Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected with a suspected rootkit virus


  • Please log in to reply
3 replies to this topic

#1 hogfather99

hogfather99

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:37 PM

Posted 21 May 2009 - 10:23 PM

As per previous discussion with Boopme, this insidious virous is causing my computer to reboot , programs to stop working or not loading up at all, my computer will freeze and at time foxfire browser will open with an unwanted pop up add.Here is the DDS txt and attach txt:
DDS (Ver_09-05-14.01) - NTFSx86
Run by Admin at 23:07:21.50 on Thu 05/21/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1023.512 [GMT -4:00]


============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\SYSTEM32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\3361\SVCHOST.exe -sysrun
C:\WINDOWS\dhcp\svchost.exe
C:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
C:\WINDOWS\system32\gearsec.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\Program Files\CDBurnerXP\NMSAccessU.exe
C:\WINDOWS\system32\sopidkc.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Microsoft IntelliType Pro\itype.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\WINDOWS\System32\reader_s.exe
C:\Documents and Settings\Admin\reader_s.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\TEMP\BN12.tmp
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\TEMP\txy14.tmp
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
svchost.exe -m
C:\Documents and Settings\Admin\My Documents\hogfather\My Music\torrent\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.guarddog2009.com/
uSearch Bar = hxxp://www.google.com/ie
uSearch Page = hxxp://www.google.com
mDefault_Search_URL = hxxp://www.google.com/ie
mSearch Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
uSearchAssistant = hxxp://www.google.com
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
mSearchAssistant = hxxp://www.google.com
uURLSearchHooks: N/A: {0579b4b6-0293-4d73-b02d-5ebb0ba0f0a2} -
TB: Pa&nicware Pop-Up Stopper Pro: {b1e741e7-1e77-40d4-9fd8-51949b9ccbd0} - c:\program files\panicware\pop-up stopper pro\popuppro.dll
TB: {E6AE90A4-1B01-47F0-AA78-E6B122E145E9} - No File
uRun: [reader_s] c:\documents and settings\admin\reader_s.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [DiskeeperSystray] c:\program files\diskeeper corporation\diskeeper\DkIcon.exe
mRun: [itype] c:\program files\microsoft intellitype pro\itype.exe
mRun: [IntelliPoint] c:\program files\microsoft intellipoint\ipoint.exe
mRun: [EM_EXEC] c:\progra~1\logitech\mousew~1\system\EM_EXEC.EXE
mRun: [svchost.exe] "c:\windows\system32\3361\SVCHOST.exe"
mRun: [reader_s] c:\windows\system32\reader_s.exe
mRunOnce: [svchost.exe] "c:\windows\system32\3361\SVCHOST.exe"
dRunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N
dRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil9b.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hppsc1~1.lnk - c:\program files\hewlett-packard\digital imaging\bin\hpohmr08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpoddt~1.lnk - c:\program files\hewlett-packard\digital imaging\bin\hpotdd01.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE
uPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
uPolicies-explorer: NoResolveTrack = 1 (0x1)
uPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
dPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
dPolicies-explorer: NoResolveTrack = 1 (0x1)
dPolicies-explorer: NoSMHelp = 1 (0x1)
dPolicies-explorer: StartMenuLogoff = 1 (0x1)
dPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~1\office10\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1210964054921
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1242860650125
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Handler: ebk - {1E411CE8-FE8B-4973-B8E0-6EA2CC3C6B06} - c:\windows\system32\ebkp.dll
Notify: AtiExtEvent - Ati2evxx.dll
Notify: nexchkh - nexchkh.dll
AppInit_DLLs: c:\progra~1\thunmail\testabd.dll
LSA: Notification Packages = scecli c:\windows\system32\jahamure.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\admin\applic~1\mozilla\firefox\profiles\8qhaxbel.default\

============= SERVICES / DRIVERS ===============

R2 DhcpSrv;Dhcp server;c:\windows\dhcp\svchost.exe [2009-5-16 260608]
R2 gearsec;gearsec;c:\windows\system32\gearsec.exe [2003-12-1 73728]
R2 Ias;Ias;c:\windows\system32\svchost.exe -k netsvcs [2004-8-4 34816]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2008-11-28 170640]
R2 msncache;msncache;c:\windows\system32\svchost.exe -k netsvcs [2004-8-4 34816]
R2 sopidkc;sopidkc Service;c:\windows\system32\sopidkc.exe [2004-8-4 145408]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2008-11-28 15504]
S0 Partizan;Partizan; [x]
S0 pfxdsfd;pfxdsfd; [x]
S0 protect;protect;c:\windows\system32\drivers\protect.sys --> c:\windows\system32\drivers\protect.sys [?]
S1 Dup;Dup;c:\windows\system32\drivers\dup.sys [2009-5-18 18368]
S1 ethjiakm;ethjiakm; [x]
S2 mscpcosd;DataBases Management Service; [x]
S3 pcm1394;pcm1394;c:\windows\system32\pcm1394.sys [2004-8-4 2304]
S3 restore;restore;\??\c:\windows\system32\drivers\restore.sys --> c:\windows\system32\drivers\restore.sys [?]
S3 sndintd;sndintd;c:\windows\system32\sndintd.sys [2004-8-4 2304]

=============== Created Last 30 ================

2009-05-21 23:06 16,896 a------- c:\windows\system32\nexchkh.dll
2009-05-21 19:43 16,896 a------- c:\windows\system32\nexchkh.dl_
2009-05-21 19:37 172,416 a------- c:\windows\system32\drivers\kmixer.sys
2009-05-21 16:32 <DIR> --d----- c:\docume~1\admin\applic~1\DriverCure
2009-05-21 16:31 <DIR> --d----- c:\program files\common files\ParetoLogic
2009-05-21 16:31 <DIR> --d----- c:\docume~1\alluse~1\applic~1\ParetoLogic
2009-05-21 16:31 <DIR> --d----- c:\docume~1\alluse~1\applic~1\DriverCure
2009-05-21 16:31 <DIR> --d----- c:\program files\ParetoLogic
2009-05-21 14:19 68,096 a------- c:\windows\services.ex_
2009-05-21 14:19 70,144 a------- c:\windows\system32\62.tmp
2009-05-21 14:19 120 a------- c:\windows\system32\5F.tmp
2009-05-20 20:41 <DIR> --d----- c:\program files\Intelinet
2009-05-20 20:31 <DIR> --d----- c:\program files\Microsoft CAPICOM 2.1.0.2
2009-05-20 20:21 70,144 a------- c:\windows\system32\55.tmp
2009-05-20 20:21 120 a------- c:\windows\system32\51.tmp
2009-05-20 20:11 70,144 a------- c:\windows\system32\52.tmp
2009-05-20 20:11 44,032 a------- c:\windows\system32\4F.tmp
2009-05-20 20:11 120 a------- c:\windows\system32\4E.tmp
2009-05-20 19:26 <DIR> --d----- c:\program files\MSXML 6.0
2009-05-20 19:21 <DIR> --d----- c:\program files\MSXML 4.0
2009-05-20 18:21 70,144 a------- c:\windows\system32\50.tmp
2009-05-20 18:21 120 a------- c:\windows\system32\4A.tmp
2009-05-20 18:15 178,176 a------- c:\windows\system32\tpsaxyd.exe
2009-05-20 17:10 <DIR> --d----- C:\RootRepair
2009-05-20 09:20 70,144 a------- c:\windows\system32\4F.tm_
2009-05-20 09:17 70,144 a------- c:\windows\system32\4D.tmp
2009-05-20 09:17 84 a------- c:\windows\system32\47.tmp
2009-05-20 00:59 70,144 a------- c:\windows\system32\4C.tmp
2009-05-20 00:59 120 a------- c:\windows\system32\46.tmp
2009-05-19 18:54 70,144 a------- c:\windows\system32\4B.tmp
2009-05-19 18:24 70,144 a------- c:\windows\system32\49.tmp
2009-05-19 18:24 120 a------- c:\windows\system32\43.tmp
2009-05-19 15:51 70,144 a------- c:\windows\system32\48.tmp
2009-05-19 15:50 120 a------- c:\windows\system32\42.tmp
2009-05-19 15:48 70,144 a------- c:\windows\system32\45.tmp
2009-05-19 15:47 120 a------- c:\windows\system32\41.tmp
2009-05-19 11:45 70,144 a------- c:\windows\system32\44.tmp
2009-05-19 11:45 120 a------- c:\windows\system32\3E.tmp
2009-05-19 10:37 70,144 a------- c:\windows\system32\42.tm_
2009-05-19 10:37 89,600 a------- c:\windows\system32\3D.tmp
2009-05-19 10:37 184 a------- c:\windows\system32\3B.tmp
2009-05-19 09:37 70,144 a------- c:\windows\system32\3F.tmp
2009-05-19 09:37 120 a------- c:\windows\system32\39.tmp
2009-05-18 23:22 <DIR> --d----- c:\program files\Remove-it
2009-05-18 22:15 70,144 a------- c:\windows\system32\3C.tmp
2009-05-18 22:15 120 a------- c:\windows\system32\36.tmp
2009-05-18 19:59 70,144 a------- c:\windows\system32\3A.tmp
2009-05-18 19:59 120 a------- c:\windows\system32\2F.tmp
2009-05-18 18:34 70,144 a------- c:\windows\system32\38.tmp
2009-05-18 18:34 44,544 a------- c:\windows\system32\37.tmp
2009-05-18 18:34 18,368 a------- c:\windows\system32\drivers\dup.sys
2009-05-18 18:34 22,016 a------- c:\windows\system32\33.tmp
2009-05-18 17:06 70,144 a------- c:\windows\system32\35.tmp
2009-05-18 17:06 120 a------- c:\windows\system32\2E.tmp
2009-05-18 15:37 70,144 a------- c:\windows\system32\32.tmp
2009-05-18 13:26 <DIR> --d----- c:\program files\WhatsRunning
2009-05-18 12:42 <DIR> --d----- c:\docume~1\admin\applic~1\ErrorFix
2009-05-18 10:34 70,144 a------- c:\windows\system32\34.tmp
2009-05-18 00:42 70,144 a------- c:\windows\system32\33.tm_
2009-05-18 00:37 0 a------- c:\windows\system32\40.tmp
2009-05-18 00:29 70,144 a------- c:\windows\system32\31.tmp
2009-05-18 00:29 153,088 a------- c:\windows\system32\30.tmp
2009-05-18 00:29 124 a------- c:\windows\system32\2D.tmp
2009-05-18 00:22 182,912 a------- c:\windows\system32\dllcache\ndis.sys
2009-05-18 00:21 70,144 a------- c:\windows\system32\2C.tmp
2009-05-18 00:21 153,088 a------- c:\windows\system32\2B.tmp
2009-05-18 00:21 40,449 a------- c:\windows\system32\2A.tmp
2009-05-18 00:21 124 a------- c:\windows\system32\26.tmp
2009-05-18 00:00 70,144 a------- c:\windows\system32\29.tmp
2009-05-18 00:00 153,088 a------- c:\windows\system32\28.tmp
2009-05-17 23:59 40,449 a------- c:\windows\system32\27.tmp
2009-05-17 23:59 124 a------- c:\windows\system32\25.tmp
2009-05-17 23:00 70,144 a------- c:\windows\system32\24.tmp
2009-05-17 23:00 153,088 a------- c:\windows\system32\23.tmp
2009-05-17 23:00 40,449 a------- c:\windows\system32\22.tmp
2009-05-17 23:00 124 a------- c:\windows\system32\1F.tmp
2009-05-17 15:28 153,088 a------- c:\windows\system32\20.tmp
2009-05-17 15:28 70,144 a------- c:\windows\system32\21.tmp
2009-05-17 14:05 70,144 a------- c:\windows\system32\1E.tmp
2009-05-17 14:05 153,088 a------- c:\windows\system32\1D.tmp
2009-05-17 14:04 40,449 a------- c:\windows\system32\1C.tmp
2009-05-17 14:04 124 a------- c:\windows\system32\19.tmp
2009-05-17 13:11 70,144 a------- c:\windows\system32\1B.tmp
2009-05-17 13:11 153,088 a------- c:\windows\system32\1A.tmp
2009-05-17 13:11 124 a------- c:\windows\system32\16.tmp
2009-05-17 13:02 70,144 a------- c:\windows\system32\18.tmp
2009-05-17 13:01 0 a------- c:\windows\system32\17.tmp
2009-05-17 13:01 124 a------- c:\windows\system32\12.tmp
2009-05-17 11:13 70,144 a------- c:\windows\system32\15.tmp
2009-05-17 11:13 153,088 a------- c:\windows\system32\13.tmp
2009-05-17 00:02 <DIR> --d----- c:\program files\LanqiEngine
2009-05-17 00:01 3 a------- c:\windows\system32\bversion.dll
2009-05-17 00:00 735,232 a------- c:\windows\system32\AdvOcr.dll
2009-05-16 23:59 94,208 a------- c:\windows\system32\TRSOCR.dll
2009-05-16 23:59 95 a------- c:\windows\system32\TRSOCR.ini
2009-05-16 22:44 32,137,216 a------- c:\windows\system32\TRSOCR.dat
2009-05-16 22:43 581,632 a------- c:\windows\system32\IPHACTION.dll
2009-05-16 22:33 0 a------- c:\windows\system32\IpSvchostF.dll
2009-05-16 21:48 61,440 a------- c:\windows\system32\tcpd.exe
2009-05-16 21:48 22,016 a------- c:\windows\system32\AUTMGR.EXE
2009-05-16 21:48 985,600 a------- c:\windows\system32\kernel32_check.dll
2009-05-16 21:48 172,032 a------- c:\windows\system32\tcpcon.dll
2009-05-16 21:48 10,240 a------- c:\windows\system32\Packer.dll
2009-05-16 21:48 9 a------- c:\windows\system32\riphy.dll
2009-05-16 21:48 9 a------- c:\windows\system32\iphy.dll
2009-05-16 21:48 3 a------- c:\windows\system32\fhpatch.dll
2009-05-16 20:47 <DIR> --d----- c:\windows\system32\3361
2009-05-16 20:47 108,336 a------- c:\windows\system32\MSWINSCK.OCX
2009-05-16 20:46 <DIR> --d----- c:\windows\dhcp
2009-05-16 20:46 231,936 a------- c:\windows\system32\w.exe
2009-05-16 20:46 36,864 a------- c:\windows\system32\dpcxool64.sys
2009-05-16 20:46 61,440 a------- c:\windows\system32\14.tmp
2009-05-16 20:46 <DIR> --dshr-- c:\program files\ThunMail
2009-05-16 20:46 152,576 a------- c:\windows\system32\10.tmp
2009-05-16 00:14 61,440 a------- c:\windows\system32\11.tmp
2009-05-16 00:14 120 a------- c:\windows\system32\C.tmp
2009-05-15 21:50 61,440 a------- c:\windows\system32\F.tmp
2009-05-15 21:50 120 a------- c:\windows\system32\5.tmp
2009-05-15 20:54 61,440 a------- c:\windows\system32\D.tmp
2009-05-15 20:54 120 a------- c:\windows\system32\4.tmp
2009-05-15 20:43 61,440 a------- c:\windows\system32\8.tmp
2009-05-15 20:43 120 a------- c:\windows\system32\2.tmp
2009-05-15 20:38 61,440 a------- c:\windows\system32\6.tmp
2009-05-15 20:38 120 a------- c:\windows\system32\3.tmp
2009-05-15 20:00 0 a------- c:\windows\system32\B.tmp
2009-05-15 20:00 61,440 a------- c:\windows\system32\A.tmp
2009-05-15 20:00 60,929 a------- c:\windows\system32\reader_s.exe
2009-05-15 20:00 60,929 a------- c:\documents and settings\admin\reader_s.exe
2009-05-15 20:00 44,032 a------- c:\windows\system32\9.tmp
2009-05-15 20:00 120 a------- c:\windows\system32\7.tmp
2009-05-15 20:00 292,864 a------- c:\windows\AV.EXE
2009-05-15 02:45 260,608 a------- c:\windows\system32\tmp0_488183752964.bk
2009-05-15 01:41 4,224 a------- c:\windows\system32\dllcache\beep.sys
2009-05-14 15:43 <DIR> --d----- c:\program files\Soulseek
2009-05-12 16:11 15,488 a------- c:\windows\system32\drivers\tbhsd.sys
2009-05-12 16:11 <DIR> --d----- c:\program files\tunebite
2009-05-08 18:13 <DIR> --d----- c:\program files\Any DVD Converter Professional
2009-05-08 16:43 <DIR> --d----- c:\docume~1\admin\applic~1\AVS4YOU
2009-05-08 16:41 <DIR> --d----- c:\program files\AVS4YOU
2009-05-06 20:18 0 a------- c:\windows\system32\iexplore8e.exe
2009-05-06 20:06 <DIR> --d----- c:\program files\PC Drivers HeadQuarters
2009-05-06 20:06 <DIR> --d----- c:\docume~1\alluse~1\applic~1\PC Drivers HeadQuarters
2009-05-05 19:23 7,827 a------- c:\windows\system32\84.scr
2009-05-05 11:55 113 a------- c:\windows\system32\i
2009-05-04 20:24 7,827 a------- c:\windows\system32\33.scr
2009-05-04 17:24 7,827 a------- c:\windows\system32\88.scr
2009-05-03 00:36 7,827 a------- c:\windows\system32\74.scr
2009-05-03 00:22 7,827 a------- c:\windows\system32\65.scr
2009-05-02 23:58 7,827 a------- c:\windows\system32\75.scr
2009-05-02 23:31 7,827 a------- c:\windows\system32\87.scr
2009-05-02 23:15 7,827 a------- c:\windows\system32\76.scr
2009-05-02 23:02 7,827 a------- c:\windows\system32\78.scr
2009-05-02 22:47 7,827 a------- c:\windows\system32\03.scr
2009-05-02 22:36 7,827 a------- c:\windows\system32\54.scr
2009-05-02 22:35 7,827 a------- c:\windows\system32\38.scr
2009-05-02 22:30 7,827 a------- c:\windows\system32\01.scr
2009-05-02 22:29 7,827 a------- c:\windows\system32\63.scr
2009-05-02 22:22 7,827 a------- c:\windows\system32\41.scr
2009-05-02 22:20 7,827 a------- c:\windows\system32\26.scr
2009-05-02 22:16 7,827 a------- c:\windows\system32\60.scr
2009-05-02 22:13 7,827 a------- c:\windows\system32\50.scr
2009-05-02 22:07 7,827 a------- c:\windows\system32\20.scr
2009-05-02 22:06 7,827 a------- c:\windows\system32\25.scr
2009-05-02 22:03 7,827 a------- c:\windows\system32\27.scr
2009-05-02 22:00 7,827 a------- c:\windows\system32\48.scr
2009-05-02 22:00 7,827 a------- c:\windows\system32\42.scr
2009-05-02 21:52 7,827 a------- c:\windows\system32\53.scr
2009-05-02 21:51 7,827 a------- c:\windows\system32\16.scr
2009-05-02 21:49 7,827 a------- c:\windows\system32\51.scr
2009-05-02 21:47 7,827 a------- c:\windows\system32\24.scr
2009-05-02 21:44 7,827 a------- c:\windows\system32\05.scr
2009-05-02 21:37 7,827 a------- c:\windows\system32\37.scr
2009-05-02 21:32 7,827 a------- c:\windows\system32\00.scr
2009-05-02 21:29 7,827 a------- c:\windows\system32\70.scr
2009-05-02 21:21 7,827 a------- c:\windows\system32\30.scr
2009-05-02 21:16 7,827 a------- c:\windows\system32\45.scr
2009-05-02 21:15 7,827 a------- c:\windows\system32\07.scr
2009-05-02 21:15 7,827 a------- c:\windows\system32\86.scr
2009-05-02 21:12 7,827 a------- c:\windows\system32\08.scr
2009-05-02 21:03 7,827 a------- c:\windows\system32\83.scr
2009-05-02 21:03 7,827 a------- c:\windows\system32\46.scr
2009-05-02 20:57 7,827 a------- c:\windows\system32\21.scr
2009-05-02 20:54 7,827 a------- c:\windows\system32\32.scr
2009-05-02 20:51 7,827 a------- c:\windows\system32\82.scr
2009-05-02 20:51 7,827 a------- c:\windows\system32\71.scr
2009-05-02 20:41 7,827 a------- c:\windows\system32\58.scr
2009-05-02 20:37 7,827 a------- c:\windows\system32\06.scr
2009-05-02 20:36 7,827 a------- c:\windows\system32\36.scr
2009-05-02 20:35 7,827 a------- c:\windows\system32\12.scr
2009-05-02 20:32 7,827 a------- c:\windows\system32\31.scr
2009-05-02 20:27 7,827 a------- c:\windows\system32\55.scr
2009-05-02 20:25 7,827 a------- c:\windows\system32\44.scr
2009-05-02 20:24 7,827 a------- c:\windows\system32\14.scr
2009-05-02 20:23 7,827 a------- c:\windows\system32\35.scr
2009-05-02 20:18 7,827 a------- c:\windows\system32\28.scr
2009-05-02 20:12 7,827 a------- c:\windows\system32\11.scr
2009-05-02 20:11 7,827 a------- c:\windows\system32\17.scr
2009-05-02 20:11 7,827 a------- c:\windows\system32\77.scr
2009-05-02 20:08 7,827 a------- c:\windows\system32\22.scr
2009-05-02 20:07 7,827 a------- c:\windows\system32\72.scr
2009-05-02 20:06 7,827 a------- c:\windows\system32\13.scr
2009-05-02 20:00 7,827 a------- c:\windows\system32\64.scr
2009-05-02 19:59 7,827 a------- c:\windows\system32\85.scr
2009-05-02 19:54 7,827 a------- c:\windows\system32\02.scr
2009-05-02 19:50 7,827 a------- c:\windows\system32\23.scr
2009-05-02 19:50 7,827 a------- c:\windows\system32\68.scr
2009-05-02 19:47 7,827 a------- c:\windows\system32\43.scr
2009-05-02 19:44 7,827 a------- c:\windows\system32\81.scr
2009-05-02 19:42 7,827 a------- c:\windows\system32\10.scr
2009-05-02 19:38 7,827 a------- c:\windows\system32\73.scr
2009-05-02 19:37 7,827 a------- c:\windows\system32\18.scr
2009-05-02 19:36 7,827 a------- c:\windows\system32\67.scr
2009-05-02 19:34 7,827 a------- c:\windows\system32\57.scr
2009-05-02 19:33 7,827 a------- c:\windows\system32\04.scr
2009-05-02 19:33 7,827 a------- c:\windows\system32\80.scr
2009-05-02 19:32 7,827 a------- c:\windows\system32\52.scr
2009-05-02 19:32 7,827 a------- c:\windows\system32\66.scr
2009-05-02 19:31 7,827 a------- c:\windows\system32\47.scr
2009-05-02 19:30 7,827 a------- c:\windows\system32\15.scr
2009-05-02 19:29 7,827 a------- c:\windows\system32\40.scr
2009-05-02 19:28 7,827 a------- c:\windows\system32\61.scr
2009-05-02 19:27 7,827 a------- c:\windows\system32\62.scr
2009-05-02 19:27 7,827 a------- c:\windows\system32\56.scr

==================== Find3M ====================

2009-05-18 00:22 182,912 a------- c:\windows\system32\drivers\ndis.sys
2009-05-16 23:18 177,119 a------- c:\windows\system32\diskpart.exe
2009-05-11 11:57 88,064 a------- c:\windows\system32\lobumije.dll.vir
2009-05-11 11:57 80,384 a------- c:\windows\system32\mebokewe.dll.vir
2008-02-11 22:49 36,024 a------- c:\docume~1\admin\applic~1\GDIPFONTCACHEV1.DAT
2007-10-12 22:45 102,400 a------- c:\docume~1\admin\applic~1\ezpinst.exe
2007-10-12 22:45 47,360 a------- c:\docume~1\admin\applic~1\pcouffin.sys
2008-11-27 01:40 2 a--shrot c:\windows\winstart.bat

============= FINISH: 23:07:43.51 ===============

BC AdBot (Login to Remove)

 


#2 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:37 PM

Posted 21 May 2009 - 11:28 PM

Hi, hogfather99 :thumbup2:

Welcome.

Please read and follow all these instructions very carefully.

Posted Image Please download Malwarebytes' Anti-Malware from Here.

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediatly.

=====================================================================


Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • If you receive a message that Combofix has detected the presence of rootkit activity and needs to reboot, kindly write down on paper the list of files present in the message before continuing, and post it in your next reply.
  • Install the Recovery Console upon request.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell us when you reply. Read HERE why we disable autoruns

Please do not install any new programs or update anything unless told to do so while we are fixing your problem.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#3 hogfather99

hogfather99
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:37 PM

Posted 22 May 2009 - 01:30 PM

Have done what you asked , below is the malbytes log, but when I tried to run combofix.exe(3x),the following message appeared:Alert!! it is not safe to continue ,the contents of combofix package has been compromised.You may be infected with a file patching virus (virut).Malwarebytes' Anti-Malware 1.30
Database version: 1430
Windows 5.1.2600 Service Pack 2

5/22/2009 1:58:56 PM
mbam-log-2009-05-22 (13-58-56).txt

Scan type: Quick Scan
Objects scanned: 65705
Time elapsed: 9 minute(s), 53 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 11
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 5
Files Infected: 39

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\121973\121973.dll (Trojan.BHO) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{f7d09218-46d7-4d3d-9b7f-315204cd0836} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{e63648f7-3933-440e-b4f6-a8584dd7b7eb} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{31c2a4cc-289d-442a-950c-b33b1b06522b} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31c2a4cc-289d-442a-950c-b33b1b06522b} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\protect (Trojan.NtRootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\protect (Trojan.NtRootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\protect (Trojan.NtRootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Intelinet_is1 (Rogue.Intelinet) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Intelinet (Rogue.Intelinet) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\SpyClean (Rogue.SpyClean) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\restore (Rootkit.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Intelinet (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Backup (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Database (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Logs (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Intelinet (Rogue.Intelinet) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\121973\121973.dll (Trojan.BHO) -> Delete on reboot.
C:\WINDOWS\system32\drivers\protect.sys (Trojan.NtRootkit.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\BCKManager.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\CheckRegistry.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\hashes.md5 (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Intelinet.exe (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\ListLogs.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\ManageRegistry.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\MFC71.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\msvcp71.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\msvcr71.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\SpywareGuard.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Spywarehandler.dll (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\unins000.dat (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\unins000.exe (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Database\Immunizer.db (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Database\Spyware.db (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Program Files\Intelinet\Logs\2009_05_20.log (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Intelinet\Intelinet.lnk (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Intelinet\Uninstall Intelinet.lnk (Rogue.Intelinet) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\3361\SVCHOST.EXE (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\comsa32.sys (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN1.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN3.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN4.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN5.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN6.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN7.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN9.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN10.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN13.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN14.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN16.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN37.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN3A.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\BN56.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\services.ex_ (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.

#4 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:37 PM

Posted 22 May 2009 - 03:06 PM

Have done what you asked , below is the malbytes log, but when I tried to run combofix.exe(3x),the following message appeared:Alert!! it is not safe to continue ,the contents of combofix package has been compromised.You may be infected with a file patching virus (virut).


Sorry to learn that. There is no defense against Virut. All executable files, incluing those that are part of the operating system become infected. The only solution is to reformat and reinstall. In the case of known branded computers, a destructive recovery is called for. You can backup your personal documents as long as they are not part of an application.

Sorry about that.

Edited by JSntgRvr, 22 May 2009 - 03:06 PM.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users