmbb.sys
2008-01-17 14:38 . 2008-01-26 12:17 <DIR> d-------- C:\WINDOWS\system32\svcd
2008-01-17 14:38 . 2008-01-26 12:13 114 --a------ C:\WINDOWS\system32\url3
2008-01-17 14:38 . 2008-01-26 12:13 105 --a------ C:\WINDOWS\system32\url2
2008-01-17 14:38 . 2008-01-26 12:13 105 --a------ C:\WINDOWS\system32\url1
2008-01-17 14:38 . 2008-01-26 12:13 8 --a------ C:\WINDOWS\system32\CID
2008-01-17 14:38 . 2008-01-17 14:38 4 --a------ C:\WINDOWS\system32\SvcNm
2008-01-15 16:42 . 2008-01-26 18:17 <DIR> d-------- C:\Program Files\RcvSystem
2008-01-09 15:01 . 2008-01-09 15:01 53,248 --a------ C:\WINDOWS\bdoscandel.exe
2008-01-09 15:01 . 2008-01-09 15:01 453 --a------ C:\WINDOWS\bdoscandellang.ini

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-26 19:13 --------- d-----w C:\Program Files\Common Files\Symantec Shared
2008-01-26 19:13 --------- d-----w C:\Documents and Settings\All Users\Application Data\Symantec
2008-01-26 19:09 --------- d-----w C:\Program Files\Symantec
2008-01-26 17:11 --------- d-----w C:\Program Files\Google
2008-01-26 16:25 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-01-26 16:25 --------- d-----w C:\Program Files\Full Tilt Poker.Org
2008-01-26 16:25 --------- d-----w C:\Program Files\Common Files\InstallShield
2008-01-26 16:23 --------- d-----w C:\Documents and Settings\All Users\Application Data\Napster
2008-01-24 05:09 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
2008-01-16 11:02 --------- d-----w C:\Program Files\PartyGaming.net
2005-09-02 01:49 57,624 ----a-w C:\Documents and Settings\Owner\Application Data\GDIPFONTCACHEV1.DAT
2005-07-04 17:34 336,896 ----a-w C:\Documents and Settings\Owner\remote.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8C6F8E56-1053-4CCD-BC00-F6081472A667}]
C:\Program Files\MSN\mevozuC:\WINDOWS\system32\winzs6\renamd83122.exe.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-10 14:00 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPLpr"="C:\Program Files\Synaptics\SynTP\SynTPLpr.exe" [2004-11-04 18:47 98394]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2004-11-04 18:47 688218]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2005-05-27 04:59 98304]
"Recguard"="%WINDIR%\SMINST\RECGUARD.EXE" [ ]
"RemoteControl"="C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-02 22:24 32768]
"NeroFilterCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2001-07-09 13:50 155648]
"Motive SmartBridge"="C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe" [2002-05-18 11:04 327680]
"ehTray"="C:\WINDOWS\ehome\ehtray.exe" [2004-08-10 13:04 59392]
"ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-02-01 23:05 339968]
"avgnt"="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-01-26 17:46 249896]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe" [2007-12-14 03:42 144784]
"Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20 866584]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 21:05:26 29696]
Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office10\OSA.EXE [2001-02-13 00:01:04 83360]
Verizon Online Support Center.lnk - C:\Program Files\Verizon Online\bin\matcli.exe [2005-07-01 11:15:09 204800]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"InstallVisualStyle"= C:\WINDOWS\Resources\Themes\Royale\Royale.msstyles
"InstallTheme"= C:\WINDOWS\Resources\Themes\Royale.theme

R1 mrxsmbb;mrxsmbb;C:\WINDOWS\system32\drivers\mrxsmbb.sys [2008-01-22 16:30]
S2 XBGG;Security Service;C:\WINDOWS\system32\svcd\svchost.exe []

.
Contents of the 'Scheduled Tasks' folder
"2005-07-01 15:33:18 C:\WINDOWS\Tasks\ISP signup reminder 3.job"
- C:\WINDOWS\system32\OOBE\oobebaln.exe
"2008-02-01 22:53:58 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
- C:\Program Files\Windows Defender\MpCmdRun.exe
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-01 17:51:26
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\a-squared Free\a2service.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Verizon Online\bin\mpbtn.exe
.
**************************************************************************
.
Completion time: 2008-02-01 17:54:41 - machine was rebooted
ComboFix-quarantined-files.txt 2008-02-01 22:54:38
ComboFix2.txt 2008-01-27 15:16:05
ComboFix3.txt 2008-01-26 17:17:26
.
2008-01-27 14:44:01 --- E O F ---

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:08 PM

Posted 02 February 2008 - 08:42 AM

Download SDFix and save it to your Desktop.

Double click SDFix.exe and it will extract the files to %systemdrive%
(Drive that contains the Windows Directory, typically C:\SDFix)

Please then reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, the Advanced Options Menu should appear;
  • Select the first option, to run Windows in Safe Mode, then press Enter.
  • Choose your usual account.
  • Open the extracted SDFix folder and double click RunThis.bat to start the script.
  • Type Y to begin the cleanup process.
  • It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
  • Press any Key and it will restart the PC.
  • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
  • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
  • Finally paste the contents of the Report.txt back on the forum with a new HijackThis log

Also post a new log from Combofix.

Edited by Buckeye_Sam, 02 February 2008 - 08:42 AM.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 cherio39

cherio39
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:01:08 PM

Posted 02 February 2008 - 02:27 PM

Here are the logs. Thanks Sam


SDFix: Version 1.135

Run by Administrator on 2008-02-03 at 14:08

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\SDFix

Safe Mode:
Checking Services:


Restoring Windows Registry Values
Restoring Windows Default Hosts File

Rebooting...


Normal Mode:
Checking Files:

Trojan Files Found:

C:\WINDOWS\leioajgq\1.png - Deleted
C:\WINDOWS\leioajgq\2.png - Deleted
C:\WINDOWS\leioajgq\3.png - Deleted
C:\WINDOWS\leioajgq\4.png - Deleted
C:\WINDOWS\leioajgq\5.png - Deleted
C:\WINDOWS\leioajgq\6.png - Deleted
C:\WINDOWS\leioajgq\7.png - Deleted
C:\WINDOWS\leioajgq\8.png - Deleted
C:\WINDOWS\leioajgq\9.png - Deleted
C:\WINDOWS\leioajgq\bottom-rc.gif - Deleted
C:\WINDOWS\leioajgq\config.png - Deleted
C:\WINDOWS\leioajgq\content.png - Deleted
C:\WINDOWS\leioajgq\download.gif - Deleted
C:\WINDOWS\leioajgq\frame-bg.gif - Deleted
C:\WINDOWS\leioajgq\frame-bottom-left.gif - Deleted
C:\WINDOWS\leioajgq\frame-h1bg.gif - Deleted
C:\WINDOWS\leioajgq\head.png - Deleted
C:\WINDOWS\leioajgq\icon.png - Deleted
C:\WINDOWS\leioajgq\indexwp.html - Deleted
C:\WINDOWS\leioajgq\main.css - Deleted
C:\WINDOWS\leioajgq\memory-prots.png - Deleted
C:\WINDOWS\leioajgq\net.png - Deleted
C:\WINDOWS\leioajgq\pc.gif - Deleted
C:\WINDOWS\leioajgq\pc-mag.gif - Deleted
C:\WINDOWS\leioajgq\poloska1.png - Deleted
C:\WINDOWS\leioajgq\poloska2.png - Deleted
C:\WINDOWS\leioajgq\poloska3.png - Deleted
C:\WINDOWS\leioajgq\promowp1.html - Deleted
C:\WINDOWS\leioajgq\promowp2.html - Deleted
C:\WINDOWS\leioajgq\promowp3.html - Deleted
C:\WINDOWS\leioajgq\promowp4.html - Deleted
C:\WINDOWS\leioajgq\promowp5.html - Deleted
C:\WINDOWS\leioajgq\reg.png - Deleted
C:\WINDOWS\leioajgq\repair.png - Deleted
C:\WINDOWS\leioajgq\scr-1.png - Deleted
C:\WINDOWS\leioajgq\scr-2.png - Deleted
C:\WINDOWS\leioajgq\start.png - Deleted
C:\WINDOWS\leioajgq\styles.css - Deleted
C:\WINDOWS\leioajgq\top-rc.gif - Deleted
C:\WINDOWS\leioajgq\vline.gif - Deleted
C:\WINDOWS\leioajgq\wp.png - Deleted
C:\WINDOWS\system32\CID - Deleted
C:\WINDOWS\system32\SvcNm - Deleted
C:\WINDOWS\system32\upds.log - Deleted
C:\WINDOWS\system32\url1 - Deleted
C:\WINDOWS\system32\url2 - Deleted
C:\WINDOWS\system32\url3 - Deleted



Folder C:\Temp\tn3 - Removed
Folder C:\WINDOWS\system32\svcd - Removed


Removing Temp Files...

ADS Check:



Final Check:

catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-03 14:14:22
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services:
------------------



Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]

Remaining Files:
---------------

File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes:


Finished!

ComboFix 08-02.01.1 - Owner 2008-02-03 14:18:05.4 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.634 [GMT -5:00]
Running from: C:\Documents and Settings\Owner\Desktop\ComboFix.exe

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\temp\tn3
C:\WINDOWS\system32\drivers\core.cache.dsk . . . . failed to delete

.
((((((((((((((((((((((((( Files Created from 2008-01-03 to 2008-02-03 )))))))))))))))))))))))))))))))
.

2008-02-03 14:20 . 2008-02-03 14:20 <DIR> d-------- C:\Temp\tn3
2008-02-03 14:12 . 2008-02-03 14:12 167,545 --a------ C:\WINDOWS\system32\drivers\core.cache.dsk
2008-02-03 14:06 . 2008-02-03 14:07 <DIR> d-------- C:\WINDOWS\ERUNT
2008-01-31 13:46 . 2008-01-31 13:46 <DIR> d-------- C:\ISeeYouXP
2008-01-31 12:46 . 2008-01-31 12:46 <DIR> d-------- C:\Program Files\ExplorerXP
2008-01-31 12:45 . 2008-01-31 12:53 <DIR> d-------- C:\Program Files\a-squared Free
2008-01-31 12:44 . 2008-01-31 12:44 <DIR> d-------- C:\Program Files\Trend Micro
2008-01-31 12:44 . 2008-01-31 12:44 <DIR> d-------- C:\Program Files\a-squared HiJackFree
2008-01-29 23:10 . 2008-01-29 23:10 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Webroot
2008-01-29 21:09 . 2008-01-29 21:09 <DIR> d-------- C:\Program Files\Windows Defender
2008-01-29 18:56 . 2008-01-29 18:56 <DIR> d-------- C:\Documents and Settings\LocalService\Application Data\Webroot
2008-01-27 23:03 . 2008-01-28 19:45 <DIR> d-------- C:\Program Files\a-squared Anti-Malware
2008-01-27 22:30 . 2008-01-28 19:45 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-01-27 12:09 . 2007-12-14 01:59 69,632 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-01-27 12:08 . 2008-01-27 12:09 <DIR> d-------- C:\Program Files\Java
2008-01-27 12:08 . 2008-01-27 12:08 <DIR> d-------- C:\Program Files\Common Files\Java
2008-01-27 09:03 . 2008-01-27 09:17 <DIR> d-a------ C:\Documents and Settings\All Users\Application Data\TEMP
2008-01-26 22:17 . 2008-01-26 23:13 <DIR> d-------- C:\WINDOWS\BDOSCAN8
2008-01-26 20:46 . 2008-01-26 22:16 <DIR> d-------- C:\Documents and Settings\Owner\.housecall6.6
2008-01-26 17:44 . 2008-01-26 17:44 <DIR> d-------- C:\Program Files\Avira
2008-01-26 17:44 . 2008-01-26 17:44 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
2008-01-26 17:28 . 2005-01-13 22:41 11,254 --a------ C:\WINDOWS\system32\locate.com
2008-01-26 17:27 . 2008-01-26 17:29 <DIR> d-------- C:\MGtools
2008-01-26 17:27 . 2008-01-26 17:29 42,728 --a------ C:\MGlogs.zip
2008-01-26 15:25 . 2008-01-30 10:53 293 --a------ C:\WINDOWS\wininit.ini
2008-01-26 14:14 . 2008-01-26 14:14 <DIR> d-------- C:\WINDOWS\system32\LogFiles
2008-01-26 13:36 . 2008-01-26 13:36 <DIR> d--h----- C:\Program Files\Uninstall Information
2008-01-26 12:26 . 2007-08-13 18:54 33,792 --a--c--- C:\WINDOWS\system32\dllcache\custsat.dll
2008-01-26 11:51 . 2008-01-26 11:51 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
2008-01-26 11:50 . 2008-01-26 11:50 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-01-26 11:44 . 2008-01-26 11:51 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-01-26 11:30 . 2008-01-26 11:30 <DIR> d-------- C:\Program Files\CCleaner
2008-01-23 16:07 . 2008-01-23 16:13 664 --a------ C:\WINDOWS\system32\d3d9caps.dat
2008-01-22 16:30 . 2008-01-26 17:24 <DIR> d-------- C:\WINDOWS\system32\winzs6
2008-01-22 16:30 . 2008-01-23 20:09 <DIR> d-------- C:\WINDOWS\system32\nui4
2008-01-22 16:30 . 2008-01-29 03:47 <DIR> d-------- C:\WINDOWS\system32\nGpxx13
2008-01-22 16:30 . 2008-01-22 16:30 <DIR> d-------- C:\WINDOWS\system32\extz1
2008-01-22 16:30 . 2008-01-23 20:09 <DIR> d-------- C:\WINDOWS\system32\dob3
2008-01-22 16:30 . 2008-01-23 20:09 <DIR> d-------- C:\WINDOWS\system32\comm7
2008-01-22 16:30 . 2008-02-03 14:11 <DIR> d-------- C:\WINDOWS\leioajgq
2008-01-22 16:30 . 2008-01-22 16:30 86,016 --a------ C:\WINDOWS\system32\drivers\mrxsmbb.sys
2008-01-15 16:42 . 2008-01-26 18:17 <DIR> d-------- C:\Program Files\RcvSystem
2008-01-09 15:01 . 2008-01-09 15:01 53,248 --a------ C:\WINDOWS\bdoscandel.exe
2008-01-09 15:01 . 2008-01-09 15:01 453 --a------ C:\WINDOWS\bdoscandellang.ini

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-26 19:13 --------- d-----w C:\Program Files\Common Files\Symantec Shared
2008-01-26 19:13 --------- d-----w C:\Documents and Settings\All Users\Application Data\Symantec
2008-01-26 19:09 --------- d-----w C:\Program Files\Symantec
2008-01-26 17:11 --------- d-----w C:\Program Files\Google
2008-01-26 16:25 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-01-26 16:25 --------- d-----w C:\Program Files\Full Tilt Poker.Org
2008-01-26 16:25 --------- d-----w C:\Program Files\Common Files\InstallShield
2008-01-26 16:23 --------- d-----w C:\Documents and Settings\All Users\Application Data\Napster
2008-01-24 05:09 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
2008-01-16 11:02 --------- d-----w C:\Program Files\PartyGaming.net
2005-09-02 01:49 57,624 ----a-w C:\Documents and Settings\Owner\Application Data\GDIPFONTCACHEV1.DAT
2005-07-04 17:34 336,896 ----a-w C:\Documents and Settings\Owner\remote.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8C6F8E56-1053-4CCD-BC00-F6081472A667}]
C:\Program Files\MSN\mevozuC:\WINDOWS\system32\winzs6\renamd83122.exe.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-10 14:00 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPLpr"="C:\Program Files\Synaptics\SynTP\SynTPLpr.exe" [2004-11-04 18:47 98394]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2004-11-04 18:47 688218]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2005-05-27 04:59 98304]
"Recguard"="%WINDIR%\SMINST\RECGUARD.EXE" [ ]
"RemoteControl"="C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-02 22:24 32768]
"NeroFilterCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2001-07-09 13:50 155648]
"Motive SmartBridge"="C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe" [2002-05-18 11:04 327680]
"ehTray"="C:\WINDOWS\ehome\ehtray.exe" [2004-08-10 13:04 59392]
"ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-02-01 23:05 339968]
"avgnt"="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-01-26 17:46 249896]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe" [2007-12-14 03:42 144784]
"Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20 866584]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 21:05:26 29696]
Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office10\OSA.EXE [2001-02-13 00:01:04 83360]
Verizon Online Support Center.lnk - C:\Program Files\Verizon Online\bin\matcli.exe [2005-07-01 11:15:09 204800]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"InstallVisualStyle"= C:\WINDOWS\Resources\Themes\Royale\Royale.msstyles
"InstallTheme"= C:\WINDOWS\Resources\Themes\Royale.theme

R1 mrxsmbb;mrxsmbb;C:\WINDOWS\system32\drivers\mrxsmbb.sys [2008-01-22 16:30]
S2 XBGG;Security Service;C:\WINDOWS\system32\svcd\svchost.exe []

.
Contents of the 'Scheduled Tasks' folder
"2005-07-01 15:33:18 C:\WINDOWS\Tasks\ISP signup reminder 3.job"
- C:\WINDOWS\system32\OOBE\oobebaln.exe
"2008-02-03 19:15:57 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
- C:\Program Files\Windows Defender\MpCmdRun.exe
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-03 14:21:35
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\a-squared Free\a2service.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Verizon Online\bin\mpbtn.exe
.
**************************************************************************
.
Completion time: 2008-02-03 14:23:55 - machine was rebooted
ComboFix-quarantined-files.txt 2008-02-03 19:23:39
ComboFix2.txt 2008-02-01 22:54:42
ComboFix3.txt 2008-01-27 15:16:05
ComboFix4.txt 2008-01-26 17:17:26
.
2008-02-01 22:59:35 --- E O F ---

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:08 PM

Posted 03 February 2008 - 09:47 AM

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

Folder::
C:\WINDOWS\system32\svcd
C:\Program Files\RcvSystem
C:\WINDOWS\system32\winzs6
C:\WINDOWS\system32\nui4
C:\WINDOWS\system32\nGpxx13
C:\WINDOWS\system32\extz1
C:\WINDOWS\system32\dob3
C:\WINDOWS\system32\comm7
C:\WINDOWS\leioajgq
C:\Temp\tn3

Driver::
mrxsmbb
XBGG

File::
C:\WINDOWS\system32\drivers\mrxsmbb.sys
C:\WINDOWS\system32\drivers\core.cache.dsk

Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8C6F8E56-1053-4CCD-BC00-F6081472A667}]
Prior to running Combofix.exe you should disable your antivirus program and disconnect from the internet.

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.

Posted Image

This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply along with a new HijackThis log.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 cherio39

cherio39
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:01:08 PM

Posted 03 February 2008 - 12:38 PM

ComboFix 08-02.01.1 - Owner 2008-02-04 12:23:46.5 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.508 [GMT -5:00]
Running from: C:\Documents and Settings\Owner\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Owner\Desktop\CFScript.txt
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

FILE
C:\WINDOWS\system32\drivers\core.cache.dsk
C:\WINDOWS\system32\drivers\mrxsmbb.sys
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\system32\drivers\core.cache.dsk
C:\WINDOWS\system32\drivers\mrxsmbb.sys
C:\Program Files\RcvSystem
C:\temp\tn3
C:\WINDOWS\leioajgq
C:\WINDOWS\leioajgq\Thumbs.db
C:\WINDOWS\system32\comm7
C:\WINDOWS\system32\dob3
C:\WINDOWS\system32\drivers\core.cache.dsk
C:\WINDOWS\system32\drivers\mrxsmbb.sys
C:\WINDOWS\system32\extz1
C:\WINDOWS\system32\extz1\lovstadcom2.exe
C:\WINDOWS\system32\nGpxx13
C:\WINDOWS\system32\nui4
C:\WINDOWS\system32\winzs6

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.
-------\LEGACY_MRXSMBB
-------\LEGACY_XBGG
-------\mrxsmbb
-------\XBGG


((((((((((((((((((((((((( Files Created from 2008-01-04 to 2008-02-04 )))))))))))))))))))))))))))))))
.

2008-02-03 14:06 . 2008-02-03 14:07 <DIR> d-------- C:\WINDOWS\ERUNT
2008-01-31 13:46 . 2008-01-31 13:46 <DIR> d-------- C:\ISeeYouXP
2008-01-31 12:46 . 2008-01-31 12:46 <DIR> d-------- C:\Program Files\ExplorerXP
2008-01-31 12:45 . 2008-01-31 12:53 <DIR> d-------- C:\Program Files\a-squared Free
2008-01-31 12:44 . 2008-01-31 12:44 <DIR> d-------- C:\Program Files\Trend Micro
2008-01-31 12:44 . 2008-01-31 12:44 <DIR> d-------- C:\Program Files\a-squared HiJackFree
2008-01-29 23:10 . 2008-01-29 23:10 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\Webroot
2008-01-29 21:09 . 2008-01-29 21:09 <DIR> d-------- C:\Program Files\Windows Defender
2008-01-29 18:56 . 2008-01-29 18:56 <DIR> d-------- C:\Documents and Settings\LocalService\Application Data\Webroot
2008-01-27 23:03 . 2008-01-28 19:45 <DIR> d-------- C:\Program Files\a-squared Anti-Malware
2008-01-27 22:30 . 2008-01-28 19:45 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-01-27 12:09 . 2007-12-14 01:59 69,632 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-01-27 12:08 . 2008-01-27 12:09 <DIR> d-------- C:\Program Files\Java
2008-01-27 12:08 . 2008-01-27 12:08 <DIR> d-------- C:\Program Files\Common Files\Java
2008-01-27 09:03 . 2008-01-27 09:17 <DIR> d-a------ C:\Documents and Settings\All Users\Application Data\TEMP
2008-01-26 22:17 . 2008-01-26 23:13 <DIR> d-------- C:\WINDOWS\BDOSCAN8
2008-01-26 20:46 . 2008-01-26 22:16 <DIR> d-------- C:\Documents and Settings\Owner\.housecall6.6
2008-01-26 17:44 . 2008-01-26 17:44 <DIR> d-------- C:\Program Files\Avira
2008-01-26 17:44 . 2008-01-26 17:44 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
2008-01-26 17:28 . 2005-01-13 22:41 11,254 --a------ C:\WINDOWS\system32\locate.com
2008-01-26 17:27 . 2008-01-26 17:29 <DIR> d-------- C:\MGtools
2008-01-26 17:27 . 2008-01-26 17:29 42,728 --a------ C:\MGlogs.zip
2008-01-26 15:25 . 2008-01-30 10:53 293 --a------ C:\WINDOWS\wininit.ini
2008-01-26 14:14 . 2008-01-26 14:14 <DIR> d-------- C:\WINDOWS\system32\LogFiles
2008-01-26 13:36 . 2008-01-26 13:36 <DIR> d--h----- C:\Program Files\Uninstall Information
2008-01-26 12:26 . 2007-08-13 18:54 33,792 --a--c--- C:\WINDOWS\system32\dllcache\custsat.dll
2008-01-26 11:51 . 2008-01-26 11:51 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
2008-01-26 11:50 . 2008-01-26 11:50 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-01-26 11:44 . 2008-01-26 11:51 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-01-26 11:30 . 2008-01-26 11:30 <DIR> d-------- C:\Program Files\CCleaner
2008-01-23 16:07 . 2008-01-23 16:13 664 --a------ C:\WINDOWS\system32\d3d9caps.dat
2008-01-09 15:01 . 2008-01-09 15:01 53,248 --a------ C:\WINDOWS\bdoscandel.exe
2008-01-09 15:01 . 2008-01-09 15:01 453 --a------ C:\WINDOWS\bdoscandellang.ini

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-26 19:13 --------- d-----w C:\Program Files\Common Files\Symantec Shared
2008-01-26 19:13 --------- d-----w C:\Documents and Settings\All Users\Application Data\Symantec
2008-01-26 19:09 --------- d-----w C:\Program Files\Symantec
2008-01-26 17:11 --------- d-----w C:\Program Files\Google
2008-01-26 16:25 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-01-26 16:25 --------- d-----w C:\Program Files\Full Tilt Poker.Org
2008-01-26 16:25 --------- d-----w C:\Program Files\Common Files\InstallShield
2008-01-26 16:23 --------- d-----w C:\Documents and Settings\All Users\Application Data\Napster
2008-01-24 05:09 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
2008-01-16 11:02 --------- d-----w C:\Program Files\PartyGaming.net
2005-09-02 01:49 57,624 ----a-w C:\Documents and Settings\Owner\Application Data\GDIPFONTCACHEV1.DAT
2005-07-04 17:34 336,896 ----a-w C:\Documents and Settings\Owner\remote.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-10 14:00 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPLpr"="C:\Program Files\Synaptics\SynTP\SynTPLpr.exe" [2004-11-04 18:47 98394]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2004-11-04 18:47 688218]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2005-05-27 04:59 98304]
"Recguard"="%WINDIR%\SMINST\RECGUARD.EXE" [ ]
"RemoteControl"="C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-02 22:24 32768]
"NeroFilterCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2001-07-09 13:50 155648]
"Motive SmartBridge"="C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe" [2002-05-18 11:04 327680]
"ehTray"="C:\WINDOWS\ehome\ehtray.exe" [2004-08-10 13:04 59392]
"ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-02-01 23:05 339968]
"avgnt"="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-01-26 17:46 249896]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe" [2007-12-14 03:42 144784]
"Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20 866584]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 21:05:26 29696]
Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office10\OSA.EXE [2001-02-13 00:01:04 83360]
Verizon Online Support Center.lnk - C:\Program Files\Verizon Online\bin\matcli.exe [2005-07-01 11:15:09 204800]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"InstallVisualStyle"= C:\WINDOWS\Resources\Themes\Royale\Royale.msstyles
"InstallTheme"= C:\WINDOWS\Resources\Themes\Royale.theme


.
Contents of the 'Scheduled Tasks' folder
"2005-07-01 15:33:18 C:\WINDOWS\Tasks\ISP signup reminder 3.job"
- C:\WINDOWS\system32\OOBE\oobebaln.exe
"2008-02-03 19:23:42 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
- C:\Program Files\Windows Defender\MpCmdRun.exe
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-04 12:27:43
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\a-squared Free\a2service.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Verizon Online\bin\mpbtn.exe
.
**************************************************************************
.
Completion time: 2008-02-04 12:30:00 - machine was rebooted
ComboFix-quarantined-files.txt 2008-02-04 17:29:51
ComboFix2.txt 2008-02-03 19:23:56
ComboFix3.txt 2008-02-01 22:54:42
ComboFix4.txt 2008-01-27 15:16:05
ComboFix5.txt 2008-01-26 17:17:26
.
2008-02-01 22:59:35 --- E O F ---


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:32, on 2008-02-04
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\a-squared Free\a2service.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Verizon Online\bin\mpbtn.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://bestbuy.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_04\bin\jusched.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Verizon Online Support Center.lnk = C:\Program Files\Verizon Online\bin\matcli.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.net\PartyPokerNet\RunPF.exe
O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.net\PartyPokerNet\RunPF.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O23 - Service: a-squared Free Service (a2free) - Emsi Software GmbH - C:\Program Files\a-squared Free\a2service.exe
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: lxcc_device - Lexmark International, Inc. - C:\WINDOWS\system32\lxcccoms.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS

--
End of file - 6688 bytes


Thanks!

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:08 PM

Posted 04 February 2008 - 09:06 AM

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Let me know how your computer is running now.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 cherio39

cherio39
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:01:08 PM

Posted 05 February 2008 - 09:52 PM

Thanks Sam. Don't see the usual 2 popups everytime I start IE, so all is looking good so far. Here is the log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/06/2008 at 09:16 PM

Application Version : 3.9.1008

Core Rules Database Version : 3395
Trace Rules Database Version: 1387

Scan type : Complete Scan
Total Scan Time : 01:04:13

Memory items scanned : 411
Memory threats detected : 0
Registry items scanned : 5698
Registry threats detected : 1
File items scanned : 41894
File threats detected : 7

Adware.Tracking Cookie
C:\Documents and Settings\Owner\Cookies\owner@questionmarket[1].txt
C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[2].txt
C:\Documents and Settings\Owner\Cookies\owner@specificclick[1].txt
C:\Documents and Settings\Owner\Cookies\owner@atdmt[1].txt
C:\Documents and Settings\Owner\Cookies\owner@msnportal.112.2o7[1].txt
C:\Documents and Settings\Owner\Cookies\owner@ads.pointroll[2].txt

Adware.AdSponsor/ISM
HKU\S-1-5-21-3583870293-3780001045-4166351489-1006\Software\QdrModule

Rogue.WinPerformance
C:\QOOBOX\QUARANTINE\C\WINDOWS\PERFINFO\5GCSQ1S55WWP.EXE.VIR

#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:08 PM

Posted 06 February 2008 - 09:12 AM

Looks good! :thumbsup:
Now let's finish up.


You will want to get your recovery console installed. Check this link for info on how to do that.

http://www.bleepingcomputer.com/tutorials/how-to-install-the-windows-xp-recovery-console/


==============



And finally, let's get rid of Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

    • Posted Image
  • When shown the disclaimer, Select "2"
The above procedure will:
  • Delete the following:
    • ComboFix and its associated files and folders.
    • VundoFix backups, if present
    • The C:\Deckard folder, if present
    • The C:_OtMoveIt folder, if present
  • Reset the clock settings.
  • Hide file extensions, if required.
  • Hide System/Hidden files, if required.
  • Reset System Restore.

=================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:wacko: :blink:
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 cherio39

cherio39
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:01:08 PM

Posted 07 February 2008 - 01:10 AM

Sam thank you so much for your help. Everything is running smoothly!

#12 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:08 PM

Posted 07 February 2008 - 08:56 PM

I'm glad I could help you out! :thumbsup:

Now that your problem appears to be resolved, this thread will be closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users