Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan.FakeAlert


  • This topic is locked This topic is locked
13 replies to this topic

#1 noctecstoran

noctecstoran

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:32 PM

Posted 15 February 2009 - 09:24 PM

Hi, I have read and used advice from bleepingcomputer forums for a couple of years now pertaining to my and family's computers. I have very seldomly been infected myself by using safe internet habits and a variety of free antivirus and antimalware programs.
This current infection I am working on was due to a person downloading a fake codec update notification resulting in fake security alerts and periodic accumulating pop ups. The fake alerts attempted to reroute to Antivirus 2009 and another malware program, however Antivirus 2009 registry keys and files were never found on computer. A userinit.exe virus was found in an incorrect directory (hence being a virus). Initial attempts to run SpybotDestroyer seemed to trigger more popups. SUPERAntiSpyware Free Edition and Malwarebytes' Anti-Malware had limited success in removing detected. Ended up using two different suggested directions involving ComboFix, CCleaner, Look2Me-Destoyer, SDFix, ATF-Cleaner, SUPERAntiSpyware and Malwarebytes and was successful in removing most of the infection.
The only thing that still exists that i can find is registry key HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} . MBAM detects and attempts to remove on restart. Cannot delete from regedit. One of the last pieces I removed seemed to blocked registry changes to this and another registry but evidently something is still there. No popups or anything else seems evident of infection except that registry.

Follows DDS and MBAM log


DDS (Ver_09-02-01.01) - NTFSx86
Run by Mom at 19:58:47.78 on Sun 02/15/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.255.57 [GMT -6:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\SearchIndexer.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\devldr32.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Documents and Settings\Mom\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
BHO: SpywareGuardDLBLOCK.CBrowserHelper: {4a368e80-174f-4872-96b5-0b27ddd11db2} - c:\program files\spywareguard\dlprotect.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
uRun: [MoneyAgent] "c:\program files\microsoft money\system\Money Express.exe"
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRunOnce: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
dRun: [MySpaceIM] c:\program files\myspace\im\MySpaceIM.exe
StartupFolder: c:\docume~1\mom\startm~1\programs\startup\spywar~1.lnk - c:\program files\spywareguard\sgmain.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1231051565460
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1231054036263
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
SEH: SpywareGuard.Handler: {81559c35-8464-49f7-bb0e-07a383bef910} - c:\program files\spywareguard\spywareguard.dll

============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-12-4 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-12-4 55024]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-12-4 7408]

=============== Created Last 30 ================

2009-02-11 00:01 <DIR> --d----- c:\program files\SpywareGuard
2009-02-10 22:40 <DIR> a-dshr-- C:\cmdcons
2009-02-10 22:32 161,792 a------- c:\windows\SWREG.exe
2009-02-10 22:32 98,816 a------- c:\windows\sed.exe
2009-02-10 22:25 <DIR> --d----- c:\program files\CCleaner
2009-02-09 21:13 578,560 ac------ c:\windows\system32\dllcache\user32.dll
2009-02-09 21:11 <DIR> --d----- c:\windows\ERUNT
2009-02-09 21:03 <DIR> --d----- C:\SDFix
2009-02-08 21:51 <DIR> --d----- c:\program files\Enigma Software Group
2009-02-08 02:58 <DIR> --d----- c:\docume~1\mom\applic~1\Malwarebytes
2009-02-08 02:58 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-02-08 02:58 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-08 02:58 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-02-08 02:58 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-02-06 12:08 <DIR> --d----- c:\windows\pss
2009-02-05 16:09 <DIR> --d----- c:\program files\Microsoft Money
2009-02-05 16:07 376 a------- c:\windows\ODBC.INI
2009-02-05 16:05 <DIR> --d----- c:\windows\ShellNew
2009-02-05 16:03 627 -------- c:\windows\fna00172
2009-02-05 16:03 <DIR> --d----- c:\program files\FoneSync
2009-02-05 16:02 <DIR> --d----- c:\documents and settings\mom\WINDOWS
2009-02-05 15:49 <DIR> --d----- c:\program files\Microsoft Works Suite 2001
2009-02-02 03:00 <DIR> --d----- c:\docume~1\mom\applic~1\MySpace
2009-02-02 03:00 <DIR> --d----- c:\program files\MySpace
2009-01-25 12:11 <DIR> --d----- c:\windows\system32\appmgmt
2009-01-25 11:46 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Intuit
2009-01-25 11:46 <DIR> --d----- c:\program files\common files\Intuit
2009-01-25 11:45 <DIR> --d----- c:\program files\TurboTax
2009-01-25 11:14 <DIR> --d-h--- c:\windows\PIF
2009-01-22 01:33 <DIR> --d----- c:\docume~1\mom\applic~1\Windows Search
2009-01-20 15:40 <DIR> --d----- c:\docume~1\mom\applic~1\LimeWire
2009-01-20 15:38 73,728 a------- c:\windows\system32\javacpl.cpl
2009-01-20 15:38 410,984 a------- c:\windows\system32\deploytk.dll
2009-01-20 15:33 <DIR> --d----- c:\program files\LimeWire

==================== Find3M ====================

2009-01-14 10:37 69,026 a------- c:\windows\hpoins05.dat
2009-01-06 02:10 1,764,375 a------- C:\SunshineUN-1.4.1.2-Beta-4.1-2.exe
2009-01-05 20:55 87,263 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2009-01-03 22:04 21,640 a------- c:\windows\system32\emptyregdb.dat
2008-12-20 17:15 826,368 a------- c:\windows\system32\wininet.dll

============= FINISH: 19:59:49.38 ===============


Malwarebytes' Anti-Malware 1.34
Database version: 1764
Windows 5.1.2600 Service Pack 3

2/15/2009 7:46:22 PM
mbam-log-2009-02-15 (19-46-16).txt

Scan type: Full Scan (A:\|C:\|D:\|)
Objects scanned: 105251
Time elapsed: 28 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Attached Files



BC AdBot (Login to Remove)

 


#2 KoanYorel

KoanYorel

    Bleepin' Conundrum


  • Staff Emeritus
  • 19,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:65 miles due East of the &quot;Logic Free Zone&quot;, in Md, USA
  • Local time:08:32 PM

Posted 27 February 2009 - 11:37 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine. If you have not done so, include a description of your problem, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

R,
K
The only easy day was yesterday.

...some do, some don't; some will, some won't (WR)

#3 noctecstoran

noctecstoran
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:32 PM

Posted 28 February 2009 - 02:05 PM

As to my knowledge, nothing new has happened since posting DDS log orginally except tried running RegAssasin from MBAM and it could not delete registry. Will happily post a fresh DDS log tonight though.

#4 KoanYorel

KoanYorel

    Bleepin' Conundrum


  • Staff Emeritus
  • 19,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:65 miles due East of the &quot;Logic Free Zone&quot;, in Md, USA
  • Local time:08:32 PM

Posted 28 February 2009 - 02:41 PM

Post the log when you can and I will alert the HJT team.

R,
K
The only easy day was yesterday.

...some do, some don't; some will, some won't (WR)

#5 noctecstoran

noctecstoran
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:32 PM

Posted 01 March 2009 - 09:07 PM

Internet was used since last DDS and have not cleaned anything since last DDS log, having said that new DDS log:


DDS (Ver_09-02-01.01) - NTFSx86
Run by Mom at 19:55:58.19 on Sun 03/01/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.255.78 [GMT -6:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\SearchIndexer.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\devldr32.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Microsoft Money\System\Money Express.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\Java\jre6\bin\jucheck.exe
C:\Program Files\LimeWire\LimeWire.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Mom\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
BHO: SpywareGuardDLBLOCK.CBrowserHelper: {4a368e80-174f-4872-96b5-0b27ddd11db2} - c:\program files\spywareguard\dlprotect.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
uRun: [MoneyAgent] "c:\program files\microsoft money\system\Money Express.exe"
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
dRun: [MySpaceIM] c:\program files\myspace\im\MySpaceIM.exe
StartupFolder: c:\docume~1\mom\startm~1\programs\startup\spywar~1.lnk - c:\program files\spywareguard\sgmain.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1231051565460
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1231054036263
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
SEH: SpywareGuard.Handler: {81559c35-8464-49f7-bb0e-07a383bef910} - c:\program files\spywareguard\spywareguard.dll

============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-12-4 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-12-4 55024]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-12-4 7408]
S3 getPlus® Helper;getPlus® Helper;c:\program files\nos\bin\getPlus_HelperSvc.exe [2009-1-13 33752]

=============== Created Last 30 ================

2009-02-11 00:01 <DIR> --d----- c:\program files\SpywareGuard
2009-02-10 22:40 <DIR> a-dshr-- C:\cmdcons
2009-02-10 22:32 161,792 a------- c:\windows\SWREG.exe
2009-02-10 22:32 98,816 a------- c:\windows\sed.exe
2009-02-10 22:25 <DIR> --d----- c:\program files\CCleaner
2009-02-09 21:13 578,560 ac------ c:\windows\system32\dllcache\user32.dll
2009-02-09 21:11 <DIR> --d----- c:\windows\ERUNT
2009-02-09 21:03 <DIR> --d----- C:\SDFix
2009-02-08 21:51 <DIR> --d----- c:\program files\Enigma Software Group
2009-02-08 02:58 <DIR> --d----- c:\docume~1\mom\applic~1\Malwarebytes
2009-02-08 02:58 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-02-08 02:58 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-08 02:58 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-02-08 02:58 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-02-06 12:08 <DIR> --d----- c:\windows\pss
2009-02-05 16:09 <DIR> --d----- c:\program files\Microsoft Money
2009-02-05 16:07 376 a------- c:\windows\ODBC.INI
2009-02-05 16:05 <DIR> --d----- c:\windows\ShellNew
2009-02-05 16:03 627 -------- c:\windows\fna00172
2009-02-05 16:03 <DIR> --d----- c:\program files\FoneSync
2009-02-05 16:02 <DIR> --d----- c:\documents and settings\mom\WINDOWS
2009-02-05 15:49 <DIR> --d----- c:\program files\Microsoft Works Suite 2001
2009-02-02 03:00 <DIR> --d----- c:\docume~1\mom\applic~1\MySpace
2009-02-02 03:00 <DIR> --d----- c:\program files\MySpace

==================== Find3M ====================

2009-01-20 15:38 410,984 a------- c:\windows\system32\deploytk.dll
2009-01-14 10:37 69,026 a------- c:\windows\hpoins05.dat
2009-01-06 02:10 1,764,375 a------- C:\SunshineUN-1.4.1.2-Beta-4.1-2.exe
2009-01-05 20:55 87,263 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2009-01-03 22:04 21,640 a------- c:\windows\system32\emptyregdb.dat
2008-12-20 17:15 826,368 a------- c:\windows\system32\wininet.dll

============= FINISH: 19:57:24.35 ===============

#6 Billy O'Neal

Billy O'Neal

    Visual C++ STL Maintainer


  • Malware Response Team
  • 12,304 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Redmond, Washington
  • Local time:05:32 PM

Posted 02 March 2009 - 08:18 PM

Hello, noctecstoran

Ended up using two different suggested directions involving ComboFix, CCleaner, Look2Me-Destoyer, SDFix, ATF-Cleaner, SUPERAntiSpyware and Malwarebytes and was successful in removing most of the infection.

This is a really really bad idea. Running such tools has destroyed any way for me to identify what's going on with your machine.

Please post the contents of the file C:\ComboFix.txt

BillyIII
Twitter - My statements do not establish the official position of Microsoft Corporation, and are my own personal opinion. (But you already knew that, right?)
Posted Image

#7 noctecstoran

noctecstoran
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:32 PM

Posted 03 March 2009 - 09:13 PM

Yeah, I was afraid of that. Also, ComboFix was probably ran more than once, if that changes the relevence of this file. ComboFix.txt:

ComboFix 09-02-10.01 - Mom 2009-02-10 22:40:53.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.255.85 [GMT -6:00]
Running from: c:\documents and settings\Mom\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((( Files Created from 2009-01-11 to 2009-02-11 )))))))))))))))))))))))))))))))
.

2009-02-10 22:25 . 2009-02-10 22:25 <DIR> d-------- c:\program files\CCleaner
2009-02-09 23:38 . 2009-02-09 23:38 <DIR> d-------- c:\documents and settings\Mom\Application Data\U3
2009-02-09 21:13 . 2009-02-09 21:13 578,560 --a--c--- c:\windows\system32\dllcache\user32.dll
2009-02-09 21:11 . 2009-02-09 21:12 <DIR> d-------- c:\windows\ERUNT
2009-02-09 21:07 . 2009-02-09 21:07 <DIR> d-------- c:\documents and settings\Administrator
2009-02-09 21:03 . 2009-02-10 21:39 <DIR> d-------- C:\SDFix
2009-02-08 21:51 . 2009-02-08 21:54 <DIR> d-------- c:\program files\Enigma Software Group
2009-02-08 02:58 . 2009-02-08 02:58 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-08 02:58 . 2009-02-08 02:58 <DIR> d-------- c:\documents and settings\Mom\Application Data\Malwarebytes
2009-02-08 02:58 . 2009-02-08 02:58 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-08 02:58 . 2009-01-14 16:11 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-08 02:58 . 2009-01-14 16:11 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-02-05 16:09 . 2009-02-05 16:10 <DIR> d-------- c:\program files\Microsoft Money
2009-02-05 16:07 . 2009-02-05 16:07 376 --a------ c:\windows\ODBC.INI
2009-02-05 16:05 . 2009-02-05 16:05 <DIR> d-------- c:\windows\ShellNew
2009-02-05 16:04 . 2009-02-05 16:04 <DIR> d-------- c:\documents and settings\Mom\Application Data\Microsoft Web Folders
2009-02-05 16:03 . 2009-02-05 16:03 <DIR> d-------- c:\program files\FoneSync
2009-02-05 16:03 . 1999-06-17 17:32 627 --------- c:\windows\fna00172
2009-02-05 16:02 . 2009-02-05 16:02 <DIR> d-------- c:\documents and settings\Mom\WINDOWS
2009-02-05 15:57 . 2009-02-05 16:07 <DIR> d-------- c:\program files\Microsoft Works
2009-02-05 15:49 . 2009-02-05 15:49 <DIR> d-------- c:\program files\Microsoft Works Suite 2001
2009-02-03 21:51 . 2009-02-03 21:51 <DIR> d-------- c:\documents and settings\Taelur\Application Data\MySpace
2009-02-02 03:00 . 2009-02-02 03:00 <DIR> d-------- c:\program files\MySpace
2009-02-02 03:00 . 2009-02-02 03:00 <DIR> d-------- c:\documents and settings\Mom\Application Data\MySpace
2009-01-30 18:51 . 2009-02-03 21:51 <DIR> d-------- c:\documents and settings\Taelur\Application Data\LimeWire
2009-01-25 11:46 . 2009-01-25 12:08 <DIR> d-------- c:\program files\Common Files\Intuit
2009-01-25 11:46 . 2009-01-25 11:50 <DIR> d-------- c:\documents and settings\All Users\Application Data\Intuit
2009-01-25 11:45 . 2009-01-25 11:45 <DIR> d-------- c:\program files\TurboTax
2009-01-25 11:14 . 2009-01-25 11:14 <DIR> d--h----- c:\windows\PIF
2009-01-22 01:33 . 2009-01-22 01:33 <DIR> d-------- c:\documents and settings\Mom\Application Data\Windows Search
2009-01-20 15:40 . 2009-02-06 12:10 <DIR> d-------- c:\documents and settings\Mom\Application Data\LimeWire
2009-01-20 15:38 . 2009-01-20 15:38 <DIR> d-------- c:\program files\Java
2009-01-20 15:38 . 2009-01-20 15:38 410,984 --a------ c:\windows\system32\deploytk.dll
2009-01-20 15:38 . 2009-01-20 15:38 73,728 --a------ c:\windows\system32\javacpl.cpl
2009-01-20 15:33 . 2009-01-30 18:49 <DIR> d-------- c:\program files\LimeWire
2009-01-15 21:29 . 2009-01-15 21:29 <DIR> d-------- c:\documents and settings\Taelur\Application Data\Windows Desktop Search
2009-01-15 21:28 . 2009-01-15 21:28 <DIR> d-------- c:\documents and settings\Taelur
2009-01-15 09:21 . 2009-01-15 09:21 <DIR> d-------- c:\program files\Common Files\Adobe AIR
2009-01-15 09:18 . 2009-01-15 09:19 <DIR> d-------- c:\program files\Common Files\Adobe
2009-01-15 09:11 . 2009-01-15 09:11 <DIR> d-------- c:\program files\Google
2009-01-13 15:34 . 2009-01-13 15:34 <DIR> d-------- c:\program files\NOS
2009-01-13 15:34 . 2009-01-15 09:17 <DIR> d-------- c:\documents and settings\All Users\Application Data\NOS

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-11 04:26 --------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-02-10 05:35 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP
2009-02-10 05:35 --------- d-----w c:\program files\SpywareBlaster
2009-02-02 19:12 --------- d-----w c:\program files\PopCap Games
2009-01-08 09:00 --------- d-----w c:\program files\MSXML 4.0
2009-01-08 05:07 --------- d-----w c:\program files\HP
2009-01-08 05:07 --------- d-----w c:\program files\Hewlett-Packard
2009-01-08 05:03 --------- d-----w c:\documents and settings\All Users\Application Data\HP Product Assistant
2009-01-07 01:40 --------- d-----w c:\program files\SunshineUN
2009-01-06 22:30 --------- d-----w c:\documents and settings\All Users\Application Data\HP
2009-01-06 22:28 --------- d-----w c:\program files\Common Files\HP
2009-01-06 22:22 --------- d-----w c:\program files\Common Files\Hewlett-Packard
2009-01-06 08:10 1,764,375 ----a-w C:\SunshineUN-1.4.1.2-Beta-4.1-2.exe
2009-01-06 05:03 --------- d-----w c:\program files\Microsoft Silverlight
2009-01-06 05:02 --------- d-----w c:\program files\Windows Desktop Search
2009-01-06 05:02 --------- d-----w c:\documents and settings\Mom\Application Data\Windows Desktop Search
2009-01-06 05:00 --------- d-----w c:\program files\Windows Media Connect 2
2009-01-04 20:17 --------- d-----w c:\program files\Spybot - Search & Destroy
2009-01-04 04:58 --------- d-----w c:\program files\SUPERAntiSpyware
2009-01-04 04:58 --------- d-----w c:\documents and settings\Mom\Application Data\SUPERAntiSpyware.com
2009-01-04 04:58 --------- d-----w c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-01-04 04:57 --------- d-----w c:\program files\Common Files\Wise Installation Wizard
2009-01-04 04:10 --------- d-----w c:\program files\microsoft frontpage
2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MoneyAgent"="c:\program files\Microsoft Money\System\Money Express.exe" [2000-07-19 176183]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2008-09-16 1833296]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2008-12-04 1809648]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-20 136600]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"MySpaceIM"="c:\program files\MySpace\IM\MySpaceIM.exe" [2008-12-12 9555968]

c:\documents and settings\Taelur\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - c:\program files\LimeWire\LimeWire.exe [2009-01-29 139776]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2008-05-26 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-03 14:56 352256 c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"= ctwdm32.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Image Zone Fast Start.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Image Zone Fast Start.lnk
backup=c:\windows\pss\HP Image Zone Fast Start.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Works Calendar Reminders.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Works Calendar Reminders.lnk
backup=c:\windows\pss\Microsoft Works Calendar Reminders.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=c:\windows\pss\Windows Search.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Mom^Start Menu^Programs^Startup^LimeWire On Startup.lnk]
path=c:\documents and settings\Mom\Start Menu\Programs\Startup\LimeWire On Startup.lnk
backup=c:\windows\pss\LimeWire On Startup.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
--a------ 2008-04-13 18:12 15360 c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
--a------ 2007-05-08 16:24 54840 c:\program files\HP\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Microsoft Works Portfolio]
--a------ 2000-08-08 14:00 311350 c:\program files\Microsoft Works\wkssb.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Microsoft Works Update Detection]
--a------ 2000-08-08 14:00 28739 c:\program files\Microsoft Works\WkDetect.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
--a------ 2003-07-28 15:19 4841472 c:\windows\system32\nvcpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
-rahs---- 2008-09-16 12:16 1833296 c:\program files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
--a------ 2009-01-20 15:38 136600 c:\program files\Java\jre6\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WorksFUD]
--a------ 2000-08-08 14:00 24576 c:\program files\Microsoft Works\wkfud.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
--a------ 2003-07-28 15:19 323584 c:\windows\system32\nwiz.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\SunshineUN\\SunshineUN.exe"=
"c:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe"=
"c:\\Program Files\\Spybot - Search & Destroy\\SDUpdate.exe"=
"c:\\Program Files\\SpywareBlaster\\spywareblaster.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\MySpace\\IM\\MySpaceIM.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2008-12-04 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2008-12-04 55024]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2008-12-04 7408]
S3 getPlus® Helper;getPlus® Helper;c:\program files\NOS\bin\getPlus_HelperSvc.exe [2009-01-13 33752]
.
Contents of the 'Scheduled Tasks' folder

2009-02-08 c:\windows\Tasks\At1.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At10.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At11.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-06 c:\windows\Tasks\At12.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-06 c:\windows\Tasks\At13.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-06 c:\windows\Tasks\At14.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-06 c:\windows\Tasks\At15.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-09 c:\windows\Tasks\At16.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At17.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At18.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-09 c:\windows\Tasks\At19.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At2.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-09 c:\windows\Tasks\At20.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-09 c:\windows\Tasks\At21.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-10 c:\windows\Tasks\At22.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-11 c:\windows\Tasks\At23.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At24.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At3.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At4.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At5.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At6.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At7.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At8.job
- c:\windows\system32\4uM20oF8.exe []

2009-02-08 c:\windows\Tasks\At9.job
- c:\windows\system32\4uM20oF8.exe []
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)


.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-10 22:42:33
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\InprocServer32]
@DACL=(02 0000)
@="c:\\WINDOWS\\system32\\msxml71.dll"
"ThreadingModel"="Apartment"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\ProgID]
@DACL=(02 0000)
@="XML.XML.1"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\Programmable]
@DACL=(02 0000)

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\TypeLib]
@DACL=(02 0000)
@="{F4678279-22B0-3551-8853-8FBDAB15425A}"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\VersionIndependentProgID]
@DACL=(02 0000)
@="XML.XML"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(616)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
.
Completion time: 2009-02-10 22:45:14
ComboFix-quarantined-files.txt 2009-02-11 04:45:10

Pre-Run: 32,920,092,672 bytes free
Post-Run: 32,910,315,520 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

250 --- E O F --- 2009-01-14 09:03:12

#8 noctecstoran

noctecstoran
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:32 PM

Posted 03 March 2009 - 09:21 PM

I may have an older MBAM log on a usb drive elsewhere, if the combofix.txt does not help out any. That would be another 24 hours before I could post it if I do still have it.

#9 Billy O'Neal

Billy O'Neal

    Visual C++ STL Maintainer


  • Malware Response Team
  • 12,304 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Redmond, Washington
  • Local time:05:32 PM

Posted 05 March 2009 - 12:04 AM

Hello, noctecstoran
Please let me know how things are running after this fix :thumbup2:

We need to re-run ComboFix with some additonal directives.
  • Please disable any running anti-virus programs.

    If you are unsure how to do this, see this topic: http://www.bleepingcomputer.com/forums/t/114351/how-to-temporarily-disable-your-anti-virus-firewall-and-anti-malware-programs/

  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  • Open notepad and copy/paste the text in the quotebox below into it:
    atjob::
    reglockdel::
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\InprocServer32]
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\ProgID]
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\Programmable]
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\TypeLib]
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\VersionIndependentProgID]
    registry::
    [-HKEY_LOCAL_MACHINE\software\Classes\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}]
  • Save this as CFScript.txt, in the same location as ComboFix.exe
  • Posted Image
    Refering to the picture above, drag CFScript into ComboFix.exe
  • When finished, it shall produce a log for you at "C:\ComboFix.txt". Please copy and paste that report here.
Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall.

In your next reply, please include the following:
  • ComboFix.txt

BillyIII
Twitter - My statements do not establish the official position of Microsoft Corporation, and are my own personal opinion. (But you already knew that, right?)
Posted Image

#10 noctecstoran

noctecstoran
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:32 PM

Posted 05 March 2009 - 09:40 PM

Registry was deleted (checked in REGEDIT); S&D, SUPERAntispyware, and MBAM did not detect anything. I am going to restart computer and see if anything reappears. Noticed it picked up another init32.exe (previous was userinit.exe)



ComboFix 09-03-04.01 - Mom 2009-03-05 18:09:53.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.255.92 [GMT -6:00]
Running from: c:\documents and settings\Mom\Desktop\fix\ComboFix.exe
Command switches used :: c:\documents and settings\Mom\Desktop\fix\CFScript.txt
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\init32.exe
c:\windows\Tasks\At1.job
c:\windows\Tasks\At10.job
c:\windows\Tasks\At11.job
c:\windows\Tasks\At12.job
c:\windows\Tasks\At13.job
c:\windows\Tasks\At14.job
c:\windows\Tasks\At15.job
c:\windows\Tasks\At16.job
c:\windows\Tasks\At17.job
c:\windows\Tasks\At18.job
c:\windows\Tasks\At19.job
c:\windows\Tasks\At2.job
c:\windows\Tasks\At20.job
c:\windows\Tasks\At21.job
c:\windows\Tasks\At22.job
c:\windows\Tasks\At23.job
c:\windows\Tasks\At24.job
c:\windows\Tasks\At3.job
c:\windows\Tasks\At4.job
c:\windows\Tasks\At5.job
c:\windows\Tasks\At6.job
c:\windows\Tasks\At7.job
c:\windows\Tasks\At8.job
c:\windows\Tasks\At9.job

.
((((((((((((((((((((((((( Files Created from 2009-02-06 to 2009-03-06 )))))))))))))))))))))))))))))))
.

2009-02-17 19:51 . 2009-02-17 19:51 <DIR> d-------- c:\windows\Sun
2009-02-11 00:01 . 2009-02-11 00:02 <DIR> d-------- c:\program files\SpywareGuard
2009-02-10 22:25 . 2009-02-10 22:25 <DIR> d-------- c:\program files\CCleaner
2009-02-09 23:38 . 2009-02-09 23:38 <DIR> d-------- c:\documents and settings\Mom\Application Data\U3
2009-02-09 21:13 . 2009-02-09 21:13 578,560 --a--c--- c:\windows\system32\dllcache\user32.dll
2009-02-09 21:11 . 2009-02-09 21:12 <DIR> d-------- c:\windows\ERUNT
2009-02-09 21:07 . 2009-02-09 21:07 <DIR> d-------- c:\documents and settings\Administrator
2009-02-09 21:03 . 2009-02-18 21:52 <DIR> d-------- C:\SDFix
2009-02-08 21:51 . 2009-02-08 21:54 <DIR> d-------- c:\program files\Enigma Software Group
2009-02-08 02:58 . 2009-02-15 19:11 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-08 02:58 . 2009-02-08 02:58 <DIR> d-------- c:\documents and settings\Mom\Application Data\Malwarebytes
2009-02-08 02:58 . 2009-02-08 02:58 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-08 02:58 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-08 02:58 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-03-04 16:48 --------- d-----w c:\program files\Microsoft Silverlight
2009-03-04 02:49 --------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-03-04 02:46 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP
2009-03-04 02:46 --------- d-----w c:\program files\SpywareBlaster
2009-03-04 02:42 --------- d-----w c:\program files\SUPERAntiSpyware
2009-02-26 21:31 --------- d-----w c:\documents and settings\Mom\Application Data\LimeWire
2009-02-16 03:58 --------- d-----w c:\program files\Spybot - Search & Destroy
2009-02-05 22:10 --------- d-----w c:\program files\Microsoft Money
2009-02-05 22:07 --------- d-----w c:\program files\Microsoft Works
2009-02-05 22:04 --------- d-----w c:\documents and settings\Mom\Application Data\Microsoft Web Folders
2009-02-05 22:03 --------- d-----w c:\program files\FoneSync
2009-02-05 21:49 --------- d-----w c:\program files\Microsoft Works Suite 2001
2009-02-04 03:51 --------- d-----w c:\documents and settings\Taelur\Application Data\MySpace
2009-02-04 03:51 --------- d-----w c:\documents and settings\Taelur\Application Data\LimeWire
2009-02-02 19:12 --------- d-----w c:\program files\PopCap Games
2009-02-02 09:00 --------- d-----w c:\program files\MySpace
2009-02-02 09:00 --------- d-----w c:\documents and settings\Mom\Application Data\MySpace
2009-01-31 00:49 --------- d-----w c:\program files\LimeWire
2009-01-25 18:08 --------- d-----w c:\program files\Common Files\Intuit
2009-01-25 17:50 --------- d-----w c:\documents and settings\All Users\Application Data\Intuit
2009-01-25 17:45 --------- d-----w c:\program files\TurboTax
2009-01-22 07:33 --------- d-----w c:\documents and settings\Mom\Application Data\Windows Search
2009-01-20 21:38 410,984 ----a-w c:\windows\system32\deploytk.dll
2009-01-20 21:38 --------- d-----w c:\program files\Java
2009-01-16 03:29 --------- d-----w c:\documents and settings\Taelur\Application Data\Windows Desktop Search
2009-01-15 15:21 --------- d-----w c:\program files\Common Files\Adobe AIR
2009-01-15 15:19 --------- d-----w c:\program files\Common Files\Adobe
2009-01-15 15:17 --------- d-----w c:\documents and settings\All Users\Application Data\NOS
2009-01-15 15:11 --------- d-----w c:\program files\Google
2009-01-13 21:34 --------- d-----w c:\program files\NOS
2009-01-08 09:00 --------- d-----w c:\program files\MSXML 4.0
2009-01-08 05:07 --------- d-----w c:\program files\HP
2009-01-08 05:07 --------- d-----w c:\program files\Hewlett-Packard
2009-01-08 05:03 --------- d-----w c:\documents and settings\All Users\Application Data\HP Product Assistant
2009-01-07 01:40 --------- d-----w c:\program files\SunshineUN
2009-01-06 22:30 --------- d-----w c:\documents and settings\All Users\Application Data\HP
2009-01-06 22:28 --------- d-----w c:\program files\Common Files\HP
2009-01-06 22:22 --------- d-----w c:\program files\Common Files\Hewlett-Packard
2009-01-06 08:10 1,764,375 ----a-w C:\SunshineUN-1.4.1.2-Beta-4.1-2.exe
2009-01-06 05:02 --------- d-----w c:\program files\Windows Desktop Search
2009-01-06 05:02 --------- d-----w c:\documents and settings\Mom\Application Data\Windows Desktop Search
2009-01-06 05:00 --------- d-----w c:\program files\Windows Media Connect 2
2008-12-20 23:15 826,368 ----a-w c:\windows\system32\wininet.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-02-10_22.43.35.96 )))))))))))))))))))))))))))))))))))))))))
.
- 2009-02-11 03:25:49 5,439,488 ----a-w c:\windows\ERUNT\SDFIX\Users\00000001\NTUSER.DAT
+ 2009-02-19 03:43:28 5,439,488 ----a-w c:\windows\ERUNT\SDFIX\Users\00000001\NTUSER.DAT
- 2009-02-11 03:25:49 290,816 ----a-w c:\windows\ERUNT\SDFIX\Users\00000002\UsrClass.dat
+ 2009-02-19 03:43:28 290,816 ----a-w c:\windows\ERUNT\SDFIX\Users\00000002\UsrClass.dat
+ 2008-10-16 20:38:34 124,928 -c----w c:\windows\ie7updates\KB961260-IE7\advpack.dll
+ 2008-10-16 20:38:34 347,136 -c----w c:\windows\ie7updates\KB961260-IE7\dxtmsft.dll
+ 2008-10-16 20:38:34 214,528 -c----w c:\windows\ie7updates\KB961260-IE7\dxtrans.dll
+ 2008-10-16 20:38:35 133,120 -c----w c:\windows\ie7updates\KB961260-IE7\extmgr.dll
+ 2008-10-16 20:38:35 63,488 -c----w c:\windows\ie7updates\KB961260-IE7\icardie.dll
+ 2008-10-16 13:11:09 70,656 -c----w c:\windows\ie7updates\KB961260-IE7\ie4uinit.exe
+ 2008-10-16 20:38:35 153,088 -c----w c:\windows\ie7updates\KB961260-IE7\ieakeng.dll
+ 2008-10-16 20:38:35 230,400 -c----w c:\windows\ie7updates\KB961260-IE7\ieaksie.dll
+ 2008-10-15 07:04:53 161,792 -c----w c:\windows\ie7updates\KB961260-IE7\ieakui.dll
+ 2008-10-16 20:38:35 383,488 -c----w c:\windows\ie7updates\KB961260-IE7\ieapfltr.dll
+ 2008-10-16 20:38:35 384,512 -c----w c:\windows\ie7updates\KB961260-IE7\iedkcs32.dll
+ 2008-10-16 20:38:37 6,066,176 -c----w c:\windows\ie7updates\KB961260-IE7\ieframe.dll
+ 2008-10-16 20:38:37 44,544 -c----w c:\windows\ie7updates\KB961260-IE7\iernonce.dll
+ 2008-10-16 20:38:37 267,776 -c----w c:\windows\ie7updates\KB961260-IE7\iertutil.dll
+ 2008-10-16 13:11:09 13,824 -c----w c:\windows\ie7updates\KB961260-IE7\ieudinit.exe
+ 2008-10-15 07:06:26 633,632 -c----w c:\windows\ie7updates\KB961260-IE7\iexplore.exe
+ 2008-10-16 20:38:37 27,648 -c----w c:\windows\ie7updates\KB961260-IE7\jsproxy.dll
+ 2008-10-16 20:38:37 459,264 -c----w c:\windows\ie7updates\KB961260-IE7\msfeeds.dll
+ 2008-10-16 20:38:37 52,224 -c----w c:\windows\ie7updates\KB961260-IE7\msfeedsbs.dll
+ 2008-12-13 06:40:02 3,593,216 -c----w c:\windows\ie7updates\KB961260-IE7\mshtml.dll
+ 2008-10-16 20:38:38 477,696 -c----w c:\windows\ie7updates\KB961260-IE7\mshtmled.dll
+ 2008-10-16 20:38:38 193,024 -c----w c:\windows\ie7updates\KB961260-IE7\msrating.dll
+ 2008-10-16 20:38:39 671,232 -c----w c:\windows\ie7updates\KB961260-IE7\mstime.dll
+ 2008-10-16 20:38:39 102,912 -c----w c:\windows\ie7updates\KB961260-IE7\occache.dll
+ 2008-10-16 20:38:39 44,544 -c----w c:\windows\ie7updates\KB961260-IE7\pngfilt.dll
+ 2007-03-06 01:22:41 213,216 -c----w c:\windows\ie7updates\KB961260-IE7\spuninst\spuninst.exe
+ 2007-03-06 01:23:51 371,424 -c----w c:\windows\ie7updates\KB961260-IE7\spuninst\updspapi.dll
+ 2008-10-16 20:38:39 105,984 -c----w c:\windows\ie7updates\KB961260-IE7\url.dll
+ 2008-10-16 20:38:39 1,160,192 -c----w c:\windows\ie7updates\KB961260-IE7\urlmon.dll
+ 2008-10-16 20:38:39 233,472 -c----w c:\windows\ie7updates\KB961260-IE7\webcheck.dll
+ 2008-10-16 20:38:40 826,368 -c----w c:\windows\ie7updates\KB961260-IE7\wininet.dll
- 2008-10-16 20:38:34 124,928 ----a-w c:\windows\system32\advpack.dll
+ 2008-12-20 23:15:11 124,928 ----a-w c:\windows\system32\advpack.dll
- 2008-10-16 20:38:34 124,928 -c--a-w c:\windows\system32\dllcache\advpack.dll
+ 2008-12-20 23:15:11 124,928 -c--a-w c:\windows\system32\dllcache\advpack.dll
- 2008-10-16 20:38:34 347,136 -c--a-w c:\windows\system32\dllcache\dxtmsft.dll
+ 2008-12-20 23:15:12 347,136 -c--a-w c:\windows\system32\dllcache\dxtmsft.dll
- 2008-10-16 20:38:34 214,528 -c--a-w c:\windows\system32\dllcache\dxtrans.dll
+ 2008-12-20 23:15:13 214,528 -c--a-w c:\windows\system32\dllcache\dxtrans.dll
- 2008-10-16 20:38:35 133,120 -c--a-w c:\windows\system32\dllcache\extmgr.dll
+ 2008-12-20 23:15:13 133,120 -c--a-w c:\windows\system32\dllcache\extmgr.dll
- 2008-10-16 20:38:35 63,488 -c----w c:\windows\system32\dllcache\icardie.dll
+ 2008-12-20 23:15:13 63,488 -c----w c:\windows\system32\dllcache\icardie.dll
- 2008-10-16 13:11:09 70,656 -c--a-w c:\windows\system32\dllcache\ie4uinit.exe
+ 2008-12-19 09:10:15 70,656 -c--a-w c:\windows\system32\dllcache\ie4uinit.exe
- 2008-10-16 20:38:35 153,088 -c--a-w c:\windows\system32\dllcache\ieakeng.dll
+ 2008-12-20 23:15:14 153,088 -c--a-w c:\windows\system32\dllcache\ieakeng.dll
- 2008-10-16 20:38:35 230,400 -c--a-w c:\windows\system32\dllcache\ieaksie.dll
+ 2008-12-20 23:15:14 230,400 -c--a-w c:\windows\system32\dllcache\ieaksie.dll
- 2008-10-15 07:04:53 161,792 -c--a-w c:\windows\system32\dllcache\ieakui.dll
+ 2008-12-19 05:23:56 161,792 -c--a-w c:\windows\system32\dllcache\ieakui.dll
- 2008-10-16 20:38:35 383,488 -c----w c:\windows\system32\dllcache\ieapfltr.dll
+ 2008-12-20 23:15:15 383,488 -c----w c:\windows\system32\dllcache\ieapfltr.dll
- 2008-10-16 20:38:35 384,512 -c--a-w c:\windows\system32\dllcache\iedkcs32.dll
+ 2008-12-20 23:15:16 384,512 -c--a-w c:\windows\system32\dllcache\iedkcs32.dll
- 2008-10-16 20:38:37 6,066,176 -c----w c:\windows\system32\dllcache\ieframe.dll
+ 2008-12-20 23:15:21 6,066,688 -c----w c:\windows\system32\dllcache\ieframe.dll
- 2008-10-16 20:38:37 44,544 -c--a-w c:\windows\system32\dllcache\iernonce.dll
+ 2008-12-20 23:15:21 44,544 -c--a-w c:\windows\system32\dllcache\iernonce.dll
- 2008-10-16 20:38:37 267,776 -c----w c:\windows\system32\dllcache\iertutil.dll
+ 2008-12-20 23:15:22 267,776 -c----w c:\windows\system32\dllcache\iertutil.dll
- 2008-10-16 13:11:09 13,824 -c----w c:\windows\system32\dllcache\ieudinit.exe
+ 2008-12-19 09:10:15 13,824 -c----w c:\windows\system32\dllcache\ieudinit.exe
- 2008-10-15 07:06:26 633,632 -c--a-w c:\windows\system32\dllcache\iexplore.exe
+ 2008-12-19 05:25:25 634,024 -c--a-w c:\windows\system32\dllcache\iexplore.exe
- 2008-10-16 20:38:37 27,648 -c--a-w c:\windows\system32\dllcache\jsproxy.dll
+ 2008-12-20 23:15:23 27,648 -c--a-w c:\windows\system32\dllcache\jsproxy.dll
- 2008-10-16 20:38:37 459,264 -c----w c:\windows\system32\dllcache\msfeeds.dll
+ 2008-12-20 23:15:23 459,264 -c----w c:\windows\system32\dllcache\msfeeds.dll
- 2008-10-16 20:38:37 52,224 -c----w c:\windows\system32\dllcache\msfeedsbs.dll
+ 2008-12-20 23:15:24 52,224 -c----w c:\windows\system32\dllcache\msfeedsbs.dll
- 2008-12-13 06:40:02 3,593,216 -c--a-w c:\windows\system32\dllcache\mshtml.dll
+ 2009-01-17 03:35:14 3,594,752 -c--a-w c:\windows\system32\dllcache\mshtml.dll
- 2008-10-16 20:38:38 477,696 -c--a-w c:\windows\system32\dllcache\mshtmled.dll
+ 2008-12-20 23:15:30 477,696 -c--a-w c:\windows\system32\dllcache\mshtmled.dll
- 2008-10-16 20:38:38 193,024 -c--a-w c:\windows\system32\dllcache\msrating.dll
+ 2008-12-20 23:15:31 193,024 -c--a-w c:\windows\system32\dllcache\msrating.dll
- 2008-10-16 20:38:39 671,232 -c--a-w c:\windows\system32\dllcache\mstime.dll
+ 2008-12-20 23:15:32 671,232 -c--a-w c:\windows\system32\dllcache\mstime.dll
- 2008-10-16 20:38:39 102,912 -c--a-w c:\windows\system32\dllcache\occache.dll
+ 2008-12-20 23:15:38 102,912 -c--a-w c:\windows\system32\dllcache\occache.dll
- 2008-10-16 20:38:39 44,544 -c--a-w c:\windows\system32\dllcache\pngfilt.dll
+ 2008-12-20 23:15:38 44,544 -c--a-w c:\windows\system32\dllcache\pngfilt.dll
+ 2008-06-17 19:02:19 8,461,312 -c----w c:\windows\system32\dllcache\shell32.dll
- 2008-10-16 20:38:39 105,984 -c--a-w c:\windows\system32\dllcache\url.dll
+ 2008-12-20 23:15:39 105,984 -c--a-w c:\windows\system32\dllcache\url.dll
- 2008-10-16 20:38:39 1,160,192 -c--a-w c:\windows\system32\dllcache\urlmon.dll
+ 2008-12-20 23:15:40 1,160,192 -c--a-w c:\windows\system32\dllcache\urlmon.dll
- 2008-10-16 20:38:39 233,472 -c--a-w c:\windows\system32\dllcache\webcheck.dll
+ 2008-12-20 23:15:40 233,472 -c--a-w c:\windows\system32\dllcache\webcheck.dll
- 2008-10-16 20:38:40 826,368 -c--a-w c:\windows\system32\dllcache\wininet.dll
+ 2008-12-20 23:15:41 826,368 -c--a-w c:\windows\system32\dllcache\wininet.dll
- 2008-10-16 20:38:34 347,136 ----a-w c:\windows\system32\dxtmsft.dll
+ 2008-12-20 23:15:12 347,136 ----a-w c:\windows\system32\dxtmsft.dll
- 2008-10-16 20:38:34 214,528 ----a-w c:\windows\system32\dxtrans.dll
+ 2008-12-20 23:15:13 214,528 ----a-w c:\windows\system32\dxtrans.dll
- 2008-10-16 20:38:35 133,120 ----a-w c:\windows\system32\extmgr.dll
+ 2008-12-20 23:15:13 133,120 ----a-w c:\windows\system32\extmgr.dll
- 2008-10-16 20:38:35 63,488 ----a-w c:\windows\system32\icardie.dll
+ 2008-12-20 23:15:13 63,488 ----a-w c:\windows\system32\icardie.dll
- 2008-10-16 13:11:09 70,656 ----a-w c:\windows\system32\ie4uinit.exe
+ 2008-12-19 09:10:15 70,656 ----a-w c:\windows\system32\ie4uinit.exe
- 2008-10-16 20:38:35 153,088 ----a-w c:\windows\system32\ieakeng.dll
+ 2008-12-20 23:15:14 153,088 ----a-w c:\windows\system32\ieakeng.dll
- 2008-10-16 20:38:35 230,400 ----a-w c:\windows\system32\ieaksie.dll
+ 2008-12-20 23:15:14 230,400 ----a-w c:\windows\system32\ieaksie.dll
- 2008-10-15 07:04:53 161,792 ----a-w c:\windows\system32\ieakui.dll
+ 2008-12-19 05:23:56 161,792 ----a-w c:\windows\system32\ieakui.dll
- 2008-10-16 20:38:35 383,488 ----a-w c:\windows\system32\ieapfltr.dll
+ 2008-12-20 23:15:15 383,488 ----a-w c:\windows\system32\ieapfltr.dll
- 2008-10-16 20:38:35 384,512 ----a-w c:\windows\system32\iedkcs32.dll
+ 2008-12-20 23:15:16 384,512 ----a-w c:\windows\system32\iedkcs32.dll
- 2008-10-16 20:38:37 6,066,176 ----a-w c:\windows\system32\ieframe.dll
+ 2008-12-20 23:15:21 6,066,688 ----a-w c:\windows\system32\ieframe.dll
- 2008-10-16 20:38:37 44,544 ----a-w c:\windows\system32\iernonce.dll
+ 2008-12-20 23:15:21 44,544 ----a-w c:\windows\system32\iernonce.dll
- 2008-10-16 20:38:37 267,776 ----a-w c:\windows\system32\iertutil.dll
+ 2008-12-20 23:15:22 267,776 ----a-w c:\windows\system32\iertutil.dll
- 2008-10-16 13:11:09 13,824 ----a-w c:\windows\system32\ieudinit.exe
+ 2008-12-19 09:10:15 13,824 ----a-w c:\windows\system32\ieudinit.exe
- 2008-10-16 20:38:37 27,648 ----a-w c:\windows\system32\jsproxy.dll
+ 2008-12-20 23:15:23 27,648 ----a-w c:\windows\system32\jsproxy.dll
- 2009-01-10 01:35:28 20,853,704 ----a-w c:\windows\system32\MRT.exe
+ 2009-02-03 23:21:12 21,244,864 ----a-w c:\windows\system32\MRT.exe
- 2008-10-16 20:38:37 459,264 ----a-w c:\windows\system32\msfeeds.dll
+ 2008-12-20 23:15:23 459,264 ----a-w c:\windows\system32\msfeeds.dll
- 2008-10-16 20:38:37 52,224 ----a-w c:\windows\system32\msfeedsbs.dll
+ 2008-12-20 23:15:24 52,224 ----a-w c:\windows\system32\msfeedsbs.dll
- 2008-12-13 06:40:02 3,593,216 ----a-w c:\windows\system32\mshtml.dll
+ 2009-01-17 03:35:14 3,594,752 ----a-w c:\windows\system32\mshtml.dll
- 2008-10-16 20:38:38 477,696 ----a-w c:\windows\system32\mshtmled.dll
+ 2008-12-20 23:15:30 477,696 ----a-w c:\windows\system32\mshtmled.dll
- 2008-10-16 20:38:38 193,024 ----a-w c:\windows\system32\msrating.dll
+ 2008-12-20 23:15:31 193,024 ----a-w c:\windows\system32\msrating.dll
- 2008-10-16 20:38:39 671,232 ----a-w c:\windows\system32\mstime.dll
+ 2008-12-20 23:15:32 671,232 ----a-w c:\windows\system32\mstime.dll
- 2008-10-16 20:38:39 102,912 ----a-w c:\windows\system32\occache.dll
+ 2008-12-20 23:15:38 102,912 ----a-w c:\windows\system32\occache.dll
- 2008-10-16 20:38:39 44,544 ----a-w c:\windows\system32\pngfilt.dll
+ 2008-12-20 23:15:38 44,544 ----a-w c:\windows\system32\pngfilt.dll
- 2008-04-14 00:12:05 8,461,312 ----a-w c:\windows\system32\shell32.dll
+ 2008-06-17 19:02:19 8,461,312 ----a-w c:\windows\system32\shell32.dll
- 2007-11-30 12:39:22 17,272 ------w c:\windows\system32\spmsg.dll
+ 2008-07-09 07:38:24 17,272 ------w c:\windows\system32\spmsg.dll
- 2008-10-16 20:38:39 105,984 ----a-w c:\windows\system32\url.dll
+ 2008-12-20 23:15:39 105,984 ----a-w c:\windows\system32\url.dll
- 2008-10-16 20:38:39 1,160,192 ----a-w c:\windows\system32\urlmon.dll
+ 2008-12-20 23:15:40 1,160,192 ----a-w c:\windows\system32\urlmon.dll
- 2008-10-16 20:38:39 233,472 ----a-w c:\windows\system32\webcheck.dll
+ 2008-12-20 23:15:40 233,472 ----a-w c:\windows\system32\webcheck.dll
+ 2009-03-04 16:48:21 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_60c.dat
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MoneyAgent"="c:\program files\Microsoft Money\System\Money Express.exe" [2000-07-19 176183]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-01-26 2144088]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-03-03 1830128]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-20 136600]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"MySpaceIM"="c:\program files\MySpace\IM\MySpaceIM.exe" [2008-12-12 9555968]

c:\documents and settings\Taelur\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - c:\program files\LimeWire\LimeWire.exe [2009-01-29 139776]

c:\documents and settings\Mom\Start Menu\Programs\Startup\
SpywareGuard.lnk - c:\program files\SpywareGuard\sgmain.exe [2003-08-29 360448]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2008-05-26 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-02-15 20:43 356352 c:\program files\SUPERAntiSpyware\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"= ctwdm32.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Image Zone Fast Start.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Image Zone Fast Start.lnk
backup=c:\windows\pss\HP Image Zone Fast Start.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Works Calendar Reminders.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Works Calendar Reminders.lnk
backup=c:\windows\pss\Microsoft Works Calendar Reminders.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=c:\windows\pss\Windows Search.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Mom^Start Menu^Programs^Startup^LimeWire On Startup.lnk]
path=c:\documents and settings\Mom\Start Menu\Programs\Startup\LimeWire On Startup.lnk
backup=c:\windows\pss\LimeWire On Startup.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
--a------ 2008-04-13 18:12 15360 c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
--a------ 2007-05-08 16:24 54840 c:\program files\HP\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Microsoft Works Portfolio]
--a------ 2000-08-08 14:00 311350 c:\program files\Microsoft Works\wkssb.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Microsoft Works Update Detection]
--a------ 2000-08-08 14:00 28739 c:\program files\Microsoft Works\WkDetect.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
--a------ 2003-07-28 15:19 4841472 c:\windows\system32\nvcpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
-rahs---- 2009-01-26 15:31 2144088 c:\program files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
--a------ 2009-01-20 15:38 136600 c:\program files\Java\jre6\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WorksFUD]
--a------ 2000-08-08 14:00 24576 c:\program files\Microsoft Works\wkfud.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
--a------ 2003-07-28 15:19 323584 c:\windows\system32\nwiz.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\SunshineUN\\SunshineUN.exe"=
"c:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe"=
"c:\\Program Files\\Spybot - Search & Destroy\\SDUpdate.exe"=
"c:\\Program Files\\SpywareBlaster\\spywareblaster.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\MySpace\\IM\\MySpaceIM.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2008-12-04 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2008-12-04 55024]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2008-12-04 7408]
S3 getPlus® Helper;getPlus® Helper;c:\program files\NOS\bin\getPlus_HelperSvc.exe [2009-01-13 33752]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - SASDIFSV
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-03-05 18:12:15
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(624)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
Completion time: 2009-03-05 18:15:10
ComboFix-quarantined-files.txt 2009-03-06 00:15:05
ComboFix2.txt 2009-02-11 04:45:17

Pre-Run: 32,730,775,552 bytes free
Post-Run: 32,773,603,328 bytes free

359 --- E O F --- 2009-02-26 17:00:49

#11 noctecstoran

noctecstoran
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:32 PM

Posted 05 March 2009 - 09:57 PM

SpywareGuard detected a IE search page change on restart. Went from http://www.microsoft.com/isapi/redir.dll?prd=iear=iesearch to http://go.microsoft.com/twlink/?Linkld=54896

#12 Billy O'Neal

Billy O'Neal

    Visual C++ STL Maintainer


  • Malware Response Team
  • 12,304 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Redmond, Washington
  • Local time:05:32 PM

Posted 06 March 2009 - 05:33 PM

Hello, noctecstoran

Went from http://www.microsoft.com/isapi/redir.dll?prd=iear=iesearch to http://go.microsoft.com/twlink/?Linkld=54896

Both are legitimate sites, so shouldn't be a problem :thumbup2:

Looking good! Is MbAM still flagging that key? How are things running?

Download and install an antivirus program, and make sure that you keep it updated
New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software
Out of the free products below, I recommend Avira (First Choice) or Avast. Note: Avira will display Ads occasionally but is slightly faster.
Out of the pay-for products I recommend NOD32 or VIPRE.

Some free AntiVirus programs for non commercial home use are (alphabetical order):Some commercial AntiVirus programs are (alphabetical order):Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection level. It may also impair the performance of your PC.

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Runtime Environment (JRE)" JRE 6 Update 12.
  • Click the Download button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u12-windows-i586-p.exe to install the newest version.
-- If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
-- If you choose to update via the Java applet in Control Panel, uncheck the option to install the Toolbar unless you want it.
-- The uninstaller incorporated in this release removes previous Updates 10 and above, but does not remove older versions, so they still need to be removed manually.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.

I would like us to use ESET (NOD32)'s Online Scanner
  • Please go to ESET OnlineScan (NOD32)
  • You will then see the Terms of Use, tick the check-box infront of YES, I accept the Terms of Use
  • Now click Start
  • Should you face a Security Warning that asks if you want to install and run a file called "OnlineScanner.cab", click Yes
  • Click Start
    • Note: (the Onlinescanner will now prepare itself for running on your pc)
  • To do a full-scan, tick: "Remove found threats" and "Scan potentially unwanted applications"
  • Press Scan
  • The Onlinescan will now start and scan your pc (this could take a while)
  • When the scan has finished, it will show a screen with two tabs "overview" and "details" and the option to get information or buy software, just close the window
  • Click Start >> Run... >> type: C:\Program Files\EsetOnlineScanner\log.txt
  • The Scanresults will now open in Notepad
  • Click into the text area, right-click and chose "select all" (or use +A)
  • Right-click again and chose "Copy" (or +C)
  • Close/Exit Notepad
  • Navigate to this thread and post your log along with anything else requested from us, by right-clicking and "paste" (or ctrl+v) in the text area of the reply post you just created.
Note: For Vista Users: Eset is compatible but Internet Explorer must be run as Administrator. To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select "Run as Administrator" from the context menu.)

In your next reply, please include the following:
  • ESET OnlineScan's Log
  • A new DDS.txt

BillyIII

Edited by Billy O'Neal, 06 March 2009 - 05:34 PM.

Twitter - My statements do not establish the official position of Microsoft Corporation, and are my own personal opinion. (But you already knew that, right?)
Posted Image

#13 Billy O'Neal

Billy O'Neal

    Visual C++ STL Maintainer


  • Malware Response Team
  • 12,304 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Redmond, Washington
  • Local time:05:32 PM

Posted 09 March 2009 - 07:56 PM

Hello, noctecstoran
Are you still here?

BillyIII
Twitter - My statements do not establish the official position of Microsoft Corporation, and are my own personal opinion. (But you already knew that, right?)
Posted Image

#14 Billy O'Neal

Billy O'Neal

    Visual C++ STL Maintainer


  • Malware Response Team
  • 12,304 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Redmond, Washington
  • Local time:05:32 PM

Posted 11 March 2009 - 08:34 PM

Hello, noctecstoran
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please send me or another moderator a PM.

Everyone else please begin a new topic.

BillyIII
Twitter - My statements do not establish the official position of Microsoft Corporation, and are my own personal opinion. (But you already knew that, right?)
Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users