Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

AVcare virus


  • Please log in to reply
18 replies to this topic

#1 Bob2009

Bob2009

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 11 August 2009 - 07:43 PM

I am posting my current hijack this and process explorer logs. Chewy was assisting me earlier on this. Topic referenced is here: http://www.bleepingcomputer.com/forums/t/247685/newbiehelp/ ~ OB I think I have eradicated parts of the virus that I had through malewarebytes scans, but the PC is still not stable at all. On a fresh reboot, the only way I can get into normal mode is to try last known good configuration, usually by the 2nd or 3rd try, that works. I have run Malwarebytes numerous times and it has continually found Trojan.agent c:\windows\system32\uacinit.dll, however, when I search for that file, I can't find it (not even hidden). It also says I have rootkit.trace hkeylocalmachine software\UAC, which I also can't find. Additionally, when I do get booted up, the system32 folder opens automatically. I have run the Dr. Web software numerous times in safe and normal modes and it always crashes before it finishes. I have also noticed that occaisionally if I have one IE window open, in task manager, it says I have two open. I did have mcafee installed but I removed that when I was trying to kill this thing off so I am still working without it. Not sure what to do at this point. Looking for some help with the logs....

HIJACKTHIS:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:27:05 PM, on 8/11/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\crypserv.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Western Digital\WD Drive Manager\WDBtnMgrSvc.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\Gaming Software\LWEMon.exe
C:\Program Files\Microsoft ActiveSync\wcescomm.exe
C:\PROGRA~1\MI3AA1~1\rapimgr.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...arm1=seconduser
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...arm1=seconduser
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...arm1=seconduser
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...arm1=seconduser
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...arm1=seconduser
O2 - BHO: (no name) - {10F89768-58DA-4270-8DDC-7B9174FE4D56} - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {62CDC018-8175-443F-8EC2-1314AAE1FE49} - (no file)
O2 - BHO: (no name) - {65B8C978-8A8A-4D28-97F2-15FBC302DE7A} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {7BD63797-9F49-4726-9D7D-B98BE34FFCB0} - (no file)
O2 - BHO: (no name) - {7BFB0F1C-563D-4F29-936C-C160D9CACD52} - (no file)
O2 - BHO: (no name) - {91BA0FDE-D033-48CF-94F8-A00F72575467} - (no file)
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.1.807.1746\swg.dll
O4 - HKLM\..\Run: [Start WingMan Profiler] C:\Program Files\Logitech\Gaming Software\LWEMon.exe /noui
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\wcescomm.exe"
O4 - HKCU\..\Run: [Cache Cleaner] -action delete
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://*.deloittenet.com
O15 - Trusted Zone: http://*.mcafee.com
O16 - DPF: {01012101-5E80-11D8-9E86-0007E96C65AE} -
O16 - DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} -
O16 - DPF: {1E54D648-B804-468d-BC78-4AFFED8E262E} (System Requirements Lab) - http://www.systemrequirementslab.com/srl_b...sreqlab_srl.cab
O16 - DPF: {3BFFE033-BF43-11D5-A271-00A024A51325} (iNotes6 Class) - https://we.plantemoran.com/,DanaInfo=SOUT-L...va+iNotes6W.cab
O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - http://dl.tvunetworks.com/TVUAx.cab
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
O16 - DPF: {6E2510E6-BF2D-4C78-9F28-2F5C8760F124} (ERPageAddin Class) - https://er0.deloitteonline.com/eRoomSetup/client.cab
O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - http://www.crucial.com/controls/cpcScanner.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn.com/binFramework/v10/...ro.cab53083.cab
O16 - DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} -
O16 - DPF: {CAFEEFAC-0015-0000-0010-ABCDEFFEDCBA} (Java Plug-in 1.5.0_10) -
O16 - DPF: {E5F5D008-DD2C-4D32-977D-1A0ADF03058B} (JuniperSetupSP1 Control) - https://we.plantemoran.com/dana-cached/setu...perSetupSP1.cab
O16 - DPF: {EB387D2F-E27B-4D36-979E-847D1036C65D} (QDiagHUpdateObj Class) - http://h20264.www2.hp.com/ediags/hpfix/sj/.../qdiagh.cab?326
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcafee.com/molbin/iss-loc/...186/mcfscan.cab
O16 - DPF: {F27237D7-93C8-44C2-AC6E-D6057B9A918F} (JuniperSetupClientControl Class) - https://we.plantemoran.com/dana-cached/sc/J...SetupClient.cab
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Automatic LiveUpdate Scheduler - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
O23 - Service: Google Update Service (gupdate1c9e6192e849402) (gupdate1c9e6192e849402) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: StarWind iSCSI Service (StarWindService) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe
O23 - Service: WD Drive Manager Service (WDBtnMgrSvc.exe) - WDC - C:\Program Files\Western Digital\WD Drive Manager\WDBtnMgrSvc.exe

--
End of file - 8895 bytes

PROCESS EXPLORER:
Process PID CPU Description Company Name
winlogon.exe 732 Windows NT Logon Application Microsoft Corporation
WDBtnMgrSvc.exe 192 WD Drive Manager Service WDC
wcescomm.exe 2820 ActiveSync Connection Manager Microsoft Corporation
taskmgr.exe 1800 Windows TaskManager Microsoft Corporation
System Idle Process 0 99.23
System 4
svchost.exe 992 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1168 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1500 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1580 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1740 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1136 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 540 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 3152 Generic Host Process for Win32 Services Microsoft Corporation
StarWindService.exe 488 StarWind iSCSI Target (Alcohol Edition) Rocket Division Software
spoolsv.exe 696 Spooler SubSystem App Microsoft Corporation
smss.exe 644 Windows NT Session Manager Microsoft Corporation
services.exe 776 0.77 Services and Controller app Microsoft Corporation
rapimgr.exe 2984 ActiveSync RAPI Manager Microsoft Corporation
procexp.exe 3924 Sysinternals Process Explorer Sysinternals - www.sysinternals.com
notepad.exe 3536 Notepad Microsoft Corporation
MsMpEng.exe 1408 Service Executable Microsoft Corporation
MDM.EXE 352 Machine Debug Manager Microsoft Corporation
LWEMon.exe 2764 Logitech WingMan Event Monitor Logitech Inc.
LSSrvc.exe 1852 Hewlett-Packard Company
lsass.exe 788 LSA Shell (Export Version) Microsoft Corporation
Interrupts n/a Hardware Interrupts
iexplore.exe 3000 Internet Explorer Microsoft Corporation
iexplore.exe 2660 Internet Explorer Microsoft Corporation
HijackThis.exe 2564 HijackThis Trend Micro Inc.
explorer.exe 1952 Windows Explorer Microsoft Corporation
ehSched.exe 1248 Media Center Scheduler Service Microsoft Corporation
ehRecvr.exe 1192 Media Center Receiver Service Microsoft Corporation
DPCs n/a Deferred Procedure Calls
dllhost.exe 1704 COM Surrogate Microsoft Corporation
ctfmon.exe 2600 CTF Loader Microsoft Corporation
csrss.exe 704 Client Server Runtime Process Microsoft Corporation
Crypserv.exe 1188 CrypKey License Service CrypKey (Canada) Ltd.
ati2evxx.exe 976 ATI External Event Utility EXE Module ATI Technologies Inc.
ati2evxx.exe 1828 ATI External Event Utility EXE Module ATI Technologies Inc.
alg.exe 2328 Application Layer Gateway Service Microsoft Corporation
aawservice.exe 2036 Ad-Aware Service Lavasoft

Edited by Orange Blossom, 11 August 2009 - 07:52 PM.


BC AdBot (Login to Remove)

 


#2 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 11 August 2009 - 08:35 PM

A few other items I should mention:

I currently also have the occasionaly error message "google installer has encountered a problem and needs to close". Even though I have attempted to disable this (maybe I'm not doing something right or it's reverting to the last known good configuration).

My original problems were very similar to others who have posted here....the wallpaper was blue with orange letters, "you've been attacked", something to that effect, with music/crap playing in the backround. I had several files such as "B.exe", all the way up to I.exe, I believe. It appears those have been obliterated by Malewarebytes and or Dr. Web (even though it has never finished completely through a scan). The scary wallpaper and music haven't reappeared since I did the first succesful run through with malwarebyetes. What I'm left with is a wonky system that doesn't want to boot up correctly.

If this can't be fixed/eradicated, I'd also like some advice on how/where to back up my files before I have my drive(s) reformated. I have an external drive that I was using at the time of this but I'm concerned about that drive as well. I did run a couple of Malwarebytes scans on it specifically and it never turned up any problems. I've connected it once since I wiped the original virus off but have now left it disconnected as I've been trying to figure out what to do. The geeks at best buy tell me this type of virus/rootkit rarely if ever attacks normal word docs, pictures, movie files, etc. but aims at exe files. They also told me they generally try to eradicate it off the pc without reformating, although they reserve that as a final option. Just wonder if I'm wise to let them try to kill it or recommend they reformat, assuming we can't find a way to fix this......

Thanks in advance for any help!!

#3 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 11 August 2009 - 08:41 PM

And, as I typed my last word....more trash comes out of my speakers!

This is awful.

Edited by Orange Blossom, 14 August 2009 - 10:40 PM.


#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:12 PM

Posted 13 August 2009 - 12:40 PM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 13 August 2009 - 10:11 PM

Sam- I tried to download combofix and did save it to my desktop. When I tried to run it, it was not allowed to run, either in normal or safe mode. I was able to boot into normal mode this evening but got an error for "google updater" and the system 32 folder opened again. Then the stupid music started again so I killed the hidden IE process that started running. I tried renaming the combo fix file to something else and running it in both normal and safe modes, but it still wouldn't run....any suggestions? Obviously something with this nasty virus is keeping it from running.

FYI, I won't be able to get back to this again until Friday afternoon/evening. Thanks.

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:12 PM

Posted 14 August 2009 - 03:20 PM

We can work around that. Go ahead and delete combofix.exe off your desktop first.

Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

Link 1
Link 2
Link 3

Posted Image


Posted Image
--------------------------------------------------------------------

Double click on Combo-Fix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt so we can continue cleaning the system.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 14 August 2009 - 06:22 PM

Sam- Here is the log. I was a little surprised because it said Norton antivirus is on the PC. It came loaded with the PC and I completely deleted/uninstalled it (or so I thought). I have been using McAfee for several years. I deleted and uninstalled McAfee once this virus hit because I was instructed to do so in the other bleepingcomputer forum (my first thread).

I also checked after Combofix ran- all 13 suspcious files it asked me to write down appear to have been deleted.



ComboFix 09-08-10.06 - HP_Administrator 08/14/2009 18:42.1.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.958.596 [GMT -4:00]
Running from: c:\documents and settings\HP_Administrator\Desktop\Combo-Fix.exe
AV: Norton Internet Security *On-access scanning enabled* (Outdated) {E10A9785-9598-4754-B552-92431C1C35F8}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\progra~1\COMMON~1\{3813C~1
c:\recycler\S-1-5-21-790525478-602162358-839522115-500
c:\temp\0b9
c:\temp\tpBe12
c:\windows\fnts~1
c:\windows\Installer\12a32c0.msp
c:\windows\Installer\12a32d3.msp
c:\windows\Installer\12a32e7.msp
c:\windows\Installer\12a3309.msp
c:\windows\Installer\12a330a.msp
c:\windows\Installer\12a331d.msp
c:\windows\Installer\12a3330.msp
c:\windows\Installer\156f9f.msi
c:\windows\Installer\4b237d.msi
c:\windows\Installer\54674c.msp
c:\windows\Installer\a741d0.msp
c:\windows\Installer\a741e4.msp
c:\windows\Installer\a74286.msp
c:\windows\Installer\eee19.msp
c:\windows\Installer\WMEncoder.msi
c:\windows\run.log
c:\windows\system32\404Fix.exe
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\drivers\SKYNETbirqlxwy.sys
c:\windows\system32\drivers\UACetptxbklro.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\fdpqguic.ini
c:\windows\system32\icroso~1
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\ilnmp.ini
c:\windows\system32\ilnmp.ini2
c:\windows\system32\ineWc01
c:\windows\system32\o4Patch.exe
c:\windows\system32\oqstv.bak1
c:\windows\system32\oqstv.bak2
c:\windows\system32\qdgexurc.ini
c:\windows\system32\SKYNETmcruyuyf.dll
c:\windows\system32\SKYNETosdevjns.dll
c:\windows\system32\SKYNETvijqsixt.dat
c:\windows\system32\SKYNETwulqqoew.dat
c:\windows\system32\spnhbihb.ini
c:\windows\system32\SrchSTS.exe
c:\windows\system32\tmp.reg
c:\windows\system32\UACboetjvjgaa.db
c:\windows\system32\UACdydovtiiqs.dll
c:\windows\system32\uacinit.dll
c:\windows\system32\UACohgsmmxpav.dat
c:\windows\system32\UACqhrjxacheg.dll
c:\windows\system32\UACriroblbfyt.dll
c:\windows\system32\UACtpgpxmktpr.dll
c:\windows\system32\UACvrnmggrwwk.dll
c:\windows\system32\uedwjrhe.ini
c:\windows\system32\unsvchosts.lzma
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\wnstssv.exe
c:\windows\system32\WS2Fix.exe
c:\windows\system32\wybeg.bak1
D:\Autorun.inf

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_SKYNETtlwekcpk
-------\Legacy_SKYNETtlwekcpk
-------\Service_UACd.sys
-------\Legacy_UACd.sys
-------\Legacy_COM+_MESSAGES


((((((((((((((((((((((((( Files Created from 2009-07-14 to 2009-08-14 )))))))))))))))))))))))))))))))
.

2009-08-14 02:52 . 2009-08-14 02:52 -------- d-----w- C:\bedaed921eecf3c753cdf4d3c4c240
2009-08-08 17:33 . 2009-08-08 17:38 -------- d-----w- c:\documents and settings\HP_Administrator\DoctorWeb
2009-08-08 03:52 . 2009-08-08 03:52 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\PCHealth
2009-08-08 02:48 . 2009-08-08 02:48 -------- d-----w- c:\windows\system32\XPSViewer
2009-08-08 02:48 . 2009-08-08 02:48 -------- d-----w- c:\program files\MSBuild
2009-08-08 02:48 . 2009-08-08 02:48 -------- d-----w- c:\program files\Reference Assemblies
2009-08-08 02:47 . 2008-07-06 12:06 89088 ------w- c:\windows\system32\dllcache\filterpipelineprintproc.dll
2009-08-08 02:47 . 2008-07-06 12:06 575488 ------w- c:\windows\system32\xpsshhdr.dll
2009-08-08 02:47 . 2008-07-06 12:06 575488 ------w- c:\windows\system32\dllcache\xpsshhdr.dll
2009-08-08 02:47 . 2008-07-06 12:06 1676288 ------w- c:\windows\system32\xpssvcs.dll
2009-08-08 02:47 . 2008-07-06 12:06 1676288 ------w- c:\windows\system32\dllcache\xpssvcs.dll
2009-08-08 02:47 . 2008-07-06 12:06 117760 ------w- c:\windows\system32\prntvpt.dll
2009-08-08 02:47 . 2008-07-06 10:50 597504 ------w- c:\windows\system32\dllcache\printfilterpipelinesvc.exe
2009-08-08 02:03 . 2009-08-03 17:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-08 02:03 . 2009-08-03 17:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-07 00:15 . 2009-08-07 00:15 -------- d-----w- c:\program files\Windows Defender
2009-08-06 23:33 . 2009-08-06 23:33 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\MetaProducts
2009-08-05 09:01 . 2009-08-05 09:01 204800 ------w- c:\windows\system32\dllcache\mswebdvd.dll
2009-07-30 01:58 . 2009-07-30 01:58 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Centra
2009-07-30 01:58 . 2009-07-30 01:58 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Saba
2009-07-24 01:20 . 2009-07-24 01:20 -------- d-----w- c:\program files\Glary Registry Repair
2009-07-24 01:20 . 2009-07-24 01:20 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\GlarySoft
2009-07-17 22:49 . 2009-07-17 22:49 -------- d-----w- c:\program files\@stake
2009-07-17 03:19 . 2009-07-17 03:19 -------- d-----w- c:\program files\Security Task Manager

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-08-12 02:33 . 2009-05-06 23:13 -------- d-----w- c:\program files\Intelore
2009-08-12 02:33 . 2005-08-17 16:34 -------- d-----w- c:\program files\Quicken
2009-08-12 02:30 . 2005-08-17 16:00 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-08-10 02:54 . 2005-08-17 16:45 -------- d-----w- c:\program files\Google
2009-08-09 07:18 . 2006-09-30 07:45 -------- d-----w- c:\program files\SpywareBlaster
2009-08-08 17:05 . 2006-12-22 02:57 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Juniper Networks
2009-08-08 02:24 . 2009-02-11 03:48 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-08-07 17:57 . 2008-11-30 02:05 4000 ----a-w- c:\windows\system32\ealregsnapshot1.reg
2009-08-07 15:05 . 2007-04-27 16:25 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\uTorrent
2009-08-07 00:30 . 2007-01-02 13:35 -------- d-----w- c:\program files\TenKey
2009-08-05 09:01 . 2004-08-10 12:00 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-11 04:13 . 2009-07-11 04:13 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\vlc
2009-07-05 23:19 . 2009-07-05 23:18 -------- d-----w- c:\program files\Common Files\Logitech
2009-07-05 23:18 . 2009-07-05 23:18 -------- d-----w- c:\program files\Logitech
2009-07-05 21:13 . 2009-07-03 23:09 -------- d-----w- c:\program files\EA GAMES
2009-07-03 23:14 . 2007-01-07 18:19 737280 -c--a-w- c:\windows\iun6002.exe
2009-07-02 23:26 . 2009-07-02 23:26 -------- d-----w- c:\program files\Lavalys
2009-06-28 18:44 . 2009-06-28 18:44 -------- d-----w- c:\program files\SystemRequirementsLab
2009-06-26 16:50 . 2004-08-10 12:00 666624 ----a-w- c:\windows\system32\wininet.dll
2009-06-26 16:50 . 2004-08-10 12:00 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-06-24 04:19 . 2006-09-18 03:24 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-06-24 04:19 . 2006-09-18 03:24 -------- d-----w- c:\docume~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy
2009-06-24 03:28 . 2009-06-24 03:04 49152 ----a-r- c:\documents and settings\HP_Administrator\Application Data\Microsoft\Installer\{FCC07EEA-FA18-4A21-9105-9666603C6885}\IconFCC07EEA1.exe
2009-06-24 03:28 . 2009-06-24 03:04 49152 ----a-r- c:\documents and settings\HP_Administrator\Application Data\Microsoft\Installer\{FCC07EEA-FA18-4A21-9105-9666603C6885}\IconFCC07EEA.exe
2009-06-24 02:46 . 2006-12-22 02:57 36939 ----a-w- c:\documents and settings\HP_Administrator\Application Data\Juniper Networks\Setup\uninstall.exe
2009-06-24 02:46 . 2009-06-24 02:46 -------- d-----w- c:\docume~1\ALLUSE~1\APPLIC~1\Juniper Networks
2009-06-16 14:36 . 2004-08-10 12:00 81920 ----a-w- c:\windows\system32\fontsub.dll
2009-06-16 14:36 . 2004-08-10 12:00 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-06-03 19:09 . 2004-08-10 12:00 1291264 ----a-w- c:\windows\system32\quartz.dll
2009-05-23 22:29 . 2009-05-23 22:29 18451986 ----a-w- C:\NHL 09 Goal Horns Updated 2[1].0.zip
2009-05-01 14:36 . 2008-06-23 22:08 6144 -csha-w- c:\program files\Thumbs.db
2007-12-16 22:53 . 2007-12-16 22:53 393 ----a-w- c:\program files\Shortcut to Program Files.lnk
2006-08-13 21:57 . 2006-08-13 21:56 206991 ----a-w- c:\program files\raccoons.jpg
2006-08-13 19:53 . 2006-08-13 22:11 1938263 -c--a-w- c:\program files\DSC01079.JPG
2007-03-09 07:12 . 2007-03-09 07:12 27648 --sha-w- c:\windows\system32\AVSredirect.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Cache Cleaner"="-action delete" [X]
"H/PC Connection Agent"="c:\program files\Microsoft ActiveSync\wcescomm.exe" [2006-11-13 1289000]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Start WingMan Profiler"="c:\program files\Logitech\Gaming Software\LWEMon.exe" [2009-01-21 92168]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\aawservice]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Google Updater.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Google Updater.lnk
backup=c:\windows\pss\Google Updater.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Updates from HP.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Updates from HP.lnk
backup=c:\windows\pss\Updates from HP.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^HP_Administrator^Start Menu^Programs^Startup^WD Anywhere Backup Launcher.lnk]
backup=c:\windows\pss\WD Anywhere Backup Launcher.lnkStartup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Interactive
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"gusvc"=2 (0x2)
"ccSetMgr"=2 (0x2)
"ccPwdSvc"=3 (0x3)
"ccEvtMgr"=3 (0x3)
"WinDefend"=2 (0x2)
"WDBtnMgrSvc.exe"=2 (0x2)
"SPBBCSvc"=3 (0x3)
"SNDSrvc"=3 (0x3)
"gupdate1c9e6192e849402"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Documents and Settings\\HP_Administrator\\Desktop\\utorrent.exe"=
"c:\\Program Files\\EA SPORTS\\MVP Baseball 2005\\mvp2005.exe"=
"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\R-Studio Agent\\RSAgent.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service

R2 WDBtnMgrSvc.exe;WD Drive Manager Service;c:\program files\Western Digital\WD Drive Manager\WDBtnMgrSvc.exe [5/16/2008 6:12 PM 102400]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
S2 gupdate1c9e6192e849402;Google Update Service (gupdate1c9e6192e849402);c:\program files\Google\Update\GoogleUpdate.exe [6/5/2009 4:06 PM 133104]
S2 ifqfnox;ifqfnox;c:\windows\system32\drivers\bdcumkks.sys --> c:\windows\system32\drivers\bdcumkks.sys [?]
S2 qaeb;qaeb;c:\windows\system32\drivers\yrjd.sys --> c:\windows\system32\drivers\yrjd.sys [?]
S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [8/2/2005 5:10 PM 32512]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [1/25/2009 12:01 AM 11520]
.
- - - - ORPHANS REMOVED - - - -

BHO-{10F89768-58DA-4270-8DDC-7B9174FE4D56} - (no file)
BHO-{62CDC018-8175-443F-8EC2-1314AAE1FE49} - (no file)
BHO-{65B8C978-8A8A-4D28-97F2-15FBC302DE7A} - (no file)
BHO-{7BD63797-9F49-4726-9D7D-B98BE34FFCB0} - (no file)
BHO-{7BFB0F1C-563D-4F29-936C-C160D9CACD52} - (no file)
BHO-{91BA0FDE-D033-48CF-94F8-A00F72575467} - (no file)
WebBrowser-{4F11ACBB-393F-4C86-A214-FF3D0D155CC3} - (no file)
MSConfigStartUp-DLD - (no file)


.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uDefault_Search_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=Q405&bd=pavilion&pf=desktop&parm1=seconduser
mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=Q405&bd=pavilion&pf=desktop&parm1=seconduser
mSearch Bar = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=Q405&bd=pavilion&pf=desktop&parm1=seconduser
uInternet Connection Wizard,ShellNext = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=Q405&bd=pavilion&pf=desktop&parm1=seconduser
uInternet Settings,ProxyOverride = <local>
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MI1933~1\OFFICE11\EXCEL.EXE/3000
Trusted Zone: ''demonoid.com
Trusted Zone: deloittenet.com
Trusted Zone: internet
Trusted Zone: mcafee.com
DPF: {6E2510E6-BF2D-4C78-9F28-2F5C8760F124} - hxxps://er0.deloitteonline.com/eRoomSetup/client.cab
DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277}
DPF: {F27237D7-93C8-44C2-AC6E-D6057B9A918F} - hxxps://we.plantemoran.com/dana-cached/sc/JuniperSetupClient.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-08-14 18:59
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-4182516981-738290856-1422756820-1008\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-4182516981-738290856-1422756820-1008\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{571DC851-1A13-2EA5-CA02-0655E8ECC972}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
"iadiccmiccldipjedb"=hex:6a,61,62,66,63,6e,69,6c,62,61,6f,6a,6d,6a,6c,68,6b,6b,
62,65,00,00
"hajhinmmphfmlgdm"=hex:6a,61,62,66,63,6e,69,6c,62,61,6f,6a,6d,6a,6c,68,6b,6b,
62,65,00,00
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(744)
c:\windows\system32\Ati2evxx.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\ati2evxx.exe
c:\program files\Lavasoft\Ad-Aware\aawservice.exe
c:\windows\system32\ati2evxx.exe
c:\windows\system32\Crypserv.exe
c:\windows\ehome\ehRecvr.exe
c:\windows\ehome\ehSched.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\progra~1\MI3AA1~1\rapimgr.exe
c:\program files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-08-14 19:14 - machine was rebooted
ComboFix-quarantined-files.txt 2009-08-14 23:14

Pre-Run: 45,670,809,600 bytes free
Post-Run: 45,764,829,184 bytes free

Current=10 Default=10 Failed=9 LastKnownGood=11 Sets=,1,2,3,4,5,6,7,8,9,10,11
276 --- E O F --- 2009-08-10 02:01

#8 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 14 August 2009 - 07:08 PM

In looking around after the scan, I note the following directory off my root of C:

directory name: bedaed921eecf3c753cdf4d3c4c240;
files in directory:
$shtdwn$.req (hidden)
mrt.exe._p
mrstub.exe

The date on the hidden file is yesterday evening; the other two appear to be dated a couple of weeks before I got this virus, however, this is the first time I've seen this directory show up. I'll wait to hear back from you before doing anything with this directory or the files.

I haven't seen anything else that looks weird, but I haven't spent alot of time looking, either.

#9 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 14 August 2009 - 09:28 PM

System 32 folder also still opens on reboot. But I seem to be ok in normal mode, just not sure if this is completely gone.

#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:12 PM

Posted 15 August 2009 - 02:25 PM

This is related to windows updates, in particular Microsoft's Malicious Software Removal Tool. Nothing to worry about.

In looking around after the scan, I note the following directory off my root of C:

directory name: bedaed921eecf3c753cdf4d3c4c240;
files in directory:
$shtdwn$.req (hidden)
mrt.exe._p
mrstub.exe

The date on the hidden file is yesterday evening; the other two appear to be dated a couple of weeks before I got this virus, however, this is the first time I've seen this directory show up. I'll wait to hear back from you before doing anything with this directory or the files.

I haven't seen anything else that looks weird, but I haven't spent alot of time looking, either.




Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 15 August 2009 - 06:25 PM

Here it is. Many of the files that were found were also the ones that combofix said it deleted.

System32 folder is still opening, but other than that, nothing else weird happened after scan/reboot.

The drives scanned included some virtual drives. I did not scan my external hard drive, because I had previously scanned that in Malwarebytes and it found nothing, so I unplugged it for the last week or so while fighting this thing. Let me know if there are additional steps I should do for that one. Thank you so much for your help.


Malwarebytes' Anti-Malware 1.40
Database version: 2631
Windows 5.1.2600 Service Pack 3

8/15/2009 7:18:50 PM
mbam-log-2009-08-15 (19-18-50).txt

Scan type: Full Scan (C:\|D:\|L:\|N:\|O:\|)
Objects scanned: 252334
Time elapsed: 1 hour(s), 15 minute(s), 1 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 12

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACqhrjxacheg.dll.vir (Rogue.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACriroblbfyt.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACtpgpxmktpr.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACvrnmggrwwk.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\SKYNETbirqlxwy.sys.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\UACetptxbklro.sys.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D7BD54B8-C977-4903-8CE7-9415B851EC71}\RP1117\A0202360.sys (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D7BD54B8-C977-4903-8CE7-9415B851EC71}\RP1117\A0202363.sys (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D7BD54B8-C977-4903-8CE7-9415B851EC71}\RP1117\A0202364.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D7BD54B8-C977-4903-8CE7-9415B851EC71}\RP1117\A0202365.dll (Rogue.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D7BD54B8-C977-4903-8CE7-9415B851EC71}\RP1117\A0202367.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D7BD54B8-C977-4903-8CE7-9415B851EC71}\RP1117\A0202368.dll (Trojan.TDSS) -> Quarantined and deleted successfully.

#12 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 15 August 2009 - 07:52 PM

I reran the Malwarbytes scan after reboot and no infected files were found. Am I out of the woods? Is there anything I should do with the external drive? (rescan assuming the other drives are clean?)

A couple other questions: 1, is the system 32 folder opening on boot up still a problem? Is there a way to stop it? 2. I am considering changing antivirus products from macafee due to its hogging of system resources. Can you recommend a good free AV that isn't as memory intensive? I need to add RAM anyway (only 1GB now) but I still don't like the way Mcafee takes up so many resources.

#13 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:12 PM

Posted 16 August 2009 - 12:18 PM

You should probably scan your external drive again just to be sure, but it should be ok.

As far as an antivirus, the two free ones that I like are AVG and Avast. I've heard that Avast is a little easier on resources, but I've never used it myself so I can't confirm that.

Now the system32 folder opening up on startup has got me puzzled a bit. You don't have a lot of programs running on startup, but there is one that I'm curious about.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Cache Cleaner"="-action delete" [X]



What can you tell me about Cache Cleaner?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#14 Bob2009

Bob2009
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 16 August 2009 - 03:15 PM

It was a program necessary for my previous job (several years ago). I haven't used it in a long time and actually I thought I had deleted all of it. It has nothing to do with this current situation.

#15 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:12 PM

Posted 17 August 2009 - 10:04 AM

I understand that it's not malicious, but neither is your system32 folder opening up on startup.
If you've removed the program then you need to remove the reference to it in the registry or it may cause errors.

Run Hijackthis, click scan, and Put a checkmark next to the line listed below. Then close all other windows--you should only see HijackThis on your Desktop--and click the Fix Checked button.


O4 - HKCU\..\Run: [Cache Cleaner] -action delete


Next reboot your computer and let me know if you still get the system32 folder on startup.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users