Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

can't launch malwarebytes and HJT from safe mode even after rename


  • This topic is locked This topic is locked
8 replies to this topic

#1 Ka1bigan

Ka1bigan

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 08 September 2009 - 09:51 AM

Please help with my malware/virus problem. I have Microsoft Windows xp Pro version 2002 service pack 2 AMD Athlon 64 processor 512 mb of RAM. I was running as resident Antivirus either Avast or Avira. Somehow I picked up an infection unknown to me. It flagged me that I had a virus. After several clicks it rebooted and I could no longer use my antivirus program. I tried to use Avira, AVG, AVAST, MCaffee, and Spybot S&D. It would either not install because of "insufficient user rights" or it would install but would either not run, or run then immediately close, and then it could not be found. I tried Malwarebytes, and Hijackthis. Downloaded it, renamed as "explorer", ran it but would also not run or immediately close. Not enough user rights to run F-secure and housecall. I removed programs adobe/acrobat readers and all java that I could remove. Attached are some old logs that i found. Have not tried to restore from a point. I have should have superuser admin rights on the computer but I can't seem to get it to work. All these things I tried in Safe Mode with network. Task Manager is no longer available in CTrl/alt/del.

Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item.

Thanks in advance

Ka1bigan

AVG 8.5 Anti-Virus command line scanner
Copyright 1992 - 2009 AVG Technologies
Program version 8.0.401, engine 8.0.408
Virus Database: Version 270.13.75/2340 2009-09-01

\\?\globalroot\systemroot\system32\UACgrlmysauvd.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\WINDOWS\system32\svchost.exe (676) Virus found Win32/Cryptor Object was moved to Virus Vault.
\\?\globalroot\systemroot\system32\UACmxxaowykxe.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\Program Files\Internet Explorer\iexplore.exe (1124) Virus found Win32/Cryptor Object was moved to Virus Vault.
\\?\globalroot\systemroot\system32\UACmxxaowykxe.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\Program Files\Internet Explorer\iexplore.exe (1128) Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\blyuwrjl.exe Trojan horse SHeur2.BAGH Object was moved to Virus Vault.
C:\Documents and Settings\MAR\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Documents and Settings\MAR\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Locked file. Not tested.
C:\Documents and Settings\MAR\NTUSER.DAT Locked file. Not tested.
C:\Documents and Settings\MAR\ntuser.dat.LOG Locked file. Not tested.
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Locked file. Not tested.
C:\Documents and Settings\NetworkService\NTUSER.DAT Locked file. Not tested.
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Locked file. Not tested.
C:\pagefile.sys Locked file. Not tested.
C:\Program Files\Alwil Software\Avast4\ashAvast.exe Locked file. Not tested.
C:\Program Files\Alwil Software\Avast4\ashServ.exe Locked file. Not tested.
C:\Program Files\Lavasoft\Ad-Aware SE Plus\Ad-Aware.exe Locked file. Not tested.
C:\RECYCLER\S-1-5-21-1715567821-1060284298-725345543-1003\Dc5.sys Virus found Corrupted Object was moved to Virus Vault.
C:\System Volume Information\ Locked file. Not tested.
C:\WINDOWS\$hf_mig$\KB932168\KB932168\ Locked file. Not tested.

------------------------------------------------------------
Objects scanned : 133015
Found infections : 8
Found PUPs : 0
Healed infections : 8
Healed PUPs : 0
Warnings : 0
------------------------------------------------------------

Attached Files


Edited by Ka1bigan, 08 September 2009 - 10:04 AM.


BC AdBot (Login to Remove)

 


#2 Ka1bigan

Ka1bigan
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 15 September 2009 - 10:21 PM

I'm not sure if I posted in the correct forum or my topic title from before was improper. I posted Sept 8 and no replies so far. I'm itching to try DDS, RSIT, System repair engineer, and rootrepeal. So I'm not sure if where I posted was wrong, my topic title is unclear, or my details of my problems or posting of my logs is lacking or outdated that's why I haven't gotten a response yet. Am I doing something wrong? Any tips on anything would be appreciated. - mark


Sept 8 post of

Topic Title can't launch malwarebytes and HJT from safe mode even after rename

Please help with my malware/virus problem. I have Microsoft Windows xp Pro version 2002 service pack 2 AMD Athlon 64 processor 512 mb of RAM. I was running as resident Antivirus either Avast or Avira. Somehow I picked up an infection unknown to me. It flagged me that I had a virus. After several clicks it rebooted and I could no longer use my antivirus program. I tried to use Avira, AVG, AVAST, MCaffee, and Spybot S&D. It would either not install because of "insufficient user rights" or it would install but would either not run, or run then immediately close, and then it could not be found. I tried Malwarebytes, and Hijackthis. Downloaded it, renamed as "explorer", ran it but would also not run or immediately close. Not enough user rights to run F-secure and housecall. I removed programs adobe/acrobat readers and all java that I could remove. Attached are some old logs that i found. Have not tried to restore from a point. I have should have superuser admin rights on the computer but I can't seem to get it to work. All these things I tried in Safe Mode with network. Task Manager is no longer available in CTrl/alt/del.

Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item.

Thanks in advance

Ka1bigan

AVG 8.5 Anti-Virus command line scanner
Copyright 1992 - 2009 AVG Technologies
Program version 8.0.401, engine 8.0.408
Virus Database: Version 270.13.75/2340 2009-09-01

\\?\globalroot\systemroot\system32\UACgrlmysauvd.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\WINDOWS\system32\svchost.exe (676) Virus found Win32/Cryptor Object was moved to Virus Vault.
\\?\globalroot\systemroot\system32\UACmxxaowykxe.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\Program Files\Internet Explorer\iexplore.exe (1124) Virus found Win32/Cryptor Object was moved to Virus Vault.
\\?\globalroot\systemroot\system32\UACmxxaowykxe.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\Program Files\Internet Explorer\iexplore.exe (1128) Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\blyuwrjl.exe Trojan horse SHeur2.BAGH Object was moved to Virus Vault.
C:\Documents and Settings\MAR\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Documents and Settings\MAR\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Locked file. Not tested.
C:\Documents and Settings\MAR\NTUSER.DAT Locked file. Not tested.
C:\Documents and Settings\MAR\ntuser.dat.LOG Locked file. Not tested.
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Locked file. Not tested.
C:\Documents and Settings\NetworkService\NTUSER.DAT Locked file. Not tested.
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Locked file. Not tested.
C:\pagefile.sys Locked file. Not tested.
C:\Program Files\Alwil Software\Avast4\ashAvast.exe Locked file. Not tested.
C:\Program Files\Alwil Software\Avast4\ashServ.exe Locked file. Not tested.
C:\Program Files\Lavasoft\Ad-Aware SE Plus\Ad-Aware.exe Locked file. Not tested.
C:\RECYCLER\S-1-5-21-1715567821-1060284298-725345543-1003\Dc5.sys Virus found Corrupted Object was moved to Virus Vault.
C:\System Volume Information\ Locked file. Not tested.
C:\WINDOWS\$hf_mig$\KB932168\KB932168\ Locked file. Not tested.

------------------------------------------------------------
Objects scanned : 133015
Found infections : 8
Found PUPs : 0
Healed infections : 8
Healed PUPs : 0
Warnings : 0
------------------------------------------------------------

This post has been edited by Ka1bigan: Sep 8 2009, 11:04 AM
Attached File(s)
Attached File Win32kDiag.txt ( 14.23k ) Number of downloads: 0
Attached File hijackthis.log ( 5.68k ) Number of downloads: 0
Attached File Log.txt ( 1.31k ) Number of downloads: 0[/size][/size][/size]

Edited by Ka1bigan, 15 September 2009 - 11:03 PM.


#3 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:04 PM

Posted 17 September 2009 - 05:53 PM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#4 Ka1bigan

Ka1bigan
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 19 September 2009 - 06:41 AM

Thank you for your reply Sam. And thanks in advance for your help.

So at first I started up in Safe Mode. Then got a message could not run
system32/41.exe
NTVDMCPU has encountered illegal instructions CS:0dcb IP:0111 OP: 6372697074

using Process explorer I killed
iexplore, ctfmon.exe, and PAVRM.exe

I then downloaded combofix from your link, saved as. Tried to run it after download. In Process Explorer (since I can't use Task Manager) I could see it that it should be running. No CPU time was being used by it and iexplore and ctfmon.exe were underneath it. I killed combofix. I downloaded it on another computer, transferred it to this infected one using thumb drive, renamed it as explorer and ran it. It said it needed to be updated so I let it run the update. Even though nothing was on my system tray, it said I was running AVG, avast, and avira (one at a time and I uninstalled each one at every prompt). Combofix continued to run and told me to write down some file names:

c:\windows\system32\drivers\UACdwxnwyapxe.sys
c:\windows\system32\UACjlturspqmb.dll
c:\windows\system32\UACgrlmysauvd.dll
c:\windows\system32\UACpxyddkspvl.dat
c:\windows\system32\UACtuunvvfquo.dll
c:\windows\system32\UACmxxaowykxe.dll

Restarted. I proceeded to safe mode. Combofix went through its cleaning stages.

Restarted again. And then gave me this log file.

Thanks again Mr. Sam


ComboFix 09-09-18.02 - MAR 09/19/2009 7:32.1.1 - NTFSx86 NETWORK
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.511.398 [GMT -4:00]
Running from: c:\vir\explore.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\blyuwrjl.exe
C:\emxtqjit.exe
C:\fyblb.exe
C:\HijackThis.exe
C:\hpbyv.exe
c:\program files\AdvancedVirusRemover
c:\program files\AdvancedVirusRemover\PAVRM.exe
c:\program files\Protection System
c:\program files\Protection System\coreext.dll
c:\program files\Protection System\uninstall.exe
c:\windows\braviax.exe
c:\windows\Downloaded Program Files\webinst.dll
c:\windows\system32\~.exe
c:\windows\system32\41.exe
c:\windows\system32\bizoyuza.dll
c:\windows\system32\braviax.exe
c:\windows\system32\buloreke.exe
c:\windows\system32\config\systemprofile\Desktop\Advanced Virus Remover.lnk
c:\windows\system32\config\systemprofile\Start Menu\Advanced Virus Remover.lnk
c:\windows\system32\Data
c:\windows\system32\drivers\UACdwxnwyapxe.sys
c:\windows\system32\figebasi.dll
c:\windows\system32\hozirave.dll
c:\windows\system32\kefuzego.exe
c:\windows\system32\pewekasi.dll
c:\windows\system32\pihuzura.dll
c:\windows\system32\pozarigo.dll
c:\windows\system32\pupamawe.dll
c:\windows\system32\romezeju.dll
c:\windows\system32\ruweyego.exe
c:\windows\system32\sehuwuri.exe
c:\windows\system32\supiyiha.dll
c:\windows\system32\toyigeru.dll
c:\windows\system32\UACgrlmysauvd.dll
c:\windows\system32\uacinit.dll
c:\windows\system32\UACjlturspqmb.dll
c:\windows\system32\UACmxxaowykxe.dll
c:\windows\system32\UACpxyddkspvl.dat
c:\windows\system32\UACtuunvvfquo.dll
c:\windows\system32\vowayore.dll
c:\windows\system32\vujapede.dll
c:\windows\system32\winhelper.dll
c:\windows\system32\winupdate.exe
c:\windows\system32\wuduluto.dll
c:\windows\system32\wurubawu.dll
c:\windows\system32\yubiyufo.exe

Infected copy of c:\windows\system32\eventlog.dll was found and disinfected
Restored copy from - c:\windows\system32\dllcache\eventlog.dll
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_UACd.sys
-------\Legacy_UACd.sys
-------\Legacy_NWCWORKSTATION
-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226ED}
-------\Service_NWCWorkstation


((((((((((((((((((((((((( Files Created from 2009-08-19 to 2009-09-19 )))))))))))))))))))))))))))))))
.

2009-09-19 11:15 . 2009-09-19 11:16 -------- d-----w- C:\explore
2009-09-10 05:24 . 2009-09-10 05:24 88064 --sha-w- c:\windows\system32\leyoyoji.dll
2009-09-08 12:52 . 2009-09-08 14:56 -------- d-----w- c:\program files\explore
2009-09-06 01:30 . 2009-09-08 01:51 -------- d-----w- c:\program files\salb4
2009-09-06 00:02 . 2009-09-06 00:02 24490 --sha-w- c:\windows\system32\fevahiva.exe
2009-09-03 20:48 . 2009-09-08 01:52 -------- d-----w- c:\program files\salb3
2009-09-03 20:39 . 2009-09-03 20:45 -------- d--h--w- c:\windows\PIF
2009-09-03 20:09 . 2009-09-03 20:44 -------- d-----w- c:\program files\salb2
2009-09-03 18:51 . 2009-09-03 18:51 -------- d-----w- c:\documents and settings\MAR\Application Data\Malwarebytes
2009-09-03 18:31 . 2009-09-03 20:46 -------- d-----w- c:\program files\salb
2009-09-03 14:57 . 2009-07-28 20:33 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2009-09-03 14:51 . 2009-09-03 14:51 0 ----a-w- c:\documents and settings\MAR\settings.dat
2009-09-03 14:45 . 2009-09-09 06:17 -------- d-----w- c:\program files\salbahe2
2009-09-03 14:25 . 2009-09-03 14:25 -------- d-----w- c:\documents and settings\MAR\.housecall6.6
2009-09-03 14:19 . 2009-09-03 14:26 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-09-03 14:19 . 2009-09-03 14:19 -------- d-----w- c:\windows\Sun
2009-09-03 14:19 . 2009-09-03 14:19 153104 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2009-09-03 14:19 . 2009-09-03 14:19 -------- d-----w- c:\documents and settings\MAR\log
2009-09-02 17:57 . 2009-09-02 17:57 -------- d-----w- c:\documents and settings\MAR\Local Settings\Application Data\Symantec
2009-09-02 17:54 . 2009-09-02 18:24 -------- d-----w- c:\program files\Symantec
2009-09-02 17:54 . 2009-09-02 18:24 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-09-02 17:54 . 2009-09-02 18:24 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-09-02 17:37 . 2009-09-02 17:37 -------- d--h--w- c:\windows\system32\GroupPolicy
2009-09-02 16:52 . 2009-09-02 16:52 -------- d-----w- c:\documents and settings\All Users\Application Data\F-Secure
2009-09-02 16:25 . 2009-09-06 01:44 -------- d-----w- c:\documents and settings\All Users\Application Data\11986874
2009-09-02 15:18 . 2009-09-09 06:29 -------- d-----w- c:\program files\Trend Micro
2009-09-02 01:56 . 2009-09-02 01:56 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-09-02 01:56 . 2009-09-02 01:57 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-09-02 01:54 . 2009-09-19 11:16 -------- d-----w- C:\vir
2009-08-31 06:50 . 2009-08-31 06:47 3942048 ----a-w- C:\mbam-setup.exe
2009-08-29 02:15 . 2009-08-31 04:26 -------- d-----w- c:\documents and settings\MAR\Application Data\LimeWire
2009-08-29 01:53 . 2009-08-29 01:53 410984 ----a-w- c:\windows\system32\deploytk.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-09-19 11:02 . 2009-06-19 11:01 50176 --sha-w- c:\windows\system32\nepusenu.dll
2009-09-19 11:01 . 2009-06-19 11:01 88064 --sha-w- c:\windows\system32\gidohanu.dll
2009-09-08 12:49 . 2009-06-08 12:49 50176 --sha-w- c:\windows\system32\garazuha.dll
2009-09-06 01:28 . 2007-02-02 18:05 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-09-06 00:02 . 2009-06-06 00:02 831524 --sha-w- c:\windows\system32\dobokehi.exe
2009-09-06 00:02 . 2009-06-06 00:02 88064 --sha-w- c:\windows\system32\hivezuto.dll
2009-09-03 20:42 . 2008-01-29 01:01 -------- d-----w- c:\program files\Google
2009-09-03 18:39 . 2007-02-01 02:26 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-09-03 14:45 . 2009-06-03 14:45 88576 --sha-w- c:\windows\system32\mepepivu.dll
2009-09-03 14:31 . 2008-01-29 01:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2009-09-02 16:26 . 2008-01-29 01:01 -------- d-----w- c:\documents and settings\MAR\Application Data\Skype
2009-09-02 16:25 . 2008-01-29 01:15 -------- d-----w- c:\documents and settings\MAR\Application Data\skypePM
2009-09-02 16:24 . 2009-06-02 16:24 830500 --sha-w- c:\windows\system32\zofitemi.exe
2009-09-02 16:01 . 2008-01-21 21:08 -------- d-----w- c:\program files\Alwil Software
2009-09-02 03:11 . 2007-08-20 20:03 -------- d-----w- c:\program files\Yahoo!
2009-09-02 03:11 . 2007-08-20 20:11 -------- d-----w- c:\documents and settings\MAR\Application Data\Yahoo!
2009-09-02 03:11 . 2007-08-20 20:04 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2009-09-02 02:07 . 2009-06-02 02:07 49152 --sha-w- c:\windows\system32\mowukiwe.dll
2009-09-02 02:07 . 2009-06-02 02:07 831012 --sha-w- c:\windows\system32\vidajadu.exe
2009-09-02 01:59 . 2007-08-16 02:06 -------- d-----w- c:\program files\Lx_cats
2009-08-31 04:33 . 2009-05-31 04:32 831012 --sha-w- c:\windows\system32\puvogafi.exe
2009-08-31 04:32 . 2009-08-05 04:48 -------- d-----w- c:\documents and settings\MAR\Application Data\Azureus
2009-08-06 14:16 . 2009-08-05 12:34 -------- d-----w- c:\program files\hp deskjet 970c series
2009-08-05 12:34 . 2009-08-05 12:34 -------- d-----w- c:\program files\Hewlett-Packard
2009-08-05 09:11 . 2004-08-04 12:00 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-08-05 04:48 . 2009-08-05 04:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Azureus
2009-08-05 04:48 . 2009-08-05 04:48 -------- d-----w- c:\program files\Vuze
2009-08-05 04:48 . 2009-08-05 04:48 -------- d-----w- c:\program files\Common Files\i4j_jres
2009-08-05 04:48 . 2009-08-05 04:48 -------- d-----w- c:\program files\AskBarDis
2009-08-03 21:25 . 2007-02-02 14:46 18872 ----a-w- c:\documents and settings\MAR\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-08-03 20:23 . 2007-02-05 01:59 -------- d-----w- c:\program files\LogMeIn
2009-07-29 04:53 . 2004-08-04 12:00 82432 ----a-w- c:\windows\system32\fontsub.dll
2009-07-29 04:53 . 2004-08-04 12:00 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-07-17 18:55 . 2004-08-04 12:00 58880 ----a-w- c:\windows\system32\atl.dll
2009-07-13 14:08 . 2004-08-04 12:00 286720 ----a-w- c:\windows\system32\wmpdxm.dll
2009-06-29 16:12 . 2004-08-04 12:00 827392 ----a-w- c:\windows\system32\wininet.dll
2009-06-29 16:12 . 2004-08-04 12:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-06-29 16:12 . 2004-08-04 12:00 17408 ----a-w- c:\windows\system32\corpol.dll
2009-06-25 18:36 . 2004-08-04 12:00 95744 ----a-w- c:\windows\system32\mqsec.dll
2009-06-25 18:36 . 2004-08-04 12:00 661504 ----a-w- c:\windows\system32\mqqm.dll
2009-06-25 18:36 . 2004-08-04 12:00 517120 ----a-w- c:\windows\system32\mqsnap.dll
2009-06-25 18:36 . 2004-08-04 12:00 48640 ----a-w- c:\windows\system32\mqupgrd.dll
2009-06-25 18:36 . 2004-08-04 12:00 471552 ----a-w- c:\windows\system32\mqutil.dll
2009-06-25 18:36 . 2004-08-04 12:00 47104 ----a-w- c:\windows\system32\mqdscli.dll
2009-06-25 18:36 . 2004-08-04 12:00 225280 ----a-w- c:\windows\system32\mqoa.dll
2009-06-25 18:36 . 2004-08-04 12:00 186880 ----a-w- c:\windows\system32\mqtrig.dll
2009-06-25 18:36 . 2004-08-04 12:00 177152 ----a-w- c:\windows\system32\mqrt.dll
2009-06-25 18:36 . 2004-08-04 12:00 16896 ----a-w- c:\windows\system32\mqise.dll
2009-06-25 18:36 . 2004-08-04 12:00 138240 ----a-w- c:\windows\system32\mqad.dll
2009-06-25 18:36 . 2004-08-04 12:00 123392 ----a-w- c:\windows\system32\mqrtdep.dll
2009-06-22 11:49 . 2004-08-04 12:00 19968 ----a-w- c:\windows\system32\mqbkup.exe
2009-06-22 11:49 . 2004-08-04 12:00 117248 ----a-w- c:\windows\system32\mqtgsvc.exe
2009-06-22 11:49 . 2004-08-04 12:00 4608 ----a-w- c:\windows\system32\mqsvc.exe
2009-06-22 11:48 . 2004-08-04 12:00 91776 ----a-w- c:\windows\system32\drivers\mqac.sys
2009-06-02 02:07 . 2009-06-02 02:07 49152 --sha-w- c:\windows\system32\huvehibi.dll.tmp
2009-06-19 11:02 . 2009-06-19 11:02 50176 --sha-w- c:\windows\system32\notugaji.dll
2009-06-02 02:07 . 2009-06-02 02:07 49152 --sha-w- c:\windows\system32\sekapehu.dll.tmp
2009-06-02 02:07 . 2009-06-02 02:07 49152 --sha-w- c:\windows\system32\vabejodu.dll.tmp
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8368391a-ecce-4d26-ae83-34afadf8f3b1}]
2009-06-19 11:02 50176 --sha-w- c:\windows\system32\notugaji.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{3041d03e-fd4b-44e0-b742-2d9b88305f98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2009-04-02 333192]

[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{3041D03E-FD4B-44E0-B742-2D9B88305F98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2009-04-02 333192]

[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]
"MSConfig"="c:\windows\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2004-08-04 158208]
"LXBTCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\LXBTtime.dll" [2004-03-17 65536]
"lumikafib"="c:\windows\system32\gidohanu.dll" [2009-09-19 88064]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoSetActiveDesktop"= 1 (0x1)
"NoActiveDesktopChanges"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\SharedTaskScheduler]
"{bc3d6e54-236e-4b00-be70-3e34395124a5}"= "c:\windows\system32\gidohanu.dll" [2009-09-19 88064]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"nitolojet"= {bc3d6e54-236e-4b00-be70-3e34395124a5} - c:\windows\system32\gidohanu.dll [2009-09-19 88064]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2007-05-25 19:22 63040 ----a-w- c:\windows\system32\LMIinit.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Authentication Packages REG_MULTI_SZ msv1_0 nwprovau relog_ap

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^MiniEYE-MiniREAD Launch.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\MiniEYE-MiniREAD Launch.lnk
backup=c:\windows\pss\MiniEYE-MiniREAD Launch.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"mnmsrvc"=3 (0x3)
"LiveUpdate"=3 (0x3)
"gusvc"=2 (0x2)
"gupdate1c985898c755423"=2 (0x2)
"ASKUpgrade"=2 (0x2)
"ASKService"=2 (0x2)
"AcrSch2Svc"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Acronis\\TrueImageEchoWorkstation\\TrueImage.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Documents and Settings\\MAR\\Application Data\\mjusbsp\\magicJack.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\taskmgr.exe"=
"c:\\WINDOWS\\system32\\verclsid.exe"=
"c:\\vir\\winlogon9.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:*:Disabled:@xpsp2res.dll,-22009

R0 m5289;m5289;c:\windows\system32\drivers\m5289.sys [1/31/2007 10:30 PM 52480]
R0 uliagpkx;ULi AGP Bus Filter Driver;c:\windows\system32\drivers\AGPKX.SYS [1/31/2007 10:26 PM 45056]
R3 A3AB;D-Link AirPro 802.11a/b Wireless Adapter Service(A3AB);c:\windows\system32\drivers\A3AB.sys [3/12/2004 9:38 PM 450400]
R3 ULI5261XP;ULi M526X Ethernet NT Driver;c:\windows\system32\drivers\ULILAN51.SYS [1/31/2007 10:29 PM 28672]
S2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [8/14/2007 9:59 PM 12992]
S2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [8/14/2007 9:59 PM 46112]
S3 F-Secure Standalone Minifilter;F-Secure Standalone Minifilter;\??\c:\docume~1\MAR\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys --> c:\docume~1\MAR\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys [?]
S4 ASKService;ASKService;c:\program files\AskBarDis\bar\bin\AskService.exe [8/5/2009 12:48 AM 464264]
S4 ASKUpgrade;ASKUpgrade;c:\program files\AskBarDis\bar\bin\ASKUpgrade.exe [8/5/2009 12:48 AM 234888]
S4 gupdate1c985898c755423;Google Update Service (gupdate1c985898c755423);c:\program files\Google\Update\GoogleUpdate.exe [2/2/2009 6:56 PM 133104]
S4 LMIRfsClientNP;LMIRfsClientNP; [x]
.
Contents of the 'Scheduled Tasks' folder

2009-08-14 c:\windows\Tasks\1-Click Maintenance.job
- c:\program files\TuneUp Utilities 2006\SystemOptimizer.exe [2005-09-22 03:35]

2009-09-06 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-02 22:56]

2009-09-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-02 22:56]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://housecall.trendmicro.com/
mStart Page = hxxp://www.google.com
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
IE: &AOL Toolbar Search - c:\program files\aol\aol toolbar 4.0\resources\en-US\local\search.html
Trusted Zone: ameritrade.com\wwws
Trusted Zone: tdameritrade.com\www
TCP: {0FBE0ADE-FF8A-4B74-B235-B912F353B5B7} = 192.168.2.1
TCP: {FADF55AD-F155-4AAB-854B-C93BB0BFCBF6} = 192.168.2.1
DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} - hxxps://fhowa.floridahospital.org/webinstall/webinst_vista/webinst.cab
.
- - - - ORPHANS REMOVED - - - -

Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
HKLM-Run-11986874 - c:\documents and settings\All Users\Application Data\11986874\11986874.exe
HKLM-Run-danavijopi - toyigeru.dll
HKU-Default-Run-Advanced Virus Remover - c:\program files\AdvancedVirusRemover\PAVRM.exe
AddRemove-HijackThis - c:\program files\Trend Micro\hjt\HijackThis.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-09-19 07:36
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
LXBTCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\LXBTtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\ANI\ANIWZCS2 Service\Parameters\Interfaces\ *;*]
"CurrentGroup"="Group#00"
"ControlFlags"=dword:00000003
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(772)
c:\windows\system32\LMIinit.dll

- - - - - - - > 'lsass.exe'(828)
c:\windows\system32\relog_ap.dll

- - - - - - - > 'explorer.exe'(1620)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\gidohanu.dll
.
Completion time: 2009-09-19 7:38 - machine was rebooted
ComboFix-quarantined-files.txt 2009-09-19 11:38

Pre-Run: 7,633,711,104 bytes free
Post-Run: 8,311,840,768 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

299 --- E O F --- 2009-08-27 06:29

Attached Files


Edited by Buckeye_Sam, 19 September 2009 - 04:46 PM.


#5 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:04 PM

Posted 19 September 2009 - 04:48 PM

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.


====================


Please run a free online scan with the ESET Online Scanner
Note: You will need to use Internet Explorer for this scan
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • When asked, allow the ActiveX control to install
  • Click Start
  • Make sure that the options Remove found threats and the option Scan unwanted applications is checked
  • Click Scan (This scan can take several hours, so please be patient)
  • Once the scan is completed, you may close the window
  • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
  • Copy and paste that log as a reply to this topic

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#6 Ka1bigan

Ka1bigan
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 20 September 2009 - 07:27 PM

thanks again mr. sam,

i feel like i'm finally doing something and getting somewhere.

Attached Files



#7 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:04 PM

Posted 21 September 2009 - 04:33 PM

The logs from Malwarebytes show "no action taken". I just want to confirm that you did have it remove everything that it found.

Please run Combofix once again and post the resulting log.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#8 Ka1bigan

Ka1bigan
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 22 September 2009 - 09:50 PM

Thanks again,

I thought I was clean already so I ran Housecall, installed Avira Antivir for guard resident protection, installed AVG and avast Customized to not use the resident protection, and thinking of installing bit defender and zone alarm for more protection, possibly spybot s&D for teatimer? Thanks again Mr. Sam.

Attached Files



#9 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:01:04 PM

Posted 23 September 2009 - 07:48 AM

Oh no! You are asking for trouble if you run more than one antivirus on this computer. Even with resident protection disabled you will be unnecessarily bogging down your computer with those resource heavy applications. Never run more than one antivirus!

You can however layer in other protective programs such as Spybot, Malwarebytes, and Superantispyware. Use only the real time protection from one of those, preferably Teatimer from Spybot, and just run the others manually after updating on a regular basis. Follow the other steps that I posted below and you'll be much more protected and your computer will run smoothly.


Run an online scan at Secunia Online Software Inspector
  • Click on the red button at the bottom of the screen that says Start Scanner.
  • Follow the prompts to install the scanning software.
  • Do not check the box for Enable thorough system inspection
  • Click the Start button.
  • The program will scan your system and identify insecure versions of software and missing security updates.
  • Using the links provided in the scan, download and install any current and secure versions that are needed.


====================


We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :(
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users