Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected by Virus/Malware


  • This topic is locked This topic is locked
20 replies to this topic

#1 djseanpc

djseanpc

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 27 June 2009 - 02:02 AM

I believe I am infected by one or more viruses. I am not able to run Malwarebytes without renaming the exe file and my computer is shutting down (blue screen) periodically due to either a driver error/memory error. I believe the blue screen is caused by the malware/virus because I have not installed any new drivers. Malwarebytes shows I have a "UAC...." files/virus(s) on my computer but it doesn't seem to go away when I choose to remove it. My browser also goes to random sites. Malwarebytes is also showing a virus affecting my memory which is why I think my computer is shutting down. Any help is GREATLY appreciate. FYI: the "uac" files keep changing names?


DDS (Ver_09-06-26.01) - NTFSx86
Run by Sean P. Corridon at 2:46:09.05 on Sat 06/27/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_12
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.640.255 [GMT -4:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
svchost.exe
C:\Program Files\Lexmark 5600-6600 Series\lxdumon.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Program Files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe
C:\WINDOWS\system32\devldr32.exe
C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
C:\WINDOWS\Process Explorer\procexp.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxduserv.exe
C:\WINDOWS\system32\lxducoms.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\Program Files\Netropa\Multimedia Keyboard\TrayMon.exe
c:\program files\common files\mcafee\mna\mcnasvc.exe
C:\Program Files\Netropa\Onscreen Display\OSD.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Documents and Settings\Sean P. Corridon\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Lexmark Printable Web: {d2c5e510-be6d-42cc-9f61-e4f939078474} - c:\program files\lexmark printable web\bho.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File
TB: {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpeedConnectStartUp]
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [MULTIMEDIA KEYBOARD] c:\program files\netropa\multimedia keyboard\MMKeybd.exe
mRun: [lxdumon.exe] "c:\program files\lexmark 5600-6600 series\lxdumon.exe"
mRun: [lxduamon] "c:\program files\lexmark 5600-6600 series\lxduamon.exe"
mRun: [Lexmark 5600-6600 Series Fax Server] "c:\program files\lexmark 5600-6600 series\fm3032.exe" /s
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
StartupFolder: c:\docume~1\seanp~1.cor\startm~1\programs\startup\pmbmed~1.lnk - c:\program files\sony\sony picture utility\pmbcore\SPUVolumeWatcher.exe
StartupFolder: c:\docume~1\seanp~1.cor\startm~1\programs\startup\procexp.lnk - c:\windows\process explorer\procexp.exe
uPolicies-system: EnableProfileQuota = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
Trusted Zone: turbotax.com
DPF: {00000161-9980-0010-8000-00AA00389B71} - hxxp://codecs.microsoft.com/codecs/i386/msaud.cab
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://a1540.g.akamai.net/7/1540/52/20061205/qtinstall.info.apple.com/qtactivex/qtplugin.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/0/5/7/05796dde-b2ba-4eef-8da4-f99c7e0c9b92/LegitCheckControl.cab
DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - hxxp://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1140999592666
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1141000347252
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - hxxp://download.mcafee.com/molbin/shared/mcgdmgr/1,0,0,26/mcgdmgr.cab
DPF: {C4847596-972C-11D0-9567-00A0C9273C2A} - hxxps://reports.fmcmortgage.com/viewer/activeXViewer/activexviewer.cab
DPF: {CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {ED28050F-D713-43BA-A376-DCC5C35407D5} - hxxp://entimg.msn.com/client/msnmusax3913.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: avgrsstarter - avgrsstx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\seanp~1.cor\applic~1\mozilla\firefox\profiles\du8eeh1s.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/
FF - component: c:\program files\avg\avg8\firefox\components\avgssff.dll
FF - component: c:\program files\mcafee\siteadvisor\components\McFFPlg.dll
FF - plugin: c:\program files\real\realarcade\plugins\mozilla\npracplug.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-4-20 325896]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2009-4-20 27784]
R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-4-20 108552]
R1 msikbd2k;Multimedia Keyboard Filter Driver;c:\windows\system32\drivers\Msikbd2k.sys [2006-2-26 6656]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2009-4-20 298776]
R2 IntuitUpdateService;Intuit Update Service;c:\program files\common files\intuit\update service\IntuitUpdateService.exe [2008-10-10 13088]
R2 lxdu_device;lxdu_device;c:\windows\system32\lxducoms.exe -service --> c:\windows\system32\lxducoms.exe -service [?]
R2 lxduCATSCustConnectService;lxduCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxduserv.exe [2009-2-1 98984]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2008-8-28 210216]
R2 nhksrv;Netropa NHK Server;c:\program files\netropa\multimedia keyboard\nhksrv.exe [2006-2-26 28672]
R3 3dfxvs;3dfxvs;c:\windows\system32\drivers\3dfxvsm.sys [2006-2-26 148352]
S2 McLogManagerService;McAfee Log Manager;c:\progra~1\mcafee\msc\mclogsrv.exe --> c:\progra~1\mcafee\msc\mclogsrv.exe [?]
S2 mcpromgr;McAfee Protection Manager;c:\progra~1\mcafee\msc\mcpromgr.exe --> c:\progra~1\mcafee\msc\mcpromgr.exe [?]
S2 McShield;McAfee.com McShield;c:\progra~1\mcafee.com\vso\mcshield.exe --> c:\progra~1\mcafee.com\vso\mcshield.exe [?]
S2 McTskshd.exe;McAfee Task Scheduler;c:\progra~1\mcafee\msc\mctskshd.exe --> c:\progra~1\mcafee\msc\mctskshd.exe [?]
S2 mcusrmgr;McAfee User Manager;c:\progra~1\mcafee\msc\mcusrmgr.exe --> c:\progra~1\mcafee\msc\mcusrmgr.exe [?]

=============== Created Last 30 ================

2009-06-21 21:45 2 a------- c:\windows\010112010146118114.lso
2009-06-21 21:45 2 a------- c:\windows\010112010146118114.dat
2009-06-17 22:43 <DIR> --d----- c:\program files\driver
2009-06-17 21:57 1,140,472 a------- c:\windows\system32\IGUltraGrid20.ocx
2009-06-17 21:57 131,856 a------- c:\windows\system32\MSADODC.ocx
2009-06-17 21:57 512,688 a------- c:\windows\system32\XceedCry.dll
2009-06-17 21:57 423,784 a------- c:\windows\system32\XceedBkp.dll
2009-06-17 21:57 28,672 a------- c:\windows\system32\systray.ocx
2009-06-17 21:57 1,435,272 a------- c:\windows\system32\Flash.ocx
2009-06-17 21:57 389,120 a------- c:\windows\system32\ACTSKN43.OCX
2009-06-17 21:57 265,753 a------- c:\windows\system32\AS-Exp2.ocx
2009-06-17 21:57 188,416 a------- c:\windows\system32\actsplash.ocx
2009-06-17 21:57 101,888 a------- c:\windows\system32\VB6STKIT.DLL
2009-06-17 21:57 89,088 a------- c:\windows\system32\ProgressBar4.ocx
2009-06-17 21:57 11,012 a------- c:\windows\system32\threadapi.tlb
2009-06-17 21:57 <DIR> --d----- c:\program files\MalwareSweeper.com
2009-06-17 21:06 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-17 21:06 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-06-17 21:06 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-06-17 14:26 <DIR> --d----- c:\windows\Logs
2009-06-17 14:21 <DIR> --d----- c:\program files\Sony

==================== Find3M ====================

2009-05-07 11:32 345,600 a------- c:\windows\system32\localspl.dll
2009-05-03 17:50 1,740 a------- c:\windows\system32\d3d8caps.dat
2009-05-01 09:22 11,952 a------- c:\windows\system32\avgrsstx.dll
2009-05-01 09:22 325,896 a------- c:\windows\system32\drivers\avgldx86.sys
2009-05-01 09:21 108,552 a------- c:\windows\system32\drivers\avgtdix.sys
2009-04-29 00:56 827,392 a------- c:\windows\system32\wininet.dll
2009-04-29 00:55 78,336 a------- c:\windows\system32\ieencode.dll
2009-04-17 08:26 1,847,168 a------- c:\windows\system32\win32k.sys
2009-04-15 10:51 585,216 a------- c:\windows\system32\rpcrt4.dll
2009-04-05 21:59 1,852 a------- c:\windows\system32\d3d9caps.dat
2006-04-23 18:12 0 a------- c:\program files\sitD4.tmp
2001-07-26 17:58 47 a------- c:\program files\ACMonitor_X73.ini
2001-07-05 13:46 8,116 a------- c:\program files\OSLO3071b2.USB
2001-05-11 12:39 53,248 a------- c:\program files\ACMonitor_X73.exe
2001-04-23 15:22 1,437 a------- c:\program files\gtx73.ini
2001-02-22 10:54 768 a------- c:\program files\x73_lut.dat
2008-06-22 03:08 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008062220080623\index.dat

============= FINISH: 2:54:10.39 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 27 June 2009 - 10:36 PM

Just wanted to add additional information. My system restore also does not function. I'm not sure of the type of virus/malware but I believe it has something to do with "UAC" files that are on my computer. The initial file was "uacinit.dll", however it appears that file has "morphed" into another file starting with "uac". When I use google to search, the search results all go to another random site instead of going to the intended location. I can however still type the address in the toolbar and my explorer will go to the intended address. Thank you for your help!

#3 DocSatan

DocSatan

    Bleepin' Wanna-Be


  • Members
  • 2,156 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Boston, Ma.
  • Local time:12:06 AM

Posted 01 July 2009 - 11:24 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

#4 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 02 July 2009 - 09:11 AM

DDS (Ver_09-06-26.01) - NTFSx86
Run by Sean P. Corridon at 9:58:18.15 on Thu 07/02/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_12
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.640.247 [GMT -4:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxduserv.exe
C:\WINDOWS\system32\lxducoms.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
c:\program files\common files\mcafee\mna\mcnasvc.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
C:\Program Files\Lexmark 5600-6600 Series\lxdumon.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Program Files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe
C:\WINDOWS\Process Explorer\procexp.exe
C:\WINDOWS\system32\devldr32.exe
C:\Program Files\Netropa\Multimedia Keyboard\TrayMon.exe
C:\Program Files\Netropa\Onscreen Display\OSD.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\Program Files\Outlook Express\msimn.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Sean P. Corridon\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Lexmark Printable Web: {d2c5e510-be6d-42cc-9f61-e4f939078474} - c:\program files\lexmark printable web\bho.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File
TB: {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpeedConnectStartUp]
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [MULTIMEDIA KEYBOARD] c:\program files\netropa\multimedia keyboard\MMKeybd.exe
mRun: [lxdumon.exe] "c:\program files\lexmark 5600-6600 series\lxdumon.exe"
mRun: [lxduamon] "c:\program files\lexmark 5600-6600 series\lxduamon.exe"
mRun: [Lexmark 5600-6600 Series Fax Server] "c:\program files\lexmark 5600-6600 series\fm3032.exe" /s
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
StartupFolder: c:\docume~1\seanp~1.cor\startm~1\programs\startup\pmbmed~1.lnk - c:\program files\sony\sony picture utility\pmbcore\SPUVolumeWatcher.exe
StartupFolder: c:\docume~1\seanp~1.cor\startm~1\programs\startup\procexp.lnk - c:\windows\process explorer\procexp.exe
uPolicies-system: EnableProfileQuota = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
Trusted Zone: turbotax.com
DPF: {00000161-9980-0010-8000-00AA00389B71} - hxxp://codecs.microsoft.com/codecs/i386/msaud.cab
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://a1540.g.akamai.net/7/1540/52/20061205/qtinstall.info.apple.com/qtactivex/qtplugin.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/0/5/7/05796dde-b2ba-4eef-8da4-f99c7e0c9b92/LegitCheckControl.cab
DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - hxxp://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1140999592666
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1141000347252
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - hxxp://download.mcafee.com/molbin/shared/mcgdmgr/1,0,0,26/mcgdmgr.cab
DPF: {C4847596-972C-11D0-9567-00A0C9273C2A} - hxxps://reports.fmcmortgage.com/viewer/activeXViewer/activexviewer.cab
DPF: {CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {ED28050F-D713-43BA-A376-DCC5C35407D5} - hxxp://entimg.msn.com/client/msnmusax3913.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: avgrsstarter - avgrsstx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\seanp~1.cor\applic~1\mozilla\firefox\profiles\du8eeh1s.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/
FF - component: c:\program files\avg\avg8\firefox\components\avgssff.dll
FF - component: c:\program files\mcafee\siteadvisor\components\McFFPlg.dll
FF - plugin: c:\program files\real\realarcade\plugins\mozilla\npracplug.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-4-20 327688]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2009-4-20 27784]
R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-4-20 108552]
R1 msikbd2k;Multimedia Keyboard Filter Driver;c:\windows\system32\drivers\Msikbd2k.sys [2006-2-26 6656]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2009-4-20 298776]
R2 IntuitUpdateService;Intuit Update Service;c:\program files\common files\intuit\update service\IntuitUpdateService.exe [2008-10-10 13088]
R2 lxdu_device;lxdu_device;c:\windows\system32\lxducoms.exe -service --> c:\windows\system32\lxducoms.exe -service [?]
R2 lxduCATSCustConnectService;lxduCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxduserv.exe [2009-2-1 98984]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2008-8-28 210216]
R2 nhksrv;Netropa NHK Server;c:\program files\netropa\multimedia keyboard\nhksrv.exe [2006-2-26 28672]
R3 3dfxvs;3dfxvs;c:\windows\system32\drivers\3dfxvsm.sys [2006-2-26 148352]
S2 McLogManagerService;McAfee Log Manager;c:\progra~1\mcafee\msc\mclogsrv.exe --> c:\progra~1\mcafee\msc\mclogsrv.exe [?]
S2 mcpromgr;McAfee Protection Manager;c:\progra~1\mcafee\msc\mcpromgr.exe --> c:\progra~1\mcafee\msc\mcpromgr.exe [?]
S2 McShield;McAfee.com McShield;c:\progra~1\mcafee.com\vso\mcshield.exe --> c:\progra~1\mcafee.com\vso\mcshield.exe [?]
S2 McTskshd.exe;McAfee Task Scheduler;c:\progra~1\mcafee\msc\mctskshd.exe --> c:\progra~1\mcafee\msc\mctskshd.exe [?]
S2 mcusrmgr;McAfee User Manager;c:\progra~1\mcafee\msc\mcusrmgr.exe --> c:\progra~1\mcafee\msc\mcusrmgr.exe [?]

=============== Created Last 30 ================

2009-06-17 22:43 <DIR> --d----- c:\program files\driver
2009-06-17 21:57 1,140,472 a------- c:\windows\system32\IGUltraGrid20.ocx
2009-06-17 21:57 131,856 a------- c:\windows\system32\MSADODC.ocx
2009-06-17 21:57 512,688 a------- c:\windows\system32\XceedCry.dll
2009-06-17 21:57 423,784 a------- c:\windows\system32\XceedBkp.dll
2009-06-17 21:57 28,672 a------- c:\windows\system32\systray.ocx
2009-06-17 21:57 1,435,272 a------- c:\windows\system32\Flash.ocx
2009-06-17 21:57 389,120 a------- c:\windows\system32\ACTSKN43.OCX
2009-06-17 21:57 265,753 a------- c:\windows\system32\AS-Exp2.ocx
2009-06-17 21:57 188,416 a------- c:\windows\system32\actsplash.ocx
2009-06-17 21:57 101,888 a------- c:\windows\system32\VB6STKIT.DLL
2009-06-17 21:57 89,088 a------- c:\windows\system32\ProgressBar4.ocx
2009-06-17 21:57 11,012 a------- c:\windows\system32\threadapi.tlb
2009-06-17 21:57 <DIR> --d----- c:\program files\MalwareSweeper.com
2009-06-17 21:06 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-17 21:06 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-06-17 21:06 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-06-17 14:26 <DIR> --d----- c:\windows\Logs
2009-06-17 14:21 <DIR> --d----- c:\program files\Sony

==================== Find3M ====================

2009-07-02 09:45 327,688 a------- c:\windows\system32\drivers\avgldx86.sys
2009-07-02 09:45 11,952 a------- c:\windows\system32\avgrsstx.dll
2009-05-07 11:32 345,600 a------- c:\windows\system32\localspl.dll
2009-05-03 17:50 1,740 a------- c:\windows\system32\d3d8caps.dat
2009-04-29 00:56 827,392 a------- c:\windows\system32\wininet.dll
2009-04-29 00:55 78,336 a------- c:\windows\system32\ieencode.dll
2009-04-17 08:26 1,847,168 a------- c:\windows\system32\win32k.sys
2009-04-15 10:51 585,216 a------- c:\windows\system32\rpcrt4.dll
2009-04-05 21:59 1,852 a------- c:\windows\system32\d3d9caps.dat
2006-04-23 18:12 0 a------- c:\program files\sitD4.tmp
2001-07-26 17:58 47 a------- c:\program files\ACMonitor_X73.ini
2001-07-05 13:46 8,116 a------- c:\program files\OSLO3071b2.USB
2001-05-11 12:39 53,248 a------- c:\program files\ACMonitor_X73.exe
2001-04-23 15:22 1,437 a------- c:\program files\gtx73.ini
2001-02-22 10:54 768 a------- c:\program files\x73_lut.dat
2008-06-22 03:08 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008062220080623\index.dat

============= FINISH: 10:08:05.26 ===============

Attached Files



#5 Jat90

Jat90

  • Members
  • 1,515 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United Kingdom
  • Local time:05:06 AM

Posted 04 July 2009 - 06:46 AM

Hello, djseanpc

Welcome to the Bleeping Computer Forums. My name is Jat, and I will be helping you with your situation.

If you do not make a reply in 5 days, we will have to close your topic.


You may want to keep the link to this topic in your favourites. Alternatively, you can click the Posted Image button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the Posted Image button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.



Root Repeal

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop:
  • Extract RootRepeal.exe from the zip archive.
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all six boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Edited by Jat90, 04 July 2009 - 06:46 AM.

- Jat90 -

If I have not responded to you within 24 hours, then please feel free to send me a message.

Posted Image

#6 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 04 July 2009 - 10:15 AM

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Time: 2009/07/04 11:07
Program Version: Version 1.3.0.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_diskdump.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_diskdump.sys
Address: 0xF0D4B000 Size: 16384 File Visible: No Signed: -
Status: -

Name: dump_ultra.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_ultra.sys
Address: 0xF0ED4000 Size: 36864 File Visible: No Signed: -
Status: -

Name: PROCEXP113.SYS
Image Path: C:\WINDOWS\system32\Drivers\PROCEXP113.SYS
Address: 0xF083F000 Size: 7872 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xEBCA8000 Size: 49152 File Visible: No Signed: -
Status: -

Name: SKYNETrerfvavk.sys
Image Path: C:\WINDOWS\system32\drivers\SKYNETrerfvavk.sys
Address: 0xF1BA2000 Size: 163840 File Visible: - Signed: -
Status: Hidden from Windows API!

Name: UACkvdkrvamtkyarol.sys
Image Path: C:\WINDOWS\system32\drivers\UACkvdkrvamtkyarol.sys
Address: 0xF184F000 Size: 81920 File Visible: - Signed: -
Status: Hidden from Windows API!

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\SKYNETosspuyqp.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETpdhcxshy.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETtagvdyvi.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETwiwhoasc.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACakqrujosduxnmnx.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACbrgqpfqjpbkboxe.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACekqnwknwrhnrota.log
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACfuwprturqrbqhry.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACgyhmopltihljqwy.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACmpsuhnoxydiqhkr.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACteppptmxdoetqlk.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uactmp.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACtqdehirkepuonlh.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACxixbbdxvkyuyvdl.dll
Status: Invisible to the Windows API!

Path: c:\windows\temp\sqlite_gvtklgvh5rvv0uu
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\sqlite_gyv2j0e8th9rzud
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\sqlite_wqsvlmluvhwxq5p
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\sqlite_xib15omnmedjhbe
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: C:\WINDOWS\Temp\UACf15b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETbyvhcpsant.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETejoknyklqe.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETevxtcislpi.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETgihbuutnrt.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETiuwmetcbqh.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETivxseqrnoe.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETkdvyjpiavu.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETnidxwmcpos.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETowahgimycd.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETpbrjhyadcs.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETpjqhpiscrp.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETqcxnqwbwul.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETrbfaetjuci.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETrbfsvruhpy.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETthabqfnmcg.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETthqvxrxexm.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETuqhrcojvkl.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETuycynvrapr.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETvlxjmfwwgf.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETxgawbdxelx.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETyfibtiwudk.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\SKYNETyuncwostik.tmp
Status: Invisible to the Windows API!

Path: c:\windows\temp\sqlite_9uwznywempadrgq
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: C:\WINDOWS\system32\drivers\UACkvdkrvamtkyarol.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\SKYNETrerfvavk.sys
Status: Invisible to the Windows API!

Path: c:\documents and settings\sean p. corridon\local settings\temp\etilqs_kyedcq5c2cpo27vnzre4
Status: Allocation size mismatch (API: 32768, Raw: 0)

Path: C:\Documents and Settings\Sean P. Corridon\Local Settings\Temp\UAC2438.tmp
Status: Invisible to the Windows API!

Path: c:\documents and settings\sean p. corridon\local settings\temporary internet files\content.ie5\g9saeghj\spc[1].php
Status: Allocation size mismatch (API: 32768, Raw: 0)

Path: c:\documents and settings\sean p. corridon\local settings\temporary internet files\content.ie5\j0g7bzly\ten_things_30_event_sell400k_stream_400x300[1].flv
Status: Allocation size mismatch (API: 393216, Raw: 32768)

Stealth Objects
-------------------
Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: winlogon.exe (PID: 520) Address: 0x007c0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: winlogon.exe (PID: 520) Address: 0x00890000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: services.exe (PID: 568) Address: 0x007c0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: services.exe (PID: 568) Address: 0x00980000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: lsass.exe (PID: 588) Address: 0x008f0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: lsass.exe (PID: 588) Address: 0x009d0000 Size: 49152

Object: Hidden Module [Name: SKYNETosspuyqp.dll]
Process: svchost.exe (PID: 748) Address: 0x00910000 Size: 57344

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 748) Address: 0x009a0000 Size: 45056

Object: Hidden Module [Name: UACf15b.tmphirkepuonlh.dll]
Process: svchost.exe (PID: 748) Address: 0x00960000 Size: 196608

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 748) Address: 0x00a40000 Size: 49152

Object: Hidden Module [Name: UACteppptmxdoetqlk.dll]
Process: svchost.exe (PID: 748) Address: 0x00c90000 Size: 73728

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 748) Address: 0x00f40000 Size: 45056

Object: Hidden Module [Name: UACtqdehirkepuonlh.dll]
Process: svchost.exe (PID: 748) Address: 0x02bf0000 Size: 196608

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 748) Address: 0x02d50000 Size: 49152

Object: Hidden Module [Name: SKYNETwiwhoasc.dll]
Process: svchost.exe (PID: 748) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 892) Address: 0x00910000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 892) Address: 0x009b0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 968) Address: 0x00910000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 968) Address: 0x009b0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 1080) Address: 0x00910000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 1080) Address: 0x009b0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 1176) Address: 0x00910000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 1176) Address: 0x009b0000 Size: 49152

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: LEXBCES.EXE (PID: 1340) Address: 0x00d90000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: LEXBCES.EXE (PID: 1340) Address: 0x009c0000 Size: 45056

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: spoolsv.exe (PID: 1380) Address: 0x00b70000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: spoolsv.exe (PID: 1380) Address: 0x00c20000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 1880) Address: 0x00910000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 1880) Address: 0x009b0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: nhksrv.exe (PID: 1916) Address: 0x003f0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: nhksrv.exe (PID: 1916) Address: 0x00d20000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: avgwdsvc.exe (PID: 1940) Address: 0x00840000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: avgwdsvc.exe (PID: 1940) Address: 0x00900000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 2004) Address: 0x00910000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 2004) Address: 0x009b0000 Size: 49152

Object: Hidden Module [Name: System.EnterpriseServices.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x04cc0000 Size: 266240

Object: Hidden Module [Name: System.Data.SQLite.DLL]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x04620000 Size: 778240

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x00950000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x00b10000 Size: 49152

Object: Hidden Module [Name: Intuit.Spc.Esd.WinClient.Application.UpdateService.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x01000000 Size: 36864

Object: Hidden Module [Name: Intuit.Spc.Esd.WinClient.Application.UpdateService.PluginContract.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x01240000 Size: 28672

Object: Hidden Module [Name: Intuit.Spc.Esd.WinClient.Application.UpdateServicePlugin.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x01420000 Size: 61440

Object: Hidden Module [Name: Intuit.Spc.Esd.Core.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x014c0000 Size: 258048

Object: Hidden Module [Name: Intuit.Spc.Esd.Client.Common.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x01460000 Size: 86016

Object: Hidden Module [Name: Intuit.Spc.Esd.WinClient.Ipc.Remoting.UpdateServiceWorker.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x01510000 Size: 36864

Object: Hidden Module [Name: Intuit.Spc.Foundations.Primary.Logging.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x01530000 Size: 53248

Object: Hidden Module [Name: Intuit.Spc.Foundations.Primary.ExceptionHandling.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x015f0000 Size: 77824

Object: Hidden Module [Name: Intuit.Spc.Foundations.Portability.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x03640000 Size: 471040

Object: Hidden Module [Name: Intuit.Spc.Foundations.Primary.Config.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x037c0000 Size: 86016

Object: Hidden Module [Name: System.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x03af0000 Size: 3084288

Object: Hidden Module [Name: System.configuration.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x03860000 Size: 438272

Object: Hidden Module [Name: System.XML.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x038d0000 Size: 2076672

Object: Hidden Module [Name: Intuit.Spc.Esd.Client.DataAccess.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x044a0000 Size: 135168

Object: Hidden Module [Name: Intuit.Spc.Esd.WinClient.Api.Net.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x04300000 Size: 421888

Object: Hidden Module [Name: Intuit.Spc.Esd.Client.BusinessLogic.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x04530000 Size: 143360

Object: Hidden Module [Name: System.Data.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x046f0000 Size: 3059712

Object: Hidden Module [Name: System.Transactions.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x04a20000 Size: 270336

Object: Hidden Module [Name: Intuit.Spc.Map.Reporter.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x04b10000 Size: 479232

Object: Hidden Module [Name: System.Runtime.Remoting.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x05350000 Size: 307200

Object: Hidden Module [Name: System.Windows.Forms.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x055b0000 Size: 5017600

Object: Hidden Module [Name: System.Drawing.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x05b10000 Size: 643072

Object: Hidden Module [Name: Intuit.Spc.Map.WindowsFirewallUtilities.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x05cd0000 Size: 1077248

Object: Hidden Module [Name: System.ServiceProcess.dll]
Process: IntuitUpdateService.exe (PID: 160) Address: 0x05c70000 Size: 126976

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: jqs.exe (PID: 200) Address: 0x00920000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: jqs.exe (PID: 200) Address: 0x00ae0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: lxduserv.exe (PID: 232) Address: 0x00a10000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: lxduserv.exe (PID: 232) Address: 0x00ac0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: lxducoms.exe (PID: 356) Address: 0x00c10000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: lxducoms.exe (PID: 356) Address: 0x00de0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: McSACore.exe (PID: 392) Address: 0x00af0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: McSACore.exe (PID: 392) Address: 0x00db0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: mcnasvc.exe (PID: 480) Address: 0x00c40000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: mcnasvc.exe (PID: 480) Address: 0x00cf0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: avgrsx.exe (PID: 952) Address: 0x00970000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: avgrsx.exe (PID: 952) Address: 0x00a30000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: avgnsx.exe (PID: 1024) Address: 0x00990000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: avgnsx.exe (PID: 1024) Address: 0x00b50000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: svchost.exe (PID: 1196) Address: 0x00910000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: svchost.exe (PID: 1196) Address: 0x009c0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: MsPMSPSv.exe (PID: 1640) Address: 0x008d0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: MsPMSPSv.exe (PID: 1640) Address: 0x00a90000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: WMPNetwk.exe (PID: 1756) Address: 0x008f0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: WMPNetwk.exe (PID: 1756) Address: 0x009a0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: alg.exe (PID: 2280) Address: 0x007f0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: alg.exe (PID: 2280) Address: 0x008a0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: Explorer.EXE (PID: 3904) Address: 0x00ba0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: Explorer.EXE (PID: 3904) Address: 0x00c50000 Size: 49152

Object: Hidden Handle [Index: 1824, Type: File]
Process: Explorer.EXE (PID: 3904) Address: 0x83255d88 Size: -

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: ctfmon.exe (PID: 3728) Address: 0x02b80000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: ctfmon.exe (PID: 3728) Address: 0x02c30000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: MMKeybd.exe (PID: 3952) Address: 0x02cc0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: MMKeybd.exe (PID: 3952) Address: 0x02d70000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: lxdumon.exe (PID: 1512) Address: 0x02d60000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: lxdumon.exe (PID: 1512) Address: 0x02e10000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: avgtray.exe (PID: 3864) Address: 0x02c90000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: avgtray.exe (PID: 3864) Address: 0x02f50000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: devldr32.exe (PID: 1784) Address: 0x00b00000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: devldr32.exe (PID: 1784) Address: 0x00bc0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: WMPNSCFG.exe (PID: 2404) Address: 0x009f0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: WMPNSCFG.exe (PID: 2404) Address: 0x00bb0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: SPUVolumeWatcher.exe (PID: 336) Address: 0x02cf0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: SPUVolumeWatcher.exe (PID: 336) Address: 0x02da0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: procexp.exe (PID: 1288) Address: 0x03010000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: procexp.exe (PID: 1288) Address: 0x030c0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: TrayMon.exe (PID: 532) Address: 0x02cb0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: TrayMon.exe (PID: 532) Address: 0x02d60000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: OSD.exe (PID: 1360) Address: 0x003f0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: OSD.exe (PID: 1360) Address: 0x02d40000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: msimn.exe (PID: 1192) Address: 0x009e0000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: msimn.exe (PID: 1192) Address: 0x00ba0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: msmsgs.exe (PID: 2052) Address: 0x00b20000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: msmsgs.exe (PID: 2052) Address: 0x00bd0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: firefox.exe (PID: 764) Address: 0x00d30000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: firefox.exe (PID: 764) Address: 0x00de0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: RootRepeal.exe (PID: 3680) Address: 0x02d20000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: RootRepeal.exe (PID: 3680) Address: 0x02ee0000 Size: 49152

Object: Hidden Module [Name: UACbrgqpfqjpbkboxe.dll]
Process: Iexplore.exe (PID: 3592) Address: 0x02d40000 Size: 45056

Object: Hidden Module [Name: UACgyhmopltihljqwy.dll]
Process: Iexplore.exe (PID: 3592) Address: 0x02df0000 Size: 49152

Hidden Services
-------------------
Service Name: SKYNETfhexumbn
Image Path: C:\WINDOWS\system32\drivers\SKYNETrerfvavk.sys

Service Name: UACd.sys
Image Path: C:\WINDOWS\system32\drivers\UACkvdkrvamtkyarol.sys

==EOF==

#7 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 04 July 2009 - 12:12 PM

FYI: My computer locked up sometime after running Rootrepeal and adding the log to this post. I had to manually reboot and when my computer re-booted it stared a Antivirus Pro 2009 virus program (which I believe) is malware. For some reason I can not connect to my email account or bleepingcomputer.com any longer. There was an executable file called sysguard.exe which was running as well. I killed that process. Where should I go from here? Prior to starting this topic I was using Malwarebytes to clean this infection. Should I run a malwarebytes scan? I wanted to check with you first before running any scans per your instructions.

Thanks Sean

#8 Jat90

Jat90

  • Members
  • 1,515 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United Kingdom
  • Local time:05:06 AM

Posted 05 July 2009 - 07:35 PM

Your computer is heavily infected with a rootkit, which leads me to this warning:

:thumbup2: Rootkit Warning

Rootkits are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control again. and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:Although the rootkit was identified and removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because this malware has been removed the computer is now secure. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:Please let me know what you decide to do.
- Jat90 -

If I have not responded to you within 24 hours, then please feel free to send me a message.

Posted Image

#9 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 06 July 2009 - 09:13 AM

Jat,

I read through the Rootkit disclosure and I just have a few questions. It mentions that the infection was "removed", however the computer can not be trusted going forward. How was it removed? I thought we just ran the root repeal diagnostic? I realize that once removed the computer is always at risk but I just wasn't sure if we actually removed anything or not. I have changed all passwords used while on this computer (using a clean computer). This computer was also always behind the windows firewall as well as a password protected router.

Are there specific instructions on how to re-format my computer?

Thanks Sean

#10 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 07 July 2009 - 01:43 PM

Jat,

I'm not sure if my last post was confusing or not, but I would like to do whatever you feel is necessary to attempt to clean the rootkit(s). I know I have UAC and SKYNET on my computer and if possible I would like to use whatever tools/programs you know of to fix it before I resort to formatting the drive. Can we use COMBOFIX or Avenger or something to cripple/clean the rootkit?

Thanks Sean

#11 Jat90

Jat90

  • Members
  • 1,515 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United Kingdom
  • Local time:05:06 AM

Posted 07 July 2009 - 05:57 PM

Sorry was a typo, I meant we could clean it. Let's proceed with ComboFix:

ComboFix

Please download ComboFix from one of these locations (If you already have it, delete it and download again):

Link 1
Link 2
Link 3

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Instruction can be found here
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Note** ComboFix was designed only to be used under the supervision of a helper, not for general use.

Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.
- Jat90 -

If I have not responded to you within 24 hours, then please feel free to send me a message.

Posted Image

#12 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 07 July 2009 - 11:02 PM

ComboFix 09-07-07.A2 - Sean P. Corridon 07/07/2009 23:43.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.640.455 [GMT -4:00]
Running from: c:\documents and settings\Sean P. Corridon\Desktop\Combo-Fix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\driver
c:\windows\Installer\686652.msi
c:\windows\system32\drivers\SKYNETrerfvavk.sys
c:\windows\system32\drivers\UACkvdkrvamtkyarol.sys
c:\windows\system32\SKYNETosspuyqp.dll
c:\windows\system32\SKYNETpdhcxshy.dat
c:\windows\system32\SKYNETtagvdyvi.dat
c:\windows\system32\SKYNETwiwhoasc.dll
c:\windows\system32\UACakqrujosduxnmnx.db
c:\windows\system32\UACasnxmryeqwjhhtw.log
c:\windows\system32\UACbrgqpfqjpbkboxe.dll
c:\windows\system32\UACekqnwknwrhnrota.log
c:\windows\system32\UACemvghijclhlqgeg.log
c:\windows\system32\UACfuwprturqrbqhry.dat
c:\windows\system32\UACgyhmopltihljqwy.dll
c:\windows\system32\uacinit.dll
c:\windows\system32\UACmpsuhnoxydiqhkr.dll
c:\windows\system32\UACteppptmxdoetqlk.dll
c:\windows\system32\uactmp.db
c:\windows\system32\UACtqdehirkepuonlh.dll
c:\windows\system32\UACxixbbdxvkyuyvdl.dll
c:\windows\system32\wbem\proquota.exe

c:\windows\system32\proquota.exe was missing
Restored copy from - c:\windows\ServicePackFiles\i386\proquota.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_UACd.sys
-------\Legacy_DRIVER
-------\Legacy_DRIVERDRV
-------\Legacy_DRV
-------\Service_drv
-------\Service_SKYNETfhexumbn


((((((((((((((((((((((((( Files Created from 2009-06-08 to 2009-07-08 )))))))))))))))))))))))))))))))
.

2100-02-23 19:35 . 2001-02-22 14:54 768 ----a-w- c:\program files\x73_lut.dat
2100-02-08 21:03 . 2001-05-11 16:39 53248 ----a-w- c:\program files\ACMonitor_X73.exe
2009-07-08 03:50 . 2008-04-14 00:12 50176 -c--a-w- c:\windows\system32\dllcache\proquota.exe
2009-07-08 03:50 . 2008-04-14 00:12 50176 ----a-w- c:\windows\system32\proquota.exe
2009-07-04 15:32 . 2009-07-05 15:43 -------- d-----w- c:\program files\drv
2009-06-18 01:57 . 2004-05-11 14:56 423784 ----a-w- c:\windows\system32\XceedBkp.dll
2009-06-18 01:57 . 2003-11-19 18:59 512688 ----a-w- c:\windows\system32\XceedCry.dll
2009-06-18 01:57 . 2000-07-15 10:00 101888 ----a-w- c:\windows\system32\VB6STKIT.DLL
2009-06-18 01:57 . 2009-06-20 02:32 -------- d-----w- c:\program files\MalwareSweeper.com
2009-06-18 01:06 . 2009-06-17 15:27 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-18 01:06 . 2009-06-18 02:21 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-06-18 01:06 . 2009-06-17 15:27 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-17 21:09 . 2009-06-17 21:09 -------- d-----w- c:\documents and settings\Sean P. Corridon\Application Data\Sony Corporation
2009-06-17 18:26 . 2009-06-17 18:26 -------- d-----w- c:\windows\Logs
2009-06-17 18:21 . 2009-06-17 18:21 -------- d-----w- c:\program files\Sony
2009-06-17 18:21 . 2009-06-17 18:21 10134 ----a-r- c:\documents and settings\Sean P. Corridon\Application Data\Microsoft\Installer\{14291118-0C19-45EA-A4FA-5C1C0F5FDE09}\ARPPRODUCTICON.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-07-08 03:21 . 2009-03-26 02:30 -------- d-----w- c:\documents and settings\All Users\Application Data\avg8
2009-07-07 20:32 . 2008-08-29 19:23 -------- d-----w- c:\documents and settings\LocalService\Application Data\SACore
2009-06-17 18:27 . 2006-02-26 22:34 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-06-06 15:36 . 2009-02-01 22:22 -------- d-----w- c:\documents and settings\All Users\Application Data\Lexmark 5600-6600 Series
2009-05-26 19:25 . 2009-05-26 19:25 -------- d-----w- c:\program files\Verizon
2009-05-16 22:09 . 2008-08-30 14:14 -------- d-----w- c:\program files\Full Tilt Poker
2009-05-07 15:32 . 2001-08-23 12:00 345600 ----a-w- c:\windows\system32\localspl.dll
2009-05-03 21:50 . 2006-02-28 12:25 1740 ----a-w- c:\windows\system32\d3d8caps.dat
2009-04-29 04:56 . 2004-01-08 20:23 827392 ----a-w- c:\windows\system32\wininet.dll
2009-04-29 04:55 . 2004-08-04 07:56 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-04-17 12:26 . 2001-08-23 12:00 1847168 ----a-w- c:\windows\system32\win32k.sys
2009-04-15 14:51 . 2006-02-27 00:40 585216 ----a-w- c:\windows\system32\rpcrt4.dll
2006-04-23 22:12 . 2006-04-23 22:12 0 ----a-w- c:\program files\sitD4.tmp
2001-07-26 21:58 . 2000-01-11 17:50 47 ----a-w- c:\program files\ACMonitor_X73.ini
2001-07-05 17:46 . 2001-07-20 15:48 8116 ----a-w- c:\program files\OSLO3071b2.USB
2001-04-23 19:22 . 2100-02-08 20:53 1437 ----a-w- c:\program files\gtx73.ini
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-19 204288]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MULTIMEDIA KEYBOARD"="c:\program files\Netropa\Multimedia Keyboard\MMKeybd.exe" [2002-06-19 180224]
"lxdumon.exe"="c:\program files\Lexmark 5600-6600 Series\lxdumon.exe" [2008-05-30 676520]
"lxduamon"="c:\program files\Lexmark 5600-6600 Series\lxduamon.exe" [2008-05-30 16040]
"Lexmark 5600-6600 Series Fax Server"="c:\program files\Lexmark 5600-6600 Series\fm3032.exe" [2008-05-30 311976]

c:\documents and settings\Sean P. Corridon\Start Menu\Programs\Startup\
PMB Media Check Tool.lnk - c:\program files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe [2009-6-17 333088]
procexp.lnk - c:\windows\Process Explorer\procexp.exe [2009-2-3 3550592]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"c:\\WINDOWS\\system32\\lxducoms.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8085:TCP"= 8085:TCP:drv

R1 msikbd2k;Multimedia Keyboard Filter Driver;c:\windows\system32\drivers\Msikbd2k.sys [2/26/2006 6:34 PM 6656]
R2 IntuitUpdateService;Intuit Update Service;c:\program files\Common Files\Intuit\Update Service\IntuitUpdateService.exe [10/10/2008 6:45 AM 13088]
R2 lxdu_device;lxdu_device;c:\windows\system32\lxducoms.exe -service --> c:\windows\system32\lxducoms.exe -service [?]
R2 lxduCATSCustConnectService;lxduCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxduserv.exe [2/1/2009 6:02 PM 98984]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\McAfee\SiteAdvisor\McSACore.exe [8/28/2008 9:44 PM 210216]
R2 nhksrv;Netropa NHK Server;c:\program files\Netropa\Multimedia Keyboard\nhksrv.exe [2/26/2006 6:34 PM 28672]
R3 3dfxvs;3dfxvs;c:\windows\system32\drivers\3dfxvsm.sys [2/26/2006 10:53 AM 148352]
S1 drvdrv;drvdrv;\??\c:\program files\drv\drv.sys --> c:\program files\drv\drv.sys [?]

--- Other Services/Drivers In Memory ---

*Deregistered* - PROCEXP113

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
drv REG_MULTI_SZ drv
.
Contents of the 'Scheduled Tasks' folder

2009-06-15 c:\windows\Tasks\McDefragTask.job
- c:\windows\system32\defrag.exe [2001-08-23 00:12]
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-SpeedConnectStartUp - (no file)


.
------- Supplementary Scan -------
.
uStart Page = about:blank
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
Trusted Zone: turbotax.com
FF - ProfilePath - c:\documents and settings\Sean P. Corridon\Application Data\Mozilla\Firefox\Profiles\du8eeh1s.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/
FF - component: c:\program files\McAfee\SiteAdvisor\components\McFFPlg.dll
FF - plugin: c:\program files\Real\RealArcade\Plugins\Mozilla\npracplug.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-07-07 23:54
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2144)
c:\program files\McAfee\SiteAdvisor\saHook.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\LEXBCES.EXE
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\lxducoms.exe
c:\windows\system32\MsPMSPSv.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\windows\system32\wscntfy.exe
c:\program files\Lexmark 5600-6600 Series\lxdumsdmon.exe
c:\windows\system32\devldr32.exe
c:\program files\Netropa\Multimedia Keyboard\Traymon.exe
c:\program files\Netropa\Onscreen Display\osd.exe
.
**************************************************************************
.
Completion time: 2009-07-08 23:59 - machine was rebooted
ComboFix-quarantined-files.txt 2009-07-08 03:59

Pre-Run: 8,512,360,448 bytes free
Post-Run: 8,431,759,360 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

180 --- E O F --- 2009-06-12 07:14

#13 Jat90

Jat90

  • Members
  • 1,515 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United Kingdom
  • Local time:05:06 AM

Posted 08 July 2009 - 08:03 PM

Suspicious Files

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Please click this link-->Jotti

When the jotti page has finished loading, click the browse button and navigate to the files listed below in bold, then click Submit. You will only be able to have one file scanned at a time.

c:\program files\sitD4.tmp
c:\program files\ACMonitor_X73.ini
c:\program files\OSLO3071b2.USB
c:\program files\gtx73.ini

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/

ESET Online Scan

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


In your next reply, please post:
  • Jotti log
  • ESET log

- Jat90 -

If I have not responded to you within 24 hours, then please feel free to send me a message.

Posted Image

#14 djseanpc

djseanpc
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 09 July 2009 - 01:59 AM

ESET Log below:

C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\UACkvdkrvamtkyarol.sys.vir a variant of Win32/Olmarik.IN trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\wbem\proquota.exe.vir a variant of Win32/Kryptik.WY trojan cleaned by deleting - quarantined


Jotti Log:

I didn't see a button that produced an actual "log text file", but here are the results after scanning each file individually.

c:\program files\sitD4.tmp ---------------- 0 bytes, nothing to scan
c:\program files\ACMonitor_X73.ini-------- all 21 scanners cleared this file, no malware found
c:\program files\OSLO3071b2.USB--------- all 21 scanners cleared this file, no malware found
c:\program files\gtx73.ini--------------------all 21 scanners cleared this file, no malware found

By the way.....thanks in advance for all of your help...I really appreciate your time!!!

#15 Jat90

Jat90

  • Members
  • 1,515 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United Kingdom
  • Local time:05:06 AM

Posted 09 July 2009 - 07:16 PM

Looking good.

ReScan

Please rescan with DDS and post DDS.txt
- Jat90 -

If I have not responded to you within 24 hours, then please feel free to send me a message.

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users