Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vundo Maybe?


  • This topic is locked This topic is locked
7 replies to this topic

#1 moonlightmafia

moonlightmafia

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:21 AM

Posted 29 September 2008 - 06:30 AM

my computer got sick, so i scanned it with spybot , adaware, and malwarebyte. the main issue was a relentless process called fm56mb32.exe and this somehow directly also involved iexplore.exe malwarebyte found the fm56mb32.exe file, quarantined then deleted it. now when i scan for it in safe mode it no longer finds it, nor in normal mode, yet it still pops up in my task manager processes and runs my page file usage history way up. along with it pops up iexplore and some other process that i cant quite remember the name of, something like Iy156(letters and numbers).exe. now that i deleted it with malwarebte it is no longer detecting it so how do i get rid of it? heres the hijack this log,

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\WINDOWS\PixArt\PAC207\Monitor.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\Juno\exec.exe
C:\Program Files\Juno\exec.exe
C:\WINDOWS\system32\fm56mb37.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\Juno\SearchEnh1.dll
O2 - BHO: Tensons.Application.DownloadAcceleratorManager.BHO - {00000003-1118-11da-8cd6-0800200c9888} - mscoree.dll (file missing)
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - C:\Program Files\Juno\Toolbar.dll
O4 - HKLM\..\Run: [Monitor] C:\WINDOWS\PixArt\PAC207\Monitor.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
O4 - HKLM\..\RunServices: [] winsock32.exe
O4 - HKCU\..\Run: [Juno_uoltray] C:\Program Files\Juno\exec.exe regrun
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O15 - Trusted Zone: *.line6.net
O17 - HKLM\System\CCS\Services\Tcpip\..\{1DD853E4-F152-441C-97C2-C72051848BB6}: NameServer = 64.136.52.73 64.136.44.73
O17 - HKLM\System\CCS\Services\Tcpip\..\{72D56D31-3ACB-47AA-AE99-051265D1CCEB}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\..\{C52CE76F-F2D4-4436-8BF8-288904673A77}: NameServer = 208.67.220.220,208.67.222.222
O18 - Filter hijack: text/html - (no CLSID) - (no file)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
O24 - Desktop Component 0: (no name) - (no file)

BC AdBot (Login to Remove)

 


#2 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:11:21 PM

Posted 06 October 2008 - 09:43 PM

Hello moonlightmafia,

Welcome back to Bleeping Computer :)

Sorry about the delay.:thumbsup: If you still need help, please post a new, and complete, HijackThis log (including the header) to make sure nothing has changed, and I'll be happy to look at it for you.

Thanks,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#3 moonlightmafia

moonlightmafia
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:21 AM

Posted 07 October 2008 - 09:11 PM

its alright, its worth it to get some professional like help see, this virus or whatevr it is has been pissing me off for weeks now. heres the log


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:19:09 PM, on 10/7/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\PixArt\PAC207\Monitor.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Juno\exec.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Juno\exec.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\AIM6\aolsoftware.exe
D:\PROGRA~1\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.juno.com/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\Juno\SearchEnh1.dll
O2 - BHO: Tensons.Application.DownloadAcceleratorManager.BHO - {00000003-1118-11da-8cd6-0800200c9888} - mscoree.dll (file missing)
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - C:\Program Files\Juno\Toolbar.dll
O4 - HKLM\..\Run: [Monitor] C:\WINDOWS\PixArt\PAC207\Monitor.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\RunServices: [] winsock32.exe
O4 - HKCU\..\Run: [HeuristicQuest] C:\DOCUME~1\AUTOMA~1\LOCALS~1\Temp\kFYt6XGa.exe
O4 - HKCU\..\Run: [Juno_uoltray] C:\Program Files\Juno\exec.exe regrun
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O15 - Trusted Zone: *.line6.net
O17 - HKLM\System\CCS\Services\Tcpip\..\{1DD853E4-F152-441C-97C2-C72051848BB6}: NameServer = 64.136.44.74 64.136.52.74
O17 - HKLM\System\CCS\Services\Tcpip\..\{72D56D31-3ACB-47AA-AE99-051265D1CCEB}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\..\{C52CE76F-F2D4-4436-8BF8-288904673A77}: NameServer = 208.67.220.220,208.67.222.222
O18 - Filter hijack: text/html - (no CLSID) - (no file)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
O24 - Desktop Component 0: (no name) - (no file)

--
End of file - 4931 bytes

#4 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:11:21 PM

Posted 08 October 2008 - 03:40 AM

Hello,

Go to start -> control panel -> Display properties -> Desktop -> Customize Desktop... -> Web tab, then uncheck and delete everything you find in there (except for "My current home page"),

Also remove the checkmark from the the Lock Desktop Items box if it is checked.
Apply.
Apply and Exit Display properties.

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

1. Download this file - combofix.exe
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
http://www.forospyware.com/sUBs/ComboFix.exe
http://subs.geekstogo.com/ComboFix.exe
2. Double click combofix.exe & follow the prompts.
3. When finished, it will produce a log for you. Post that log in your next reply please, along with a new HijackThis log.

Note:
Do not mouseclick combofix's window while it's running. That may cause it to stall.

Thanks,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#5 moonlightmafia

moonlightmafia
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:21 AM

Posted 12 October 2008 - 08:38 PM

i did everything you told me, sorry about the delayed reply life's been hectic..heres a new hijack this log and the combofix log,

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:19:09 PM, on 10/7/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\PixArt\PAC207\Monitor.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Juno\exec.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Juno\exec.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\AIM6\aolsoftware.exe
D:\PROGRA~1\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.juno.com/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\Juno\SearchEnh1.dll
O2 - BHO: Tensons.Application.DownloadAcceleratorManager.BHO - {00000003-1118-11da-8cd6-0800200c9888} - mscoree.dll (file missing)
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)
O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - C:\Program Files\Juno\Toolbar.dll
O4 - HKLM\..\Run: [Monitor] C:\WINDOWS\PixArt\PAC207\Monitor.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\RunServices: [] winsock32.exe
O4 - HKCU\..\Run: [HeuristicQuest] C:\DOCUME~1\AUTOMA~1\LOCALS~1\Temp\kFYt6XGa.exe
O4 - HKCU\..\Run: [Juno_uoltray] C:\Program Files\Juno\exec.exe regrun
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O15 - Trusted Zone: *.line6.net
O17 - HKLM\System\CCS\Services\Tcpip\..\{1DD853E4-F152-441C-97C2-C72051848BB6}: NameServer = 64.136.44.74 64.136.52.74
O17 - HKLM\System\CCS\Services\Tcpip\..\{72D56D31-3ACB-47AA-AE99-051265D1CCEB}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\..\{C52CE76F-F2D4-4436-8BF8-288904673A77}: NameServer = 208.67.220.220,208.67.222.222
O18 - Filter hijack: text/html - (no CLSID) - (no file)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
O24 - Desktop Component 0: (no name) - (no file)

--
End of file - 4931 bytes



ComboFix 08-10-11.02 - automatic clam bomb 2008-10-12 17:07:33.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.110 [GMT -4:00]
Running from: C:\Documents and Settings\automatic clam bomb\Desktop\ComboFix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
C:\Documents and Settings\automatic clam bomb\Application Data\iasna_27FE67F6-017D-4123-8E81-713889A5DAC1.dll
C:\Program Files\cas
C:\Program Files\cas\install.log
C:\Program Files\cas\UNWISE.EXE
C:\Program Files\cas\UNWISE.INI
C:\WINDOWS\smdat32m.sys
C:\WINDOWS\system32\fm56mb37.exe
C:\WINDOWS\system32\fm56mb37.exe.a_a

----- BITS: Possible infected sites -----

hxxp://vamebok.com
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_OREANS32
-------\Service_oreans32


((((((((((((((((((((((((( Files Created from 2008-09-12 to 2008-10-12 )))))))))))))))))))))))))))))))
.

2008-10-11 14:01 . 2008-10-11 14:05 176 --a------ C:\WINDOWS\system32\temp_0000_85-24.aok
2008-10-07 21:15 . 2008-10-12 17:13 54,156 --ah----- C:\WINDOWS\QTFont.qfn
2008-10-07 21:15 . 2008-10-07 21:15 1,409 --a------ C:\WINDOWS\QTFont.for
2008-10-05 22:01 . 2008-10-05 22:01 <DIR> d-------- C:\Program Files\Juno
2008-10-05 22:01 . 2008-10-05 22:01 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Juno
2008-09-28 05:14 . 2008-09-28 05:14 <DIR> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-09-28 05:14 . 2008-09-28 05:14 <DIR> d-------- C:\Documents and Settings\automatic clam bomb\Application Data\Malwarebytes
2008-09-28 05:14 . 2008-09-28 05:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-09-28 05:14 . 2008-09-10 00:04 38,528 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-09-28 05:14 . 2008-09-10 00:03 17,200 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-09-27 12:02 . 2008-09-27 12:02 <DIR> d-------- C:\Program Files\Trend Micro
2008-09-26 00:14 . 2008-09-26 00:14 <DIR> d-------- C:\Program Files\CCleaner
2008-09-25 20:19 . 2008-09-25 20:19 <DIR> d-------- C:\Program Files\Lavasoft
2008-09-25 20:19 . 2008-09-25 20:20 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-09-25 20:18 . 2008-09-25 20:18 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-09-24 20:47 . 2008-09-24 21:11 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-09-24 12:59 . 2004-08-04 03:56 24,576 --a------ C:\WINDOWS\system32\stus.exe
2008-09-23 22:00 . 2008-09-24 20:45 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SpeedBit
2008-09-22 03:41 . 2008-09-22 03:40 30,272 --a------ C:\WINDOWS\system32\iIy768t0.exe
2008-09-21 21:09 . 2008-09-21 21:09 <DIR> d-------- C:\Documents and Settings\automatic clam bomb\Application Data\acccore
2008-09-21 21:09 . 2008-09-21 21:09 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\acccore
2008-09-21 21:08 . 2008-09-21 21:09 <DIR> d-------- C:\Program Files\AIM6
2008-09-19 22:27 . 2008-09-19 22:27 <DIR> d-------- C:\Program Files\3Dize
2008-09-15 18:55 . 2008-09-15 18:55 <DIR> d-------- C:\Documents and Settings\automatic clam bomb\Application Data\FXpansion
2008-09-15 18:47 . 2008-09-15 18:47 <DIR> d-------- C:\Program Files\FXpansion

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-09-29 05:06 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-09-27 12:45 --------- d-----w C:\Program Files\eMule
2008-09-25 00:44 --------- d---a-w C:\Documents and Settings\All Users\Application Data\TEMP
2008-09-22 12:59 --------- d-----w C:\Program Files\u-he
2008-09-22 01:09 --------- d-----w C:\Program Files\Viewpoint
2008-09-22 01:09 --------- d-----w C:\Documents and Settings\All Users\Application Data\Viewpoint
2008-09-22 01:08 --------- d-----w C:\Program Files\Common Files\AOL
2008-09-11 08:15 --------- d-----w C:\Program Files\Creative
2008-09-07 04:02 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-09-07 04:02 --------- d-----w C:\Program Files\RCA
2008-09-07 04:02 --------- d-----w C:\Program Files\Common Files\InstallShield
2005-09-09 15:08 1,798 -c--a-w C:\Documents and Settings\automatic clam bomb\Presets.bin
1998-11-22 18:12 100,000 -c--a-w C:\Documents and Settings\automatic clam bomb\TETRIPZ.EXE
1996-09-06 17:07 29,696 -c--a-w C:\Documents and Settings\automatic clam bomb\EXTRACT.EXE
1996-09-06 16:59 31,232 -c--a-w C:\Documents and Settings\automatic clam bomb\FINDKEY.EXE
1996-09-06 16:52 37,376 -c--a-w C:\Documents and Settings\automatic clam bomb\ZIPDECRY.EXE
.

------- Sigcheck -------

2001-08-18 08:00 21504 585398603f570f9705774d65d292e5d1 C:\WINDOWS\$NtServicePackUninstall$\userinit.exe
2004-08-04 03:56 24576 39b1ffb03c2296323832acbae50d2aff C:\WINDOWS\ServicePackFiles\i386\userinit.exe
2008-09-01 13:04 8192 c90cab227a00f0bcb8900b5f069c5c19 C:\WINDOWS\system32\userinit.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Juno_uoltray"="C:\Program Files\Juno\exec.exe" [2008-05-06 1701376]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Monitor"="C:\WINDOWS\PixArt\PAC207\Monitor.exe" [2006-11-03 319488]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 144784]
"DAEMON Tools"="C:\Program Files\DAEMON Tools\daemon.exe" [2005-12-10 133016]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2008-03-28 413696]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2008-03-30 267048]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"MIDI1"= myokent.dll
"vidc.MJPG"= m3jpeg32.dll
"vidc.dmb1"= m3jpeg32.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^NETGEAR WPN111 Smart Wizard.lnk]
backup=C:\WINDOWS\pss\NETGEAR WPN111 Smart Wizard.lnkCommon Startup

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\uTorrent\\utorrent.exe"=
"C:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"C:\\WINDOWS\\system32\\mmc.exe"=

R2 Viewpoint Manager Service;Viewpoint Manager Service;C:\Program Files\Viewpoint\Common\ViewpointService.exe [2007-01-04 24652]
R3 ati2mtaa;ati2mtaa;C:\WINDOWS\system32\DRIVERS\ati2mtaa.sys [2002-01-11 295168]
S3 ati2mpaa;ati2mpaa;C:\WINDOWS\system32\DRIVERS\ati2mpaa.sys [2001-08-17 281856]
S3 ATICDSDr;ATICDSDr;C:\DOCUME~1\AUTOMA~1\LOCALS~1\Temp\ATICDSDr.sys [ ]
S3 DNINDIS5;DNINDIS5 NDIS Protocol Driver;C:\WINDOWS\system32\DNINDIS5.SYS [2003-07-24 17149]
S3 L6DP;L6DP;C:\WINDOWS\system32\Drivers\l6dp.sys [ ]
S3 PAC207;Basic Webcam;C:\WINDOWS\system32\DRIVERS\PFC027.SYS [2006-11-20 506112]
S3 SynasUSB;SynasUSB;C:\WINDOWS\system32\drivers\SynasUSB.sys [2006-01-29 16896]
S3 usbprint;Microsoft USB PRINTER Class;C:\WINDOWS\system32\DRIVERS\usbprint.sys [2004-08-04 25856]
S3 WPN111;Wireless USB 2.0 Adapter with RangeMax Service;C:\WINDOWS\system32\DRIVERS\WPN111.sys [2005-09-26 362944]
.
Contents of the 'Scheduled Tasks' folder

2008-10-09 C:\WINDOWS\Tasks\At1.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At10.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At11.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At12.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-02 C:\WINDOWS\Tasks\At13.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-06 C:\WINDOWS\Tasks\At14.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At15.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-10 C:\WINDOWS\Tasks\At16.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At17.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-12 C:\WINDOWS\Tasks\At18.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At19.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At2.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-08 C:\WINDOWS\Tasks\At20.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-08 C:\WINDOWS\Tasks\At21.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-09 C:\WINDOWS\Tasks\At22.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-08 C:\WINDOWS\Tasks\At23.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-09 C:\WINDOWS\Tasks\At24.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At25.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At26.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At27.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At28.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At29.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At3.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At30.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At31.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At32.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At33.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At34.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At35.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At36.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-02 C:\WINDOWS\Tasks\At37.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-06 C:\WINDOWS\Tasks\At38.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At39.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At4.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-10 C:\WINDOWS\Tasks\At40.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At41.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-12 C:\WINDOWS\Tasks\At42.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At43.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-08 C:\WINDOWS\Tasks\At44.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-08 C:\WINDOWS\Tasks\At45.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-09 C:\WINDOWS\Tasks\At46.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-08 C:\WINDOWS\Tasks\At47.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-09 C:\WINDOWS\Tasks\At48.job
- C:\WINDOWS\system32\fm56mb37.exe []

2008-10-11 C:\WINDOWS\Tasks\At5.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At6.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At7.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At8.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]

2008-10-11 C:\WINDOWS\Tasks\At9.job
- C:\WINDOWS\system32\iIy768t0.exe [2008-09-22 03:40]
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Aim6 - (no file)
HKLM-RunServices-<NO NAME> - winsock32.exe


.
------- Supplementary Scan -------
.
FireFox -: Profile - C:\Documents and Settings\automatic clam bomb\Application Data\Mozilla\Firefox\Profiles\zg6ypawp.default\
FireFox -: prefs.js - SEARCH.DEFAULTURL - hxxp://search.aol.com/aolcom/search?invocationType=tbff50ie7&query=
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://www.aol.com/?src=aim
.

**************************************************************************

catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-10-12 17:12:36
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\Program Files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2008-10-12 17:17:47 - machine was rebooted
ComboFix-quarantined-files.txt 2008-10-12 21:17:42

Pre-Run: 2,086,510,592 bytes free
Post-Run: 2,017,886,208 bytes free

249 --- E O F --- 2007-11-14 08:02:05

#6 moonlightmafia

moonlightmafia
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:21 AM

Posted 26 October 2008 - 08:09 PM

uhm,..ive been waiting for a response. still have this problem..tis sooo annoying. i have to restart my comp like every 30 minutes. if anyone could help me, feel free. please feel free

#7 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:11:21 PM

Posted 02 November 2008 - 07:21 PM

Hello,

I apologize for my delayed reply.

Please download Malwarebytes' Anti-Malware from one of these places:
http://www.majorgeeks.com/Malwarebytes_Ant...ware_d5756.html
http://www.besttechie.net/tools/mbam-setup.exe

Double Click mbam-setup.exe to install the application.

* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Quick Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy&Paste the entire report in your next reply along with a fresh HijackThis log.

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.

Thanks,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#8 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:11:21 PM

Posted 02 December 2008 - 05:21 AM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users