Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser Slow, Redirected Searches and Pop Windows


  • This topic is locked This topic is locked
22 replies to this topic

#1 freedom lover

freedom lover

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 11 October 2009 - 02:24 AM

greetings,

my internet browser (firefox) is really slow and has popups and search redirects...the infection started as SecurityTool...I went in and manually deleted the files I could find which SecurityTool was using...but there are some reminants of the infection, which are stated above...also, those popups are both in IE and Firefox...even though I am only browsing in firefox...I am currently using spywareblaster, avira, online armor...and I had malwarebytes installed but something about this infection disabled it, and now I can't run it...and when I try to re-install it, it doesn't work...it says "searching for mbam.exe"...

thanks for the help!!


here is the dds.txt log:



DDS (Ver_09-09-29.01) - NTFSx86
Run by Forrest at 0:10:54.65 on Sun 10/11/2009
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_14
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1023.187 [GMT -7:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
FW: Online Armor Firewall *enabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Tall Emu\Online Armor\OAcat.exe
C:\Program Files\Tall Emu\Online Armor\oasrv.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\Avira\AntiVir Desktop\sched.exe
C:\Program Files\Avira\Avira\AntiVir Desktop\avguard.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\System32\ezSP_Px.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\AGRSMMSG.exe
C:\WINDOWS\Mixer.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Avira\Avira\AntiVir Desktop\avgnt.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Tall Emu\Online Armor\oaui.exe
C:\Program Files\Vidalia Bundle\Vidalia\vidalia.exe
C:\Program Files\uTorrent\uTorrent.exe
C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe
C:\Program Files\Tall Emu\Online Armor\OAhlp.exe
C:\Program Files\Vidalia Bundle\Privoxy\privoxy.exe
C:\Program Files\sony\usbsircs\usbsircs.exe
C:\Program Files\Vidalia Bundle\Tor\tor.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Macromedia\Fireworks 8\Fireworks.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\Forrest\My Documents\Downloads\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.sony.com/vaiopeople
uInternet Connection Wizard,ShellNext = hxxp://www.sony.com/vaiopeople
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: {7b857fa0-d8e2-4324-844c-3ca2acd36d07} - vivudoma.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Vidalia] "c:\program files\vidalia bundle\vidalia\vidalia.exe"
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
uRun: [LightScribe Control Panel] c:\program files\common files\lightscribe\LightScribeControlPanel.exe -hidden
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [ezShieldProtector for Px] c:\windows\system32\ezSP_Px.exe
mRun: [VAIOSurvey] c:\program files\sony\vaio survey\surveysa.exe
mRun: [ZTgServerSwitch] "c:\program files\support.com\client\bin\tgcmd.exe" /server
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [C-Media Mixer] Mixer.exe /startup
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [VAIO Recovery] c:\windows\sonysys\vaio recovery\PartSeal.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [avgnt] "c:\program files\avira\avira\antivir desktop\avgnt.exe" /min
mRun: [7931373338] c:\documents and settings\forrest\application data\7931373338\7931373338.exe
mRun: [9560204689] c:\documents and settings\forrest\application data\9560204689\9560204689.exe
mRun: [85389942] c:\documents and settings\all users\application data\85389942\85389942.exe
mRun: [45035017] c:\documents and settings\all users\application data\45035017\45035017.exe
mRun: [@OnlineArmor GUI] "c:\program files\tall emu\online armor\oaui.exe"
mRun: [hokajofini] Rundll32.exe "devopaha.dll",s
mRun: [lahohudan] Rundll32.exe "c:\windows\system32\fipuyuko.dll",a
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\privoxy.lnk - c:\program files\vidalia bundle\privoxy\privoxy.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\quicke~1.lnk - c:\program files\quicken\bagent.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\remoco~1.lnk - c:\program files\sony\usbsircs\usbsircs.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {36ECAF82-3300-8F84-092E-AFF36D6C7040} - {86529161-034E-4F8A-88D2-3C625E612E04} - c:\program files\winhttrack\WinHTTrackIEBar.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: microsoft.com\www.update
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_14-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_14-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_14-windows-i586.cab
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SSODL: mudedomek - {20861ac0-c772-40e3-a021-4bf954040b1d} - c:\windows\system32\fipuyuko.dll
STS: kupuhivus: {20861ac0-c772-40e3-a021-4bf954040b1d} - c:\windows\system32\fipuyuko.dll
SEH: OA Shell Helper: {4f07da45-8170-4859-9b5f-037ef2970034} - c:\progra~1\tallem~1\online~1\oaevent.dll
LSA: Notification Packages = scecli tadezuzu.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\forrest\applic~1\mozilla\firefox\profiles\xjb7zysc.default\
FF - prefs.js: browser.startup.homepage - hxxp://extremetracking.com/open;ref1?login=picsass|http://mail.google.com/mail/?shva=1#inbox|http://picsandass.com/pics/thumbnails.php?album=lasthits&cat=0&page=1|http://whos.amung.us/stats/readers/c7wikkg2seo1/|http://www.staticfiends.com/
FF - plugin: c:\program files\real\realone player\netscape6\nppl3260.dll
FF - plugin: c:\program files\real\realone player\netscape6\nprjplug.dll
FF - plugin: c:\program files\real\realone player\netscape6\nprpjplug.dll
FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-10-9 64160]
R1 avgio;avgio;c:\program files\avira\avira\antivir desktop\avgio.sys [2009-8-13 11608]
R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [2009-10-7 200784]
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [2009-10-7 24656]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [2009-10-7 29776]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\avira\antivir desktop\sched.exe [2009-8-13 108289]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\avira\antivir desktop\avguard.exe [2009-8-13 185089]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2009-8-13 55656]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccEvtMgr.exe [2003-9-5 255136]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSetMgr.exe [2003-9-5 234656]

Attached Files



BC AdBot (Login to Remove)

 


#2 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 12 October 2009 - 03:51 PM

I forgot to mention that online armor gets a lot of requests from files like:

nihujoti.dll
doluwuhi.dll
ruyupuno.exe


peace

:(

Hello freedom lover,

We ask that once you have posted your log and are waiting, please DO NOT "bump" your thread or make further replies until it has been responded to by a member of the HJT Team. The reason we ask this or do not respond to your requests is because that would remove you from the active queue that Techs and Staff have access to. The malware staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response, there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

That is why I have made an edit to your last post, instead of a reply. Please do not multiple post here, as that only pushes you further down the queue and causes confusion to the staff.

Please be patient. It may take a while to get a response but your log will be reviewed and answered as soon as possible.

Thank you for understanding.

Regards,

The weatherman
(Moderator)

Edited by The weatherman, 12 October 2009 - 04:19 PM.


#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:09 PM

Posted 25 October 2009 - 07:41 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.

    First Location
    Second Location
    Third Location

  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Posted Image
m0le is a proud member of UNITE

#4 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 26 October 2009 - 02:31 AM

Thank you!!

:(


here is the dds.txt:


----


DDS (Ver_09-10-26.01) - NTFSx86
Run by Forrest at 0:15:56.21 on Mon 10/26/2009
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_15
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1023.182 [GMT -7:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
FW: Online Armor Firewall *enabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Tall Emu\Online Armor\OAcat.exe
C:\Program Files\Tall Emu\Online Armor\oasrv.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\Avira\AntiVir Desktop\sched.exe
C:\Program Files\Avira\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\System32\ezSP_Px.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\AGRSMMSG.exe
C:\WINDOWS\Mixer.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Avira\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Tall Emu\Online Armor\oaui.exe
C:\Program Files\Vidalia Bundle\Vidalia\vidalia.exe
C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe
C:\Program Files\Tall Emu\Online Armor\OAhlp.exe
C:\Program Files\Vidalia Bundle\Privoxy\privoxy.exe
C:\Program Files\sony\usbsircs\usbsircs.exe
C:\Program Files\Vidalia Bundle\Tor\tor.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Forrest\My Documents\Downloads\RootRepeal.exe
C:\Documents and Settings\Forrest\Local Settings\Temp\Rar$EX09.406\Audacity\audacity.exe
C:\Program Files\Total Video Converter\tvp.exe
C:\Documents and Settings\Forrest\My Documents\Downloads\dds(2).scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.sony.com/vaiopeople
uInternet Connection Wizard,ShellNext = hxxp://www.sony.com/vaiopeople
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: {7b857fa0-d8e2-4324-844c-3ca2acd36d07} - kejefuru.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Vidalia] "c:\program files\vidalia bundle\vidalia\vidalia.exe"
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
uRun: [LightScribe Control Panel] c:\program files\common files\lightscribe\LightScribeControlPanel.exe -hidden
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [ezShieldProtector for Px] c:\windows\system32\ezSP_Px.exe
mRun: [VAIOSurvey] c:\program files\sony\vaio survey\surveysa.exe
mRun: [ZTgServerSwitch] "c:\program files\support.com\client\bin\tgcmd.exe" /server
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [C-Media Mixer] Mixer.exe /startup
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [VAIO Recovery] c:\windows\sonysys\vaio recovery\PartSeal.exe
mRun: [avgnt] "c:\program files\avira\avira\antivir desktop\avgnt.exe" /min
mRun: [7931373338] c:\documents and settings\forrest\application data\7931373338\7931373338.exe
mRun: [9560204689] c:\documents and settings\forrest\application data\9560204689\9560204689.exe
mRun: [85389942] c:\documents and settings\all users\application data\85389942\85389942.exe
mRun: [45035017] c:\documents and settings\all users\application data\45035017\45035017.exe
mRun: [@OnlineArmor GUI] "c:\program files\tall emu\online armor\oaui.exe"
mRun: [hokajofini] Rundll32.exe "bawawaza.dll",s
mRun: [lahohudan] Rundll32.exe "c:\windows\system32\dujujewo.dll",a
mRun: [35763226] c:\docume~1\alluse~1\applic~1\35763226\35763226.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\privoxy.lnk - c:\program files\vidalia bundle\privoxy\privoxy.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\quicke~1.lnk - c:\program files\quicken\bagent.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\remoco~1.lnk - c:\program files\sony\usbsircs\usbsircs.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {36ECAF82-3300-8F84-092E-AFF36D6C7040} - {86529161-034E-4F8A-88D2-3C625E612E04} - c:\program files\winhttrack\WinHTTrackIEBar.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: microsoft.com\www.update
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SSODL: levoruwor - {60975b00-70c3-46ac-883b-dd5e4cded930} - c:\windows\system32\nihujoti.dll
SSODL: kinepuliw - {01eaff08-a527-437d-acd2-b108e305ea34} - c:\windows\system32\nihujoti.dll
SSODL: vihivilus - {4f9a86b5-055b-4b00-9f34-ea6317226327} - c:\windows\system32\dujujewo.dll
STS: mujuzedij: {60975b00-70c3-46ac-883b-dd5e4cded930} - c:\windows\system32\nihujoti.dll
STS: gahurihor: {01eaff08-a527-437d-acd2-b108e305ea34} - c:\windows\system32\nihujoti.dll
STS: gahurihor: {4f9a86b5-055b-4b00-9f34-ea6317226327} - c:\windows\system32\dujujewo.dll
SEH: OA Shell Helper: {4f07da45-8170-4859-9b5f-037ef2970034} - c:\progra~1\tallem~1\online~1\oaevent.dll
LSA: Notification Packages = scecli begimepo.dll
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\forrest\applic~1\mozilla\firefox\profiles\xjb7zysc.default\
FF - prefs.js: browser.startup.homepage - hxxp://extremetracking.com/open;ref1?login=picsass|http://mail.google.com/mail/?shva=1#inbox|http://picsandass.com/pics/thumbnails.php?album=lasthits&cat=0&page=1|http://whos.amung.us/stats/readers/c7wikkg2seo1/|http://www.staticfiends.com/
FF - plugin: c:\program files\real\realone player\netscape6\nppl3260.dll
FF - plugin: c:\program files\real\realone player\netscape6\nprjplug.dll
FF - plugin: c:\program files\real\realone player\netscape6\nprpjplug.dll
FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-10-9 64160]
R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [2009-10-7 200784]
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [2009-10-7 24656]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [2009-10-7 29776]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\avira\antivir desktop\sched.exe [2009-8-13 108289]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-7-3 1028432]
R2 OAcat;Online Armor Helper Service;c:\program files\tall emu\online armor\oacat.exe [2009-10-7 1244360]
R2 SvcOnlineArmor;Online Armor;c:\program files\tall emu\online armor\oasrv.exe [2009-10-7 3184328]

=============== Created Last 30 ================

2009-10-25 05:46:36 37888 --sh--w- c:\windows\system32\siguhafe.dll
2009-10-24 08:12:31 0 d-----w- c:\docume~1\alluse~1\applic~1\35763226
2009-10-23 06:08:24 2713 --sh--w- c:\windows\system32\yabikuse.exe
2009-10-20 08:31:01 39424 --sh--w- c:\windows\system32\zinipelu.dll
2009-10-10 10:17:29 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-10-10 05:27:44 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-10-10 05:24:20 0 dc-h--w- c:\docume~1\alluse~1\applic~1\{EF63305C-BAD7-4144-9208-D65528260864}
2009-10-10 05:24:12 0 d-----w- c:\program files\Lavasoft
2009-10-07 21:48:55 0 d-----w- c:\docume~1\forrest\applic~1\OnlineArmor
2009-10-07 21:48:55 0 d-----w- c:\docume~1\alluse~1\applic~1\OnlineArmor
2009-10-07 21:48:39 24656 ----a-w- c:\windows\system32\drivers\OAmon.sys
2009-10-07 21:48:38 29776 ----a-w- c:\windows\system32\drivers\OAnet.sys
2009-10-07 21:48:38 200784 ----a-w- c:\windows\system32\drivers\OADriver.sys
2009-10-07 21:48:38 0 d-----w- c:\program files\Tall Emu
2009-10-07 21:36:16 0 d-----w- c:\program files\SpywareBlaster
2009-10-07 21:27:16 0 d-s---w- C:\ComboFix
2009-10-07 21:27:15 388608 ----a-w- c:\windows\system32\CF11305.exe
2009-10-07 21:00:17 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-07 21:00:15 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-07 20:02:33 0 d-----w- c:\windows\pss
2009-10-06 20:34:34 0 d-----w- c:\docume~1\forrest\applic~1\Tor
2009-10-06 20:34:32 0 d-----w- c:\program files\Vidalia Bundle
2009-10-06 20:10:12 0 d-sh--w- c:\documents and settings\forrest\IECompatCache
2009-10-06 19:56:22 2713 --sh--w- c:\windows\system32\lodehiwe.exe
2009-09-29 21:58:45 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-09-28 20:49:09 59264 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2009-09-28 20:49:09 59264 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
2009-09-28 20:49:03 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys
2009-09-28 20:49:03 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2009-09-28 19:29:09 208744 ----a-w- c:\windows\system32\muweb.dll
2009-09-28 19:29:08 27496 ----a-w- c:\windows\system32\mucltui.dll.mui
2009-09-28 19:29:08 268648 ----a-w- c:\windows\system32\mucltui.dll
2009-09-26 22:47:16 0 d-----w- c:\docume~1\forrest\applic~1\Drag'n Drop CD+DVD

==================== Find3M ====================

2009-08-05 09:11:47 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-29 04:53:14 82432 ----a-w- c:\windows\system32\fontsub.dll
2009-07-29 04:53:14 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-07-29 04:53:14 119808 ----a-w- c:\windows\system32\t2embed(3).dll
2009-07-29 04:53:14 119808 ----a-w- c:\windows\system32\t2embed(2).dll
2009-07-29 04:37:01 119808 ------w- c:\windows\system32\SET116D.tmp
2009-07-21 15:19:48 52224 --sha-w- c:\windows\system32\bawawaza.dll
2009-07-21 15:19:48 52224 --sha-w- c:\windows\system32\begimepo.dll
2009-07-22 18:07:29 90112 --sha-w- c:\windows\system32\bezayedo.dll
2009-07-22 04:17:19 38400 --sha-w- c:\windows\system32\bihorugi.dll
2009-07-16 02:14:11 1085474 --sha-w- c:\windows\system32\bivemufi.exe
2009-07-23 06:07:32 37888 --sha-w- c:\windows\system32\buraboto.dll
2009-07-21 15:19:03 52224 --sha-w- c:\windows\system32\difoyuro.dll
2009-07-12 20:37:59 88064 --sha-w- c:\windows\system32\doluwuhi.dll
2009-07-24 08:11:50 89088 --sha-w- c:\windows\system32\dujujewo.dll
2009-07-16 02:14:11 88576 --sha-w- c:\windows\system32\fahazura.dll
2009-07-07 07:56:28 89088 --sha-w- c:\windows\system32\fefiweta.dll
2009-07-07 07:56:28 52224 --sha-w- c:\windows\system32\fipufola.dll
2009-07-10 07:58:42 87552 --sha-w- c:\windows\system32\fipuyuko.dll
2009-07-09 19:58:54 1011718 --sha-w- c:\windows\system32\fugudipi.exe
2009-07-18 07:03:51 1116720 --sha-w- c:\windows\system32\gafuyowo.exe
2009-07-12 20:37:58 50688 --sha-w- c:\windows\system32\garetuso.dll
2009-07-11 16:20:15 88064 --sha-w- c:\windows\system32\gazikiri.dll
2009-07-17 02:52:00 1111915 --sha-w- c:\windows\system32\gebuhiri.exe
2009-07-20 20:32:33 38400 --sha-w- c:\windows\system32\gejekoyu.dll
2009-07-10 22:01:06 87552 --sha-w- c:\windows\system32\gurinuwe.dll
2009-07-19 07:03:33 38400 --sha-w- c:\windows\system32\guyipiwa.dll
2009-07-26 05:46:31 1011753 --sha-w- c:\windows\system32\haguyofe.exe
2009-07-13 20:38:14 37888 --sha-w- c:\windows\system32\hakurevi.dll
2009-07-14 20:28:57 88576 --sha-w- c:\windows\system32\honomige.dll
2009-07-13 08:37:57 1011513 --sha-w- c:\windows\system32\hosopovo.exe
2009-07-15 13:34:09 38912 --sha-w- c:\windows\system32\hozekopo.dll
2009-07-12 20:38:00 38400 --sha-w- c:\windows\system32\jigefuwi.dll
2009-07-17 18:48:52 89088 --sha-w- c:\windows\system32\kagohaku.dll
2009-07-21 15:19:48 52224 --sha-w- c:\windows\system32\kejefuru.dll
2009-07-09 19:58:54 37376 --sha-w- c:\windows\system32\kihinuga.dll
2009-07-21 15:19:05 38400 --sha-w- c:\windows\system32\kipiheba.dll
2009-07-07 07:56:28 1050147 --sha-w- c:\windows\system32\kirasahi.exe
2009-07-07 19:56:58 1049635 --sha-w- c:\windows\system32\kozibala.exe
2009-07-25 17:46:06 90112 --sha-w- c:\windows\system32\kutosiva.dll
2009-07-14 20:28:57 51712 --sha-w- c:\windows\system32\lebobofu.dll
2009-07-12 04:20:24 38400 --sha-w- c:\windows\system32\lesufuya.dll
2009-07-18 19:03:05 89088 --sha-w- c:\windows\system32\lonufeyi.dll
2009-07-18 07:03:51 38400 --sha-w- c:\windows\system32\maguhugi.dll
2009-07-16 14:52:07 89088 --sha-w- c:\windows\system32\mevozeha.dll
2009-07-22 18:07:30 1051170 --sha-w- c:\windows\system32\mivohilu.exe
2009-07-20 20:32:33 90112 --sha-w- c:\windows\system32\mokosuha.dll
2009-07-17 02:52:00 38400 --sha-w- c:\windows\system32\molavefe.dll
2009-07-10 22:01:06 1050659 --sha-w- c:\windows\system32\mosowisi.exe
2009-07-23 18:07:43 90112 --sha-w- c:\windows\system32\mubodigi.dll
2009-07-25 17:46:07 1011751 --sha-w- c:\windows\system32\mulivusi.exe
2009-07-12 04:20:24 1011354 --sha-w- c:\windows\system32\munokesu.exe
2009-07-11 16:20:15 1011348 --sha-w- c:\windows\system32\muzipemi.exe
2009-07-20 08:30:29 89600 --sha-w- c:\windows\system32\naluwota.dll
2009-07-21 15:19:04 1050658 --sha-w- c:\windows\system32\nepivoyi.exe
2009-07-19 07:03:33 1011511 --sha-w- c:\windows\system32\nugojuwa.exe
2009-07-19 07:03:33 3 --sha-w- c:\windows\system32\nuzemuve.dll
2009-07-26 05:46:31 37888 --sha-w- c:\windows\system32\pulemebo.dll
2009-07-18 19:03:05 1113163 --sha-w- c:\windows\system32\pusogumu.exe
2009-07-16 14:52:07 38400 --sha-w- c:\windows\system32\rapepute.dll
2009-07-16 14:52:07 1111915 --sha-w- c:\windows\system32\rapepute.exe
2009-07-08 23:03:02 37376 --sha-w- c:\windows\system32\ravezula.dll
2009-07-07 19:56:58 38400 --sha-w- c:\windows\system32\regoyivu.dll
2009-07-18 07:03:51 89088 --sha-w- c:\windows\system32\rogahefa.dll
2009-07-10 07:58:42 37376 --sha-w- c:\windows\system32\rogavove.dll
2009-07-22 04:17:19 89088 --sha-w- c:\windows\system32\romabotu.dll
2009-07-23 06:07:33 89600 --sha-w- c:\windows\system32\romenepo.dll
2009-07-12 20:37:58 1011386 --sha-w- c:\windows\system32\ruyupuno.exe
2009-07-25 05:46:26 89600 --sha-w- c:\windows\system32\ruyutego.dll
2009-07-24 08:11:51 1011747 --sha-w- c:\windows\system32\sapahore.exe
2009-07-07 19:56:58 88576 --sha-w- c:\windows\system32\satevowa.dll
2009-07-25 17:46:06 38400 --sha-w- c:\windows\system32\seduvumo.dll
2009-07-14 20:28:57 1112864 --sha-w- c:\windows\system32\seduvumo.exe
2009-07-11 16:20:15 37888 --sha-w- c:\windows\system32\soluwale.dll
2009-07-10 07:58:42 1011343 --sha-w- c:\windows\system32\talefake.exe
2009-07-23 18:07:43 38400 --sha-w- c:\windows\system32\tasurepa.dll
2009-07-22 18:07:29 37888 --sha-w- c:\windows\system32\tiyupotu.dll
2009-07-13 20:38:14 87552 --sha-w- c:\windows\system32\toraheke.dll
2009-07-17 02:52:00 89088 --sha-w- c:\windows\system32\towefuzu.dll
2009-07-08 23:03:02 88576 --sha-w- c:\windows\system32\tuneyevi.dll
2009-07-14 20:28:59 37888 --sha-w- c:\windows\system32\vafedewe.dll
2009-07-24 08:11:50 38400 --sha-w- c:\windows\system32\vegozadi.dll
2009-07-10 22:01:06 37888 --sha-w- c:\windows\system32\vemumise.dll
2009-07-16 02:14:11 38912 --sha-w- c:\windows\system32\venaroyu.dll
2009-07-09 19:58:54 50688 --sha-w- c:\windows\system32\vipuliji.dll
2009-07-22 04:17:19 1011403 --sha-w- c:\windows\system32\vivodiha.exe
2009-07-17 18:48:51 38400 --sha-w- c:\windows\system32\vopereso.dll
2009-07-07 07:56:29 38400 --sha-w- c:\windows\system32\vosevodi.dll
2009-07-15 13:34:09 1117124 --sha-w- c:\windows\system32\wahotake.exe
2009-07-23 18:07:44 1051682 --sha-w- c:\windows\system32\wemeyebi.exe
2009-07-09 19:58:55 88064 --sha-w- c:\windows\system32\wezisuve.dll
2009-07-19 20:30:36 39424 --sha-w- c:\windows\system32\winusime.dll
2009-07-15 13:34:09 88576 --sha-w- c:\windows\system32\wiyatuto.dll
2009-07-25 05:46:26 1011747 --sha-w- c:\windows\system32\worusego.exe
2009-07-06 01:55:11 52224 --sha-w- c:\windows\system32\yakiyetu.dll
2009-07-19 20:30:36 1011243 --sha-w- c:\windows\system32\yemibumi.exe
2009-07-18 19:03:05 38400 --sha-w- c:\windows\system32\yeyapoyu.dll
2009-07-19 20:30:36 89600 --sha-w- c:\windows\system32\yofamoyu.dll
2009-07-13 08:37:57 38400 --sha-w- c:\windows\system32\yonevena.dll
2009-07-21 15:19:03 90112 --sha-w- c:\windows\system32\yukojuni.dll
2009-07-13 20:38:15 1011606 --sha-w- c:\windows\system32\zalezupe.exe
2009-07-20 08:30:30 1011320 --sha-w- c:\windows\system32\zanamalo.exe
2009-07-13 08:37:57 88064 --sha-w- c:\windows\system32\zasezara.dll
2009-07-26 05:46:31 89600 --sha-w- c:\windows\system32\zolahipu.dll
2009-07-08 23:03:02 1011755 --sha-w- c:\windows\system32\zoyageze.exe

============= FINISH: 0:19:12.89 ===============



----

Attached Files



#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:09 PM

Posted 26 October 2009 - 08:23 AM

Okay, there's no rootkit but you have a trojan called Vundo.


Let's run two tools one after another and try and get it all

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop but rename it Combo-Fix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combo-Fix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#6 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 26 October 2009 - 02:26 PM

thanks...

malwarebytes does not work anymore...as stated in my first post...when I try to reinstall it, it says:

unable to execute file
c:\program files\malwarebytes' antimalware\mbam.exe

create process failed; code 2.
the system cannot find the file specified.




I will try to run combo fix as suggested...

#7 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 26 October 2009 - 05:11 PM

ComboFix 09-10-25.02 - Forrest 10/26/2009 12:31.1.2 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1023.349 [GMT -7:00]
Running from: c:\documents and settings\Forrest\Desktop\Combo-Fix.exe
AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
FW: Online Armor Firewall *disabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\35763226
c:\documents and settings\All Users\Application Data\35763226\35763226.exe
c:\documents and settings\Forrest\Start Menu\Programs\Security Tool.lnk
c:\recycler\S-1-5-21-1004574870-2323233685-3874368327-1003
c:\recycler\S-1-5-21-1153268050-1745101451-2860577156-1003
c:\recycler\S-1-5-21-2390782801-2610304041-153104931-1003
c:\recycler\S-1-5-21-2610108528-1692246880-3841467644-1003
c:\recycler\S-1-5-21-2641702931-1635820559-1401996470-1003
c:\recycler\S-1-5-21-3175570731-937336541-441031306-1003
c:\recycler\S-1-5-21-3639935143-843763449-1625352185-1003
c:\recycler\S-1-5-21-3930981269-3810791699-899491540-1003
c:\recycler\S-1-5-21-4069970522-2291726883-3272541339-1003
c:\recycler\S-1-5-21-776561741-1757981266-725345543-1003
c:\windows\system32\bawawaza.dll.tmp
c:\windows\system32\begimepo.dll.tmp
c:\windows\system32\bihorugi.dll
c:\windows\system32\buraboto.dll
c:\windows\system32\difoyuro.dll
c:\windows\system32\dimadadu.dll
c:\windows\system32\doluwuhi.dll
c:\windows\system32\dujujewo.dll
c:\windows\system32\fahazura.dll
c:\windows\system32\fefiweta.dll
c:\windows\system32\fipufola.dll
c:\windows\system32\fipuyuko.dll
c:\windows\system32\fugudipi.exe
c:\windows\system32\garetuso.dll
c:\windows\system32\gazikiri.dll
c:\windows\system32\gebuhiri.exe
c:\windows\system32\gejekoyu.dll
c:\windows\system32\gurinuwe.dll
c:\windows\system32\guyipiwa.dll
c:\windows\system32\haguyofe.exe
c:\windows\system32\hakurevi.dll
c:\windows\system32\hosopovo.exe
c:\windows\system32\hozekopo.dll
c:\windows\system32\jigefuwi.dll
c:\windows\system32\kagohaku.dll
c:\windows\system32\kejefuru.dll.tmp
c:\windows\system32\kihinuga.dll
c:\windows\system32\kipiheba.dll
c:\windows\system32\kirasahi.exe
c:\windows\system32\kozibala.exe
c:\windows\system32\kutosiva.dll
c:\windows\system32\lebobofu.dll
c:\windows\system32\lesufuya.dll
c:\windows\system32\lodehiwe.exe
c:\windows\system32\lonufeyi.dll
c:\windows\system32\maguhugi.dll
c:\windows\system32\mevozeha.dll
c:\windows\system32\mokosuha.dll
c:\windows\system32\molavefe.dll
c:\windows\system32\mosowisi.exe
c:\windows\system32\mubodigi.dll
c:\windows\system32\mulivusi.exe
c:\windows\system32\munokesu.exe
c:\windows\system32\muzipemi.exe
c:\windows\system32\naluwota.dll
c:\windows\system32\nugojuwa.exe
c:\windows\system32\podusafe.dll
c:\windows\system32\pulemebo.dll
c:\windows\system32\pusogumu.exe
c:\windows\system32\rapepute.dll
c:\windows\system32\rapepute.exe
c:\windows\system32\ravezula.dll
c:\windows\system32\regoyivu.dll
c:\windows\system32\rogahefa.dll
c:\windows\system32\rogavove.dll
c:\windows\system32\romabotu.dll
c:\windows\system32\romenepo.dll
c:\windows\system32\ruyupuno.exe
c:\windows\system32\sapahore.exe
c:\windows\system32\satevowa.dll
c:\windows\system32\seduvumo.dll
c:\windows\system32\seduvumo.exe
c:\windows\system32\sewupedi.dll
c:\windows\system32\siguhafe.dll
c:\windows\system32\soluwale.dll
c:\windows\system32\talefake.exe
c:\windows\system32\tasurepa.dll
c:\windows\system32\tiyupotu.dll
c:\windows\system32\toraheke.dll
c:\windows\system32\towefuzu.dll
c:\windows\system32\vafedewe.dll
c:\windows\system32\vegozadi.dll
c:\windows\system32\vemumise.dll
c:\windows\system32\venaroyu.dll
c:\windows\system32\vipuliji.dll
c:\windows\system32\vivodiha.exe
c:\windows\system32\vopereso.dll
c:\windows\system32\vosevodi.dll
c:\windows\system32\wezisuve.dll
c:\windows\system32\winusime.dll
c:\windows\system32\wiyatuto.dll
c:\windows\system32\worusego.exe
c:\windows\system32\yabikuse.exe
c:\windows\system32\yakiyetu.dll
c:\windows\system32\yemibumi.exe
c:\windows\system32\yeyapoyu.dll
c:\windows\system32\yofamoyu.dll
c:\windows\system32\yonevena.dll
c:\windows\system32\yukojuni.dll
c:\windows\system32\zalezupe.exe
c:\windows\system32\zanamalo.exe
c:\windows\system32\zasezara.dll
c:\windows\system32\zibuzuhu.dll
c:\windows\system32\zinipelu.dll
c:\windows\system32\zoyageze.exe
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat . . . . failed to delete
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat . . . . failed to delete

----- BITS: Possible infected sites -----

hxxp://81.222.236.97
.
((((((((((((((((((((((((( Files Created from 2009-09-26 to 2009-10-26 )))))))))))))))))))))))))))))))
.

2009-10-23 06:08 . 2009-10-23 06:08 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2009-10-18 21:25 . 2009-10-18 21:25 -------- d-----w- c:\documents and settings\You\Application Data\Publish Providers
2009-10-18 21:25 . 2009-10-18 21:32 -------- d-----w- c:\documents and settings\You\Application Data\Sony
2009-10-18 21:25 . 2009-10-18 21:25 -------- d-----w- c:\documents and settings\You\Local Settings\Application Data\Sony
2009-10-18 21:24 . 2009-10-18 21:24 -------- d-----w- c:\documents and settings\You\Application Data\OnlineArmor
2009-10-11 22:24 . 2009-10-11 22:24 -------- d-sh--w- c:\documents and settings\Soula\PrivacIE
2009-10-11 22:19 . 2009-10-11 22:19 -------- d-----w- c:\documents and settings\Soula\Application Data\OnlineArmor
2009-10-10 10:17 . 2009-10-10 05:27 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-10-10 05:27 . 2009-07-03 14:49 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-10-10 05:27 . 2009-10-10 05:27 -------- dc----w- c:\windows\system32\DRVSTORE
2009-10-10 05:24 . 2009-10-10 05:24 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
2009-10-10 05:24 . 2009-10-10 05:27 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-10-10 05:24 . 2009-10-10 05:24 -------- d-----w- c:\program files\Lavasoft
2009-10-07 21:48 . 2009-10-10 05:34 -------- d-----w- c:\documents and settings\All Users\Application Data\OnlineArmor
2009-10-07 21:48 . 2009-10-07 21:49 -------- d-----w- c:\documents and settings\Forrest\Application Data\OnlineArmor
2009-10-07 21:48 . 2009-09-18 05:44 24656 ----a-w- c:\windows\system32\drivers\OAmon.sys
2009-10-07 21:48 . 2009-10-07 21:48 -------- d-----w- c:\program files\Tall Emu
2009-10-07 21:48 . 2009-09-18 05:44 29776 ----a-w- c:\windows\system32\drivers\OAnet.sys
2009-10-07 21:48 . 2009-09-18 05:44 200784 ----a-w- c:\windows\system32\drivers\OADriver.sys
2009-10-07 21:36 . 2009-10-07 21:53 -------- d-----w- c:\program files\SpywareBlaster
2009-10-07 21:27 . 2009-10-26 19:29 -------- d-----w- C:\ComboFix
2009-10-07 21:13 . 2009-10-12 21:39 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-10-07 21:00 . 2009-09-10 21:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-07 21:00 . 2009-09-10 21:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-06 20:34 . 2009-10-26 18:42 -------- d-----w- c:\documents and settings\Forrest\Application Data\Tor
2009-10-06 20:34 . 2009-10-25 19:11 -------- d-----w- c:\documents and settings\Forrest\Application Data\Vidalia
2009-10-06 20:34 . 2009-10-06 20:34 -------- d-----w- c:\program files\Vidalia Bundle
2009-10-06 20:10 . 2009-10-06 20:10 -------- d-sh--w- c:\documents and settings\Forrest\IECompatCache
2009-10-06 13:55 . 2009-10-06 13:55 -------- d-sh--w- c:\documents and settings\Administrator\PrivacIE
2009-10-06 07:32 . 2009-10-06 07:32 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2009-10-01 05:17 . 2009-10-01 05:17 -------- d-----w- c:\documents and settings\Soula\Application Data\Apple Computer
2009-09-29 21:58 . 2009-10-21 06:27 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-09-28 20:49 . 2004-08-04 06:07 59264 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2009-09-28 20:49 . 2004-08-04 06:07 59264 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
2009-09-28 20:49 . 2004-08-04 06:08 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys
2009-09-28 20:49 . 2004-08-04 06:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2009-09-28 19:29 . 2008-10-16 21:06 208744 ----a-w- c:\windows\system32\muweb.dll
2009-09-28 19:29 . 2008-10-16 21:06 268648 ----a-w- c:\windows\system32\mucltui.dll
2009-09-28 06:06 . 2009-09-28 06:06 -------- d-----w- c:\program files\Microsoft Silverlight
2009-09-26 22:47 . 2009-09-26 22:47 -------- d-----w- c:\documents and settings\Forrest\Application Data\Drag'n Drop CD+DVD

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-26 22:00 . 2009-08-09 02:49 -------- d-----w- c:\documents and settings\Forrest\Application Data\uTorrent
2009-10-26 19:21 . 2009-09-11 07:50 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-21 00:37 . 2003-12-02 20:17 -------- d-----w- c:\program files\Java
2009-10-19 21:37 . 2009-08-12 07:13 -------- d-----w- c:\program files\DVDlabPro2
2009-10-15 00:04 . 2009-07-31 17:50 -------- d-----w- c:\documents and settings\Forrest\Application Data\Azureus
2009-10-14 21:06 . 2009-07-31 17:50 165640 ----a-w- c:\documents and settings\Forrest\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-03 23:45 . 2009-07-31 16:55 335 ----a-w- c:\windows\nsreg.dat
2009-10-01 05:09 . 2009-09-02 15:30 90600 ----a-w- c:\documents and settings\Soula\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-11 11:29 . 2009-08-06 18:31 -------- d-----w- c:\program files\Total Video Converter
2009-09-11 08:21 . 2009-09-11 08:21 552 ----a-w- c:\windows\system32\d3d8caps.dat
2009-09-11 07:50 . 2009-09-11 07:50 -------- d-----w- c:\documents and settings\Forrest\Application Data\Malwarebytes
2009-09-11 07:50 . 2009-09-11 07:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-09-05 19:11 . 2009-09-05 19:11 90600 ----a-w- c:\documents and settings\You\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-01 12:28 . 2009-09-01 12:28 -------- d-----w- c:\documents and settings\Forrest\Application Data\NeoDownloader
2009-09-01 12:28 . 2009-09-01 12:28 -------- d-----w- c:\program files\NeoDownloader
2009-08-29 03:12 . 2009-08-29 03:12 -------- d-----w- c:\documents and settings\All Users\Application Data\DVD Shrink
2009-08-29 03:12 . 2009-08-29 03:12 -------- d-----w- c:\program files\DVD Shrink
2009-08-28 21:56 . 2009-08-28 21:56 -------- d-----w- c:\documents and settings\Forrest\Application Data\InterVideo
2009-08-15 00:17 . 2009-08-14 00:16 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2009-08-05 09:11 . 2002-12-12 08:14 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-29 04:53 . 2003-12-02 00:28 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-07-29 04:53 . 2003-12-02 00:28 119808 ----a-w- c:\windows\system32\t2embed(3).dll
2009-07-29 04:53 . 2003-12-02 00:28 119808 ----a-w- c:\windows\system32\t2embed(2).dll
2009-07-29 04:53 . 2003-12-02 00:28 82432 ----a-w- c:\windows\system32\fontsub.dll
2009-07-29 04:37 . 2009-07-29 04:37 119808 ------w- c:\windows\system32\SET116D.tmp
2009-07-22 18:07 . 2009-07-22 18:07 90112 --sha-w- c:\windows\system32\bezayedo.dll
2009-07-16 02:14 . 2009-07-16 02:14 1085474 --sha-w- c:\windows\system32\bivemufi.exe
2009-07-18 07:03 . 2009-07-18 07:03 1116720 --sha-w- c:\windows\system32\gafuyowo.exe
2009-07-14 20:28 . 2009-07-14 20:28 88576 --sha-w- c:\windows\system32\honomige.dll
2009-07-26 17:46 . 2009-07-26 17:46 89600 --sha-w- c:\windows\system32\kuwokilo.dll
2009-07-26 17:46 . 2009-07-26 17:46 52224 --sha-w- c:\windows\system32\mekawiba.dll
2009-07-22 18:07 . 2009-07-22 18:07 1051170 --sha-w- c:\windows\system32\mivohilu.exe
2009-07-21 15:19 . 2009-07-21 15:19 1050658 --sha-w- c:\windows\system32\nepivoyi.exe
2009-07-19 07:03 . 2009-07-19 07:03 3 --sha-w- c:\windows\system32\nuzemuve.dll
2009-07-25 05:46 . 2009-07-25 05:46 89600 --sha-w- c:\windows\system32\ruyutego.dll
2009-07-08 23:03 . 2009-07-08 23:03 88576 --sha-w- c:\windows\system32\tuneyevi.dll
2009-07-15 13:34 . 2009-07-15 13:34 1117124 --sha-w- c:\windows\system32\wahotake.exe
2009-07-23 18:07 . 2009-07-23 18:07 1051682 --sha-w- c:\windows\system32\wemeyebi.exe
2009-07-26 05:46 . 2009-07-26 05:46 89600 --sha-w- c:\windows\system32\zolahipu.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-08-04 1667584]
"Vidalia"="c:\program files\Vidalia Bundle\Vidalia\vidalia.exe" [2009-07-12 5113430]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2009-08-09 288048]
"LightScribe Control Panel"="c:\program files\Common Files\LightScribe\LightScribeControlPanel.exe" [2009-06-17 2363392]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2003-11-16 335872]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-05-27 413696]
"ezShieldProtector for Px"="c:\windows\System32\ezSP_Px.exe" [2002-08-20 40960]
"VAIOSurvey"="c:\program files\sony\vaio survey\surveysa.exe" [2003-11-03 1052672]
"ZTgServerSwitch"="c:\program files\support.com\client\bin\tgcmd.exe" [2003-06-24 1409024]
"IgfxTray"="c:\windows\System32\igfxtray.exe" [2003-04-07 155648]
"HotKeysCmds"="c:\windows\System32\hkcmd.exe" [2003-04-07 114688]
"NvCplDaemon"="c:\windows\System32\NvCpl.dll" [2003-08-19 4841472]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2003-09-06 70816]
"VAIO Recovery"="c:\windows\Sonysys\VAIO Recovery\PartSeal.exe" [2003-04-20 28672]
"avgnt"="c:\program files\Avira\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]
"@OnlineArmor GUI"="c:\program files\Tall Emu\Online Armor\oaui.exe" [2009-09-18 6503624]
"AGRSMMSG"="AGRSMMSG.exe" - c:\windows\AGRSMMSG.exe [2003-05-23 88363]
"C-Media Mixer"="Mixer.exe" - c:\windows\mixer.exe [2002-10-16 1818624]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
Privoxy.lnk - c:\program files\Vidalia Bundle\Privoxy\privoxy.exe [2006-11-20 250368]
Quicken Scheduled Updates.lnk - c:\program files\Quicken\bagent.exe [2003-10-2 57344]
Remocon Driver.lnk - c:\program files\sony\usbsircs\usbsircs.exe [2009-7-31 229376]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\TALLEM~1\ONLINE~1\oaevent.dll" [2009-09-18 852680]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\support.com\\client\\bin\\tgcmd.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=
"c:\\WINDOWS\\system32\\ezSP_Px.exe"=
"c:\\Program Files\\Vidalia Bundle\\Vidalia\\vidalia.exe"=
"c:\\Program Files\\Vidalia Bundle\\Privoxy\\privoxy.exe"=
"c:\\Program Files\\Sony\\usbsircs\\USBsircs.exe"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [10/9/2009 10:27 PM 64160]
R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [10/7/2009 2:48 PM 200784]
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [10/7/2009 2:48 PM 24656]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [10/7/2009 2:48 PM 29776]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\Avira\AntiVir Desktop\sched.exe [8/13/2009 5:16 PM 108289]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 7:49 AM 1028432]
R2 OAcat;Online Armor Helper Service;c:\program files\Tall Emu\Online Armor\oacat.exe [10/7/2009 2:48 PM 1244360]
R2 SvcOnlineArmor;Online Armor;c:\program files\Tall Emu\Online Armor\oasrv.exe [10/7/2009 2:48 PM 3184328]

--- Other Services/Drivers In Memory ---

*Deregistered* - mbr

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
"c:\program files\Common Files\LightScribe\LSRunOnce.exe"
.
Contents of the 'Scheduled Tasks' folder

2009-10-20 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-07-03 05:27]

2009-10-21 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 19:34]

2009-08-06 c:\windows\Tasks\Registration reminder 1.job
- c:\windows\System32\OOBE\oobebaln.exe [2003-12-02 07:56]

2009-08-11 c:\windows\Tasks\Registration reminder 2.job
- c:\windows\System32\OOBE\oobebaln.exe [2003-12-02 07:56]

2009-07-31 c:\windows\Tasks\Symantec NetDetect.job
- c:\program files\Symantec\LiveUpdate\NDETECT.EXE [2009-07-31 01:38]

2009-10-26 c:\windows\Tasks\User_Feed_Synchronization-{337A1032-78F0-4BF2-A5E2-0508B6DD1878}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 11:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.sony.com/vaiopeople
uInternet Connection Wizard,ShellNext = hxxp://www.sony.com/vaiopeople
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
Trusted Zone: microsoft.com\www.update
FF - ProfilePath - c:\documents and settings\Forrest\Application Data\Mozilla\Firefox\Profiles\xjb7zysc.default\
FF - prefs.js: browser.startup.homepage - hxxp://extremetracking.com/open;ref1?login=picsass|http://mail.google.com/mail/?shva=1#inbox|http://picsandass.com/pics/thumbnails.php?album=lasthits&cat=0&page=1|http://whos.amung.us/stats/readers/c7wikkg2seo1/|http://www.staticfiends.com/
FF - plugin: c:\program files\Real\RealOne Player\Netscape6\nppl3260.dll
FF - plugin: c:\program files\Real\RealOne Player\Netscape6\nprjplug.dll
FF - plugin: c:\program files\Real\RealOne Player\Netscape6\nprpjplug.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Media Player\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true.
- - - - ORPHANS REMOVED - - - -

BHO-{7b857fa0-d8e2-4324-844c-3ca2acd36d07} - sewupedi.dll
HKLM-Run-7931373338 - c:\documents and settings\Forrest\Application Data\7931373338\7931373338.exe
HKLM-Run-9560204689 - c:\documents and settings\Forrest\Application Data\9560204689\9560204689.exe
HKLM-Run-85389942 - c:\documents and settings\All Users\Application Data\85389942\85389942.exe
HKLM-Run-45035017 - c:\documents and settings\All Users\Application Data\45035017\45035017.exe
HKLM-Run-lahohudan - c:\windows\system32\dujujewo.dll
HKLM-Run-35763226 - c:\docume~1\ALLUSE~1\APPLIC~1\35763226\35763226.exe
HKLM-Run-hokajofini - dimadadu.dll
SharedTaskScheduler-{60975b00-70c3-46ac-883b-dd5e4cded930} - c:\windows\system32\nihujoti.dll
SharedTaskScheduler-{01eaff08-a527-437d-acd2-b108e305ea34} - c:\windows\system32\nihujoti.dll
SharedTaskScheduler-{4f9a86b5-055b-4b00-9f34-ea6317226327} - c:\windows\system32\dujujewo.dll
SSODL-levoruwor-{60975b00-70c3-46ac-883b-dd5e4cded930} - c:\windows\system32\nihujoti.dll
SSODL-kinepuliw-{01eaff08-a527-437d-acd2-b108e305ea34} - c:\windows\system32\nihujoti.dll
SSODL-vihivilus-{4f9a86b5-055b-4b00-9f34-ea6317226327} - c:\windows\system32\dujujewo.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-26 14:58
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,eb,8c,b7,05,d9,c0,4a,88,8d,4e,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,eb,8c,b7,05,d9,c0,4a,88,8d,4e,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2104)
c:\windows\system32\WININET.dll
c:\program files\Tall Emu\Online Armor\OAwatch.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\msi.dll
c:\windows\system32\ImgUtil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\WinSCP\DragExt.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Avira\Avira\AntiVir Desktop\avguard.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\windows\System32\wbem\unsecapp.exe
c:\program files\Lavasoft\Ad-Aware\AAWTray.exe
c:\combo-fix\CF23431.exe
c:\combo-fix\PEV.cfxxe
.
**************************************************************************
.
Completion time: 2009-10-26 15:08 - machine was rebooted
ComboFix-quarantined-files.txt 2009-10-26 22:08

Pre-Run: 18,945,617,920 bytes free
Post-Run: 19,901,071,360 bytes free

- - End Of File - - 97A62385473754CED2D3FCE2C9F3E767

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:09 PM

Posted 26 October 2009 - 05:22 PM

That's better. :(

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

File::
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\windows\system32\bezayedo.dll
c:\windows\system32\bivemufi.exe
c:\windows\system32\gafuyowo.exe
c:\windows\system32\honomige.dll
c:\windows\system32\kuwokilo.dll
c:\windows\system32\mekawiba.dll
c:\windows\system32\mivohilu.exe
c:\windows\system32\nepivoyi.exe
c:\windows\system32\nuzemuve.dll
c:\windows\system32\ruyutego.dll
c:\windows\system32\tuneyevi.dll
c:\windows\system32\wahotake.exe
c:\windows\system32\wemeyebi.exe
c:\windows\system32\zolahipu.dll


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#9 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 26 October 2009 - 07:01 PM

ComboFix 09-10-26.01 - Forrest 10/26/2009 16:36.2.2 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1023.648 [GMT -7:00]
Running from: c:\documents and settings\Forrest\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\Forrest\Desktop\CFScript.txt
AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
FW: Online Armor Firewall *disabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}

FILE ::
"c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat"
"c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat"
"c:\windows\system32\bezayedo.dll"
"c:\windows\system32\bivemufi.exe"
"c:\windows\system32\gafuyowo.exe"
"c:\windows\system32\honomige.dll"
"c:\windows\system32\kuwokilo.dll"
"c:\windows\system32\mekawiba.dll"
"c:\windows\system32\mivohilu.exe"
"c:\windows\system32\nepivoyi.exe"
"c:\windows\system32\nuzemuve.dll"
"c:\windows\system32\ruyutego.dll"
"c:\windows\system32\tuneyevi.dll"
"c:\windows\system32\wahotake.exe"
"c:\windows\system32\wemeyebi.exe"
"c:\windows\system32\zolahipu.dll"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\windows\system32\bezayedo.dll
c:\windows\system32\bivemufi.exe
c:\windows\system32\gafuyowo.exe
c:\windows\system32\honomige.dll
c:\windows\system32\kuwokilo.dll
c:\windows\system32\mekawiba.dll
c:\windows\system32\mivohilu.exe
c:\windows\system32\nepivoyi.exe
c:\windows\system32\nuzemuve.dll
c:\windows\system32\ruyutego.dll
c:\windows\system32\tuneyevi.dll
c:\windows\system32\wahotake.exe
c:\windows\system32\wemeyebi.exe
c:\windows\system32\zolahipu.dll

.
((((((((((((((((((((((((( Files Created from 2009-09-26 to 2009-10-26 )))))))))))))))))))))))))))))))
.

2009-10-26 23:30 . 2009-10-26 23:32 -------- d-----w- C:\Combo-Fix8861C
2009-10-26 22:38 . 2009-10-26 22:39 -------- d-----w- C:\Combo-Fix
2009-10-23 06:08 . 2009-10-23 06:08 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2009-10-18 21:25 . 2009-10-18 21:25 -------- d-----w- c:\documents and settings\You\Application Data\Publish Providers
2009-10-18 21:25 . 2009-10-18 21:32 -------- d-----w- c:\documents and settings\You\Application Data\Sony
2009-10-18 21:25 . 2009-10-18 21:25 -------- d-----w- c:\documents and settings\You\Local Settings\Application Data\Sony
2009-10-18 21:24 . 2009-10-18 21:24 -------- d-----w- c:\documents and settings\You\Application Data\OnlineArmor
2009-10-11 22:24 . 2009-10-11 22:24 -------- d-sh--w- c:\documents and settings\Soula\PrivacIE
2009-10-11 22:19 . 2009-10-11 22:19 -------- d-----w- c:\documents and settings\Soula\Application Data\OnlineArmor
2009-10-10 10:17 . 2009-10-10 05:27 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-10-10 05:27 . 2009-07-03 14:49 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-10-10 05:27 . 2009-10-10 05:27 -------- dc----w- c:\windows\system32\DRVSTORE
2009-10-10 05:24 . 2009-10-10 05:24 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
2009-10-10 05:24 . 2009-10-10 05:27 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-10-10 05:24 . 2009-10-10 05:24 -------- d-----w- c:\program files\Lavasoft
2009-10-07 21:48 . 2009-10-10 05:34 -------- d-----w- c:\documents and settings\All Users\Application Data\OnlineArmor
2009-10-07 21:48 . 2009-10-07 21:49 -------- d-----w- c:\documents and settings\Forrest\Application Data\OnlineArmor
2009-10-07 21:48 . 2009-09-18 05:44 24656 ----a-w- c:\windows\system32\drivers\OAmon.sys
2009-10-07 21:48 . 2009-10-07 21:48 -------- d-----w- c:\program files\Tall Emu
2009-10-07 21:48 . 2009-09-18 05:44 29776 ----a-w- c:\windows\system32\drivers\OAnet.sys
2009-10-07 21:48 . 2009-09-18 05:44 200784 ----a-w- c:\windows\system32\drivers\OADriver.sys
2009-10-07 21:36 . 2009-10-07 21:53 -------- d-----w- c:\program files\SpywareBlaster
2009-10-07 21:27 . 2009-10-26 19:29 -------- d-----w- C:\ComboFix
2009-10-07 21:13 . 2009-10-12 21:39 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-10-07 21:00 . 2009-09-10 21:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-07 21:00 . 2009-09-10 21:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-06 20:34 . 2009-10-26 23:30 -------- d-----w- c:\documents and settings\Forrest\Application Data\Tor
2009-10-06 20:34 . 2009-10-26 23:30 -------- d-----w- c:\documents and settings\Forrest\Application Data\Vidalia
2009-10-06 20:34 . 2009-10-06 20:34 -------- d-----w- c:\program files\Vidalia Bundle
2009-10-06 20:10 . 2009-10-06 20:10 -------- d-sh--w- c:\documents and settings\Forrest\IECompatCache
2009-10-06 13:55 . 2009-10-06 13:55 -------- d-sh--w- c:\documents and settings\Administrator\PrivacIE
2009-10-06 07:32 . 2009-10-06 07:32 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2009-10-01 05:17 . 2009-10-01 05:17 -------- d-----w- c:\documents and settings\Soula\Application Data\Apple Computer
2009-09-29 21:58 . 2009-10-21 06:27 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-09-28 20:49 . 2004-08-04 06:07 59264 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2009-09-28 20:49 . 2004-08-04 06:07 59264 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
2009-09-28 20:49 . 2004-08-04 06:08 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys
2009-09-28 20:49 . 2004-08-04 06:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2009-09-28 19:29 . 2008-10-16 21:06 208744 ----a-w- c:\windows\system32\muweb.dll
2009-09-28 19:29 . 2008-10-16 21:06 268648 ----a-w- c:\windows\system32\mucltui.dll
2009-09-28 06:06 . 2009-09-28 06:06 -------- d-----w- c:\program files\Microsoft Silverlight

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-26 23:30 . 2009-08-09 02:49 -------- d-----w- c:\documents and settings\Forrest\Application Data\uTorrent
2009-10-26 19:21 . 2009-09-11 07:50 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-21 00:37 . 2003-12-02 20:17 -------- d-----w- c:\program files\Java
2009-10-19 21:37 . 2009-08-12 07:13 -------- d-----w- c:\program files\DVDlabPro2
2009-10-15 00:04 . 2009-07-31 17:50 -------- d-----w- c:\documents and settings\Forrest\Application Data\Azureus
2009-10-14 21:06 . 2009-07-31 17:50 165640 ----a-w- c:\documents and settings\Forrest\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-03 23:45 . 2009-07-31 16:55 335 ----a-w- c:\windows\nsreg.dat
2009-10-01 05:09 . 2009-09-02 15:30 90600 ----a-w- c:\documents and settings\Soula\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-26 22:47 . 2009-09-26 22:47 -------- d-----w- c:\documents and settings\Forrest\Application Data\Drag'n Drop CD+DVD
2009-09-11 11:29 . 2009-08-06 18:31 -------- d-----w- c:\program files\Total Video Converter
2009-09-11 08:21 . 2009-09-11 08:21 552 ----a-w- c:\windows\system32\d3d8caps.dat
2009-09-11 07:50 . 2009-09-11 07:50 -------- d-----w- c:\documents and settings\Forrest\Application Data\Malwarebytes
2009-09-11 07:50 . 2009-09-11 07:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-09-05 19:11 . 2009-09-05 19:11 90600 ----a-w- c:\documents and settings\You\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-01 12:28 . 2009-09-01 12:28 -------- d-----w- c:\documents and settings\Forrest\Application Data\NeoDownloader
2009-09-01 12:28 . 2009-09-01 12:28 -------- d-----w- c:\program files\NeoDownloader
2009-08-29 03:12 . 2009-08-29 03:12 -------- d-----w- c:\documents and settings\All Users\Application Data\DVD Shrink
2009-08-29 03:12 . 2009-08-29 03:12 -------- d-----w- c:\program files\DVD Shrink
2009-08-28 21:56 . 2009-08-28 21:56 -------- d-----w- c:\documents and settings\Forrest\Application Data\InterVideo
2009-08-15 00:17 . 2009-08-14 00:16 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2009-08-05 09:11 . 2002-12-12 08:14 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-29 04:53 . 2003-12-02 00:28 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-07-29 04:53 . 2003-12-02 00:28 119808 ----a-w- c:\windows\system32\t2embed(3).dll
2009-07-29 04:53 . 2003-12-02 00:28 119808 ----a-w- c:\windows\system32\t2embed(2).dll
2009-07-29 04:53 . 2003-12-02 00:28 82432 ----a-w- c:\windows\system32\fontsub.dll
2009-07-29 04:37 . 2009-07-29 04:37 119808 ------w- c:\windows\system32\SET116D.tmp
.

((((((((((((((((((((((((((((( SnapShot@2009-10-26_21.58.56 )))))))))))))))))))))))))))))))))))))))))
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-08-04 1667584]
"Vidalia"="c:\program files\Vidalia Bundle\Vidalia\vidalia.exe" [2009-07-12 5113430]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2009-08-09 288048]
"LightScribe Control Panel"="c:\program files\Common Files\LightScribe\LightScribeControlPanel.exe" [2009-06-17 2363392]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2003-11-16 335872]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-05-27 413696]
"ezShieldProtector for Px"="c:\windows\System32\ezSP_Px.exe" [2002-08-20 40960]
"VAIOSurvey"="c:\program files\sony\vaio survey\surveysa.exe" [2003-11-03 1052672]
"ZTgServerSwitch"="c:\program files\support.com\client\bin\tgcmd.exe" [2003-06-24 1409024]
"IgfxTray"="c:\windows\System32\igfxtray.exe" [2003-04-07 155648]
"HotKeysCmds"="c:\windows\System32\hkcmd.exe" [2003-04-07 114688]
"NvCplDaemon"="c:\windows\System32\NvCpl.dll" [2003-08-19 4841472]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2003-09-06 70816]
"VAIO Recovery"="c:\windows\Sonysys\VAIO Recovery\PartSeal.exe" [2003-04-20 28672]
"avgnt"="c:\program files\Avira\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]
"@OnlineArmor GUI"="c:\program files\Tall Emu\Online Armor\oaui.exe" [2009-09-18 6503624]
"AGRSMMSG"="AGRSMMSG.exe" - c:\windows\AGRSMMSG.exe [2003-05-23 88363]
"C-Media Mixer"="Mixer.exe" - c:\windows\mixer.exe [2002-10-16 1818624]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
Privoxy.lnk - c:\program files\Vidalia Bundle\Privoxy\privoxy.exe [2006-11-20 250368]
Quicken Scheduled Updates.lnk - c:\program files\Quicken\bagent.exe [2003-10-2 57344]
Remocon Driver.lnk - c:\program files\sony\usbsircs\usbsircs.exe [2009-7-31 229376]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\TALLEM~1\ONLINE~1\oaevent.dll" [2009-09-18 852680]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\support.com\\client\\bin\\tgcmd.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=
"c:\\WINDOWS\\system32\\ezSP_Px.exe"=
"c:\\Program Files\\Vidalia Bundle\\Vidalia\\vidalia.exe"=
"c:\\Program Files\\Vidalia Bundle\\Privoxy\\privoxy.exe"=
"c:\\Program Files\\Sony\\usbsircs\\USBsircs.exe"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [10/9/2009 10:27 PM 64160]
R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [10/7/2009 2:48 PM 200784]
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [10/7/2009 2:48 PM 24656]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [10/7/2009 2:48 PM 29776]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\Avira\AntiVir Desktop\sched.exe [8/13/2009 5:16 PM 108289]
R2 OAcat;Online Armor Helper Service;c:\program files\Tall Emu\Online Armor\oacat.exe [10/7/2009 2:48 PM 1244360]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 7:49 AM 1028432]
S2 SvcOnlineArmor;Online Armor;c:\program files\Tall Emu\Online Armor\oasrv.exe [10/7/2009 2:48 PM 3184328]

--- Other Services/Drivers In Memory ---

*Deregistered* - mbr

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
"c:\program files\Common Files\LightScribe\LSRunOnce.exe"
.
Contents of the 'Scheduled Tasks' folder

2009-10-20 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-07-03 05:27]

2009-10-21 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 19:34]

2009-08-06 c:\windows\Tasks\Registration reminder 1.job
- c:\windows\System32\OOBE\oobebaln.exe [2003-12-02 07:56]

2009-08-11 c:\windows\Tasks\Registration reminder 2.job
- c:\windows\System32\OOBE\oobebaln.exe [2003-12-02 07:56]

2009-07-31 c:\windows\Tasks\Symantec NetDetect.job
- c:\program files\Symantec\LiveUpdate\NDETECT.EXE [2009-07-31 01:38]

2009-10-26 c:\windows\Tasks\User_Feed_Synchronization-{337A1032-78F0-4BF2-A5E2-0508B6DD1878}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 11:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.sony.com/vaiopeople
uInternet Connection Wizard,ShellNext = hxxp://www.sony.com/vaiopeople
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
Trusted Zone: microsoft.com\www.update
FF - ProfilePath - c:\documents and settings\Forrest\Application Data\Mozilla\Firefox\Profiles\xjb7zysc.default\
FF - prefs.js: browser.startup.homepage - hxxp://extremetracking.com/open;ref1?login=picsass|http://mail.google.com/mail/?shva=1#inbox|http://picsandass.com/pics/thumbnails.php?album=lasthits&cat=0&page=1|http://whos.amung.us/stats/readers/c7wikkg2seo1/|http://www.staticfiends.com/
FF - plugin: c:\program files\Real\RealOne Player\Netscape6\nppl3260.dll
FF - plugin: c:\program files\Real\RealOne Player\Netscape6\nprjplug.dll
FF - plugin: c:\program files\Real\RealOne Player\Netscape6\nprpjplug.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Media Player\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-26 16:41
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,eb,8c,b7,05,d9,c0,4a,88,8d,4e,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,eb,8c,b7,05,d9,c0,4a,88,8d,4e,\
.
Completion time: 2009-10-26 16:43
ComboFix-quarantined-files.txt 2009-10-26 23:43
ComboFix2.txt 2009-10-26 22:08

Pre-Run: 19,790,528,512 bytes free
Post-Run: 19,742,806,016 bytes free

- - End Of File - - 2C8C145EEE397026DCFBB4AF07686F7E

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:09 PM

Posted 26 October 2009 - 07:10 PM

:(

Can you run MBAM now?

If so please run a full scan for me. If not, let me know and we'll have a look at why it isn't running.
Posted Image
m0le is a proud member of UNITE

#11 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 26 October 2009 - 08:37 PM

sweet!! it worked!




Malwarebytes' Anti-Malware 1.41
Database version: 3037
Windows 5.1.2600 Service Pack 2

10/26/2009 6:36:31 PM
mbam-log-2009-10-26 (18-36-31).txt

Scan type: Quick Scan
Objects scanned: 123123
Time elapsed: 5 minute(s), 53 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Forrest\Desktop\avenger.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:09 PM

Posted 27 October 2009 - 08:02 AM

It's looking pretty good for your PC, freedom lover :(


Can you run an online scanner to mop up anything else

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
Thanks :(
Posted Image
m0le is a proud member of UNITE

#13 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 28 October 2009 - 11:41 AM

C:\Qoobox\Quarantine\[4]-Submit_2009-10-26_16.35.53.zip multiple threats
C:\Qoobox\Quarantine\C\WINDOWS\system32\bawawaza.dll.tmp.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\begimepo.dll.tmp.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\bivemufi.exe.vir a variant of Win32/Kryptik.AVG trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\buraboto.dll.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\difoyuro.dll.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\doluwuhi.dll.vir a variant of Win32/Adware.Virtumonde.NFT application
C:\Qoobox\Quarantine\C\WINDOWS\system32\dujujewo.dll.vir a variant of Win32/Adware.Virtumonde.NFW application
C:\Qoobox\Quarantine\C\WINDOWS\system32\fefiweta.dll.vir a variant of Win32/Adware.Virtumonde.NFR application
C:\Qoobox\Quarantine\C\WINDOWS\system32\fipufola.dll.vir a variant of Win32/Kryptik.ARO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\gafuyowo.exe.vir a variant of Win32/Kryptik.AVX trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\garetuso.dll.vir a variant of Win32/Adware.SuperJuan.F application
C:\Qoobox\Quarantine\C\WINDOWS\system32\gazikiri.dll.vir a variant of Win32/Adware.Virtumonde.NFT application
C:\Qoobox\Quarantine\C\WINDOWS\system32\gurinuwe.dll.vir a variant of Win32/Adware.Virtumonde.NFT application
C:\Qoobox\Quarantine\C\WINDOWS\system32\guyipiwa.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\haguyofe.exe.vir Win32/Adware.SecurityTool application
C:\Qoobox\Quarantine\C\WINDOWS\system32\hosopovo.exe.vir a variant of Win32/Kryptik.AVV trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\jigefuwi.dll.vir a variant of Win32/AntiAV.NCZ trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\kejefuru.dll.tmp.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\kirasahi.exe.vir a variant of Win32/Kryptik.AWF trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\kutosiva.dll.vir a variant of Win32/Adware.Virtumonde.NFW application
C:\Qoobox\Quarantine\C\WINDOWS\system32\lebobofu.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\maguhugi.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\molavefe.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\mubodigi.dll.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\mulivusi.exe.vir Win32/Adware.SecurityTool application
C:\Qoobox\Quarantine\C\WINDOWS\system32\munokesu.exe.vir a variant of Win32/Kryptik.AVV trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\muzipemi.exe.vir a variant of Win32/Kryptik.AVV trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\naluwota.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\nugojuwa.exe.vir a variant of Win32/Kryptik.AWF trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\pulemebo.dll.vir a variant of Win32/KillAV.NGF trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\pusogumu.exe.vir a variant of Win32/Kryptik.AVX trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\romenepo.dll.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\ruyupuno.exe.vir a variant of Win32/Kryptik.AVV trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\satevowa.dll.vir a variant of Win32/Kryptik.ARO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\seduvumo.dll.vir a variant of Win32/KillAV.NGF trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\siguhafe.dll.vir a variant of Win32/KillAV.NGF trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\talefake.exe.vir a variant of Win32/Kryptik.AVV trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\tasurepa.dll.vir a variant of Win32/Kryptik.AWS trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\toraheke.dll.vir Win32/Adware.Virtumonde.NFT application
C:\Qoobox\Quarantine\C\WINDOWS\system32\vegozadi.dll.vir a variant of Win32/KillAV.NGF trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\vemumise.dll.vir a variant of Win32/AntiAV.NCZ trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\vipuliji.dll.vir a variant of Win32/Adware.SuperJuan.F application
C:\Qoobox\Quarantine\C\WINDOWS\system32\vivodiha.exe.vir a variant of Win32/Kryptik.AXJ trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\vopereso.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\vosevodi.dll.vir a variant of Win32/Adware.Virtumonde.NFR application
C:\Qoobox\Quarantine\C\WINDOWS\system32\winusime.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\yakiyetu.dll.vir a variant of Win32/Adware.Virtumonde.NFQ application
C:\Qoobox\Quarantine\C\WINDOWS\system32\yemibumi.exe.vir a variant of Win32/Kryptik.AWF trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\yeyapoyu.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\yofamoyu.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\yonevena.dll.vir a variant of Win32/AntiAV.NCZ trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\zanamalo.exe.vir a variant of Win32/Kryptik.AVV trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\zasezara.dll.vir a variant of Win32/Adware.Virtumonde.NFT application
C:\Qoobox\Quarantine\C\WINDOWS\system32\zinipelu.dll.vir a variant of Win32/Kryptik.AWO trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\zoyageze.exe.vir a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP66\A0018481.dll Win32/Cimag.AQ trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP87\A0027249.dll a variant of Win32/Adware.Virtumonde.NFQ application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP87\A0027250.dll a variant of Win32/Adware.Virtumonde.NFQ application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP87\A0027251.dll a variant of Win32/Adware.Virtumonde.NFQ application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP87\A0027272.exe a variant of Win32/Kryptik.AWF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP87\A0027475.dll a variant of Win32/Kryptik.ARO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP87\A0027476.dll a variant of Win32/Kryptik.ARO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP87\A0027477.dll a variant of Win32/Kryptik.ARO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP89\A0027778.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP89\A0027779.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP89\A0027780.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP90\A0027960.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP90\A0027961.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP90\A0027962.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP94\A0028569.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP94\A0028570.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP94\A0028571.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP96\A0029851.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP96\A0029852.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP96\A0029853.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029978.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029979.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029981.dll a variant of Win32/Adware.Virtumonde.NFT application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029982.dll a variant of Win32/Adware.Virtumonde.NFW application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029984.dll a variant of Win32/Adware.Virtumonde.NFR application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029985.dll a variant of Win32/Kryptik.ARO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029988.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029989.dll a variant of Win32/Adware.Virtumonde.NFT application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029992.dll a variant of Win32/Adware.Virtumonde.NFT application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029993.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029994.exe Win32/Adware.SecurityTool application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029996.exe a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0029998.dll a variant of Win32/AntiAV.NCZ trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030002.exe a variant of Win32/Kryptik.AWF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030004.dll a variant of Win32/Adware.Virtumonde.NFW application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030005.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030009.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030012.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030014.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030015.exe Win32/Adware.SecurityTool application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030016.exe a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030017.exe a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030018.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030019.exe a variant of Win32/Kryptik.AWF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030021.dll a variant of Win32/KillAV.NGF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030022.exe a variant of Win32/Kryptik.AVX trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030030.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030031.exe a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030033.dll a variant of Win32/Kryptik.ARO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030034.dll a variant of Win32/KillAV.NGF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030037.dll a variant of Win32/KillAV.NGF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030039.exe a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030040.dll a variant of Win32/Kryptik.AWS trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030042.dll Win32/Adware.Virtumonde.NFT application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030045.dll a variant of Win32/KillAV.NGF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030046.dll a variant of Win32/AntiAV.NCZ trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030048.dll a variant of Win32/Adware.SuperJuan.F application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030049.exe a variant of Win32/Kryptik.AXJ trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030050.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030051.dll a variant of Win32/Adware.Virtumonde.NFR application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030053.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030057.dll a variant of Win32/Adware.Virtumonde.NFQ application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030058.exe a variant of Win32/Kryptik.AWF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030059.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030060.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030061.dll a variant of Win32/AntiAV.NCZ trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030064.exe a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030065.dll a variant of Win32/Adware.Virtumonde.NFT application
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030067.dll a variant of Win32/Kryptik.AWO trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0030068.exe a variant of Win32/Kryptik.AVV trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0031882.exe a variant of Win32/Kryptik.AVG trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0031883.exe a variant of Win32/Kryptik.AVX trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0031887.exe a variant of Win32/Kryptik.ALL trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0031888.exe a variant of Win32/Kryptik.AWF trojan
C:\System Volume Information\_restore{45892D38-A0BF-43F9-8C9F-96715222A8FE}\RP97\A0031890.dll a variant of Win32/Adware.Virtumonde.NFW application
K:\backup\C\Documents and Settings\Forrest_2\Desktop\vdownloader\vd_setup.exe a variant of Win32/Adware.ADON application
K:\backup\D\Program Files\Vidalia Bundle\Tor\tor.exe probably a variant of Win32/TrojanDownloader.Agent trojan

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:09 PM

Posted 28 October 2009 - 06:47 PM

That log is better than it looks. Most of the entries are quarantined or will be removed before we're done.

K:\backup\C\Documents and Settings\Forrest_2\Desktop\vdownloader\vd_setup.exe a variant of Win32/Adware.ADON application
K:\backup\D\Program Files\Vidalia Bundle\Tor\tor.exe probably a variant of Win32/TrojanDownloader.Agent trojan


Can you tell me what your K drive is? There are two files that need to be removed on that drive.
Posted Image
m0le is a proud member of UNITE

#15 freedom lover

freedom lover
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Local time:12:09 PM

Posted 29 October 2009 - 02:25 AM

right on...thanks a bunch man...thanks!!!!

my k drive is an external hard drive...




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users