Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected w/Rootkit (Fake AV - wscsv32.exe)


  • Please log in to reply
8 replies to this topic

#1 HopefulDude

HopefulDude

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 04 September 2009 - 12:35 AM

Hello,

I am infected with a virus that adds the protection anti-virus to my computer, also gives me fake alerts using the wscsv32.exe file, along with some DLLs. Sometimes it adds porn icons to my desktop, such as porntube, nudetube, etc...And it also runs a hidden internet explorer window in the background. Sometimes that window plays podcasts or something, because interviews are going on until I shut down the hidden window.

Originally it tried blocking my internet, but I think I broke that part of it. I am also able to get the security alerts to stop popping up if I set the permissions to deny on everything, but there is still things going on in the background.

I have tried McAfee, Ad-Aware, Malware Bytes, Norton, AVG, SUPERAnti-spyware, + others I can't even remember the name of, and I was going to try Kaspersky but it wants me to remove anti-viruses such as McAfee and AVG. AVG gives me a registry error everytime I try to uninstall it, and I don't believe I even have McAfee on this computer anymore.

I have tried running quick, and full virus scans in normal, safe mode, and safe mode with networking. All of the scans have picked up something, and they seem to remove it, but it's back as soon as I boot into windows, which is Win XP Pro SP2, by the way.

This is a continuation from my original thread which was posted in "Am I Infected? What do I do?" section. I was sent here after Blade Zephon confirmed that I do, indeed, have a rootkit. The thread can be found here.

Just wanted to note that I could not have had a better experience with this site so far...Blade did an amazing job. Keep up the good work guys!!!

I have attached the logs as requested.

DDS Log:


DDS (Ver_09-07-30.01) - NTFSx86
Run by REMOVED at 1:13:25.64 on Fri 09/04/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.2039.924 [GMT -4:00]

AV: AVG Anti-Virus *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Proventia Desktop *enabled* {7956B471-0AC0-46A8-B31A-EADCBF7C2C74}

============== Running Processes ===============

C:\WINDOWS\System32\svchost.exe -k Cognizance
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\cisvc.exe
C:\Program Files\AVG\AVG8\avgrsx.exe
C:\WINDOWS\system32\Prot_srv.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
c:\Program Files\Hewlett-Packard\IAM\bin\asghost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\FreeWheel\FreeWheel.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\PROGRA~1\AVG\AVG8\avgam.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\Program Files\Juniper Networks\Common Files\dsNcService.exe
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
C:\WINDOWS\system32\IFXTCS.exe
c:\WINDOWS\system32\ifxspmgt.exe
C:\Program Files\Internet Explorer\Iexplore.exe
\\?\C:\WINDOWS\system32\WBEM\WMIADAP.EXE
C:\WINDOWS\system32\SearchProtocolHost.exe
D:\Documents and Settings\REMOVED\Desktop\dds.scr

============== Pseudo HJT Report ===============

uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
uURLSearchHooks: H - No File
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_03\bin\ssv.dll
BHO: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
BHO: Credential Manager for HP ProtectTools: {df21f1db-80c6-11d3-9483-b03d0ec10000} - c:\program files\hewlett-packard\iam\bin\ItIEAddIn.dll
TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
TB: {8FF5E180-ABDE-46EB-B09E-D2AAB95CABE3} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\da920e52-286e-4770-8803-e2fe1f4414ac.exe
mRun: [LXCJCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\LXCJtime.dll,_RunDLLEntry@16
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRunOnce: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\awc.lnk - c:\program files\awc\AWC.exe
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\blueto~1.lnk - c:\program files\widcomm\bluetooth software\BTTray.exe
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
mPolicies-system: LogonType = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\widcomm\bluetooth software\btsendto_ie_ctx.htm
IE: {c95fe080-8f5d-11d2-a20b-00aa003c157a}
IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: //localhost/main.html

Trusted Zone: intuit.com
Trusted Zone: turbotax.com

DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: Yahoo! Towers 2.0 - hxxp://download2.games.yahoo.com/games/clients/y/ywt0_x.cab

DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1229319819796
DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} - hxxp://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
DPF: {6B75345B-AA36-438A-BBE6-4078B4C6984D} - hxxp://h20270.www2.hp.com/ediags/gmn2/install/HPProductDetection.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1229319811546

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {8BE5651C-D60B-4B59-B5B2-F0EB93733D17} - hxxps://www36.verizon.com/CallAssistant/UnProtected/Voice%20Mail/VCAVMUtil.CAB
DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} - hxxp://lads.myspace.com/upload/MySpaceUploader2.cab

DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

DPF: {E2739AFF-FA40-4527-9A19-DE81795C2C03} - hxxp://moneycentral.msn.com/cabs/ticker.cab


DPF: {FFBB3F3B-0A5A-4106-BE53-DFE1E2340CB1} - hxxp://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.1.6.cab

Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Handler: x-owacid - {0215258f-f0a8-49de-bf1b-0ff02eda8807} - c:\program files\microsoft\outlook web access smime client\mimectl.dll
Notify: avgrsstarter - avgrsstx.dll
Notify: DeviceNP - DeviceNP.dll
Notify: igfxcui - igfxdev.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
Notify: OneCard - c:\program files\hewlett-packard\iam\bin\ASWLNPkg.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll,
LSA: Notification Packages = SbHpNp scecli ASWLNPkg

============= SERVICES / DRIVERS ===============

R0 AvgRkx86;avgrkx86.sys;c:\windows\system32\drivers\avgrkx86.sys [2009-9-2 12552]
R0 prot_2k;prot_2k;c:\windows\system32\drivers\prot_2k.sys [2007-2-6 238496]
R0 pxscan;pxscan;c:\windows\system32\drivers\pxscan.sys --> c:\windows\system32\drivers\pxscan.sys [?]
R0 pxsec;pxsec;c:\windows\system32\drivers\pxsec.sys --> c:\windows\system32\drivers\pxsec.sys [?]
R0 SafeBoot;SafeBoot;c:\windows\system32\drivers\SafeBoot.sys [2007-8-14 101167]
R0 SbAlg;SbAlg;c:\windows\system32\drivers\SbAlg.sys [2006-10-9 44720]
R0 SbFsLock;SbFsLock;c:\windows\system32\drivers\SbFsLock.sys [2007-6-14 13184]
R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-9-2 335240]
R1 AvgMfx86;AVG On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2009-9-2 27784]
R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-9-2 108552]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-7-8 214024]
R1 PersonalSecureDrive;PersonalSecureDrive;c:\windows\system32\drivers\psd.sys [2007-7-24 38816]
R1 RsvLock;RsvLock;c:\windows\system32\drivers\rsvlock.sys [2007-8-14 5840]
R1 SASKUTIL;SASKUTIL;\??\c:\program files\superantispyware\saskutil.sys --> c:\program files\superantispyware\SASKUTIL.sys [?]
R1 SAVRT;SAVRT;c:\program files\symantec antivirus\savrt.sys [2005-8-26 334984]
R2 ASBroker;Logon Session Broker;c:\windows\system32\svchost.exe -k Cognizance [2006-9-12 14336]
R2 ASChannel;Local Communication Channel;c:\windows\system32\svchost.exe -k Cognizance [2006-9-12 14336]
R2 avg8wd;AVG8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2009-9-2 297752]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccEvtMgr.exe [2005-12-21 186016]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSetMgr.exe [2005-12-21 177824]
R2 Pointsec;Pointsec;c:\windows\system32\Prot_srv.exe [2007-2-6 146720]
R2 SAVRTPEL;SAVRTPEL;c:\program files\symantec antivirus\Savrtpel.sys [2005-8-26 53896]
R2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2006-5-27 1757936]
R3 Astdi;Astdi;c:\program files\aventail\connect\asnttdi.sys [2003-12-7 126196]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-8-27 102448]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [2007-1-23 41216]
R3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\85.tmp --> c:\windows\system32\85.tmp [?]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20090901.006\naveng.sys [2009-9-1 84912]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20090901.006\navex15.sys [2009-9-1 1323568]
R3 rismc32;RICOH Smart Card Reader;c:\windows\system32\drivers\rismc32.sys [2007-8-8 47616]
R3 SASENUM;SASENUM;\??\c:\program files\superantispyware\sasenum.sys --> c:\program files\superantispyware\SASENUM.SYS [?]
S0 black;black;c:\windows\system32\drivers\Blackcat.sys [2008-2-13 196978]
S0 Lbd;Lbd;c:\windows\system32\drivers\lbd.sys --> c:\windows\system32\drivers\Lbd.sys [?]

S2 BlackICE;BlackICE;c:\program files\iss\proventia desktop\blackd.exe [2008-2-13 2007382]
S3 Ascrypto;Ascrypto;c:\program files\aventail\connect\ascrypto.sys [2003-12-7 219286]
S3 ccPwdSvc;Symantec Password Validation;c:\program files\common files\symantec shared\ccPwdSvc.exe [2005-12-21 83616]
S3 DAMDrv;DAMDrv;c:\windows\system32\drivers\DAMDrv.sys [2008-2-13 30008]
S3 FLCDLOCK;HP ProtectTools Device Locking / Auditing;c:\windows\system32\flcdlock.exe [2007-6-8 172131]
S3 MakoNT;MakoNT;c:\windows\system32\drivers\MakoNT.sys [2008-2-13 76849]
S3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-9-1 79816]
S3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-9-1 35272]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2009-9-1 34248]
S3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2009-9-1 40552]
S3 rap;rap;c:\windows\system32\drivers\RapDrv.sys [2008-2-13 47697]
S4 HpFkCryptService;Drive Encryption Service;c:\program files\hewlett-packard\drive encryption\HpFkCrypt.exe [2007-9-6 221184]
S4 IgniteService;IgniteService;c:\program files\ignitecds\IgniteService.exe [2008-10-13 86016]
S4 IntuitUpdateService;Intuit Update Service;c:\program files\common files\intuit\update service\IntuitUpdateService.exe [2008-10-10 13088]
S4 Pointsec_start;Pointsec Service Start;c:\windows\system32\pstartSr.exe [2007-2-6 109856]
S4 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2006-5-27 169200]
S4 VPatch;ISS Buffer Overflow Exploit Prevention;c:\program files\iss\proventia desktop\vpatch.exe [2008-2-13 426333]

============== File Associations ===============

regfile=regedit.exe "%1" %*
scrfile="%1" %*

=============== Created Last 30 ================

2009-09-04 00:38 --d----- d:\docume~1\alluse~1\applic~1\Infineon
2009-09-03 22:39 --d----- c:\program files\Sophos
2009-09-03 15:34 61,440 a------- c:\windows\system32\drivers\dghd.sys
2009-09-03 14:41 71 a------- c:\windows\wininit.ini
2009-09-03 13:58 388,608 a------- c:\windows\system32\CF10504.exe
2009-09-03 13:57 388,608 -------- c:\windows\system32\cmd.execf
2009-09-03 13:57 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-03 13:57 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-09-03 12:10 --d----- c:\program files\Lavasoft
2009-09-02 14:22 108,552 a------- c:\windows\system32\drivers\avgtdix.sys
2009-09-02 14:22 12,552 a------- c:\windows\system32\drivers\avgrkx86.sys
2009-09-02 14:22 11,952 a------- c:\windows\system32\avgrsstx.dll
2009-09-02 14:21 335,240 a------- c:\windows\system32\drivers\avgldx86.sys
2009-09-02 14:21 --d----- c:\windows\system32\drivers\Avg
2009-09-02 14:21 --d----- d:\docume~1\alluse~1\applic~1\AVG Security Toolbar
2009-09-02 14:21 --d----- d:\docume~1\alluse~1\applic~1\avg8
2009-09-02 14:21 --d----- c:\program files\AVG
2009-09-02 13:16 --d----- c:\program files\SUPERAntiSpyware
2009-09-02 12:43 --d----- c:\program files\Spybot - Search & Destroy
2009-09-02 00:11 1,614 a------- c:\windows\system32\tmp.reg
2009-09-02 00:07 1,012,736 a------- c:\windows\system32\wscsvc32.exe
2009-09-01 19:10 79,816 a------- c:\windows\system32\drivers\mfeavfk.sys
2009-09-01 19:10 40,552 a------- c:\windows\system32\drivers\mfesmfk.sys
2009-09-01 19:10 35,272 a------- c:\windows\system32\drivers\mfebopk.sys
2009-09-01 19:05 34,248 a------- c:\windows\system32\drivers\mferkdk.sys
2009-09-01 18:05 61,440 a------- c:\windows\system32\drivers\duul.sys
2009-08-28 09:58 --d----- c:\windows\ServicePackFiles

==================== Find3M ====================

2009-08-05 05:11 204,800 a------- c:\windows\system32\mswebdvd.dll
2009-08-05 05:11 204,800 a------- c:\windows\system32\dllcache\mswebdvd.dll
2009-07-19 09:31 3,600,384 -------- c:\windows\system32\dllcache\mshtml.dll
2009-07-19 09:31 6,070,784 -------- c:\windows\system32\dllcache\ieframe.dll
2009-07-17 14:55 58,880 a------- c:\windows\system32\dllcache\atl.dll
2009-07-17 14:55 58,880 a------- c:\windows\system32\atl.dll
2009-07-13 23:43 10,841,088 a------- c:\windows\system32\dllcache\wmp.dll
2009-07-13 23:43 286,208 a------- c:\windows\system32\wmpdxm.dll
2009-07-13 23:43 286,208 a------- c:\windows\system32\dllcache\wmpdxm.dll
2009-07-08 13:44 214,024 a------- c:\windows\system32\drivers\mfehidk.sys
2009-06-29 07:25 70,656 -------- c:\windows\system32\dllcache\ie4uinit.exe
2009-06-29 07:25 13,824 -------- c:\windows\system32\dllcache\ieudinit.exe
2009-06-29 04:33 2,452,872 -------- c:\windows\system32\dllcache\ieapfltr.dat
2009-06-29 03:25 634,632 a------- c:\windows\system32\dllcache\iexplore.exe
2009-06-29 03:23 161,792 -------- c:\windows\system32\dllcache\ieakui.dll
2009-06-16 20:25 119,808 a------- c:\windows\system32\t2embed.dll
2009-06-16 20:25 119,808 a------- c:\windows\system32\dllcache\t2embed.dll
2009-06-16 10:55 82,432 a------- c:\windows\system32\fontsub.dll
2009-06-16 10:55 82,432 a------- c:\windows\system32\dllcache\fontsub.dll
2009-06-10 10:21 84,992 a------- c:\windows\system32\dllcache\avifil32.dll
2009-06-10 10:21 84,992 a------- c:\windows\system32\avifil32.dll
2009-06-09 11:06 1,871,872 a------- c:\windows\system32\mstscax.dll
2009-06-09 11:06 1,871,872 a------- c:\windows\system32\dllcache\mstscax.dll
2008-07-18 11:48 24,576 a------- c:\program files\common files\ACTripsLog.dll
2007-11-02 14:11 45,056 -------- c:\program files\common files\PERIOD20.DLL
2007-11-02 14:11 24,576 -------- c:\program files\common files\ARTES32X.DLL
2006-09-12 15:21 319 a------- c:\program files\VersionMarker.dat
2008-10-01 23:27 88 ---shr-- c:\windows\system32\8386F06F26.sys
2008-10-01 21:56 168 ---shr-- c:\windows\system32\C00B2A55DD.sys
2008-12-07 20:28 6,422 a--sh--- c:\windows\system32\KGyGaAvL.sys

============= FINISH: 1:13:35.81 ===============

Attached Files


Edited by HopefulDude, 04 September 2009 - 12:36 AM.


BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:23 AM

Posted 05 September 2009 - 10:47 AM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 HopefulDude

HopefulDude
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 06 September 2009 - 10:54 AM

Hello,

Thanks a lot for your help. I ran CF (ComboFix) as requested. However, I couldn't get AVG to stop running, and it won't uninstall with the uninstaller. CF warned me of this, but ran anyway. I will go to AVG and try to get it removed while I wait for your reply. let me know if you need me to run it again.

What my machine did:
  • CF ran and warned me of a rootkit. Told me to write down the following.


    - C:\Windows\system32

    • UACdpspqoioyn.sys
    • UACmtoxkkctqr.dll
    • UACgrodvgkkas.dat
    • UACvpenedyaur.dll
    • UACsjklafture.dll

  • CF then rebooted my machine
  • CF then rescanned when the machine booted up
  • It continued to run steps, and notified of me of 2 errors

    • C:\Windows\Temp\Creg.dat is corrupt and unreadable. Run Chkdsk.
    • C:\Windows\Temp is corrupt and unreadable. Run Chkdsk.

  • CF then rebooted the machine
  • CHKDSK automatically ran, and deleted:

    • C:\Windows\Temp\Creg.dat
    • C:\Windows\Temp\C.dat

I am not sure if the machine is clean yet. My iexplorer.exe icon within c:\program files\Internet Explorer\ still automatically comes back after I delete it. Is it supposed to be self-creating? The reason I know this is because I originally started opening an IE window and then going back to the .exe file and set the permissions to deny access to that program so the virus couldn't get it opened. Well, the virus does something to the .exe file after I do this, because I can't right click-it after that, so I have to delete the file, and then it usually respawns about 5 seconds later. If I don't do this the virus will open the iexplorer window, hidden in the background. Sometimes it plays comedy scenes, shrek, or interviews....

Below is the log. Anytime you see the word "REMOVED" I replaced confidential information.

ComboFix 09-09-05.03 - REMOVED 09/06/2009 11:08.1.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.2039.1348 [GMT -4:00]
Running from: d:\documents and settings\REMOVED\Desktop\ComboFix.bat
AV: AVG Anti-Virus *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Proventia Desktop *enabled* {7956B471-0AC0-46A8-B31A-EADCBF7C2C74}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\recycler\S-1-5-21-2830465878-1560760812-1415291305-500
C:\uacinit.dll
c:\windows\Installer\1ecfdc0.msp
c:\windows\system32\404Fix.exe
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\Drivers\duul.sys
c:\windows\system32\drivers\UACdpspqoioyn.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\MabryObj.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\Process.exe
c:\windows\system32\SrchSTS.exe
c:\windows\system32\tmp.reg
c:\windows\system32\UACgrodvgkkas.dat
c:\windows\system32\uacinit.dll
c:\windows\system32\UACmtoxkkctqr.dll
c:\windows\system32\UACpxsxminlxx.dll
c:\windows\system32\UACsjklafture.dll
c:\windows\system32\UACvpenedyaur.dll
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WS2Fix.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_UACd.sys
-------\Legacy_UACd.sys
-------\Legacy_NPF


((((((((((((((((((((((((( Files Created from 2009-08-06 to 2009-09-06 )))))))))))))))))))))))))))))))
.

2009-09-05 16:27 . 2009-09-05 16:32 2048 ----a-w- c:\windows\system32\_loader.exe
2009-09-05 16:00 . 2009-09-05 16:56 -------- d--h--w- C:\$AVG8.VAULT$
2009-09-05 15:50 . 2009-09-05 16:24 -------- d-----w- d:\documents and settings\REMOVED\Application Data\PE Explorer
2009-09-04 16:52 . 2009-09-04 16:53 -------- d-----w- C:\test
2009-09-04 16:48 . 2009-09-04 16:48 -------- d-----w- d:\documents and settings\All Users\Application Data\Malwarebytes
2009-09-04 13:25 . 2009-09-04 13:25 -------- d-----w- d:\documents and settings\All Users\Application Data\iPass
2009-09-04 04:38 . 2009-09-04 04:38 -------- d-----w- d:\documents and settings\All Users\Application Data\Infineon
2009-09-04 04:37 . 2009-09-04 04:37 -------- d-----w- d:\documents and settings\All Users\Application Data\Yahoo!
2009-09-04 02:39 . 2009-09-04 02:39 -------- d-----w- c:\program files\Sophos
2009-09-03 17:57 . 2009-08-03 17:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-03 17:57 . 2009-08-03 17:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-09-03 16:10 . 2009-09-03 18:20 -------- d-----w- c:\program files\Lavasoft
2009-09-02 18:22 . 2009-09-02 18:22 12552 ----a-w- c:\windows\system32\drivers\avgrkx86.sys
2009-09-02 18:22 . 2009-09-02 18:22 11952 ----a-w- c:\windows\system32\avgrsstx.dll
2009-09-02 18:22 . 2009-09-02 18:22 108552 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2009-09-02 18:21 . 2009-09-02 18:21 335240 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2009-09-02 18:21 . 2009-09-02 18:21 27784 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2009-09-02 18:21 . 2009-09-05 15:25 -------- d-----w- c:\windows\system32\drivers\Avg
2009-09-02 18:21 . 2009-09-05 16:54 -------- d-----w- d:\documents and settings\All Users\Application Data\AVG Security Toolbar
2009-09-02 18:21 . 2009-09-03 18:38 -------- d-----w- d:\documents and settings\All Users\Application Data\avg8
2009-09-02 18:21 . 2009-09-02 18:21 -------- d-----w- c:\program files\AVG
2009-09-02 17:16 . 2009-09-03 21:18 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-09-02 16:43 . 2009-09-02 13:06 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-09-02 01:51 . 2009-09-02 01:53 -------- d---a-w- d:\documents and settings\All Users\Application Data\TEMP
2009-09-01 23:13 . 2009-09-02 16:32 -------- d-----w- d:\documents and settings\LocalService\Application Data\SACore
2009-09-01 23:10 . 2009-07-08 17:44 79816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2009-09-01 23:10 . 2009-07-08 17:44 40552 ----a-w- c:\windows\system32\drivers\mfesmfk.sys
2009-09-01 23:10 . 2009-07-08 17:44 35272 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2009-09-01 23:05 . 2009-07-08 17:43 34248 ----a-w- c:\windows\system32\drivers\mferkdk.sys
2009-08-28 13:58 . 2009-08-28 13:58 -------- d-----w- c:\windows\ServicePackFiles

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-09-06 15:24 . 2006-09-14 01:54 -------- d-----w- c:\program files\Symantec AntiVirus
2009-09-03 17:57 . 2008-08-14 15:46 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-09-02 03:48 . 2008-03-03 03:29 -------- d-----w- c:\program files\Common Files\Adobe
2009-09-02 03:45 . 2008-05-19 03:44 -------- d-----w- c:\program files\Windows Media Connect 2
2009-09-02 03:44 . 2008-12-06 04:23 -------- d-----w- c:\program files\Unity
2009-08-31 23:35 . 2008-07-07 02:58 -------- d-----w- c:\program files\Lx_cats
2009-08-29 14:50 . 2008-02-18 17:03 -------- d-----w- c:\program files\Microsoft Silverlight
2009-08-05 09:11 . 2006-09-12 19:50 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-28 15:05 . 2009-07-28 15:05 -------- d-----w- c:\program files\REMOVED
2009-07-17 18:55 . 2006-09-12 19:49 58880 ----a-w- c:\windows\system32\atl.dll
2009-07-14 14:34 . 2008-12-17 03:13 -------- d-----w- c:\program files\Windows Desktop Search
2009-07-14 03:43 . 2006-09-12 19:50 286208 ----a-w- c:\windows\system32\wmpdxm.dll
2009-07-08 17:44 . 2009-07-08 17:44 214024 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2009-06-29 16:23 . 2006-09-12 19:49 828928 ----a-w- c:\windows\system32\wininet.dll
2009-06-29 16:23 . 2006-09-12 19:50 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-06-29 16:23 . 2006-09-12 19:49 17408 ------w- c:\windows\system32\corpol.dll
2009-06-17 00:25 . 2006-09-12 19:50 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-06-16 14:55 . 2006-09-12 19:50 82432 ----a-w- c:\windows\system32\fontsub.dll
2009-06-10 14:21 . 2006-09-12 19:49 84992 ----a-w- c:\windows\system32\avifil32.dll
2009-06-09 15:06 . 2006-09-12 20:01 1871872 ----a-w- c:\windows\system32\mstscax.dll
2008-07-18 15:48 . 2008-12-15 17:41 24576 ----a-w- c:\program files\Common Files\ACTripsLog.dll
2007-11-02 18:11 . 2008-02-13 18:59 45056 ------w- c:\program files\Common Files\PERIOD20.DLL
2007-11-02 18:11 . 2008-02-13 18:59 24576 ------w- c:\program files\Common Files\ARTES32X.DLL
2006-09-12 19:21 . 2006-09-13 19:47 319 ----a-w- c:\program files\VersionMarker.dat
2008-10-02 03:27 . 2008-10-02 03:25 88 --sh--r- c:\windows\system32\8386F06F26.sys
2008-10-02 01:56 . 2008-06-18 20:58 168 --sh--r- c:\windows\system32\C00B2A55DD.sys
2008-12-08 00:28 . 2008-06-18 17:21 6422 --sha-w- c:\windows\system32\KGyGaAvL.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-07-24 1062144]

[HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}]
2009-07-24 13:56 1062144 ----a-w- c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-07-24 1062144]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-07-24 1062144]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\da920e52-286e-4770-8803-e2fe1f4414ac.exe" [2009-08-05 1830128]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LXCJCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\LXCJtime.dll" [2006-11-21 106496]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-09-02 2007832]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-09-06 413696]

c:\windows\system32\config\systemprofile\Start Menu\Programs\Startup\
runpst62.vbs [2006-11-28 693]

d:\documents and settings\REMOVED\Start Menu\Programs\Startup\
FreeWheel.lnk - c:\program files\FreeWheel\FreeWheel.exe [1999-10-28 229376]

d:\documents and settings\All Users\Start Menu\Programs\Startup\
REMOVED Connection.lnk - c:\program files\REMOVED Connection\9341989\Program\REMOVED Connection.exe [2008-10-13 28711]
AWC.lnk - c:\program files\AWC\AWC.exe [2008-2-13 1261568]
Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2007-2-6 561213]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"LogonType"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoWelcomeScreen"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\windowsupdate\au]
"NoAutoUpdate"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\OneCard]
2007-03-14 11:03 74752 ----a-r- c:\program files\Hewlett-Packard\IAM\Bin\ASWLNPkg.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-09-02 18:22 11952 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\DeviceNP]
2007-06-08 14:04 49152 ----a-r- c:\windows\system32\DeviceNP.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\APSHook.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Notification Packages REG_MULTI_SZ SbHpNp scecli ASWLNPkg

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKLM\~\startupfolder\D:^Documents and Settings^All Users^Start Menu^Programs^Startup^REMOVED Connection.lnk]
path=d:\documents and settings\All Users\Start Menu\Programs\Startup\REMOVED Connection.lnk
backup=c:\windows\pss\REMOVED Connection.lnkCommon Startup

[HKLM\~\startupfolder\D:^Documents and Settings^All Users^Start Menu^Programs^Startup^DVD Check.lnk]
path=d:\documents and settings\All Users\Start Menu\Programs\Startup\DVD Check.lnk
backup=c:\windows\pss\DVD Check.lnkCommon Startup

[HKLM\~\startupfolder\D:^Documents and Settings^All Users^Start Menu^Programs^Startup^Proventia Desktop Agent.lnk]
path=d:\documents and settings\All Users\Start Menu\Programs\Startup\Proventia Desktop Agent.lnk
backup=c:\windows\pss\Proventia Desktop Agent.lnkCommon Startup

[HKLM\~\startupfolder\D:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=d:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=c:\windows\pss\Windows Search.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"VPatch"=2 (0x2)
"SavRoam"=3 (0x3)
"RapApp"=2 (0x2)
"ProtexisLicensing"=2 (0x2)
"Pointsec_start"=2 (0x2)
"PCLEPCI"=2 (0x2)
"ose"=3 (0x3)
"Neoteris Setup Service"=2 (0x2)
"MBackMonitor"=3 (0x3)
"LiveUpdate"=3 (0x3)
"IntuitUpdateService"=2 (0x2)
"IgniteService"=3 (0x3)
"idsvc"=3 (0x3)
"IDriverT"=3 (0x3)
"HpFkCryptService"=2 (0x2)
"FLEXnet Licensing Service"=3 (0x3)
"Bonjour Service"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"="0x00000000"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
"DisableUnicastResponsesToMulticastBroadcast"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\REMOVED Connection\\9341989\\Program\\REMOVED Connection.exe"=

R0 AvgRkx86;avgrkx86.sys;c:\windows\system32\drivers\avgrkx86.sys [9/2/2009 2:22 PM 12552]
R0 prot_2k;prot_2k;c:\windows\system32\drivers\prot_2k.sys [2/6/2007 1:48 PM 238496]
R0 SafeBoot;SafeBoot;c:\windows\system32\drivers\SafeBoot.sys [8/14/2007 6:59 PM 101167]
R0 SbAlg;SbAlg;c:\windows\system32\drivers\SbAlg.sys [10/9/2006 2:31 PM 44720]
R0 SbFsLock;SbFsLock;c:\windows\system32\drivers\SbFsLock.sys [6/14/2007 5:22 PM 13184]
R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [9/2/2009 2:21 PM 335240]
R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [9/2/2009 2:22 PM 108552]
R1 PersonalSecureDrive;PersonalSecureDrive;c:\windows\system32\drivers\psd.sys [7/24/2007 9:21 AM 38816]
R1 RsvLock;RsvLock;c:\windows\system32\drivers\rsvlock.sys [8/14/2007 6:59 PM 5840]
R2 ASBroker;Logon Session Broker;c:\windows\System32\svchost.exe -k Cognizance [9/12/2006 3:50 PM 14336]
R2 ASChannel;Local Communication Channel;c:\windows\System32\svchost.exe -k Cognizance [9/12/2006 3:50 PM 14336]
R2 avg8wd;AVG8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [9/2/2009 2:21 PM 297752]
R2 BackWeb Plug-in - 9341989;REMOVED Connection;c:\program files\REMOVED Connection\9341989\Program\ServiceWrapper-9341989.exe [10/13/2008 1:02 PM 28711]
R2 BlackICE;BlackICE;c:\program files\ISS\Proventia Desktop\blackd.exe [2/13/2008 2:57 PM 2007382]
R2 Pointsec;Pointsec;c:\windows\system32\Prot_srv.exe [2/6/2007 1:48 PM 146720]
R3 Astdi;Astdi;c:\program files\Aventail\Connect\asnttdi.sys [12/7/2003 6:15 PM 126196]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [1/23/2007 7:13 PM 41216]
R3 rismc32;RICOH Smart Card Reader;c:\windows\system32\drivers\rismc32.sys [8/8/2007 1:11 PM 47616]
R4 black;black;c:\windows\system32\drivers\Blackcat.sys [2/13/2008 2:57 PM 196978]
S0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys --> c:\windows\system32\DRIVERS\Lbd.sys [?]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys --> c:\program files\SUPERAntiSpyware\SASKUTIL.sys [?]
S3 Ascrypto;Ascrypto;c:\program files\Aventail\Connect\ascrypto.sys [12/7/2003 6:15 PM 219286]
S3 DAMDrv;DAMDrv;c:\windows\system32\drivers\DAMDrv.sys [2/13/2008 7:27 PM 30008]
S3 FLCDLOCK;HP ProtectTools Device Locking / Auditing;c:\windows\system32\flcdlock.exe [6/8/2007 10:06 AM 172131]
S3 MakoNT;MakoNT;c:\windows\system32\drivers\MakoNT.sys [2/13/2008 2:57 PM 76849]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [9/3/2009 1:57 PM 38160]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\85.tmp --> c:\windows\system32\85.tmp [?]
S3 rap;rap;c:\windows\system32\drivers\RapDrv.sys [2/13/2008 2:57 PM 47697]
S3 SASENUM;SASENUM;\??\c:\program files\SUPERAntiSpyware\SASENUM.SYS --> c:\program files\SUPERAntiSpyware\SASENUM.SYS [?]
S4 HpFkCryptService;Drive Encryption Service;c:\program files\Hewlett-Packard\Drive Encryption\HpFkCrypt.exe [9/6/2007 2:26 PM 221184]
S4 IgniteService;IgniteService;c:\program files\IgniteCDS\IgniteService.exe [10/13/2008 1:02 PM 86016]
S4 IntuitUpdateService;Intuit Update Service;c:\program files\Common Files\Intuit\Update Service\IntuitUpdateService.exe [10/10/2008 6:45 AM 13088]
S4 Pointsec_start;Pointsec Service Start;c:\windows\system32\pstartSr.exe [2/6/2007 1:48 PM 109856]
S4 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [5/27/2006 3:06 PM 169200]
S4 VPatch;ISS Buffer Overflow Exploit Prevention;c:\program files\ISS\Proventia Desktop\vpatch.exe [2/13/2008 2:57 PM 426333]

--- Other Services/Drivers In Memory ---

*Deregistered* - EraserUtilDrv10920

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
Cognizance REG_MULTI_SZ ASBroker ASChannel

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{EEBF9CA6-567B-41cd-B5F6-EF2C7FEF37B5}]
rundll32.exe advpack.dll,LaunchINFSection c:\windows\INF\wmactedp.inf,PerUserStub
.
Contents of the 'Scheduled Tasks' folder

2009-09-06 c:\windows\Tasks\User_Feed_Synchronization-{DCE27619-AF71-49F0-B33E-AA3D4A1143B0}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 22:36]
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{8FF5E180-ABDE-46EB-B09E-D2AAB95CABE3} - (no file)
SafeBoot-mcmscsvc
SafeBoot-MCODS


.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: {{c95fe080-8f5d-11d2-a20b-00aa003c157a}
Trusted Zone: //localhost/main.html
Trusted Zone: REMOVED.com
Trusted Zone: intuit.com
Trusted Zone: turbotax.com
Trusted Zone: REMOVED.com
Handler: bwfile-9341989 - {358D3935-0C33-4169-9598-63FAF077328B} - c:\program files\REMOVED Connection\9341989\Program\GAPlugProtocol-9341989.dll
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {5445BE81-B796-11D2-B931-002018654E2E} - hxxps://cim.REMOVED.com/system/web/view/live/messaging/ie/SecMgr.cab
DPF: {8BE5651C-D60B-4B59-B5B2-F0EB93733D17} - hxxps://www36.verizon.com/CallAssistant/UnProtected/Voice%20Mail/VCAVMUtil.CAB
DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} - hxxp://lads.myspace.com/upload/MySpaceUploader2.cab
DPF: {BF17C411-9ADA-4C73-B12C-BD814BDE187F} - hxxps://mylearning.REMOVED.com/REMOVED/core/common/ScheduleServices/ScheduleServices.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-09-06 11:25
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
LXCJCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\LXCJtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\85.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"cd042efbbd7f7af1647644e76e06692b"=hex:c8,28,51,af,b0,29,a3,98,4a,ee,7c,b5,01,
a7,89,37,c8,28,51,af,b0,29,a3,98,a6,0d,d7,e2,7f,15,dc,61,e2,63,26,f1,3f,c8,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"bca643cdc5c2726b20d2ecedcc62c59b"=hex:71,3b,04,66,8b,46,0d,96,bb,50,cf,8a,b3,
bc,93,dd,71,3b,04,66,8b,46,0d,96,72,e6,52,d5,f5,ac,d8,44,6a,9c,d6,61,af,45,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"2c81e34222e8052573023a60d06dd016"=hex:25,da,ec,7e,55,20,c9,26,0c,12,1c,37,1b,
b9,cb,16,25,da,ec,7e,55,20,c9,26,3b,7a,c4,c0,b1,be,f2,50,ff,7c,85,e0,43,d4,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"2582ae41fb52324423be06337561aa48"=hex:3e,1e,9e,e0,57,5a,93,61,00,64,d0,52,17,
fa,ac,99,3e,1e,9e,e0,57,5a,93,61,8a,f3,e0,3a,92,14,81,9c,86,8c,21,01,be,91,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"caaeda5fd7a9ed7697d9686d4b818472"=hex:cd,44,cd,b9,a6,33,6c,cd,8f,86,c0,d8,7c,
b3,c3,8b,cd,44,cd,b9,a6,33,6c,cd,16,fe,b8,10,dd,08,16,4b,f5,1d,4d,73,a8,13,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"a4a1bcf2cc2b8bc3716b74b2b4522f5d"=hex:50,93,e5,ab,ec,6a,4e,ab,a1,3a,7e,f1,f3,
03,36,0d,b0,18,ed,a7,3f,8d,37,a4,9c,6f,2c,e8,d7,4c,ab,84,df,20,58,62,78,6b,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"4d370831d2c43cd13623e232fed27b7b"=hex:fb,a7,78,e6,12,2f,9a,ea,0c,5d,0a,68,d6,
a6,10,d5,31,77,e1,ba,b1,f8,68,02,2b,92,03,3a,cb,87,e6,2e,fb,a7,78,e6,12,2f,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"1d68fe701cdea33e477eb204b76f993d"=hex:aa,52,c6,00,84,3c,26,64,68,aa,73,46,36,
12,04,38,83,6c,56,8b,a0,85,96,ab,d1,52,35,54,a2,d7,7f,6a,01,3a,48,fc,e8,04,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"1fac81b91d8e3c5aa4b0a51804d844a3"=hex:f6,0f,4e,58,98,5b,89,c9,45,67,d7,e6,8b,
df,01,dd,51,fa,6e,91,28,9e,14,cc,10,ca,29,15,72,6d,7c,d4,f6,0f,4e,58,98,5b,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"f5f62a6129303efb32fbe080bb27835b"=hex:37,a4,aa,c3,a6,15,56,0a,6c,e4,9e,f9,3b,
a5,f6,69,b1,cd,45,5a,a8,c4,f8,b9,a6,f7,6f,6f,f9,e8,b5,0e,3d,ce,ea,26,2d,45,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"fd4e2e1a3940b94dceb5a6a021f2e3c6"=hex:e3,0e,66,d5,eb,bc,2f,6b,17,56,85,2b,d4,
0a,41,04,e3,0e,66,d5,eb,bc,2f,6b,5e,92,99,60,17,2e,c4,1d,2a,b7,cc,b5,b9,7f,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32*]
"ThreadingModel"="Apartment"
@="c:\\WINDOWS\\system32\\OLE32.DLL"
"8a8aec57dd6508a385616fbc86791ec2"=hex:fa,ea,66,7f,d4,3b,6b,70,e2,c1,a9,9a,ff,
7d,78,17,fa,ea,66,7f,d4,3b,6b,70,be,f4,b1,69,2a,83,51,51,6c,43,2d,1e,aa,22,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1044)
c:\windows\system32\pssogina.dll
c:\program files\Hewlett-Packard\IAM\bin\ocgina.dll
c:\program files\Hewlett-Packard\IAM\bin\ItMsg.dll
c:\program files\Hewlett-Packard\IAM\bin\HPBrand.dll
c:\program files\Hewlett-Packard\IAM\bin\ItTal.dll
c:\program files\Hewlett-Packard\IAM\bin\ItReports.DLL
c:\program files\Hewlett-Packard\IAM\Bin\ASWLNPkg.dll
c:\program files\Hewlett-Packard\IAM\Bin\TrayIcon.dll
c:\program files\Hewlett-Packard\IAM\Bin\ItDAC.dll
c:\program files\Hewlett-Packard\IAM\Bin\ASChnl.dll
c:\program files\Hewlett-Packard\IAM\Bin\STEngine.dll
c:\program files\Hewlett-Packard\IAM\Bin\ItVCClient.dll
c:\program files\Hewlett-Packard\IAM\Bin\ittalsnap.dll
c:\program files\Hewlett-Packard\IAM\Bin\BioAuth.dll
c:\program files\Hewlett-Packard\IAM\Bin\ASBIoAT.dll
c:\program files\Hewlett-Packard\IAM\Bin\AuthWiz.dll
c:\program files\Hewlett-Packard\IAM\Bin\ItVCard.dll
c:\windows\system32\xenroll.dll
c:\windows\system32\WININET.dll
c:\program files\Hewlett-Packard\IAM\Bin\TpmAuth.dll
c:\windows\system32\IFXTSP.dll
c:\windows\system32\IfxSpArc.dll
c:\windows\system32\IFXTCSps.dll
c:\windows\system32\IFXTPMCP.dll
c:\program files\Hewlett-Packard\Embedded Security Software\IfxTRsUS.dll
c:\program files\Hewlett-Packard\Embedded Security Software\IfxTrsMs.dll
c:\program files\Hewlett-Packard\IAM\Bin\TokenAuth.dll
c:\program files\Hewlett-Packard\IAM\Bin\NetAdmin.dll
c:\windows\system32\DeviceNP.dll

- - - - - - - > 'lsass.exe'(1100)
c:\windows\SbHpNp.dll
c:\program files\Hewlett-Packard\IAM\bin\ASWLNPkg.dll
c:\program files\Hewlett-Packard\IAM\bin\ItMsg.dll

- - - - - - - > 'Explorer.exe'(7976)
c:\windows\system32\WININET.dll
c:\windows\system32\APSHook.dll
c:\windows\system32\btmmhook.dll
c:\program files\Windows Desktop Search\deskbar.dll
c:\program files\Windows Desktop Search\en-us\dbres.dll.mui
c:\program files\Windows Desktop Search\dbres.dll
c:\program files\Windows Desktop Search\wordwheel.dll
c:\program files\Windows Desktop Search\en-us\msnlExtRes.dll.mui
c:\program files\Windows Desktop Search\msnlExtRes.dll
d:\docume~1\REMOVED\LOCALS~1\Temp\frw6.tmp
c:\windows\system32\ieframe.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\btncopy.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
c:\program files\Aventail\Connect\as32svc.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\windows\system32\scardsvr.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Juniper Networks\Common Files\dsNcService.exe
c:\windows\system32\IFXSPMGT.exe
c:\windows\system32\IFXTCS.exe
c:\program files\ipass\ipassconnect\iPassPeriodicUpdateService.exe
c:\progra~1\AVG\AVG8\avgam.exe
c:\windows\system32\lxcjcoms.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
c:\windows\system32\IfxPsdSv.exe
c:\progra~1\AVG\AVG8\avgnsx.exe
c:\progra~1\AVG\AVG8\avgrsx.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\searchindexer.exe
c:\program files\Hewlett-Packard\Shared\hpqwmiex.exe
c:\program files\ipass\ipassconnect\iPassPeriodicUpdateApp.exe
c:\program files\Hewlett-Packard\IAM\Bin\asghost.exe
.
**************************************************************************
.
Completion time: 2009-09-06 11:29 - machine was rebooted
ComboFix-quarantined-files.txt 2009-09-06 15:28

Pre-Run: 11,956,457,472 bytes free
Post-Run: 11,791,499,264 bytes free

420

Edited by HopefulDude, 06 September 2009 - 11:13 AM.


#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:23 AM

Posted 07 September 2009 - 11:19 AM

IE is integrated into Windows so you won't be able to just delete it.

Do you know anything about this file that is set up to start on boot up.

runpst62.vbs


Please visit the online Jotti Virus Scanner
  • Click on Browse button.
  • Navigate to the following file and upload it.


    c:\windows\system32\_loader.exe


  • Click on the Posted Image button.
    The scanner will check the file with various AV companies.
  • Copy and paste the results box into a reply to this thread.

If Jotti's too busy, try here:
Go here: http://www.virustotal.com/en/virustotalf.html


===================



Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 HopefulDude

HopefulDude
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 08 September 2009 - 11:35 AM

Hello,

I am not sure why that file is starting up with the computer. I will do some investigation while I wait for your reply. I successfully removed AVG by the way, just as an FYI.

Here is the permalink from that file you have me scan. Only one of the scanners saw it as a threat. What do you think? Link Here.

Here is the scan from MBAM. Looks like those UAC files won't disapear. However, things do seem to be running smoother, so maybe we just have the root files sticking around?

Malwarebytes' Anti-Malware 1.40
Database version: 2758
Windows 5.1.2600 Service Pack 2

9/8/2009 12:23:58 PM
mbam-log-2009-09-08 (12-23-58).txt

Scan type: Full Scan (C:\|D:\|E:\|)
Objects scanned: 174592
Time elapsed: 44 minute(s), 14 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACsjklafture.dll.vir (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{1901F8C3-AEAB-49E9-A500-A4B7F1C707B8}\RP519\A0245530.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.

#6 HopefulDude

HopefulDude
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 08 September 2009 - 12:22 PM

Hey again,

I noticed that the files that were still infected in the last scan were a quarantined item and a restore point. So I ran the scan again, and it came back completely clean.

Also, the following symptoms have disapeared:
  • IE no longer runs hidden in the background
  • Search engine pages now load properly (Previously when I entered a search term the result was a blank page)
  • IE font is no longer displayed improperly
  • Using search companion to search for window files no longer results in a non-responsive window
  • I can run MBAM through the .exe file. Previously I needed to run it as a .bat file.
Looking good, right? Please let me know if I need to take any further action. Is there another scanner I can run just to be sure?

Below is my recent MBAM log.

Malwarebytes' Anti-Malware 1.40
Database version: 2758
Windows 5.1.2600 Service Pack 2

9/8/2009 1:16:18 PM
mbam-log-2009-09-08 (13-16-18).txt

Scan type: Full Scan (C:\|D:\|E:\|)
Objects scanned: 175068
Time elapsed: 40 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#7 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:23 AM

Posted 08 September 2009 - 02:04 PM

Malwarebytes is usually a pretty good indicator. Although I'm still suspicious of the file that you scanned and I don't know of any legitimate use for it. I would recommend that you just rename that file for now. Just right click, rename it to _loader.exe.vir and that should keep it from causing any trouble. Then if you find out later that it is needed for something you can just rename it back.

If you want to run one more scan to be certain, here's a good one.

Please run a free online scan with the ESET Online Scanner
Note: You will need to use Internet Explorer for this scan
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • When asked, allow the ActiveX control to install
  • Click Start
  • Make sure that the options Remove found threats and the option Scan unwanted applications is checked
  • Click Scan (This scan can take several hours, so please be patient)
  • Once the scan is completed, you may close the window
  • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
  • Copy and paste that log as a reply to this topic

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#8 HopefulDude

HopefulDude
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 08 September 2009 - 03:47 PM

Hey...Thanks for all of your help!!! The virus scanner found two more things in that QooBox folder. Should I delete the contents of that folder?

ESETSmartInstaller@High as CAB hook log:
OnlineScanner.ocx - registred OK
# version=6
# iexplore.exe=7.00.6000.21073 (vista_ldr.090625-2339)
# OnlineScanner.ocx=1.0.0.6050
# api_version=3.0.2
# EOSSerial=90e273e964b72b4c89526b5b2e3f30cc
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2009-09-08 08:43:36
# local_time=2009-09-08 04:43:36 (-0500, Eastern Daylight Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 2
# compatibility_mode=3585 63 50 0 0
# scanned=66010
# found=2
# cleaned=2
# scan_time=3793
C:\Qoobox\Quarantine\C\WINDOWS\system32\UACvpenedyaur.dll.vir Win32/Adware.CoreguardAntivirus application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\UACdpspqoioyn.sys.vir a variant of Win32/Olmarik.HI trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C

#9 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:23 AM

Posted 09 September 2009 - 12:17 PM

That folder contains the quarantined files from Combofix. It will be removed when we remove Combofix. Which as long as everything is running smoothly, we can do right now.



We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :(
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users