Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with uacinit.dll


  • This topic is locked This topic is locked
14 replies to this topic

#1 risc44

risc44

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:41 PM

Posted 25 August 2009 - 12:57 AM

I was pretty badly infected with spyware after i accidentally disabled windows firewall. Malware bytes, ad-aware, and avg took care of most of them. However, uacinit.dll is detected, but unable to be removed by malware bytes. Whatever this is, it keeps re-downloading and running a process/trojan called iexplorer.exe. It doesn't seem to do much but make clicking noises. Just re-enabled my firewall but i'm not sure if iexplorer.exe will come back yet. Additionally, and I'm trying to follow the "one topic - one problem" rule, my computer crashes when i try to wake it up from sleep mode every time. It flashes a blue screen too briefly to be read. This started happening around the time my comp became infected so it might be related. Hopefully if uacinit.dll goes away so will the crashes. Thank you kindly for your much anticipated help -Chris

PS: RootRepeal threw up some errors which i neglected to write down when i installed it. It still worked but I received the message, "Warning: the SSDT in our driver has been faked (0x80559480)! after the scan.


dds log:


DDS (Ver_09-07-30.01) - NTFSx86
Run by Owner at 22:17:13.98 on Mon 08/24/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1023.488 [GMT -7:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Realtek\InstallShield\AzMixerSel.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
svchost.exe
C:\Program Files\Apoint2K\HidFind.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uURLSearchHooks: H - No File
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
mWinlogon: UIHost=c:\program files\tgtsoft\stylexp\logon\CurrentLogon.EXE
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.5.0_06\bin\ssv.dll
BHO: CoTGT_BHO Class: {c333cf63-767f-4831-94ac-e683d962c63c} - c:\program files\tgtsoft\stylexp\TGT_BHO.dll
TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File
EB: {17996E72-EE06-4d59-943F-4C3EBBA5A916} - No File
uRun: [STYLEXP] c:\program files\tgtsoft\stylexp\StyleXP.exe -Hide
mRun: [AzMixerSel] c:\program files\realtek\installshield\AzMixerSel.exe
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - d:\progra~1\micros~1\office11\EXCEL.EXE/3000
IE: {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - c:\program files\aim\aim.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_06\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - d:\progra~1\micros~1\office11\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: AtiExtEvent - Ati2evxx.dll
Notify: avgrsstarter - avgrsstx.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\owner\applic~1\mozilla\firefox\profiles\vzhztdqa.default\
FF - prefs.js: browser.startup.homepage - google.com
FF - component: c:\program files\avg\avg8\firefox\components\avgssff.dll
FF - plugin: c:\documents and settings\owner\application data\mozilla\firefox\profiles\vzhztdqa.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp071303000006.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\java\jre1.5.0_06\bin\NPJava11.dll
FF - plugin: c:\program files\java\jre1.5.0_06\bin\NPJava12.dll
FF - plugin: c:\program files\java\jre1.5.0_06\bin\NPJava13.dll
FF - plugin: c:\program files\java\jre1.5.0_06\bin\NPJava14.dll
FF - plugin: c:\program files\java\jre1.5.0_06\bin\NPJava32.dll
FF - plugin: c:\program files\java\jre1.5.0_06\bin\NPJPI150_06.dll
FF - plugin: c:\program files\java\jre1.5.0_06\bin\NPOJI610.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npclntax.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-8-18 64160]
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-9-4 335752]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2007-3-1 27784]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2009-1-31 298776]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-7-3 1029456]
R3 FUJ02E3;Fujitsu FUJ02E3 Device Driver;c:\windows\system32\drivers\fuj02e3.sys [2005-4-20 4864]
RUnknown prncm;prncm; [x]
RUnknown xIjxahov;xIjxahov; [x]
S2 kppwug;kppwug;c:\windows\system32\drivers\rvbdmldc.sys --> c:\windows\system32\drivers\rvbdmldc.sys [?]
S2 Viewpoint Manager Service;Viewpoint Manager Service;"c:\program files\viewpoint\common\viewpointservice.exe" --> c:\program files\viewpoint\common\ViewpointService.exe [?]
S3 Ca522bv;CA522B WebCam Driver;c:\windows\system32\drivers\Ca522Bv.sys [2007-10-16 2329216]
S3 Px64Mc;PIX-MPEG/USB2.0 MCE;c:\windows\system32\drivers\Px64Mc.sys [2005-4-21 239360]
S3 XIRLINK;Veo Mobile/Advanced Web Camera;c:\windows\system32\drivers\ucdnt.sys [2004-1-26 728083]

=============== Created Last 30 ================

2009-08-18 02:08 15,688 a------- c:\windows\system32\lsdelete.exe
2009-08-18 01:54 64,160 a------- c:\windows\system32\drivers\Lbd.sys
2009-08-18 01:53 <DIR> -cd-h--- c:\docume~1\alluse~1\applic~1\{EF63305C-BAD7-4144-9208-D65528260864}
2009-08-18 01:53 <DIR> --d----- c:\program files\Lavasoft
2009-08-12 02:17 <DIR> --d----- c:\windows\ServicePackFiles
2009-07-27 14:55 <DIR> --d----- c:\docume~1\owner\applic~1\Malwarebytes
2009-07-27 14:45 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-07-27 14:45 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-07-27 14:45 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-07-27 14:45 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-07-27 14:34 <DIR> --d----- c:\program files\Trend Micro

==================== Find3M ====================

2009-08-24 21:40 448 a------- C:\sccfg.sys
2009-08-05 02:11 204,800 a------- c:\windows\system32\mswebdvd.dll
2009-07-27 14:57 4 ----h--- c:\windows\fonts\mlog
2009-07-17 11:55 58,880 a------- c:\windows\system32\atl.dll
2009-07-13 10:08 286,720 a------- c:\windows\system32\wmpdxm.dll
2009-07-12 21:53 335,752 a------- c:\windows\system32\drivers\avgldx86.sys
2009-06-26 09:18 659,456 a------- c:\windows\system32\wininet.dll
2009-06-26 09:18 81,920 a------- c:\windows\system32\ieencode.dll
2009-06-16 07:55 119,808 a------- c:\windows\system32\t2embed.dll
2009-06-16 07:55 82,432 a------- c:\windows\system32\fontsub.dll
2009-06-12 04:50 76,288 a------- c:\windows\system32\telnet.exe
2009-06-10 07:21 84,992 a------- c:\windows\system32\avifil32.dll
2009-06-09 23:32 132,096 a------- c:\windows\system32\wkssvc.dll
2009-06-05 00:42 655,872 a------- c:\windows\system32\mstscax.dll
2009-06-03 12:27 1,290,752 a------- c:\windows\system32\quartz.dll
2006-05-13 07:30 6,032 ac------ c:\docume~1\owner\applic~1\wklnhst.dat

============= FINISH: 22:18:06.15 ===============


Malwarebytes log:


Malwarebytes' Anti-Malware 1.39
Database version: 2421
Windows 5.1.2600 Service Pack 2

8/24/2009 10:55:18 PM
mbam-log-2009-08-24 (22-55-18).txt

Scan type: Quick Scan
Objects scanned: 90129
Time elapsed: 3 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.

Attached Files



BC AdBot (Login to Remove)

 


#2 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:41 PM

Posted 07 September 2009 - 06:13 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#3 risc44

risc44
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:41 PM

Posted 14 September 2009 - 07:28 PM

Nothing has changed from my original post. Still can't remove Uacinit.dll. Still have to open task manager and stop a process called IEXPLORER.EXE every 10-20 minutes. Computer seems to slowly be getting slower and slower. I'll attach a new DDS report. Thanks. Attached File  New_DDS.txt   6.97KB   1 downloads

#4 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 16 September 2009 - 06:51 PM

Hello.

Run a new scan with RootRepeal:

Download and run RootRepeal CR

Please download RootRepeal from the following location and save it to your desktop.
  • Unzip the RootRepeal.zip file it to it's own folder. (If you did not use the "Direct Download" mirror to download RootRepeal).
  • Close/Disable all other programs especially your security programs (anti-spyware, anti-virus, and firewall) Refer to this page, if you are unsure how.
  • Physically disconnect your machine from the internet as your system will be unprotected.
  • Double-click on RootRepeal.exe to run it. If you are using Vista, please right-click and run as Administrator...
  • Click the Posted Image tab at the bottom.
  • Now press the Posted Image button.
  • A box will pop up, check the boxes beside All Seven options/scan area
    Posted Image
  • Now click OK.
  • Another box will open, check the boxes beside all the drives, eg : C:\, then click OK.
  • The scan will take a little while to run, so let it go unhindered.
  • Once it is done, click the Save Report button. Posted Image
  • Save it as RepealScan and save it to your desktop
  • Reconnect to the internet.
  • Post the contents of that log in your reply please.
Take a new DDS run afterward and post back with both the DDS and Attach logs in your next reply. Also, let me know how your computer is running and if you have any more problems, issues or symptoms left. Basically give me an update of the condition of your system.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#5 risc44

risc44
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:41 PM

Posted 17 September 2009 - 01:22 AM

Computer status: IEXPLORER.exe still opening and making a bunch of clicking noises using anywhere from 12-30k mem, reopens every 10 minutes or so. Malware bytes still repeatedly finds 2 infections and can remove one but not uacinit.dll. Computer still crashes when I wake it up from standby (I can give you the jist of the blue screen later on if need be). There seem to be some other suspicious processes running but i'm not sure. Computer speed not so great but it's probably a combo of the virus' and needing to be cleaned.

Here's my new RootRepeal scan:Attached File  RootRepeal_report_09_16_09__22_37_41_.txt   95.79KB   10 downloads

THANK YOU for the help, you guys rule. -Chris

#6 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 17 September 2009 - 04:57 PM

Hello.

The rootkit is still active and so are its' hooks.

Regarding rootkits...

Rootkits and backdoor Trojans are very dangerous because they use advanced techniques (backdoors) as a means of accessing a computer system that bypasses security mechanisms and steal sensitive information which they send back to the hacker. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers use backdoor Trojans and rootkits as part of an exploit to gain unauthorized access to a computer and take control of it without your knowledge.

All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Although the rootkit has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because this malware has been removed the computer is now secure. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:Should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy or that the removal will be successful. Tell me what you want to do.

If you wish to continue, please follow the instructions below please...

Download and Run ComboFix

Note to readers of this post other than the starter of this thread:
ComboFix is a VERY POWERFUL tool which should NOT BE USED without guidance of an expert.

Download Combofix from any of the links below, and save it to your desktop.
Link 1
Link 2

Please refer to this page for full instructions on how to run ComboFix.
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Double click ComboFix.exe to start the program. Agree to the prompts.
  • When ComboFix is finished, a log report (C:\ComboFix.txt) will open. Post back with it.
Leave your computer alone while ComboFix is running.

ComboFix will restart your computer if malware is found; allow it to do so.


If Combofix doesn't work, try re-naming it to risc44.exe and run it again.

Note: Please Do NOT mouseclick combofix's window while its running because it may call it to stall.
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#7 risc44

risc44
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:41 PM

Posted 19 September 2009 - 09:49 PM

ComboFix 09-09-18.02 - Owner 09/19/2009 19:21.3.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1023.662 [GMT -7:00]
Running from: c:\documents and settings\Owner\Desktop\risc44.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Owner\Application Data\.#
c:\documents and settings\Owner\Application Data\.#\MBX@1230@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@1230@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@32C@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@32C@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@330@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@330@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@508@12F39D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@508@12F39E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5A0@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5A0@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@5CC@1213A00.###
c:\documents and settings\Owner\Application Data\.#\MBX@5CC@1213A10.###
c:\documents and settings\Owner\Application Data\.#\MBX@644@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@644@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7F4@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@7F4@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@804@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@804@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@828@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@828@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@844@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@844@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@888@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@888@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@88C@15539D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@88C@15539E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@944@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@944@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9B4@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9B4@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9C0@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@9C0@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A24@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A24@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A54@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@A54@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AA4@1563A00.###
c:\documents and settings\Owner\Application Data\.#\MBX@AA4@1563A10.###
c:\documents and settings\Owner\Application Data\.#\MBX@AC8@15539D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@AC8@15539E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BF4@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@BF4@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C18@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C18@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C5C@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@C5C@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D3C@1213A00.###
c:\documents and settings\Owner\Application Data\.#\MBX@D3C@1213A10.###
c:\documents and settings\Owner\Application Data\.#\MBX@D44@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@D44@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E30@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E30@12239E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E30@15539D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E30@15539E0.###
c:\documents and settings\Owner\Application Data\.#\MBX@E5C@1213A00.###
c:\documents and settings\Owner\Application Data\.#\MBX@E5C@1213A10.###
c:\documents and settings\Owner\Application Data\.#\MBX@ED0@12239D0.###
c:\documents and settings\Owner\Application Data\.#\MBX@ED0@12239E0.###
c:\program files\Internet Explorer\2.exe
c:\program files\Mozilla Firefox\plugins\npclntax.dll
c:\windows\Fonts\mlog
c:\windows\Install.txt
c:\windows\system32\drivers\UACxbehewbmkd.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\Install.txt
c:\windows\system32\kernel1.exe
c:\windows\system32\Process.exe
c:\windows\system32\SrchSTS.exe
c:\windows\system32\tmp.reg
c:\windows\system32\UACdyvbfpxrwl.log
c:\windows\system32\UACeutengmqht.dll
c:\windows\system32\UACfqjafldyir.db
c:\windows\system32\uacinit.dll
c:\windows\system32\UAClmjruyfvll.dll
c:\windows\system32\UACmkyblvhnik.dat
c:\windows\system32\UACnsrsbnrjjp.dll
c:\windows\system32\UACwgkuiqaitc.dll
c:\windows\system32\UACwqekxwbivj.dll
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WS2Fix.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_UACd.sys
-------\Legacy_UACd.sys
-------\Legacy_6TO4
-------\Legacy_IAS
-------\Legacy_MSNCACHE
-------\Legacy_SOPIDKC


((((((((((((((((((((((((( Files Created from 2009-08-20 to 2009-09-20 )))))))))))))))))))))))))))))))
.

2009-09-17 07:00 . 2009-09-17 07:00 -------- d-----w- c:\documents and settings\Owner\Application Data\Winamp
2009-09-16 06:04 . 2009-09-16 06:03 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-08-31 00:03 . 2004-08-04 12:00 4224 -c--a-w- c:\windows\system32\dllcache\beep.sys
2009-08-31 00:03 . 2004-08-04 12:00 4224 ----a-w- c:\windows\system32\drivers\beep.sys
2009-08-27 06:26 . 2009-08-27 06:26 -------- d-----w- c:\program files\Common Files\Blizzard Entertainment

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-09-19 02:49 . 2008-09-19 04:47 -------- d-----w- c:\program files\Diablo II
2009-09-17 07:00 . 2006-03-20 08:34 -------- d-----w- c:\program files\Winamp
2009-09-16 06:03 . 2005-09-12 23:06 -------- d-----w- c:\program files\Java
2009-09-07 20:33 . 2008-03-09 08:42 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-09-07 19:51 . 2008-03-09 08:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-09-07 19:44 . 2008-03-07 00:34 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-09-07 19:36 . 2005-09-13 17:34 -------- d-----w- c:\program files\AIM
2009-09-07 19:36 . 2005-09-13 17:34 -------- d-----w- c:\documents and settings\Owner\Application Data\Aim
2009-08-28 17:32 . 2009-02-01 02:55 11952 ----a-w- c:\windows\system32\avgrsstx.dll
2009-08-28 17:32 . 2008-09-04 23:31 335240 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2009-08-28 17:32 . 2007-03-02 05:53 27784 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2009-08-20 23:54 . 2006-01-13 01:50 -------- d-----w- c:\program files\BitComet
2009-08-18 17:41 . 2008-09-05 20:24 -------- d-----w- c:\program files\CCleaner
2009-08-18 16:49 . 2008-09-04 23:31 -------- d-----w- c:\documents and settings\All Users\Application Data\avg8
2009-08-18 08:53 . 2009-08-18 08:53 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
2009-08-18 08:53 . 2009-08-18 08:53 -------- d-----w- c:\program files\Lavasoft
2009-08-18 08:41 . 2006-02-04 05:24 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-08-06 07:05 . 2008-12-28 08:21 -------- d-----w- c:\program files\Folder Lock
2009-08-05 09:11 . 2005-04-21 01:52 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-27 21:55 . 2009-07-27 21:55 -------- d-----w- c:\documents and settings\Owner\Application Data\Malwarebytes
2009-07-27 21:50 . 2009-07-27 21:45 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-07-27 21:45 . 2009-07-27 21:45 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-07-27 21:34 . 2009-07-27 21:34 -------- d-----w- c:\program files\Trend Micro
2009-07-27 21:24 . 2005-04-21 16:53 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-07-27 21:23 . 2008-11-20 03:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-07-27 21:15 . 2008-11-10 07:40 -------- d-----w- c:\program files\Common Files\Apple
2009-07-17 18:55 . 2005-04-21 01:51 58880 ----a-w- c:\windows\system32\atl.dll
2009-07-13 20:36 . 2009-07-27 21:45 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-07-13 20:36 . 2009-07-27 21:45 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-07-13 17:08 . 2005-04-21 01:54 286720 ----a-w- c:\windows\system32\wmpdxm.dll
2009-07-03 14:49 . 2009-08-18 08:54 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-07-03 14:49 . 2009-08-18 09:08 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-06-26 16:18 . 2005-04-21 01:53 659456 ----a-w- c:\windows\system32\wininet.dll
2009-06-26 16:18 . 2005-04-21 01:52 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-06-24 09:19 . 2005-09-06 21:51 300640 -c--a-w- c:\documents and settings\Owner\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"STYLEXP"="c:\program files\TGTSoft\StyleXP\StyleXP.exe" [2005-08-18 1359872]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AzMixerSel"="c:\program files\Realtek\InstallShield\AzMixerSel.exe" [2005-02-18 53248]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2004-07-02 163840]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-08-28 2007832]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-02-02 339968]
"RTHDCPL"="RTHDCPL.EXE" - c:\windows\RTHDCPL.EXE [2005-02-21 13783040]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"UIHost"="c:\program files\TGTSoft\StyleXP\Logon\CurrentLogon.EXE"

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-08-28 17:32 11952 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Monitor.lnk
backup=c:\windows\pss\Monitor.lnkCommon Startup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Monopod

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Pml Driver HPZ12"=3 (0x3)
"ose"=3 (0x3)
"NTService1"=3 (0x3)
"NtmsSvc"=3 (0x3)
"mnmsrvc"=3 (0x3)
"MaxBackServiceInt"=3 (0x3)
"iPod Service"=3 (0x3)
"gusvc"=3 (0x3)
"Ati HotKey Poller"=3 (0x3)
"Adobe LM Service"=3 (0x3)
"aawservice"=2 (0x2)
"UPS"=3 (0x3)
"Schedule"=2 (0x2)
"LmHosts"=2 (0x2)
"SCardSvr"=3 (0x3)
"RDSessMgr"=3 (0x3)
"FastUserSwitchingCompatibility"=3 (0x3)
"ERSvc"=2 (0x2)
"BITS"=2 (0x2)
"ALG"=3 (0x3)
"Themes"=2 (0x2)
"TermService"=3 (0x3)
"Netlogon"=3 (0x3)
"CiSvc"=3 (0x3)
"helpsvc"=2 (0x2)
"HidServ"=2 (0x2)
"MSDTC"=3 (0x3)
"CryptSvc"=2 (0x2)
"Browser"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\NexConcepts\\NoteTaker\\NoteTaker.exe"=
"c:\\Program Files\\BitComet\\BitComet.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"c:\\Program Files\\QuickTime\\QuickTimePlayer.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\mIRC\\mirc.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\xampplite\\apache\\bin\\httpd.exe"=
"c:\\Program Files\\xampplite\\mysql\\bin\\mysqld.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3724:TCP"= 3724:TCP:Blizzard Downloader: 3724

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [8/18/2009 1:54 AM 64160]
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [9/4/2008 4:31 PM 335240]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [1/31/2009 7:55 PM 297752]
R3 FUJ02E3;Fujitsu FUJ02E3 Device Driver;c:\windows\system32\drivers\fuj02e3.sys [4/20/2005 7:32 PM 4864]
S2 kppwug;kppwug;c:\windows\system32\drivers\rvbdmldc.sys --> c:\windows\system32\drivers\rvbdmldc.sys [?]
S2 Viewpoint Manager Service;Viewpoint Manager Service;"c:\program files\Viewpoint\Common\ViewpointService.exe" --> c:\program files\Viewpoint\Common\ViewpointService.exe [?]
S3 Ca522bv;CA522B WebCam Driver;c:\windows\system32\drivers\Ca522Bv.sys [10/16/2007 1:36 PM 2329216]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 7:49 AM 1029456]
S3 Px64Mc;PIX-MPEG/USB2.0 MCE;c:\windows\system32\drivers\Px64Mc.sys [4/21/2005 10:29 AM 239360]
S3 XIRLINK;Veo Mobile/Advanced Web Camera;c:\windows\system32\drivers\ucdnt.sys [1/26/2004 8:42 PM 728083]
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - d:\progra~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\vzhztdqa.default\
FF - prefs.js: browser.startup.homepage - google.com
FF - component: c:\program files\AVG\AVG8\Firefox\components\avgssff.dll
FF - plugin: c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\vzhztdqa.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmp071303000006.dll
FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npmozax.dll

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true.
- - - - ORPHANS REMOVED - - - -

URLSearchHooks-<default> - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-09-19 19:38
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(900)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(2936)
c:\program files\iTunes\iTunesMiniPlayer.dll
c:\program files\iTunes\iTunesMiniPlayer.Resources\en.lproj\iTunesMiniPlayerLocalized.dll
c:\program files\iTunes\iTunesMiniPlayer.Resources\iTunesMiniPlayer.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\wdfmgr.exe
c:\program files\AVG\AVG8\avgrsx.exe
c:\program files\Apoint2K\Hidfind.exe
c:\program files\Apoint2K\ApntEx.exe
.
**************************************************************************
.
Completion time: 2009-09-20 19:41 - machine was rebooted
ComboFix-quarantined-files.txt 2009-09-20 02:41

Pre-Run: 2,494,328,832 bytes free
Post-Run: 2,321,100,800 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(3)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(3)\WINDOWS="Microsoft Windows XP Home Edition (bootscreen)" /noexecute=optin /fastdetect /KERNEL=kernel1.exe
multi(0)disk(0)rdisk(0)partition(3)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

288 --- E O F --- 2009-09-09 08:51

#8 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 20 September 2009 - 07:02 AM

Hello.

Let's continue.

Download and Run OTM
  • Please download OTM by OldTimer and save it to your desktop.
  • Double click the Posted Image icon on your desktop If you are running on Vista, right click on the file and choose Run As Administrator.
  • Paste the following code under the Posted Image area. Do not include the word "Code".
    :services
    kppwug
    Viewpoint Manager Service
    :files
    c:\windows\system32\drivers\rvbdmldc.sys
    c:\program files\Viewpoint
    :commands
    [EmptyTemp]
    [Reboot]
  • Click the large Posted Image button.
  • If OTM requires are reboot, please allow it to do so.
  • Copy/Paste the contents under the Posted Image line here in your next reply.
Note: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

Download and run MalwareBytes Anti-Malware

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

For complete or visual instructions on installing and running Malwarebytes Anti-Malware please read this link

~Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#9 risc44

risc44
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:41 PM

Posted 23 September 2009 - 03:47 AM

computer is running much better after combofix, almost forgot we weren't done here...

OTM log:

All processes killed
========== SERVICES/DRIVERS ==========

Service\Driver kppwug deleted successfully.

Service\Driver Viewpoint Manager Service deleted successfully.
========== FILES ==========
File/Folder c:\windows\system32\drivers\rvbdmldc.sys not found.
File/Folder c:\program files\Viewpoint not found.
========== COMMANDS ==========

[EMPTYTEMP]

User: Administrator
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: All Users

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 32768 bytes

User: LocalService
->Temp folder emptied: 0 bytes
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 458886 bytes
->FireFox cache emptied: 3444914 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
File delete failed. C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 33170 bytes

User: Owner
->Temp folder emptied: 491861679 bytes
->Temporary Internet Files folder emptied: 5420495 bytes
->Java cache emptied: 25493442 bytes
->FireFox cache emptied: 106617761 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
Windows Temp folder emptied: 32811 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 604.05 mb


OTM by OldTimer - Version 3.0.0.6 log created on 09232009_012747

Files moved on Reboot...

Registry entries deleted on Reboot...


MBAM log:

Malwarebytes' Anti-Malware 1.41
Database version: 2848
Windows 5.1.2600 Service Pack 2

9/23/2009 1:45:30 AM
mbam-log-2009-09-23 (01-45-30).txt

Scan type: Quick Scan
Objects scanned: 98231
Time elapsed: 3 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


That's a good sign eh? Thanks very much.

#10 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 23 September 2009 - 03:23 PM

Yes. That is a good sign. Let's run an online scan now.

Run ESET Online Scan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
You can refer to this animation by neomage if needed.

Take a new DDS run afterward and post back with both the DDS and Attach logs in your next reply. Also, let me know how your computer is running and if you have any more problems, issues or symptoms left.

Thanks.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#11 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 26 September 2009 - 11:13 AM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 5-7 from the last day I replied initially, the topic will need to be closed.

Thanks for understanding.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#12 risc44

risc44
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:41 PM

Posted 28 September 2009 - 12:32 AM

Sorry for the delay. Ok, computer is running very well. No more blue screen upon waking up and faster overall performance. I did the online scan twice but it didn't give me an option to post the results. I think it might have been because I had the "fix problems" box selected. Anyway, results were clean with no threats. I mixed up the dds reports when i saved them to my desktop but you can probably figure out which is which. I have no more issues with my machine, if the dds reports look good feel free to close the topic. Thanks a LOT for all the help. -Chris

DDS Stuff:
Attached File  newest_dds.txt   7.7KB   3 downloads
Attached File  newest_dds_2.txt   6.34KB   4 downloads

#13 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 28 September 2009 - 03:18 PM

Hello.

Yup, the logs look clean. We can wrap up then.

You also need to update your Windows to Service Pack 3. This can be obtained via Windows Update.

Please follow/read the steps below to remove the tools we used and for some more information. :cool:

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Click on your Start Menu, then Run....
  • Now type combofix /u in the runbox and click OK. Notice the space between the "x" and "/".
    Posted Image
  • You will then recieve a message letting you know that Combofix was uninstalled Successfully.
This will remove files/folders assoicated with combofix and uninstall it.

Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
System A bit Slow? Try StartupLight

You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.

If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.


Congratulations! You now appear clean! :) :thumbup2:

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Preventing Infections in the Future

Please also have a look at the following links, giving some advice and Tips to protect yourself against malware and reduce the potential for re-infection:
  • Avoid gaming sites, underground web pages, pirated software sites, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.
Vist the WindowsUpdate Site Regularly

I recommend you regularly visit the Windows Update Site!
  • Lots of Hacking/Trojans use the methods found (plugged by the updates) that have not been stopped by people not updating.
  • Update ALL Critical updates and any other Windows updates for services/programs that you use.
  • If you wish to turn on automatic updates then you will find here is a nice little article about turning on automatic updates.
  • Note that it will download them for you, but you still have to actually click install.
Update Non-Microsoft Programs

It is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

Update all programs regularly - Make sure you update all the programs you have installed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.

Follow this list and your potential for being infected again will reduce dramatically.

Glad I was able to help and thank you for choosing Bleeping Computer as you malware removal source.
Don't forget to tell your friends about us and Good luck :)


If you have no more questions, comments or problems please tell us, so we can close off the topic.

Thanks :)

With Regards,
Extremeboy

Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#14 risc44

risc44
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:41 PM

Posted 01 October 2009 - 04:53 AM

I think that's a wrap. Thanks again.

#15 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 01 October 2009 - 04:37 PM

You're welcome.

Since the problem appears to be resolved, this topic is now Closed. Glad we could help :thumbup2:
If you need this topic reopened, please Send Me a Message. In your message please include the address of this thread in your request.

This applies only to the original topic starter

Everyone else please start a new topic in the Hijackthis-Malware Removal Forum.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users