Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Services and Controller app - status code 1073741819


  • This topic is locked This topic is locked
26 replies to this topic

#1 carlfuffel

carlfuffel

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 22 September 2009 - 10:22 AM

Hope the experts in this forum can help me with this very persistent and irritating problem that i've been having with my Windows XP OS.

- So, a dialogue box pops up saying ' to help protect your computer, Windows has closed this program.
name : Services and controller app'

- When you click 'close' a furthur dialogue box appears which says that Services.exe has terminated unexpectedly Status code 1073741819

- Then a furthur dialogue box appears and a 60 sec countdown begins which restarts the computer.

Can anyone please help me? This occurs everytime the computer restarts and i can't get any work done.

This is my Hijackthis log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:46:27, on 22/09/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\DesktopAuthority\DaMaint.exe
C:\Program Files\DesktopAuthority\DesktopAuthority.exe
C:\Program Files\System Center Operations Manager 2007\HealthService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
c:\windows\system32\slclient.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\WINDOWS\TEMP\RJCCBD.EXE
C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
C:\WINDOWS\system32\slagent.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\dumprep.exe
C:\WINDOWS\system32\rundll32.exe
C:\DOCUME~1\MMCLOU~1.CED\LOCALS~1\Temp\miniagent.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.cedar-foundation.org/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.cedar-foundation.org/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Novosco
O1 - Hosts: 82.98.231.89 url.adtrgt.com
O1 - Hosts: 82.98.231.89 googleads2.gdoubleclick.net
O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\en-us\msntb.dll
O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\en-us\msntb.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
O4 - HKLM\..\Run: [systray] C:\windows\mstre8.exe
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [Regedit32] C:\WINDOWS\system32\regedit.exe
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [TSClientMSIUninstaller] cmd.exe /C "cscript %systemroot%\Installer\TSClientMsiTrans\tscuinst.vbs" (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [TSClientMSIUninstaller] cmd.exe /C "cscript %systemroot%\Installer\TSClientMsiTrans\tscuinst.vbs" (User 'Default user')
O4 - Startup: miniagent.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: EPSON Status Monitor 3 Environment Check(3).lnk = C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV03.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\npjpi160_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\npjpi160_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.cedar-foundation.org/
O15 - Trusted Zone: http://*.mcafee.com (HKLM)
O15 - Trusted Zone: http://betavscan.mcafeeasap.com (HKLM)
O15 - Trusted Zone: http://vs.mcafeeasap.com (HKLM)
O15 - Trusted Zone: http://www.mcafeeasap.com (HKLM)
O15 - ESC Trusted Zone: http://*.mcafee.com (HKLM)
O15 - ESC Trusted Zone: http://betavscan.mcafeeasap.com (HKLM)
O15 - ESC Trusted Zone: http://vs.mcafeeasap.com (HKLM)
O15 - ESC Trusted Zone: http://www.mcafeeasap.com (HKLM)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1233758884970
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = cedar.local
O17 - HKLM\Software\..\Telephony: DomainName = cedar.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = cedar.local
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = cedar.local
O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: Desktop Authority Maintenance Service (DAMaint) - ScriptLogic Corporation - C:\Program Files\DesktopAuthority\DaMaint.exe
O23 - Service: Desktop Authority Service (DesktopAuthority) - ScriptLogic Corporation - C:\Program Files\DesktopAuthority\DesktopAuthority.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
O23 - Service: ScriptLogic Service (SLClient) - ScriptLogic Software Corporation - c:\windows\system32\slclient.exe
O23 - Service: OfficeScan NT Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
O23 - Service: OfficeScan NT Proxy Service (TmProxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\TmProxy.exe

--
End of file - 6599 bytes

BC AdBot (Login to Remove)

 


#2 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:50 PM

Posted 08 October 2009 - 04:00 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#3 carlfuffel

carlfuffel
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 14 October 2009 - 03:00 AM

Here you are with the requested DDS Log. Thank you.

DDS (Ver_09-10-13.01) - NTFSx86
Run by mmcloughlin at 8:58:19.77 on 14/10/2009
Internet Explorer: 6.0.2900.5512
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.510.189 [GMT 1:00]

AV: Trend Micro OfficeScan Antivirus *On-access scanning enabled* (Updated) {9ABC4B10-5592-4FAD-A2C8-27A3055654C4}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\DesktopAuthority\DaMaint.exe
C:\Program Files\DesktopAuthority\DesktopAuthority.exe
C:\Program Files\System Center Operations Manager 2007\HealthService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
c:\windows\system32\slclient.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\WINDOWS\TEMP\FND3AE.EXE
C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
C:\WINDOWS\system32\slagent.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\dumprep.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\WINDOWS\system32\rundll32.exe
C:\DOCUME~1\MMCLOU~1.CED\LOCALS~1\Temp\miniagent.exe
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\mmcloughlin.CEDAR\My Documents\Downloads\dds.scr

============== Pseudo HJT Report ===============

uWindow Title = Microsoft Internet Explorer provided by Novosco
uStart Page = hxxp://www.cedar-foundation.org/
uSearch Bar = hxxp://www.google.com/
mDefault_Page_URL = hxxp://www.cedar-foundation.org/
mDefault_Search_URL = hxxp://www.google.com/ie
mSearch Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = <local>
mSearchAssistant = hxxp://www.google.com
BHO: MSNToolBandBHO: {bdbd1dad-c946-4a17-adc1-64b5b4ff55d0} - c:\program files\msn apps\msn toolbar\msn toolbar\01.02.5000.1021\en-us\msntb.dll
TB: MSN: {bdad1dad-c946-4a17-adc1-64b5b4ff55d0} - c:\program files\msn apps\msn toolbar\msn toolbar\01.02.5000.1021\en-us\msntb.dll
uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
uRun: [Google Update] "c:\documents and settings\mmcloughlin.cedar\local settings\application data\google\update\GoogleUpdate.exe" /c
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
mRun: [systray] c:\windows\mstre8.exe
mRun: [OfficeScanNT Monitor] "c:\program files\trend micro\officescan client\pccntmon.exe" -HideWindow
mRun: [Regedit32] c:\windows\system32\regedit.exe
mRun: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
dRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
dRun: [A00F379484.exe] c:\windows\temp\_A00F379484.exe
dRunOnce: [TSClientMSIUninstaller] cmd.exe /C "cscript %systemroot%\Installer\TSClientMsiTrans\tscuinst.vbs"
dRunOnce: [TSClientAXDisabler] cmd.exe /C "%systemroot%\Installer\TSClientMsiTrans\tscdsbl.bat"
dRunOnce: [RunNarrator] Narrator.exe
StartupFolder: c:\documents and settings\mmcloughlin.cedar\start menu\programs\startup\miniagent.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\epsons~1.lnk - c:\windows\system32\spool\drivers\w32x86\3\E_SRCV03.EXE
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_05\bin\npjpi160_05.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: //about.htm/
Trusted Zone: //Exclude.htm/
Trusted Zone: //LanguageSelection.htm/
Trusted Zone: //Message.htm/
Trusted Zone: //MyAgttryCmd.htm/
Trusted Zone: //MyAgttryNag.htm/
Trusted Zone: //MyNotification.htm/
Trusted Zone: //NOCLessUpdate.htm/
Trusted Zone: //quarantine.htm/
Trusted Zone: //ScanNow.htm/
Trusted Zone: //strings.vbs/
Trusted Zone: //Template.htm/
Trusted Zone: //Update.htm/
Trusted Zone: //VirFound.htm/
Trusted Zone: mcafee.com\*
Trusted Zone: mcafeeasap.com\betavscan
Trusted Zone: mcafeeasap.com\vs
Trusted Zone: mcafeeasap.com\www
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1233758884970
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program files\belarc\advisor\system\BAVoilaX.dll
Notify: igfxcui - igfxsrvc.dll
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, digiwet.dll

============= SERVICES / DRIVERS ===============

R2 DAInfo;Desktop Authority Kernel Information Provider;c:\program files\desktopauthority\DAInfo.sys [2007-11-12 12080]
R2 DAMaint;Desktop Authority Maintenance Service;c:\program files\desktopauthority\DaMaint.exe [2007-6-4 63408]
R2 DAtf;Desktop Authority Token Factory;c:\program files\desktopauthority\DAtf.sys [2007-6-4 11184]
R2 DesktopAuthority;Desktop Authority Service;c:\program files\desktopauthority\DesktopAuthority.exe [2007-6-4 1308592]
R2 HealthService;OpsMgr Health Service;c:\program files\system center operations manager 2007\HealthService.exe [2007-3-17 24968]
R2 SLClient;ScriptLogic Service;c:\windows\system32\slClient.exe [2006-5-11 556960]
R2 tmfilter;Trend Micro Filter;c:\program files\trend micro\officescan client\TmXpflt.sys [2008-11-26 225296]
R2 tmprefilter;Trend Micro PreFilter;c:\program files\trend micro\officescan client\TmPreflt.sys [2008-11-26 36368]
R3 DAmirr;DAmirr;c:\windows\system32\drivers\DAmirr.sys [2007-6-4 9264]
S1 1b682085;1b682085;c:\windows\system32\drivers\1b682085.sys [2009-5-26 0]
S1 4a9632f2;4a9632f2;c:\windows\system32\drivers\4a9632f2.sys [2009-5-14 0]
S1 4f48ea00;4f48ea00;c:\windows\system32\drivers\4f48ea00.sys [2009-5-19 0]
S3 TmProxy;OfficeScan NT Proxy Service;c:\program files\trend micro\officescan client\TmProxy.exe [2009-5-8 652552]
S4 AdtAgent;Operations Manager Audit Forwarding Service;c:\windows\system32\AdtAgent.exe [2007-3-16 262656]
S4 MDMose;Machine Debug Manager MDMose; [x]

=============== Created Last 30 ================

2009-09-22 15:12 <DIR> --d----- c:\documents and settings\mmcloughlin.cedar\DoctorWeb
2009-09-21 14:17 <DIR> --d----- c:\docume~1\mmclou~1.ced\applic~1\Malwarebytes
2009-09-17 09:05 <DIR> --d----- c:\docume~1\mmclou~1.ced\applic~1\Xerox
2009-09-17 09:04 <DIR> --ds---- c:\documents and settings\mmcloughlin.cedar\UserData
2009-09-17 09:04 <DIR> --d----- c:\documents and settings\mmcloughlin.CEDAR

==================== Find3M ====================

2009-09-23 08:47 94,432 a------- c:\windows\system32\drivers\agp440.sys
2009-08-04 15:45 10,752 a------- c:\windows\DCEBoot.exe
2009-07-24 11:44 19,268 a------- c:\windows\pobunedyd.scr
2009-07-24 11:44 19,156 a------- c:\program files\common files\ejeduk.ban
2009-07-24 11:44 18,923 a------- c:\windows\system32\unenito.com
2009-07-24 11:44 18,033 a------- c:\windows\system32\fikypocyjo.com
2009-07-24 11:44 17,616 a------- c:\windows\akedy.dat
2009-07-24 11:44 12,765 a------- c:\program files\common files\mijuj.inf
2009-07-24 11:44 12,758 a------- c:\windows\xyjutim.vbs
2009-07-24 11:44 12,031 a------- c:\windows\system32\bilenu.dat
2009-07-22 10:10 80,384 a--sh--- c:\windows\system32\natojuza.dll
2009-06-08 09:37 82,432 a--sh--- c:\windows\system32\bokuwavi.dll
2009-05-27 13:02 50,176 a--sh--- c:\windows\system32\derabuji.dll
2009-06-18 13:49 81,920 a--sh--- c:\windows\system32\divosewo.dll
2009-06-15 09:24 81,408 a--sh--- c:\windows\system32\gezonawo.dll
2009-07-01 09:49 83,968 a--sh--- c:\windows\system32\gudosaho.dll
2009-06-24 12:36 81,920 a--sh--- c:\windows\system32\javavuso.dll
2009-07-02 09:38 84,480 a--sh--- c:\windows\system32\jegohami.dll
2009-07-03 12:11 84,480 a--sh--- c:\windows\system32\jetebemi.dll
2009-06-17 10:29 80,896 a--sh--- c:\windows\system32\miluduri.dll
2009-05-05 11:55 81,920 a--sh--- c:\windows\system32\nigokeyo.dll
2009-05-05 11:55 52,224 a--sh--- c:\windows\system32\nomadefe.exe
2009-06-12 10:34 48,640 a--sh--- c:\windows\system32\numisufe.dll
2009-05-18 15:43 2,098 ---sh--- c:\windows\system32\pabevajo.exe
2009-06-09 14:23 80,896 a--sh--- c:\windows\system32\pamuzuwa.dll
2009-06-16 09:15 81,920 a--sh--- c:\windows\system32\pobojohe.dll
2009-05-11 16:25 2,098 ---sh--- c:\windows\system32\risowupa.exe
2009-06-10 12:40 81,408 a--sh--- c:\windows\system32\rugalilu.dll
2009-05-27 13:01 81,408 a--sh--- c:\windows\system32\tabupulu.dll
2009-06-19 09:21 81,920 a--sh--- c:\windows\system32\tebutago.dll
2009-06-02 09:10 82,432 a--sh--- c:\windows\system32\tibajera.dll
2009-05-06 10:14 80,896 a--sh--- c:\windows\system32\wayiluhi.dll
2009-06-30 13:38 83,456 a--sh--- c:\windows\system32\wijidapa.dll
2009-06-29 09:21 83,456 a--sh--- c:\windows\system32\wojajugi.dll
2009-06-25 11:50 81,408 a--sh--- c:\windows\system32\yubiliyu.dll
2009-05-28 14:36 81,920 a--sh--- c:\windows\system32\zegazoha.dll

============= FINISH: 8:58:51.34 ===============

#4 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:50 PM

Posted 20 October 2009 - 11:12 AM

Hello carlfuffel :( Welcome to the BC HijackThis Log and Analysis forum. Sorry about your wait, but I will be assisting you in cleaning up your system from here on out.


I ask that you refrain from running tools other than those we suggest while we are performing the clean-up. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.



In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond the your topic and facilitate the cleaning of your machine.

After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.





I need to get a little different look at your system so please perform the following:



We need to scan for Rootkits with GMER
  • Please download GMER from one of the following locations, and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zip Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Close any and all open programs, as this process may crash your computer.
  • Double click Posted Image or Posted Image on your desktop.
  • Allow the gmer.sys driver to load if asked.
  • You may see this window. If you do, click No.
    Posted Image
  • Click on Posted Image and wait for the scan to finish.
  • If you see a rootkit warning window, click OK.
  • Push Posted Image and save the logfile to your desktop.
  • Copy and Paste the contents of that file in your next post.


Please do not post any logs as an attachment unless asked to do so.





Thanks,



thewall
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#5 carlfuffel

carlfuffel
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 22 October 2009 - 03:13 AM

Thanks thewall.

GMER 1.0.15.15163 - http://www.gmer.net
Rootkit scan 2009-10-22 09:12:21
Windows 5.1.2600 Service Pack 3
Running: zgeoffpu.exe; Driver: C:\DOCUME~1\MMCLOU~1.CED\LOCALS~1\Temp\kwxiipow.sys


---- System - GMER 1.0.15 ----

Code 82D33920 ZwEnumerateKey
Code 82D299D0 ZwFlushInstructionCache
Code 82D3FCEE IofCallDriver
Code 82D39DE6 IofCompleteRequest

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!IofCallDriver 804E37C5 5 Bytes JMP 82D3FCF3
.text ntoskrnl.exe!IofCompleteRequest 804E3BF6 5 Bytes JMP 82D39DEB
PAGE ntoskrnl.exe!ZwEnumerateKey 80570D64 5 Bytes JMP 82D33924
PAGE ntoskrnl.exe!ZwFlushInstructionCache 80577693 1 Byte [E9]
PAGE ntoskrnl.exe!ZwFlushInstructionCache 80577693 5 Bytes JMP 82D299D4

---- User code sections - GMER 1.0.15 ----

.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtCreateFile + 6 7C90D0B4 4 Bytes [28, 00, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtCreateFile + B 7C90D0B9 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenFile + 6 7C90D5A4 4 Bytes [68, 00, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenFile + B 7C90D5A9 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenProcess + 6 7C90D604 4 Bytes [A8, 01, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenProcess + B 7C90D609 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenProcessToken + 6 7C90D614 4 Bytes CALL 7B90EB1A
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenProcessToken + B 7C90D619 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenProcessTokenEx + 6 7C90D624 4 Bytes [A8, 02, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenProcessTokenEx + B 7C90D629 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenThread + 6 7C90D664 4 Bytes [68, 01, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenThread + B 7C90D669 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenThreadToken + 6 7C90D674 4 Bytes [68, 02, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenThreadToken + B 7C90D679 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenThreadTokenEx + 6 7C90D684 4 Bytes CALL 7B90EB8B
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtOpenThreadTokenEx + B 7C90D689 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtQueryAttributesFile + 6 7C90D714 4 Bytes [A8, 00, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtQueryAttributesFile + B 7C90D719 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtQueryFullAttributesFile + 6 7C90D7B4 4 Bytes CALL 7B90ECB9
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtQueryFullAttributesFile + B 7C90D7B9 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtSetInformationFile + 6 7C90DC64 4 Bytes [28, 01, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtSetInformationFile + B 7C90DC69 1 Byte [E2]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtSetInformationThread + 6 7C90DCB4 4 Bytes [28, 02, 15, 00]
.text C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1060] ntdll.dll!NtSetInformationThread + B 7C90DCB9 1 Byte [E2]

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessA] [100025C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!ExitWindowsEx] [10001E32] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessA] [100025C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\slagent.exe[2336] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\Explorer.EXE [KERNEL32.dll!CreateProcessW] [0158265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\Explorer.EXE [USER32.dll!ExitWindowsEx] [01581E32] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!CreateProcessW] [0158265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessA] [015825C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessW] [0158265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!CreateProcessW] [0158265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessA] [015825C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessW] [0158265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!CreateProcessW] [0158265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!ExitWindowsEx] [01581E32] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\Explorer.EXE[2856] @ C:\WINDOWS\system32\USERENV.dll [KERNEL32.dll!CreateProcessW] [0158265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!ExitWindowsEx] [10001E32] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessA] [100025C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessA] [100025C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\Documents and Settings\mmcloughlin.CEDAR\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3024] @ C:\WINDOWS\system32\USERENV.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessA] [100025C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!ExitWindowsEx] [10001E32] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessA] [100025C5] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)
IAT C:\WINDOWS\system32\rundll32.exe[3476] @ C:\WINDOWS\system32\USERENV.dll [KERNEL32.dll!CreateProcessW] [1000265F] C:\WINDOWS\system32\SLAgent.dll (SLAgent.dll/ScriptLogic Software Corporation)

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs [82EE6E01] Ntfs.sys[.reloc]
Device \FileSystem\Ntfs \Ntfs [82F010E5] Ntfs.sys[.reloc]

AttachedDevice \FileSystem\Ntfs \Ntfs TmPreFlt.sys (Pre-Filter For XP/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp mfetdik.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)

Device \FileSystem\Fastfat \Fat EEB62D20

AttachedDevice \FileSystem\Fastfat \Fat TmPreFlt.sys (Pre-Filter For XP/Trend Micro Inc.)

---- EOF - GMER 1.0.15 ----

#6 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:50 PM

Posted 22 October 2009 - 09:10 AM

You're most welcome. Let's try a scanner:


I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#7 carlfuffel

carlfuffel
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 22 October 2009 - 10:53 AM

Results look like this...............

C:\Documents and Settings\anewell\Local Settings\Temporary Internet Files\Content.IE5\4TIBODUR\customer_service_skills_skills[1].htm HTML/TrojanClicker.Iframe.GT.gen trojan cleaned by deleting - quarantined
C:\Documents and Settings\anewell\Local Settings\Temporary Internet Files\Content.IE5\4TMBSH2N\five_key_ways_improve_customers_experience[1].htm HTML/TrojanClicker.Iframe.GT.gen trojan cleaned by deleting - quarantined
C:\Documents and Settings\apoole.old\apoole.exe Win32/Wigon.KI trojan cleaned by deleting - quarantined
C:\Documents and Settings\apoole.old\Local Settings\Temp\BNA.tmp probably a variant of Win32/TrojanDownloader.Wigon.BS trojan cleaned by deleting - quarantined
C:\Documents and Settings\apoole.old\Local Settings\Temp\BNB.tmp probably a variant of Win32/TrojanDownloader.Wigon.BS trojan cleaned by deleting - quarantined
C:\Documents and Settings\apoole.old\Local Settings\Temp\BNC.tmp probably a variant of Win32/TrojanDownloader.Wigon.BS trojan cleaned by deleting - quarantined
C:\Documents and Settings\apoole.old\Local Settings\Temp\BND.tmp probably a variant of Win32/TrojanDownloader.Wigon.BS trojan cleaned by deleting - quarantined
C:\Documents and Settings\apoole.old\Local Settings\Temp\BNE.tmp probably a variant of Win32/TrojanDownloader.Wigon.BS trojan cleaned by deleting - quarantined
C:\Documents and Settings\apoole.old\Local Settings\Temp\BNF.tmp probably a variant of Win32/TrojanDownloader.Wigon.BS trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\ajutumel.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\bokuwavi.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\bunofalo.dll.tmp a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\busudene.dll.tmp a variant of Win32/Kryptik.OS trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\derabuji.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\elojukoz.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\erifesip.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\eroleyuf.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\ewopotit.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\fuyemuhu.dll.tmp a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\gezonawo.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\gudosaho.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\ipulovab.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\jatelumi.dll.tmp a variant of Win32/Kryptik.OS trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\javavuso.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\jegohami.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\jetebemi.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\miharewo.dll.tmp a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\miluduri.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\natojuza.dll a variant of Win32/Kryptik.YD trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\nigokeyo.dll a variant of Win32/Kryptik.OG trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\nomadefe.exe a variant of Win32/Kryptik.OG trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\numisufe.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\olezehaw.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\pamuzuwa.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\pobojohe.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\rabomivo.dll.tmp a variant of Win32/Kryptik.OS trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\rugalilu.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\suwidusu.dll.tmp a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\tabupulu.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\tebutago.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\tibajera.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\tosigupa.dll.tmp a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\uriwumep.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\vesavino.dll.tmp a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\wayiluhi.dll a variant of Win32/Kryptik.OS trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\wijidapa.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\wojajugi.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\yubiliyu.dll a variant of Win32/Kryptik.ACU trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\zegazoha.dll a variant of Win32/Adware.Virtumonde.NEW application cleaned by deleting - quarantined
C:\WINDOWS\system32\dllcache\agp440.sys a variant of Win32/Kryptik.ABX trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\dllcache\ntfs.sys Win32/Wigon.LV trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\drivers\agp440.sys a variant of Win32/Kryptik.ABX trojan unable to clean
C:\WINDOWS\system32\drivers\ntfs.sys Win32/Wigon.LV trojan unable to clean
C:\WINDOWS\system32\drivers\etc\hosts Win32/Qhost trojan cleaned by deleting - quarantined

#8 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:50 PM

Posted 22 October 2009 - 11:15 AM

That should have made a difference. How are things running now?
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#9 carlfuffel

carlfuffel
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 26 October 2009 - 03:31 AM

I'm still getting the same two pesky dialog boxes, thewall. When I click on them the system goes into shutdown.

Edited by carlfuffel, 26 October 2009 - 03:31 AM.


#10 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:50 PM

Posted 26 October 2009 - 08:42 AM

Alright then we'll try something a little stronger:



Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Instruction can be found HERE
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:


Posted Image


Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#11 carlfuffel

carlfuffel
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 29 October 2009 - 03:58 AM

Hi thewall,

When I click on the link and the run combofix button that appears after download, the same dialog box that shuts the system down appears and stops me from progressing any further.

#12 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:50 PM

Posted 29 October 2009 - 08:21 AM

Try running the following first and then see if ComboFix will run:

RKill by Grinler

Link #1
Link #2
Link #3
Link #4

  • Download Link #1.
  • Save it to your Desktop.
  • Double click the RKill desktop icon.
    If you are using Vista please right click and run as Admin!
  • A black screen will briefly flash indicating a successful run.
  • If this does not occur please delete that application and download Link #2.
  • Continue process until the tool runs.
  • If the tool does not run from any of the links tell me about it.

If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#13 carlfuffel

carlfuffel
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 29 October 2009 - 11:27 AM

Same problem the wall. The dialog box keeps popping up

#14 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:50 PM

Posted 29 October 2009 - 11:58 AM

Right click on ComboFix and change the name to carl.com. Try it then. If that doesn't work delete the copy you have and download a new one renaming it to something like the above. Just something you can remember.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#15 carlfuffel

carlfuffel
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:50 PM

Posted 02 November 2009 - 11:41 AM

Blimey! I think that's fixed it thewall. I'm not experiencing any such problems now. Excellent, thank you for your help, i'm very grateful.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users