Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

rootkit infection


  • This topic is locked This topic is locked
34 replies to this topic

#1 bobmaluga

bobmaluga

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 28 September 2009 - 12:12 PM

Hi

First of all I have never posted in a forum before .so please bare with me.

I tried to run mbam and it ran for about 3 seconds and then quit to desktop.I tried running it again and i got this message"windows cannot access the specified device,path,or file. you may not have the appropriate permissions to access the item" the same for super antispyware. same thing happens in safemode

I also tried to get logs with DDS and RootRepeal they run for about 1 second and quit. after the rootrepeal 1 second run a settings.dat file showed up on my desktop.

The forum "Am I infected? What do I do? sent me to you. they had me download "Win32kDiag.exe"the log is below and the cmd c prompt log they asked for

any help would be much thanks

Running from: C:\Documents and Settings\James n\Desktop\Win32kDiag.exe

Log file at : C:\Documents and Settings\James n\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Found mount point : C:\WINDOWS\addins\addins

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\temp\temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\tmp\tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Config\Config

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Connection Wizard\Connection Wizard

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Debug\UserMode\UserMode

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ftpcache\ftpcache

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\chsime\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\CHTIME\Applets\Applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp98\imejp98

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imjp8_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imkr6_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imkr6_1\dicts\dicts

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\shared\res\res

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\0DC1503A46F231838AD88BCDDC8E8F7C\3.2.30729\3.2.30729

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\DC3BF90CC0D3D2F398A9A6D1762F70F3\2.2.30729\2.2.30729

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\classes\classes

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\trustlib\trustlib

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\Temporary ASP.NET Files\Bind Logs\Bind Logs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files\Temporary ASP.NET Files

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\msapps\msinfo\msinfo

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\msdownld.tmp\msdownld.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\mui\mui

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\ErrorRep\QHEADLES\QHEADLES

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\ErrorRep\QSIGNOFF\QSIGNOFF

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\ErrorRep\UserDumps\UserDumps

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\BATCH\BATCH

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\Config\CheckPoint\CheckPoint

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\Config\News\News

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\HelpFiles\HelpFiles

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\InstalledSKUs\InstalledSKUs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\System\DFS\DFS

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\System_OEM\System_OEM

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PCHealth\HelpCtr\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Profiles\All Users\Adobe\Webbuy\Webbuy

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Registration\CRMLog\CRMLog

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\AuthCabs\AuthCabs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\8361ae28fcfac79271825a6b2935fdb6\8361ae28fcfac79271825a6b2935fdb6

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\SelfUpdate\Registered\Registered

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Sun\Java\Deployment\Deployment

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\system32\eventlog.dll

[1] 2003-03-31 08:00:00 49152 C:\WINDOWS\$NtServicePackUninstall$\eventlog.dll (Microsoft Corporation)

[1] 2005-11-11 19:57:32 55808 C:\WINDOWS\system32\dllcache\eventlog.dll (Microsoft Corporation)

[1] 2005-11-11 19:57:32 61952 C:\WINDOWS\system32\eventlog.dll ()

[2] 2005-11-11 19:57:32 55808 C:\WINDOWS\system32\logevent.dll (Microsoft Corporation)



Found mount point : C:\WINDOWS\Temp\Cookies\Cookies

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\History\History.IE5\History.IE5

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\IW53\IW53

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\SaveReport\SaveReport

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\07K3QDMZ\07K3QDMZ

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\2URXGMO9\2URXGMO9

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\6P8XI7M7\6P8XI7M7

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\AOEZPQQR\AOEZPQQR

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\ATK12NC1\ATK12NC1

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\DDNDCVVJ\DDNDCVVJ

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\EOQBWSE7\EOQBWSE7

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\EWL8W6R3\EWL8W6R3

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\IKN34BGH\IKN34BGH

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\J1HDK9QY\J1HDK9QY

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\JQVEF7RJ\JQVEF7RJ

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\MZ078V8F\MZ078V8F

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\S0U91QM0\S0U91QM0

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\W6KPEUCI\W6KPEUCI

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\XK77VNL9\XK77VNL9

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temporary Internet Files\Content.IE5\Y1E0KIS6\Y1E0KIS6

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\WinSxS\InstallTemp\InstallTemp

Mount point destination : \Device\__max++>\^



Finished!


Volume in drive C has no label.
Volume Serial Number is 4CF5-5E25

Directory of C:\WINDOWS\$NtServicePackUninstall$

03/31/2003 08:00 AM 174,592 scecli.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

03/31/2003 08:00 AM 399,360 netlogon.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

03/31/2003 08:00 AM 49,152 eventlog.dll
3 File(s) 623,104 bytes

Directory of C:\WINDOWS\system32

11/11/2005 08:00 PM 180,224 scecli.dll

Directory of C:\WINDOWS\system32

11/11/2005 07:59 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\system32

11/11/2005 07:57 PM 61,952 eventlog.dll
3 File(s) 649,216 bytes

Directory of C:\WINDOWS\system32\dllcache

11/11/2005 08:00 PM 180,224 scecli.dll

Directory of C:\WINDOWS\system32\dllcache

11/11/2005 07:59 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\system32\dllcache

11/11/2005 07:57 PM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Total Files Listed:
9 File(s) 1,915,392 bytes
0 Dir(s) 12,188,110,848 bytes free

I do not have any windows installation disks to do a reformat the cpu is used Idid not get any software other than what was on the harddrive.
thanks.

BC AdBot (Login to Remove)

 


#2 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:50 PM

Posted 28 September 2009 - 12:42 PM

Hello, bobmaluga.
Welcome to Bleeping Computer. My name is etavares and I will be helping you with your log.

Please give me a little time to go through your log. I'd also like to let you know that I am in training here at BC. At each stage of the process, my work will be checked by an expert coach. That means there may be a slight delay between my responses as they check it. Don't worry, we won't leave you.

Please note that I may have taken this log out of order. As a HJT trainee, I occasionally take logs out of order to further develop my skills. I have a balance of older logs (e.g. first come, first served) and fresh logs. If you are reading this and are still waiting, please be patient. Our volunteers are working as hard we as we can to help everyone.

Here's a few things to get started:
  • Please subscribe to this topic, if you haven't already, and wait for me to get back to you.
  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.
  • Even if things appear better, that does not mean we are finished. Please continue to follow my instructions until I give you the all clean.
  • If at any point, you are not sure what I am asking for, please ask me and I can better communicate what I mean.
  • Please reply within 5 days of my last post or the thread will be closed. If you will be away or unable to reply, please let me know in advance so the thread is not closed. We have many folks waiting for help and it is not fair to keep an unresponsive thread open.
  • Please reply to this post so I know you are there.
Thanks!

Edited by etavares, 28 September 2009 - 12:42 PM.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#3 bobmaluga

bobmaluga
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 28 September 2009 - 01:08 PM

Hi etavares

how does one subsribe to this topic as im a idiot at this stuff and all the help i can get is welcom?also I am keeping this cpu unpluged form net until word from you.

#4 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:50 PM

Posted 28 September 2009 - 01:28 PM

Hi bobmaluga-

You're not an idiot, just new to the forums. :( Go to the original post at the top. There's a button saying "Options" on the right side of the blue bar at the top of Post #1. Click Options, then Track This Topic.

Select your option (usually Immediate Email Notification or Delayed Email Notification) and then click the "Subscribe to this topic" button at the bottom.

Now...don't always trust the email notification, best to check on here once per day or so.

I'm looking at your log now and waiting for approval before I post (since I'm a senior trainee all my posts have to be approved). I'd expect a response in the next day or two. After that, you can expect responses to be more frequent.

Keeping the CPU unplugged is a smart idea. Also...don't do anything on it until instructed as it will get progressively worse with use...you'll eventually lose the taskbar, start menu, task manager, etc. and need to reformat and reinstall Windows as the only solution.

Edited by etavares, 28 September 2009 - 01:28 PM.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#5 bobmaluga

bobmaluga
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 28 September 2009 - 01:44 PM

Hi again etavares

It said i was already subscribed.do i need to shut it down completely or just from internet accesss?

#6 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:50 PM

Posted 28 September 2009 - 02:36 PM

Ok...the email system is about 80% reliable for subscription. You're obviously checking the thread, so that's good enough. As for the machine, you can just unplug from the network once you do the below. Here's the first step to regain control...but for this, please connect it to the internet.

Hello, bobmaluga.
Next, please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image
Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply, along with any symptoms that are present after it runs.

Edited by etavares, 28 September 2009 - 02:36 PM.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#7 bobmaluga

bobmaluga
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 28 September 2009 - 03:20 PM

heres the log. other than a slighty slower startup at the welcome screen and a wallpaper of the moon which i did not have in the background.I have not noticed anything else but I came staight here.

ComboFix 09-09-27.05 - James n 09/28/2009 15:55.1.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.991.767 [GMT -4:00]
Running from: c:\documents and settings\James n\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\James n\Application Data\Install.dat
c:\documents and settings\James n\My Documents\st-setup.bat
c:\documents and settings\James n\My Documents\wd.bat
c:\program files\INSTALL.LOG
c:\windows\Installer\203c07.msi
c:\windows\Installer\2a922.msi
c:\windows\Installer\973378c.msi
c:\windows\mcroso~1
c:\windows\mcroso~1\wowexec.exe~
c:\windows\system\SysSD.dll
c:\windows\system32\gxxygekd.ini
c:\windows\system32\lmWxwyay.ini
c:\windows\system32\lmWxwyay.ini2
c:\windows\system32\shaibgvh.ini

Infected copy of c:\windows\system32\eventlog.dll was found and disinfected
Restored copy from - c:\windows\system32\dllcache\eventlog.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226ED}


((((((((((((((((((((((((( Files Created from 2009-08-28 to 2009-09-28 )))))))))))))))))))))))))))))))
.

2009-09-26 01:24 . 2009-09-28 15:12 0 ----a-r- c:\windows\win32k.sys
2009-09-25 21:24 . 2009-09-25 22:08 21840 ----atw- c:\windows\system32\SIntfNT.dll
2009-09-25 21:24 . 2009-09-25 22:08 17212 ----atw- c:\windows\system32\SIntf32.dll
2009-09-25 21:24 . 2009-09-25 22:08 12067 ----atw- c:\windows\system32\SIntf16.dll
2009-09-24 21:20 . 2009-09-24 21:20 -------- d-----w- c:\program files\Sierra
2009-09-22 02:09 . 2009-09-22 02:09 57344 --sh--r- c:\windows\system32\flashadgmn32.dll
2009-09-18 03:24 . 2009-09-18 03:24 -------- d-----w- c:\windows\East India Company v1.01 Update

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-09-28 20:01 . 2007-11-13 02:49 -------- d-----w- c:\program files\SpywareDetector
2009-09-26 22:40 . 2009-04-01 02:35 -------- d-----w- c:\program files\hs
2009-09-25 22:05 . 2007-10-08 19:21 -------- d-----w- c:\documents and settings\James n\Application Data\uTorrent
2009-09-25 18:26 . 2007-06-21 02:52 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2009-09-17 18:45 . 2008-02-20 02:23 -------- d-----w- c:\program files\DAMN NFO Viewer
2009-09-12 04:52 . 2009-07-23 18:07 147552 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2009-09-11 22:52 . 2007-05-30 23:47 -------- d-----w- c:\program files\Bethesda Softworks
2009-08-28 02:14 . 2009-08-28 02:14 -------- d-----w- c:\documents and settings\James n\Application Data\GetRightToGo
2009-07-31 17:51 . 2008-10-25 16:26 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-07-23 18:40 . 2006-01-26 23:40 52688 ----a-w- c:\documents and settings\James n\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2003-12-18 15:33 . 2009-09-24 21:29 20102 ----a-w- c:\program files\Readme.txt
2003-09-03 11:46 . 2009-09-24 21:29 10960 ----a-w- c:\program files\EULA.txt
2006-05-03 10:06 . 2009-01-10 22:54 163328 --sh--r- c:\windows\system32\flvDX.dll
2007-02-21 11:47 . 2009-01-10 22:54 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 13:30 . 2009-01-10 22:54 216064 --sh--r- c:\windows\system32\nbDX.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-09-11 86960]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2005-11-11 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"OpwareSE2"="c:\program files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe" [2003-05-08 49152]
"tgcmd"="c:\program files\Support.com\BellSouth\hcenter.exe" [2005-08-31 1277952]
"NeroCheck"="c:\windows\system32\NeroCheck.exe" [2007-08-15 155648]
"SystemTraySD"="c:\program files\SpywareDetector\SDSystemTray.exe" [2007-08-24 681424]
"SDAutoLiveupdate"="c:\program files\SpywareDetector\LiveUpdateSD.exe" [2007-08-24 402896]
"DMXLauncher"="c:\program files\Roxio\CinePlayer\DMXLauncher.exe" [2007-08-14 113136]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-04-19 7700480]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-04-19 86016]
"PWRISOVM.EXE"="c:\program files\PowerISO\PWRISOVM.EXE" [2008-07-07 167936]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]
"PCTVOICE"="pctspk.exe" - c:\windows\system32\pctspk.exe [2003-04-25 180224]
"PV92TRAY"="PV92Tray.exe" - c:\windows\system32\PV92Tray.exe [2003-04-25 135168]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2007-04-19 1626112]

c:\documents and settings\James n\Start Menu\Programs\Startup\
MagicDisc.lnk - c:\program files\MagicDisc\MagicDisc.exe [2007-10-28 557568]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
"{68101905-D80F-4788-96F6-98618116178A}"= "c:\windows\system32\flashadgmn32.dll" [2009-09-22 57344]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-22 16:05 356352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\SDNotify]
2007-08-22 19:25 167936 ----a-w- c:\program files\SpywareDetector\SDNotify.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ SDEarlyDelete \??\c:\program files\SpywareDetector\0autocheck autochk *

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\Roxio Shared\\10.0\\SharedCOM\\RoxWatchTray10.exe"=
"c:\\Program Files\\Azureus\\Azureus.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\monitor.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\manager.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\server.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\3dsmax.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\mentalray\\satellite\\raysat_3dsmax2010_32server.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\mentalray\\satellite\\raysat_3dsmax2010_32.exe"=
"c:\\Program Files\\Orbitdownloader\\orbitnet.exe"=
"c:\\Program Files\\Orbitdownloader\\orbitdm.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [3/23/2009 2:07 PM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [3/23/2009 2:07 PM 72944]
R2 SDService;SDService;c:\program files\SpywareDetector\SDService.exe [9/2/2007 11:19 PM 251344]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [1/21/2007 10:29 AM 24652]
S2 mi-raysat_3dsmax2010_32;mental ray 3.7 Satellite for Autodesk 3ds Max 2010 32-bit 32-bit;c:\program files\Autodesk\3ds Max 2010\mentalray\satellite\raysat_3dsmax2010_32server.exe [3/12/2009 5:36 PM 86016]
S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\Roxio\Digital Home 10\RoxioUpnpService10.exe [8/24/2007 3:53 PM 362992]
S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxLiveShare10.exe [8/24/2007 3:52 PM 309744]
S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxWatch10.exe [8/24/2007 3:52 PM 166384]
S2 rwfukyvp;Volume Manager Monitor;c:\windows\System32\svchost.exe -k netsvcs [3/31/2003 8:00 AM 14336]
S2 SessionLauncher;SessionLauncher;c:\docume~1\JAMESN~1\LOCALS~1\Temp\DX9\SessionLauncher.exe --> c:\docume~1\JAMESN~1\LOCALS~1\Temp\DX9\SessionLauncher.exe [?]
S3 cdiskdun;cdiskdun;\??\c:\docume~1\JAMESN~1\LOCALS~1\Temp\cdiskdun.sys --> c:\docume~1\JAMESN~1\LOCALS~1\Temp\cdiskdun.sys [?]
S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\Roxio\Digital Home 10\RoxioUPnPRenderer10.exe [8/24/2007 3:53 PM 72176]
S3 RoxMediaDB10;RoxMediaDB10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxMediaDB10.exe [8/24/2007 3:52 PM 1083888]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [3/23/2009 2:07 PM 7408]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
rwfukyvp
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.armstrongmywire.com/index.php
IE: &Download by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/201
IE: &Grab video by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/204
IE: Do&wnload selected by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/203
IE: Down&load all by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/202
FF - ProfilePath - c:\documents and settings\James n\Application Data\Mozilla\Firefox\Profiles\06lgyvcy.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?ei=utf-8&fr=megaup&p=
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{A057A204-BACC-4D26-C39E-35F1D2A32EC8} - (no file)
AddRemove-AoA MP4 Converter_is1 - c:\program files\AoA MP4 Converter\unins000.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-09-28 16:01
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1004336348-1547161642-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(692)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\program files\SpywareDetector\SDNotify.dll

- - - - - - - > 'explorer.exe'(3128)
c:\windows\system32\flashadgmn32.dll
c:\program files\ScanSoft\OmniPageSE2.0\ophookSE2.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\wscntfy.exe
c:\program files\SpywareDetector\UpdatePopUp.exe
c:\program files\Viewpoint\Viewpoint Manager\ViewMgr.exe
.
**************************************************************************
.
Completion time: 2009-09-28 16:05 - machine was rebooted
ComboFix-quarantined-files.txt 2009-09-28 20:05

Pre-Run: 12,087,308,288 bytes free
Post-Run: 15,161,405,440 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

185 --- E O F --- 2007-10-11 06:04

#8 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:50 PM

Posted 29 September 2009 - 06:38 AM

Hello, bobmaluga.
OK, that did take care of the major rootkit, although we will still have to deal with collateral damage. There's still some malware on your machine as well.

I see Viewpoint is installed on your machine. Viewpoint Manager is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". This changed from what we know in 2006 read this article:

http://www.clickz.com/news/article.php/3561546

I suggest you remove the program now. Go to the Control Panel, then Add or Remove Programs uninstall the following if they exist: Viewpoint, Viewpoint Manager, Viewpoint Media Player.

The log shows that you have been using so called peer-to-peer or file-sharing programmes (in your case Azereus and uTorrent). These programmes allow to share files between users as the name(s) suggest. In today's world the cyber crime has come a long way and any means is used to infect personal computers to make use of their stored data or machine power for further propagation of their malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. I recommend that you uninstall this program. That is optional, however. If you decide to not uninstall, please refrain from using it until I let you know your computer is clean.


Step 1

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

File::
c:\windows\system32\flashadgmn32.dll
c:\docume~1\JAMESN~1\LOCALS~1\Temp\cdiskdun.sys
c:\docume~1\JAMESN~1\LOCALS~1\Temp\DX9\SessionLauncher.exe
c:\windows\win32k.sys

Driver::
rwfukyvp
cdiskdun
SessionLauncher

Registry::
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{68101905-D80F-4788-96F6-98618116178A}"=-
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000000

NetSvc::
rwfukyvp


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.



Step 2

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.



Step 3

We need to scan the system with this special tool:

* Please download and save:

Junction.zip

* Unzip it and place Junction.exe in the Windows directory (C:\Windows).
* Go to Start => Run... => Copy and paste the following command in the Run box and click OK:

cmd /c junction -s c:\ >log.txt&log.txt& del log.txt

A command window opens starting to scan the system. Wait until a log file opens. Copy and paste the log in your next reply.



Step 4

In your reply, please post:
  • Combofix log
  • MBAM log
  • Junction log

Edited by etavares, 29 September 2009 - 06:39 AM.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#9 bobmaluga

bobmaluga
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 29 September 2009 - 11:36 AM

Hi sorry for delay
first of all combofix asked to update I did not because you did not say to.
second I installed new mbam in a different folder because i allready had older version but log is from new version.
third I don't know whats up with the junction log theres not much of it.
forth while making this post spyware detector sent me to is web site without asking.I want to get rid of spyware detector but the last time I tried to uninstall it I got an error saying something about cannot find uninstall exe or dll. something like that.
anyway here are the logs

ComboFix 09-09-27.05 - James n 09/29/2009 11:12.2.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.991.712 [GMT -4:00]
Running from: c:\documents and settings\James n\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\James n\Desktop\CFScript.txt

FILE ::
"c:\docume~1\JAMESN~1\LOCALS~1\Temp\cdiskdun.sys"
"c:\docume~1\JAMESN~1\LOCALS~1\Temp\DX9\SessionLauncher.exe"
"c:\windows\system32\flashadgmn32.dll"
"c:\windows\win32k.sys"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\flashadgmn32.dll
c:\windows\win32k.sys

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_CDISKDUN
-------\Legacy_RWFUKYVP
-------\Legacy_SESSIONLAUNCHER
-------\Service_cdiskdun
-------\Service_rwfukyvp
-------\Service_SessionLauncher


((((((((((((((((((((((((( Files Created from 2009-08-28 to 2009-09-29 )))))))))))))))))))))))))))))))
.

2009-09-25 21:24 . 2009-09-25 22:08 21840 ----atw- c:\windows\system32\SIntfNT.dll
2009-09-25 21:24 . 2009-09-25 22:08 17212 ----atw- c:\windows\system32\SIntf32.dll
2009-09-25 21:24 . 2009-09-25 22:08 12067 ----atw- c:\windows\system32\SIntf16.dll
2009-09-24 21:20 . 2009-09-24 21:20 -------- d-----w- c:\program files\Sierra
2009-09-18 03:24 . 2009-09-18 03:24 -------- d-----w- c:\windows\East India Company v1.01 Update

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-09-29 15:19 . 2007-11-13 02:49 -------- d-----w- c:\program files\SpywareDetector
2009-09-29 14:54 . 2006-01-31 02:03 -------- d-----w- c:\program files\Viewpoint
2009-09-29 14:54 . 2006-01-31 02:03 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-09-26 22:40 . 2009-04-01 02:35 -------- d-----w- c:\program files\hs
2009-09-25 22:05 . 2007-10-08 19:21 -------- d-----w- c:\documents and settings\James n\Application Data\uTorrent
2009-09-25 18:26 . 2007-06-21 02:52 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2009-09-17 18:45 . 2008-02-20 02:23 -------- d-----w- c:\program files\DAMN NFO Viewer
2009-09-12 04:52 . 2009-07-23 18:07 147552 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2009-09-11 22:52 . 2007-05-30 23:47 -------- d-----w- c:\program files\Bethesda Softworks
2009-08-28 02:14 . 2009-08-28 02:14 -------- d-----w- c:\documents and settings\James n\Application Data\GetRightToGo
2009-07-31 17:51 . 2008-10-25 16:26 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-07-23 18:40 . 2006-01-26 23:40 52688 ----a-w- c:\documents and settings\James n\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2003-12-18 15:33 . 2009-09-24 21:29 20102 ----a-w- c:\program files\Readme.txt
2003-09-03 11:46 . 2009-09-24 21:29 10960 ----a-w- c:\program files\EULA.txt
2006-05-03 10:06 . 2009-01-10 22:54 163328 --sh--r- c:\windows\system32\flvDX.dll
2007-02-21 11:47 . 2009-01-10 22:54 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 13:30 . 2009-01-10 22:54 216064 --sh--r- c:\windows\system32\nbDX.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-09-28_20.02.08 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-09-29 15:19 . 2009-09-29 15:19 16384 c:\windows\temp\Perflib_Perfdata_744.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-09-11 86960]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2005-11-11 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"OpwareSE2"="c:\program files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe" [2003-05-08 49152]
"tgcmd"="c:\program files\Support.com\BellSouth\hcenter.exe" [2005-08-31 1277952]
"NeroCheck"="c:\windows\system32\NeroCheck.exe" [2007-08-15 155648]
"SystemTraySD"="c:\program files\SpywareDetector\SDSystemTray.exe" [2007-08-24 681424]
"SDAutoLiveupdate"="c:\program files\SpywareDetector\LiveUpdateSD.exe" [2007-08-24 402896]
"DMXLauncher"="c:\program files\Roxio\CinePlayer\DMXLauncher.exe" [2007-08-14 113136]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-04-19 7700480]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-04-19 86016]
"PWRISOVM.EXE"="c:\program files\PowerISO\PWRISOVM.EXE" [2008-07-07 167936]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]
"PCTVOICE"="pctspk.exe" - c:\windows\system32\pctspk.exe [2003-04-25 180224]
"PV92TRAY"="PV92Tray.exe" - c:\windows\system32\PV92Tray.exe [2003-04-25 135168]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2007-04-19 1626112]

c:\documents and settings\James n\Start Menu\Programs\Startup\
MagicDisc.lnk - c:\program files\MagicDisc\MagicDisc.exe [2007-10-28 557568]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-22 16:05 356352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\SDNotify]
2007-08-22 19:25 167936 ----a-w- c:\program files\SpywareDetector\SDNotify.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ SDEarlyDelete \??\c:\program files\SpywareDetector\0autocheck autochk *

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\Roxio Shared\\10.0\\SharedCOM\\RoxWatchTray10.exe"=
"c:\\Program Files\\Azureus\\Azureus.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\monitor.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\manager.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\server.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\3dsmax.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\mentalray\\satellite\\raysat_3dsmax2010_32server.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\mentalray\\satellite\\raysat_3dsmax2010_32.exe"=
"c:\\Program Files\\Orbitdownloader\\orbitnet.exe"=
"c:\\Program Files\\Orbitdownloader\\orbitdm.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [3/23/2009 2:07 PM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [3/23/2009 2:07 PM 72944]
R2 SDService;SDService;c:\program files\SpywareDetector\SDService.exe [9/2/2007 11:19 PM 251344]
S2 mi-raysat_3dsmax2010_32;mental ray 3.7 Satellite for Autodesk 3ds Max 2010 32-bit 32-bit;c:\program files\Autodesk\3ds Max 2010\mentalray\satellite\raysat_3dsmax2010_32server.exe [3/12/2009 5:36 PM 86016]
S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\Roxio\Digital Home 10\RoxioUpnpService10.exe [8/24/2007 3:53 PM 362992]
S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxLiveShare10.exe [8/24/2007 3:52 PM 309744]
S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxWatch10.exe [8/24/2007 3:52 PM 166384]
S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\Roxio\Digital Home 10\RoxioUPnPRenderer10.exe [8/24/2007 3:53 PM 72176]
S3 RoxMediaDB10;RoxMediaDB10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxMediaDB10.exe [8/24/2007 3:52 PM 1083888]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [3/23/2009 2:07 PM 7408]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.armstrongmywire.com/index.php
IE: &Download by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/201
IE: &Grab video by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/204
IE: Do&wnload selected by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/203
IE: Down&load all by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/202
FF - ProfilePath - c:\documents and settings\James n\Application Data\Mozilla\Firefox\Profiles\06lgyvcy.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?ei=utf-8&fr=megaup&p=
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-09-29 11:19
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1004336348-1547161642-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(696)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\program files\SpywareDetector\SDNotify.dll

- - - - - - - > 'explorer.exe'(3632)
c:\program files\ScanSoft\OmniPageSE2.0\ophookSE2.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\nvsvc32.exe
c:\program files\SpywareDetector\UpdatePopUp.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-09-29 11:24 - machine was rebooted
ComboFix-quarantined-files.txt 2009-09-29 15:24
ComboFix2.txt 2009-09-28 20:05

Pre-Run: 15,153,160,192 bytes free
Post-Run: 15,122,231,296 bytes free

164 --- E O F --- 2007-10-11 06:04

Malwarebytes' Anti-Malware 1.41
Database version: 2871
Windows 5.1.2600 Service Pack 2

9/29/2009 11:46:55 AM
mbam-log-2009-09-29 (11-46-55).txt

Scan type: Quick Scan
Objects scanned: 103182
Time elapsed: 4 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Junction v1.05 - Windows junction creator and reparse point viewer
Copyright © 2000-2007 Mark Russinovich
Systems Internals - http://www.sysinternals.com


Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.


...

...

...


Failed to open \\?\c:\\Documents and Settings\James n\Desktop\RootRepeal.exe: Access is denied.


...

...

...

...

...

...

...

...

...

...

...

...

..
Failed to open \\?\c:\\Program Files\hs\mbam.exe: Access is denied.


.

...

...

...

...

...

...

...

...


Failed to open \\?\c:\\Program Files\SUPERAntiSpyware\SUPERANTISPYWARE.EXE: Access is denied.


...


Failed to open \\?\c:\\System Volume Information\MountPointManagerRemoteDatabase: Access is denied.


...

...

...

...

...

...

...

...

...

...

.No reparse points found.

#10 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:50 PM

Posted 30 September 2009 - 03:19 PM

Hi bobmaluga,

We're looking better now. You did the right thing by following the instructions. The junction log should be mostly blanks, but there are some items in there we need to deal with. Let's do the following:

Step 1

We need to reset the permissions altered by the malware on some files.

* Download this tool and save it to your Desktop: <-- Important

Inherit.exe

* Go to Start => Run => Copy and paste the first line of the following lines in the run box and click OK:


"%userprofile%\desktop\inherit" "c:\Documents and Settings\James n\Desktop\RootRepeal.exe"
"%userprofile%\desktop\inherit" "c:\Program Files\hs\mbam.exe"
"%userprofile%\desktop\inherit" "c:\Program Files\SUPERAntiSpyware\SUPERANTISPYWARE.EXE"
"%userprofile%\desktop\inherit" "c:\System Volume Information\MountPointManagerRemoteDatabase"


* If you get a security warning select Run.
* You will get a "Finish" popup. Click OK.
* Do the same for the rest of the lines until you have run all the above commands one by one.

Step 2

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


Step 3

When did you last try to uninstall Spyware Detector? Please try it again, from the Add/Remove Programs part of the Control Panel. THe malware may have been blocking it. If you are unable to, please let me know the exact error.


Step 4

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.


Step 5

In your reply, please post:
  • ESET log
  • results of Steps 1 and 3
  • Both logs from the DDS run in step 4.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#11 bobmaluga

bobmaluga
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 30 September 2009 - 06:27 PM

Hi etavares and thanks again!

Ok step 1. IF I was supose to leave the quotes at the begining and end then all went well.
step 2. if I was supose to let it remove what it found then I will have to redo if not here is the log.

C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\17\299e4e91-4c5e4a17 Java/TrojanDownloader.OpenStream.NAC trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\24\9541718-57d5d698 probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\41\529ea6e9-7c6fc82c Win32/Adware.SpySheriff application
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\42\9436b6a-5cfe93e6 Java/TrojanDownloader.OpenStream.NAC trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\330fa4eb-4874cf07 Java/TrojanDownloader.OpenStream.NAB trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\7d3deceb-191b2782 Java/TrojanDownloader.OpenStream.NAC trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\49\156d9cb1-50bda1ec probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\54\480b0ef6-17ff5d42 probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\56\3c28cc78-17ae6203 probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-1a434e1-157ff57b.class Java/TrojanDownloader.OpenStream.NAC trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-4bee71a-19bc0889.class Java/TrojanDownloader.OpenStream.NAC trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-27406485-209fe0f3.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-5b7fd168-52299e20.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-2863fd48-3dc40a8c.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-74249065-57c6b959.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\OP.jar-4b9c0e39-67f435fc.zip Win32/Adware.SpySheriff application
C:\Documents and Settings\James n\Desktop\bac\sysguard.exe Win32/Adware.SpywareProtect2009 application
C:\Documents and Settings\James n\Desktop\hw2 trainer\bie.exe probably a variant of Win32/TrojanDownloader.Agent trojan
C:\Documents and Settings\James n\Desktop\Important Game Stuff\Sea Dogs\seadogssa.zip probably a variant of Win32/Spy.Agent trojan
C:\Documents and Settings\James n\Desktop\Important Game Stuff\Sid Mieres Pirates\piratestrn-068.exe.exe probably a variant of Win32/Spy.Agent trojan
C:\Documents and Settings\James n\Desktop\Important Game Stuff\Sid Mieres Pirates\piratestrn.zip probably a variant of Win32/Spy.Agent trojan
C:\Documents and Settings\James n\Desktop\Important Game Stuff\Sins Of A Solar Empire\sinsolartrn8.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Desktop\Important Game Stuff\StarWolves 2\StarWolves2Plus6.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Desktop\Important Game Stuff\StarWolves 2\star_wolves_2_6_trainer.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Desktop\new downloaded tools\magic.dvd.ripper.4.3.1.keygen-rev.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Desktop\new downloaded tools\Magic.DVD.Ripper.v5.0.1.Incl.Keymaker-ARN.zip probably a variant of Win32/Agent trojan
C:\Documents and Settings\James n\Local Settings\Application Data\Mozilla\Firefox\Profiles\06lgyvcy.default\Cache\79668B22d01 a variant of Win32/Kryptik.ANP trojan
C:\Documents and Settings\James n\My Documents\3dstmax files\Photoshop cs4 stuff\Pixarra.TwistedBrush.Pro.Studio.v15.67.WinALL.Incl.Keygen-BRD\brptb67e.zip probably a variant of Win32/TrojanDownloader.Agent trojan
C:\Documents and Settings\James n\My Documents\my videos 2\homeworld.2.v1.1.plus3trn.devious.zip probably a variant of Win32/TrojanDownloader.Agent trojan
C:\Program Files\Stardock Games\Sins of a Solar Empire\brewers.exe probably a variant of Win32/Agent trojan
C:\Qoobox\Quarantine\C\WINDOWS\MCROSO~1\wowexec.exe~.vir Win32/TrojanDownloader.PurityScan trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\eventlog.dll.vir a variant of Win32/Kryptik.YQ trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\gxxygekd.ini.vir Win32/Adware.Virtumonde.NEO application
C:\Qoobox\Quarantine\C\WINDOWS\system32\lmWxwyay.ini.vir Win32/Adware.Virtumonde.NEO application
C:\Qoobox\Quarantine\C\WINDOWS\system32\lmWxwyay.ini2.vir Win32/Adware.Virtumonde.NEO application
C:\Qoobox\Quarantine\C\WINDOWS\system32\shaibgvh.ini.vir Win32/Adware.Virtumonde.NEO application
C:\System Volume Information\_restore{0549BACE-0AA4-46A0-83A7-80769610537C}\RP103\A0029682.ini Win32/Adware.Virtumonde.NEO application
C:\System Volume Information\_restore{0549BACE-0AA4-46A0-83A7-80769610537C}\RP103\A0029683.ini Win32/Adware.Virtumonde.NEO application
C:\System Volume Information\_restore{0549BACE-0AA4-46A0-83A7-80769610537C}\RP103\A0029684.ini Win32/Adware.Virtumonde.NEO application
C:\System Volume Information\_restore{0549BACE-0AA4-46A0-83A7-80769610537C}\RP103\A0029685.dll a variant of Win32/Kryptik.YQ trojan
C:\WINDOWS\system32\winjvd32(2).dll probably a variant of Win32/Dialer trojan

step 3. I tried to uninstall again and got same error message here it is "File "c:\ProgramFiles\SpywareDetector\uninsooo.dat" does not exist cannot uninstall".

step 4. it worked this time here is the DDS log and the Attach.txt atachment if Idid it right


DDS (Ver_09-09-29.01) - NTFSx86
Run by James n at 18:40:33.76 on Wed 09/30/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_13
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.991.620 [GMT -4:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Autodesk\3ds Max 2010\mentalray\satellite\raysat_3dsmax2010_32server.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\SpywareDetector\SDService.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\pctspk.exe
C:\WINDOWS\system32\PV92Tray.exe
C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe
C:\Program Files\Support.com\BellSouth\hcenter.exe
C:\Program Files\Roxio\CinePlayer\DMXLauncher.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\James n\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.armstrongmywire.com/index.php
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 5.0\reader\activex\AcroIEHelper.ocx
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [PCTVOICE] pctspk.exe
mRun: [PV92TRAY] PV92Tray.exe
mRun: [OpwareSE2] "c:\program files\scansoft\omnipagese2.0\OpwareSE2.exe"
mRun: [tgcmd] "c:\program files\support.com\bellsouth\hcenter.exe" /starthidden /tgcmdwrapper
mRun: [NeroCheck] c:\windows\system32\NeroCheck.exe
mRun: [SystemTraySD] c:\program files\spywaredetector\SDSystemTray.exe -AUTO
mRun: [SDAutoLiveupdate] c:\program files\spywaredetector\LiveUpdateSD.exe -AUTO
mRun: [DMXLauncher] "c:\program files\roxio\cineplayer\DMXLauncher.exe"
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [PWRISOVM.EXE] c:\program files\poweriso\PWRISOVM.EXE
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
StartupFolder: c:\docume~1\jamesn~1\startm~1\programs\startup\magicd~1.lnk - c:\program files\magicdisc\MagicDisc.exe
IE: &Download by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/201
IE: &Grab video by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/204
IE: Do&wnload selected by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/203
IE: Down&load all by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/202
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} - hxxps://components.viewpoint.com/MTSInstallers/MetaStream3.cab?url=http://www.viewpoint.com/cgi-bin/installer.v4/vet_install_premium.pl?3&6&04.00.09.13&premium&unknown&http://www.fabfours.com/Front%20Full%20Size%20Winch%20Bumpers%20Dodge%202003%20Winch%20Bumper%20A1050?noreloadredir
DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - hxxp://download.divx.com/player/DivXBrowserPlugin.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: SDNotify - c:\program files\spywaredetector\SDNotify.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\jamesn~1\applic~1\mozilla\firefox\profiles\06lgyvcy.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?ei=utf-8&fr=megaup&p=
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0010-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-3-23 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-3-23 72944]
R2 mi-raysat_3dsmax2010_32;mental ray 3.7 Satellite for Autodesk 3ds Max 2010 32-bit 32-bit;c:\program files\autodesk\3ds max 2010\mentalray\satellite\raysat_3dsmax2010_32server.exe [2009-3-12 86016]
R2 SDService;SDService;c:\program files\spywaredetector\SDService.exe [2007-9-2 251344]
S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\roxio\digital home 10\RoxioUpnpService10.exe [2007-8-24 362992]
S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxLiveShare10.exe [2007-8-24 309744]
S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxWatch10.exe [2007-8-24 166384]
S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\roxio\digital home 10\RoxioUPnPRenderer10.exe [2007-8-24 72176]
S3 RoxMediaDB10;RoxMediaDB10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxMediaDB10.exe [2007-8-24 1083888]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-3-23 7408]

=============== Created Last 30 ================

2009-09-30 17:11 <DIR> --d----- c:\program files\ESET
2009-09-29 11:54 95,616 a------- c:\windows\junction.exe
2009-09-29 11:38 <DIR> --d----- c:\program files\stm
2009-09-28 15:53 <DIR> a-dshr-- C:\cmdcons
2009-09-28 15:51 229,888 a------- c:\windows\PEV.exe
2009-09-28 15:51 161,792 a------- c:\windows\SWREG.exe
2009-09-28 15:51 98,816 a------- c:\windows\sed.exe
2009-09-25 17:24 21,840 a------t c:\windows\system32\SIntfNT.dll
2009-09-25 17:24 17,212 a------t c:\windows\system32\SIntf32.dll
2009-09-25 17:24 12,067 a------t c:\windows\system32\SIntf16.dll
2009-09-24 17:20 <DIR> --d----- c:\program files\Sierra
2009-09-17 23:24 <DIR> --d----- c:\windows\East India Company v1.01 Update

==================== Find3M ====================

2009-09-25 14:26 43,520 a------- c:\windows\system32\CmdLineExt03.dll
2009-09-10 14:54 38,224 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 14:53 19,160 a------- c:\windows\system32\drivers\mbam.sys
2007-09-05 21:18 81,920 a------- c:\docume~1\jamesn~1\applic~1\ezpinst.exe
2007-09-05 21:18 47,360 a------- c:\docume~1\jamesn~1\applic~1\pcouffin.sys
2003-12-18 11:33 20,102 a------- c:\program files\Readme.txt
2003-09-03 07:46 10,960 a------- c:\program files\EULA.txt
2006-05-03 06:06 163,328 ---shr-- c:\windows\system32\flvDX.dll
2007-02-21 07:47 31,232 ---shr-- c:\windows\system32\msfDX.dll
2008-03-16 09:30 216,064 ---shr-- c:\windows\system32\nbDX.dll

============= FINISH: 18:40:50.35 ===============

Thanks again for your kindness

Attached Files



#12 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:50 PM

Posted 02 October 2009 - 07:05 AM

Hi bobmaluga,

For the Spyware Detector installation...once we're done here, you'll need to work with their tech support...I'm not familiar with that error and couldn't find any information about it.

I see there were a lot of files infected that appear to be games and applications. If they were downloaded from a torrent, I would be very concerned about these results. I did not include in the fix, but I do strongly recomment you delete them as viruses are often passed via P2P sharing.

The log shows that you have been using so called peer-to-peer or file-sharing programmes (in your case Azereus Vuze and uTorrent). These programmes allow to share files between users as the name(s) suggest. In today's world the cyber crime has come a long way and any means is used to infect personal computers to make use of their stored data or machine power for further propagation of their malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. I recommend that you uninstall this program. That is optional, however. If you decide to not uninstall, please refrain from using it until I let you know your computer is clean.



Step 1

Yes, you did need to use the quotes, so all should be good now. Just to be safe, please run Junction again and post the log to ensure it worked.

We need to scan the system with this special tool:

* Please download and save:

Junction.zip

* Unzip it and place Junction.exe in the Windows directory (C:\Windows).
* Go to Start => Run... => Copy and paste the following command in the Run box and click OK:

cmd /c junction -s c:\ >log.txt&log.txt& del log.txt

A command window opens starting to scan the system. Wait until a log file opens. Copy and paste the log in your next reply.


Step 2


Please download a new copy of Combofix and save to your desktop. (IT's constantly updated.)
HEre are the download links:
Bleeping Computer
ForoSpyware


1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

File::
C:\Documents and Settings\James n\Desktop\bac\sysguard.exe
C:\WINDOWS\system32\winjvd32(2).dll
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\17\299e4e91-4c5e4a17
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\24\9541718-57d5d698
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\41\529ea6e9-7c6fc82c
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\42\9436b6a-5cfe93e6
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\330fa4eb-4874cf07
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\7d3deceb-191b2782
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\49\156d9cb1-50bda1ec
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\54\480b0ef6-17ff5d42
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\56\3c28cc78-17ae6203
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-1a434e1-157ff57b.class
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-4bee71a-19bc0889.class
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-27406485-209fe0f3.zip
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-5b7fd168-52299e20.zip
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-2863fd48-3dc40a8c.zip
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-74249065-57c6b959.zip
C:\Documents and Settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\OP.jar-4b9c0e39-67f435fc.zip

Registry::
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Explorer Bars]
"{32683183-48a0-441b-a342-7c2a440a9478}"=-
[-HKEY_CLASSES_ROOT\CLSID\{32683183-48a0-441b-a342-7c2a440a9478}]


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


Step 3

Next, we need to update Java.
Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 16 and save it to your desktop.
  • Scroll down to where it says "Java Runtime Environment (JRE) 6 Update 16...allows end-users to run Java applications".
  • Click the "Download" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u16-windows-i586-p.exe to install the newest version.


Step 4
I don't see an Anti Virus Program running on your machine
  • Download and install an antivirus program, and make sure that you keep it updated
    New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
    Two good antivirus programs free for non-commercial home use are Avast! and Antivir
    Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.

Step 5
Now, we need to update Windows to prevent this from happening again.

It is important that you visit Windows Update regularly. This will ensure your computer has always the latest security updates available installed on your computer.

Please check now and if there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates. Please let me know when you have done this.

Step 6
In your reply, please post:
  • Junction log
  • CF Log
  • Updated DDS log


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#13 bobmaluga

bobmaluga
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 02 October 2009 - 03:19 PM

Hi etavares and thanks once again.

I have went to windows update and updated and install everything i seen.
I also installed Avira Antivir Personal free version. it wanted to update and scan for first time and i let it.But when it seemed like it was not doing anything for 15:00 minutes so I aborted. also as I was downloading and updating windows Avira bleeped and a window poped up saying "c:\program Files\SpywareDetector\SDNotify.dll contains recognition pattern of the ADSPY/Spyware detector adware or spyware" and it hapened six different times. I know you said your not familiar with it but do tou think deleting that .dll may stop it . I tried to get Avira to deni access or quarentine on two of the occasions but I think it was all for not.
Here are the log in order of the steps.


Junction v1.05 - Windows junction creator and reparse point viewer
Copyright © 2000-2007 Mark Russinovich
Systems Internals - http://www.sysinternals.com


Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.


...

...

...


Failed to open \\?\c:\\Documents and Settings\James n\Desktop\RootRepeal.exe: Access is denied.


...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

.No reparse points found.


ComboFix 09-10-01.05 - James n 10/02/2009 11:40.3.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.991.689 [GMT -4:00]
Running from: c:\documents and settings\James n\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\James n\Desktop\CFScript.txt
* Created a new restore point

FILE ::
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\17\299e4e91-4c5e4a17"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\24\9541718-57d5d698"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\41\529ea6e9-7c6fc82c"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\42\9436b6a-5cfe93e6"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\330fa4eb-4874cf07"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\7d3deceb-191b2782"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\49\156d9cb1-50bda1ec"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\54\480b0ef6-17ff5d42"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\56\3c28cc78-17ae6203"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-1a434e1-157ff57b.class"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-4bee71a-19bc0889.class"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-27406485-209fe0f3.zip"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-5b7fd168-52299e20.zip"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-2863fd48-3dc40a8c.zip"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-74249065-57c6b959.zip"
"c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\OP.jar-4b9c0e39-67f435fc.zip"
"c:\documents and settings\James n\Desktop\bac\sysguard.exe"
"c:\windows\system32\winjvd32(2).dll"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\17\299e4e91-4c5e4a17
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\24\9541718-57d5d698
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\41\529ea6e9-7c6fc82c
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\42\9436b6a-5cfe93e6
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\330fa4eb-4874cf07
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\43\7d3deceb-191b2782
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\49\156d9cb1-50bda1ec
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\54\480b0ef6-17ff5d42
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\6.0\56\3c28cc78-17ae6203
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-1a434e1-157ff57b.class
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-4bee71a-19bc0889.class
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-27406485-209fe0f3.zip
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\eRT.jar-5b7fd168-52299e20.zip
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-2863fd48-3dc40a8c.zip
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-74249065-57c6b959.zip
c:\documents and settings\James n\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\OP.jar-4b9c0e39-67f435fc.zip
c:\documents and settings\James n\Desktop\bac\sysguard.exe
c:\windows\system32\winjvd32(2).dll

.
((((((((((((((((((((((((( Files Created from 2009-09-02 to 2009-10-02 )))))))))))))))))))))))))))))))
.

2009-09-30 21:11 . 2009-09-30 21:11 -------- d-----w- c:\program files\ESET
2009-09-29 15:54 . 2007-07-24 19:58 95616 ----a-w- c:\windows\junction.exe
2009-09-29 15:38 . 2009-09-29 15:38 -------- d-----w- c:\program files\stm
2009-09-25 21:24 . 2009-09-25 22:08 21840 ----atw- c:\windows\system32\SIntfNT.dll
2009-09-25 21:24 . 2009-09-25 22:08 17212 ----atw- c:\windows\system32\SIntf32.dll
2009-09-25 21:24 . 2009-09-25 22:08 12067 ----atw- c:\windows\system32\SIntf16.dll
2009-09-24 21:20 . 2009-09-24 21:20 -------- d-----w- c:\program files\Sierra
2009-09-18 03:24 . 2009-09-18 03:24 -------- d-----w- c:\windows\East India Company v1.01 Update

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-02 14:31 . 2007-11-13 02:49 -------- d-----w- c:\program files\SpywareDetector
2009-09-29 14:54 . 2006-01-31 02:03 -------- d-----w- c:\program files\Viewpoint
2009-09-29 14:54 . 2006-01-31 02:03 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-09-26 22:40 . 2009-04-01 02:35 -------- d-----w- c:\program files\hs
2009-09-25 22:05 . 2007-10-08 19:21 -------- d-----w- c:\documents and settings\James n\Application Data\uTorrent
2009-09-25 18:26 . 2007-06-21 02:52 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2009-09-17 18:45 . 2008-02-20 02:23 -------- d-----w- c:\program files\DAMN NFO Viewer
2009-09-12 04:52 . 2009-07-23 18:07 147552 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2009-09-11 22:52 . 2007-05-30 23:47 -------- d-----w- c:\program files\Bethesda Softworks
2009-09-10 18:54 . 2009-04-01 02:35 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 18:53 . 2009-04-01 02:35 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-28 02:14 . 2009-08-28 02:14 -------- d-----w- c:\documents and settings\James n\Application Data\GetRightToGo
2009-07-23 18:40 . 2006-01-26 23:40 52688 ----a-w- c:\documents and settings\James n\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2003-12-18 15:33 . 2009-09-24 21:29 20102 ----a-w- c:\program files\Readme.txt
2003-09-03 11:46 . 2009-09-24 21:29 10960 ----a-w- c:\program files\EULA.txt
2006-05-03 10:06 . 2009-01-10 22:54 163328 --sh--r- c:\windows\system32\flvDX.dll
2007-02-21 11:47 . 2009-01-10 22:54 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 13:30 . 2009-01-10 22:54 216064 --sh--r- c:\windows\system32\nbDX.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-09-11 86960]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"OpwareSE2"="c:\program files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe" [2003-05-08 49152]
"tgcmd"="c:\program files\Support.com\BellSouth\hcenter.exe" [2005-08-31 1277952]
"NeroCheck"="c:\windows\system32\NeroCheck.exe" [2007-08-15 155648]
"SystemTraySD"="c:\program files\SpywareDetector\SDSystemTray.exe" [2007-08-24 681424]
"SDAutoLiveupdate"="c:\program files\SpywareDetector\LiveUpdateSD.exe" [2007-08-24 402896]
"DMXLauncher"="c:\program files\Roxio\CinePlayer\DMXLauncher.exe" [2007-08-14 113136]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-04-19 7700480]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-04-19 86016]
"PWRISOVM.EXE"="c:\program files\PowerISO\PWRISOVM.EXE" [2008-07-07 167936]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]
"PCTVOICE"="pctspk.exe" - c:\windows\system32\pctspk.exe [2003-04-25 180224]
"PV92TRAY"="PV92Tray.exe" - c:\windows\system32\PV92Tray.exe [2003-04-25 135168]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2007-04-19 1626112]

c:\documents and settings\James n\Start Menu\Programs\Startup\
MagicDisc.lnk - c:\program files\MagicDisc\MagicDisc.exe [2007-10-28 557568]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-22 16:05 356352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\SDNotify]
2007-08-22 19:25 167936 ----a-w- c:\program files\SpywareDetector\SDNotify.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ SDEarlyDelete \??\c:\program files\SpywareDetector\0autocheck autochk *

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\Roxio Shared\\10.0\\SharedCOM\\RoxWatchTray10.exe"=
"c:\\Program Files\\Azureus\\Azureus.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\monitor.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\manager.exe"=
"c:\\Program Files\\Autodesk\\Backburner\\server.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\3dsmax.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\mentalray\\satellite\\raysat_3dsmax2010_32server.exe"=
"c:\\Program Files\\Autodesk\\3ds Max 2010\\mentalray\\satellite\\raysat_3dsmax2010_32.exe"=
"c:\\Program Files\\Orbitdownloader\\orbitnet.exe"=
"c:\\Program Files\\Orbitdownloader\\orbitdm.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [3/23/2009 2:07 PM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [3/23/2009 2:07 PM 72944]
R2 SDService;SDService;c:\program files\SpywareDetector\SDService.exe [9/2/2007 11:19 PM 251344]
S2 mi-raysat_3dsmax2010_32;mental ray 3.7 Satellite for Autodesk 3ds Max 2010 32-bit 32-bit;c:\program files\Autodesk\3ds Max 2010\mentalray\satellite\raysat_3dsmax2010_32server.exe [3/12/2009 5:36 PM 86016]
S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\Roxio\Digital Home 10\RoxioUpnpService10.exe [8/24/2007 3:53 PM 362992]
S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxLiveShare10.exe [8/24/2007 3:52 PM 309744]
S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxWatch10.exe [8/24/2007 3:52 PM 166384]
S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\Roxio\Digital Home 10\RoxioUPnPRenderer10.exe [8/24/2007 3:53 PM 72176]
S3 RoxMediaDB10;RoxMediaDB10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxMediaDB10.exe [8/24/2007 3:52 PM 1083888]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [3/23/2009 2:07 PM 7408]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.armstrongmywire.com/index.php
IE: &Download by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/201
IE: &Grab video by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/204
IE: Do&wnload selected by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/203
IE: Down&load all by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/202
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
FF - ProfilePath - c:\documents and settings\James n\Application Data\Mozilla\Firefox\Profiles\06lgyvcy.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?ei=utf-8&fr=megaup&p=
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-02 11:44
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1004336348-1547161642-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(688)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\program files\SpywareDetector\SDNotify.dll
.
Completion time: 2009-10-02 11:47
ComboFix-quarantined-files.txt 2009-10-02 15:46
ComboFix2.txt 2009-09-29 15:24
ComboFix3.txt 2009-09-28 20:05

Pre-Run: 17,439,522,816 bytes free
Post-Run: 17,417,138,176 bytes free

174 --- E O F --- 2007-10-11 06:04


DDS (Ver_09-09-29.01) - NTFSx86
Run by James n at 15:43:14.64 on Fri 10/02/2009
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_16
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.991.683 [GMT -4:00]

AV: AntiVir Desktop *On-access scanning disabled* (Outdated) {AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
svchost.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
c:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Autodesk\3ds Max 2010\mentalray\satellite\raysat_3dsmax2010_32server.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\SpywareDetector\SDService.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\pctspk.exe
C:\WINDOWS\system32\PV92Tray.exe
C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe
C:\Program Files\Support.com\BellSouth\hcenter.exe
C:\Program Files\Roxio\CinePlayer\DMXLauncher.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\James n\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.armstrongmywire.com/index.php
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 5.0\reader\activex\AcroIEHelper.ocx
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [PCTVOICE] pctspk.exe
mRun: [PV92TRAY] PV92Tray.exe
mRun: [OpwareSE2] "c:\program files\scansoft\omnipagese2.0\OpwareSE2.exe"
mRun: [tgcmd] "c:\program files\support.com\bellsouth\hcenter.exe" /starthidden /tgcmdwrapper
mRun: [NeroCheck] c:\windows\system32\NeroCheck.exe
mRun: [SystemTraySD] c:\program files\spywaredetector\SDSystemTray.exe -AUTO
mRun: [SDAutoLiveupdate] c:\program files\spywaredetector\LiveUpdateSD.exe -AUTO
mRun: [DMXLauncher] "c:\program files\roxio\cineplayer\DMXLauncher.exe"
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [PWRISOVM.EXE] c:\program files\poweriso\PWRISOVM.EXE
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
StartupFolder: c:\docume~1\jamesn~1\startm~1\programs\startup\magicd~1.lnk - c:\program files\magicdisc\MagicDisc.exe
IE: &Download by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/201
IE: &Grab video by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/204
IE: Do&wnload selected by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/203
IE: Down&load all by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/202
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} - hxxps://components.viewpoint.com/MTSInstallers/MetaStream3.cab?url=http://www.viewpoint.com/cgi-bin/installer.v4/vet_install_premium.pl?3&6&04.00.09.13&premium&unknown&http://www.fabfours.com/Front%20Full%20Size%20Winch%20Bumpers%20Dodge%202003%20Winch%20Bumper%20A1050?noreloadredir
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1254503085921
DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - hxxp://download.divx.com/player/DivXBrowserPlugin.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: SDNotify - c:\program files\spywaredetector\SDNotify.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\jamesn~1\applic~1\mozilla\firefox\profiles\06lgyvcy.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?ei=utf-8&fr=megaup&p=
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0010-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2009-10-2 11608]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-3-23 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-3-23 72944]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2009-10-2 108289]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2009-10-2 185089]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2009-10-2 55656]
R2 mi-raysat_3dsmax2010_32;mental ray 3.7 Satellite for Autodesk 3ds Max 2010 32-bit 32-bit;c:\program files\autodesk\3ds max 2010\mentalray\satellite\raysat_3dsmax2010_32server.exe [2009-3-12 86016]
R2 SDService;SDService;c:\program files\spywaredetector\SDService.exe [2007-9-2 251344]
S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\roxio\digital home 10\RoxioUpnpService10.exe [2007-8-24 362992]
S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxLiveShare10.exe [2007-8-24 309744]
S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxWatch10.exe [2007-8-24 166384]
S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\roxio\digital home 10\RoxioUPnPRenderer10.exe [2007-8-24 72176]
S3 RoxMediaDB10;RoxMediaDB10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxMediaDB10.exe [2007-8-24 1083888]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-3-23 7408]

=============== Created Last 30 ================

2009-10-02 15:22 <DIR> --dsh--- c:\documents and settings\james n\PrivacIE
2009-10-02 15:21 <DIR> --dsh--- c:\documents and settings\james n\IETldCache
2009-10-02 15:13 100,352 -c------ c:\windows\system32\dllcache\iecompat.dll
2009-10-02 15:12 <DIR> --d----- c:\windows\ie8updates
2009-10-02 15:12 12,800 -c------ c:\windows\system32\dllcache\xpshims.dll
2009-10-02 15:12 246,272 -c------ c:\windows\system32\dllcache\ieproxy.dll
2009-10-02 15:09 <DIR> -cd-h--- c:\windows\ie8
2009-10-02 14:42 153,088 -c------ c:\windows\system32\dllcache\triedit.dll
2009-10-02 14:37 1,315,328 -c------ c:\windows\system32\dllcache\msoe.dll
2009-10-02 14:37 128,512 -c------ c:\windows\system32\dllcache\dhtmled.ocx
2009-10-02 14:23 1,203,922 -c------ c:\windows\system32\dllcache\sysmain.sdb
2009-10-02 14:23 215,552 -c------ c:\windows\system32\dllcache\wordpad.exe
2009-10-02 14:23 2,560 -------- c:\windows\system32\xpsp4res.dll
2009-10-02 14:22 1,089,593 -c------ c:\windows\system32\dllcache\ntprint.cat
2009-10-02 14:22 333,952 -c------ c:\windows\system32\dllcache\srv.sys
2009-10-02 14:20 455,296 -c------ c:\windows\system32\dllcache\mrxsmb.sys
2009-10-02 14:19 1,106,944 -c------ c:\windows\system32\dllcache\msxml3.dll
2009-10-02 14:19 337,408 -c------ c:\windows\system32\dllcache\netapi32.dll
2009-10-02 14:19 331,776 -c------ c:\windows\system32\dllcache\msadce.dll
2009-10-02 14:18 691,712 -c------ c:\windows\system32\dllcache\inetcomm.dll
2009-10-02 14:16 272,128 -c------ c:\windows\system32\dllcache\bthport.sys
2009-10-02 14:16 203,136 -c------ c:\windows\system32\dllcache\rmcast.sys
2009-10-02 14:01 <DIR> --d----- c:\windows\system32\scripting
2009-10-02 14:01 <DIR> --d----- c:\windows\l2schemas
2009-10-02 14:00 <DIR> --d----- c:\windows\system32\en
2009-10-02 14:00 <DIR> --d----- c:\windows\system32\bits
2009-10-02 13:58 <DIR> --d----- c:\windows\ServicePackFiles
2009-10-02 13:39 69,120 -------- c:\windows\system32\wlanapi.dll
2009-10-02 13:39 53,248 -------- c:\windows\system32\tsgqec.dll
2009-10-02 13:39 50,688 -------- c:\windows\system32\tspkg.dll
2009-10-02 13:39 10,240 -------- c:\windows\system32\drivers\sffp_mmc.sys
2009-10-02 13:39 32,768 -------- c:\windows\system32\setupn.exe
2009-10-02 13:39 290,304 -------- c:\windows\system32\rhttpaa.dll
2009-10-02 13:39 61,952 -------- c:\windows\system32\rasqec.dll
2009-10-02 13:39 76,800 -------- c:\windows\system32\qutil.dll
2009-10-02 13:39 62,464 -------- c:\windows\system32\qcliprov.dll
2009-10-02 13:39 291,328 -------- c:\windows\system32\qagentrt.dll
2009-10-02 13:39 150,528 -------- c:\windows\system32\qagent.dll
2009-10-02 13:37 19,569 a------- c:\windows\005047_.tmp
2009-10-02 13:06 23,576 a------- c:\windows\system32\wuapi.dll.mui
2009-10-02 12:32 55,656 a------- c:\windows\system32\drivers\avgntflt.sys
2009-10-02 12:32 <DIR> --d----- c:\program files\Avira
2009-10-02 12:32 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Avira
2009-10-02 12:14 73,728 a------- c:\windows\system32\javacpl.cpl
2009-10-02 11:38 <DIR> --d----- C:\ComboFix
2009-09-30 17:11 <DIR> --d----- c:\program files\ESET
2009-09-29 11:54 95,616 a------- c:\windows\junction.exe
2009-09-29 11:38 <DIR> --d----- c:\program files\stm
2009-09-28 15:53 <DIR> a-dshr-- C:\cmdcons
2009-09-28 15:51 229,888 a------- c:\windows\PEV.exe
2009-09-28 15:51 161,792 a------- c:\windows\SWREG.exe
2009-09-28 15:51 98,816 a------- c:\windows\sed.exe
2009-09-25 17:24 21,840 a------t c:\windows\system32\SIntfNT.dll
2009-09-25 17:24 17,212 a------t c:\windows\system32\SIntf32.dll
2009-09-25 17:24 12,067 a------t c:\windows\system32\SIntf16.dll
2009-09-24 17:20 <DIR> --d----- c:\program files\Sierra
2009-09-17 23:24 <DIR> --d----- c:\windows\East India Company v1.01 Update

==================== Find3M ====================

2009-10-02 14:04 76,487 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2009-10-02 12:14 411,368 a------- c:\windows\system32\deploytk.dll
2009-09-25 14:26 43,520 a------- c:\windows\system32\CmdLineExt03.dll
2009-09-10 14:54 38,224 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 14:53 19,160 a------- c:\windows\system32\drivers\mbam.sys
2009-08-05 05:01 204,800 a------- c:\windows\system32\mswebdvd.dll
2009-07-29 00:37 119,808 a------- c:\windows\system32\t2embed.dll
2009-07-29 00:37 81,920 a------- c:\windows\system32\fontsub.dll
2009-07-17 15:01 58,880 a------- c:\windows\system32\atl.dll
2009-07-13 23:43 286,208 -------- c:\windows\system32\wmpdxm.dll
2007-09-05 21:18 81,920 a------- c:\docume~1\jamesn~1\applic~1\ezpinst.exe
2007-09-05 21:18 47,360 a------- c:\docume~1\jamesn~1\applic~1\pcouffin.sys
2003-12-18 11:33 20,102 a------- c:\program files\Readme.txt
2003-09-03 07:46 10,960 a------- c:\program files\EULA.txt
2006-05-03 06:06 163,328 ---shr-- c:\windows\system32\flvDX.dll
2007-02-21 07:47 31,232 ---shr-- c:\windows\system32\msfDX.dll
2008-03-16 09:30 216,064 ---shr-- c:\windows\system32\nbDX.dll

============= FINISH: 15:43:52.95 ===============

Sorry about the delay but this is all starting to confuse me.

Attached Files



#14 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:50 PM

Posted 03 October 2009 - 09:45 AM

Hi bobmaluga,

No problem about the delay. I'm sorry for the confusion. If you have any questions, please feel free to ask.

The initial Avira scan may take some time. I use Avast! so I don't have much experience with it.

Regarding the warning about the Spy Detector file from Avira, I would "ignore" it if possible. It appears to be a false positive, which can happen occasionally. Once you are able to uninstall Spyware Detector, those warnings will stop. You have SuperAntiSpyware and MBAM which are much more widely regarded as outstanding anti-malware programs.

Regarding your machine, We're in a much better place, but there are still a few key things to do before we clean up.

Root Repeal is still locked out, so we will need to restore permission to it. Then, there's one more CFScript we need to do to clean the registry entry. We also need to run GooredFix as you have that malware impacted your firefox. Finally, I want to run another anti-virus scan to be sure. THere were lots of remnants and I want a second opinion that there are no active viruses left.

Finally, before we get into the fix, I also strongly urge you to upgrade from Adobe Acrobat 5 to Adobe Acrobat 9 which has many more security fixes. I do not believe Acrobat 5 is patched anymore and will have security holes from poisoned PDF files.


Step 1

Restore Permissions for Root Repeal

Please download Inherit by sUBs and save to your desktop.
  • Log into Windows under the "James n" user profile.
  • Drag and drop RootRepeal.exe from your desktop onto Inherit
  • This shall restore permissions to the application.
  • The application should now run normally, and or be able to be deleted.
Please indicate in your next post if this was successful. Try to open or delete RootRepeal.exe.


Step 2
  • Open notepad.
  • Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad.
  • Save it to your desktop (click file, save as) as "fixit.reg" with the quotes.
REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Explorer Bars]
"{32683183-48a0-441b-a342-7c2a440a9478}"=-
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars]
"{32683183-48a0-441b-a342-7c2a440a9478}"=-
[-HKEY_CLASSES_ROOT\CLSID\{32683183-48a0-441b-a342-7c2a440a9478}]

NOTICE: This file was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Locate fixit.reg on your Desktop and double-click on it.
You will receive a prompt similar to: "Do you wish to merge the information into the registry?".
Answer "Yes" and wait for a message to appear similar to "Merged Successfully".

Please reply back letting me know if it merged correctly.


Step 3

Please read and follow all these instructions very carefully.
  • Please download GooredFix and save it to your Desktop.
  • Double-click GooredFix.exe to run it.
  • A log will open, please post the contents of that log in your next reply (it can also be found on your desktop, called Goored.txt).
Step 4

Please do an online scan with Kaspersky WebScanner

Click on Kaspersky Online Scanner

You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make sure that the following are selected:
    • Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    • Scan Options:
    Scan Archives
    Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.
Step 4
In your reply please post:
  • If you were able to run or delete RootRepeal.exe
  • Confirmation the registry fix went as described.
  • Kapersky log
  • A new DDS log (you do not need to post attach.txt)
Step 5

Let's try to uninstall Spyware Detector through a different approach.

We need to cleanup Spyware Detector.
  • Click Here and download the Microsoft Cleanup Utility.
  • Install it and then go to Start > All Programs then locate the folder called Microsoft Cleanup Utility
  • Open Microsoft Cleanup Utility then start the utility.
  • Scroll down until you see Spyware Detector, highlight it by clicking it once then choose remove.
  • Reboot and see if the program is still there.

Step 6
In your reply, please post:
  • results of step 1
  • results of step 2
  • GooredFix log from step 3
  • Kapersky log from step 4
  • If you were able to cleanup Spyware Detector
  • a fresh DDS log (i don't need attach.txt this time)

Edited by etavares, 03 October 2009 - 09:46 AM.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#15 bobmaluga

bobmaluga
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:11:50 PM

Posted 03 October 2009 - 10:53 AM

Hi etavares
One Question how do i change the user profile. I only see mine on windows startup to click on. Is there a trick?when I went in to safemode it give me two choices one is mine and the other just says admenistator.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users