Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Beep.sys


  • This topic is locked This topic is locked
11 replies to this topic

#1 Batim

Batim

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 15 October 2009 - 10:58 PM

Hi

My pc keeps on replacing the beep.sys file with an infected one. I have scanned the pc with malwarebytes, spybot,avg, antivir, sdfix,etc. Everything seems to fix it but with in seconds the beep.sys file is again back and infected. I have tried to replace it delete it but still it comes back in seconds, together with this there is a popup that comes up that tell me to put in the xp cd because some files is overwritten. In the registry the key beep I can't delete it nor can I change the permissions on it.

In save mode the popup does not start about the xp cd that is needed. I really need help on this as I don't know what else to do and reinstall is not an option if possible.

ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/10/15 06:08
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xAE68F000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\Program Files\Hunting Unlimited\sys
Status: Size mismatch (API: 182912, Raw: 0)

Path: c:\system volume information\catalog.wci\00010004.ci
Status: Size mismatch (API: 4096, Raw: 196608)

Path: C:\System Volume Information\catalog.wci\00010004.dir
Status: Locked to the Windows API!

Path: c:\windows\system32\dllcache\ndis.sys
Status: Size mismatch (API: 182912, Raw: 212480)

Path: c:\windows\system32\drivers\ndis.sys
Status: Size mismatch (API: 182912, Raw: 212480)

Path: C:\Documents and Settings\Sune'\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys
Status: Size mismatch (API: 182912, Raw: 0)

Path: C:\Documents and Settings\user\Application Data\Macromedia\Flash Player\#SharedObjects\KRBKN9UT\video.google.com\s
Status: Size mismatch (API: 182912, Raw: 0)

Path: C:\Documents and Settings\user\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys
Status: Size mismatch (API: 182912, Raw: 0)

SSDT
-------------------
#: 035 Function Name: NtCreateEvent
Status: Hooked by "C:\WINDOWS\System32\Drivers\Beep.SYS" at address 0xaf5dc615

#: 041 Function Name: NtCreateKey
Status: Hooked by "<unknown>" at address 0xbae730de

#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0xbae730d4

#: 063 Function Name: NtDeleteKey
Status: Hooked by "<unknown>" at address 0xbae730e3

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "<unknown>" at address 0xbae730ed

#: 098 Function Name: NtLoadKey
Status: Hooked by "<unknown>" at address 0xbae730f2

#: 119 Function Name: NtOpenKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\Beep.SYS" at address 0xaf5da6c5

#: 122 Function Name: NtOpenProcess
Status: Hooked by "<unknown>" at address 0xbae730c0

#: 128 Function Name: NtOpenThread
Status: Hooked by "<unknown>" at address 0xbae730c5

#: 193 Function Name: NtReplaceKey
Status: Hooked by "<unknown>" at address 0xbae730fc

#: 204 Function Name: NtRestoreKey
Status: Hooked by "<unknown>" at address 0xbae730f7

#: 247 Function Name: NtSetValueKey
Status: Hooked by "<unknown>" at address 0xbae730e8

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "<unknown>" at address 0xbae730cf

Stealth Objects
-------------------
Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 2800) Address: 0x01000000 Size: 20480

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 2932) Address: 0x01000000 Size: 20480

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 2944) Address: 0x01000000 Size: 20480

Hidden Services
-------------------
Service Name: Beep
Image Path: C:\WINDOWS\system32\drivers\Beep.sys

==EOF==

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:43:52 PM, on 10/15/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\system32\cisvc.exe
C:\Program Files\Canon\IJPLM\IJPLMSVC.EXE
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Canon\MultiPASS4\MPSERVIC.EXE
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\fxssvc.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Canon\MultiPASS4\MPDBMgr.exe
C:\Documents and Settings\user\Desktop\HijackThis.exe

F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe, C:\DOCUME~1\Sune'\LOCALS~1\Temp\638.exe,
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - C:\Program Files\AVG\AVG8\avgssie.dll
O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\BitDefender\BitDefender 2008\IEToolbar.dll (file missing)
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\.DEFAULT\..\Run: [Windows Network Data Management System Service] "C:\WINDOWS\system32\bndmss.exe" * (User 'Default user')
O4 - HKUS\.DEFAULT\..\Run: [Windows Live] C:\Documents and Settings\All Users\WindowsLive.exe (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{0B535667-7FA6-4232-9F99-DEA6FB3FE0A5}: NameServer = 192.168.0.1,196.252.255.35
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: Avira AntiVir Scheduler (antivirschedulerservice) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (antivirservice) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: Google Update Service (gupdate1c9639324b6e50) (gupdate1c9639324b6e50) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: PIXMA Extended Survey Program (IJPLMSVC) - Unknown owner - C:\Program Files\Canon\IJPLM\IJPLMSVC.EXE
O23 - Service: MpService - Canon Inc. - C:\Program Files\Canon\MultiPASS4\MPSERVIC.EXE
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: Automatic Updates (wuauserv) - Unknown owner - C:\WINDOWS\

--
End of file - 4034 bytes

BC AdBot (Login to Remove)

 


#2 Batim

Batim
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 17 October 2009 - 05:27 PM

I can see the problem is in the registry, but the registry entry beep can't be accesed in the registry. Access denied is the error I get and the permissions can't be changed. Any ideas?

#3 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:05:16 AM

Posted 17 October 2009 - 08:06 PM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#4 Batim

Batim
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 18 October 2009 - 04:12 AM

Hi Sam

Here is the combofix file.

ComboFix 09-10-16.09 - user 10/18/2009 10:42.1.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1247.824 [GMT 2:00]
Running from: c:\documents and settings\user\Desktop\ComboFix.exe
AV: AntiVir Desktop *On-access scanning disabled* (Outdated) {AD166499-45F9-482A-A743-FDD3350758C7}
AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Documents\EA Games\Desktop_.ini
c:\documents and settings\All Users\Documents\My Music\Desktop_.ini
c:\documents and settings\All Users\Documents\My Music\My Playlists\Desktop_.ini
c:\documents and settings\All Users\Documents\My Music\Sample Music\Desktop_.ini
c:\documents and settings\All Users\Documents\My Music\Sample Playlists\0013BCDB\Desktop_.ini
c:\documents and settings\All Users\Documents\My Music\Sample Playlists\Desktop_.ini
c:\documents and settings\All Users\Documents\My Music\Sync Playlists\2AF81F\Desktop_.ini
c:\documents and settings\All Users\Documents\My Music\Sync Playlists\Desktop_.ini
c:\documents and settings\All Users\Documents\My Pictures\Desktop_.ini
c:\documents and settings\All Users\Documents\My Pictures\Sample Pictures\Desktop_.ini
c:\documents and settings\All Users\Documents\My Pictures\Sample Pictures\New Folder\Copy of New Briefcase\Desktop_.ini
c:\documents and settings\All Users\Documents\My Pictures\Sample Pictures\New Folder\Desktop_.ini
c:\documents and settings\All Users\Documents\My Pictures\Sample Pictures\New Folder\New Briefcase\Desktop_.ini
c:\documents and settings\All Users\Documents\My Videos\Desktop_.ini
c:\windows\regedit.com
c:\windows\system32\im64.dll
c:\windows\system32\oledb32.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_BNDMSS
-------\Legacy_fci
-------\Legacy_icf


((((((((((((((((((((((((( Files Created from 2009-09-18 to 2009-10-18 )))))))))))))))))))))))))))))))
.

2009-10-17 23:42 . 2009-10-18 08:28 -------- d-----w- c:\windows\system32\NtmsData
2009-10-15 19:34 . 2009-10-15 19:34 -------- d-----w- c:\windows\ERUNT
2009-10-15 19:30 . 2009-10-17 23:54 -------- d-----w- C:\SDFix
2009-10-15 03:52 . 2004-08-03 21:07 42368 -c--a-w- c:\windows\system32\dllcache\agp440.sys
2009-10-15 03:52 . 2004-08-03 21:07 42368 ----a-w- c:\windows\system32\drivers\agp440.sys
2009-10-14 20:17 . 2009-10-14 20:24 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-14 19:36 . 2009-07-28 14:33 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2009-10-14 19:36 . 2009-03-30 08:33 96104 ----a-w- c:\windows\system32\drivers\avipbb.sys
2009-10-14 19:36 . 2009-02-13 10:29 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys
2009-10-14 19:36 . 2009-02-13 10:17 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys
2009-10-14 19:36 . 2009-10-14 19:36 -------- d-----w- c:\program files\Avira
2009-10-14 19:36 . 2009-10-14 19:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira
2009-10-14 19:29 . 2009-10-14 19:29 -------- d-----w- C:\thys
2009-10-14 18:12 . 2009-10-14 18:12 -------- d-----w- c:\documents and settings\user\Local Settings\Application Data\GHISLER
2009-10-14 17:45 . 2009-10-14 17:54 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-10-14 17:45 . 2009-10-14 17:45 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-10-14 09:02 . 2009-10-14 09:02 552 ----a-w- c:\windows\system32\d3d8caps.dat
2009-10-14 08:13 . 2009-10-14 19:16 -------- d-----w- C:\$AVG8.VAULT$
2009-10-14 08:11 . 2009-10-14 08:11 11952 ----a-w- c:\windows\system32\avgrsstx.dll
2009-10-14 08:11 . 2009-10-14 08:11 108552 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2009-10-14 08:11 . 2009-10-14 08:11 335240 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2009-10-14 08:11 . 2009-10-14 08:11 27784 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2009-10-14 08:11 . 2009-10-14 18:05 -------- d-----w- c:\windows\system32\drivers\Avg
2009-10-14 08:10 . 2009-10-14 08:10 -------- d-----w- c:\program files\AVG
2009-10-14 08:10 . 2009-10-14 08:10 -------- d-----w- c:\documents and settings\All Users\Application Data\avg8
2009-10-14 07:51 . 2009-10-14 07:51 -------- d-----w- c:\windows\SxsCaPendDel
2009-10-14 06:49 . 2009-10-14 06:49 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-10-14 06:49 . 2009-10-14 06:49 -------- d-----w- c:\documents and settings\user\Application Data\SUPERAntiSpyware.com
2009-10-14 06:48 . 2009-10-14 06:48 -------- d-----w- c:\documents and settings\user\Application Data\Malwarebytes
2009-10-14 06:48 . 2009-10-14 06:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-10-14 06:48 . 2009-09-10 12:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-14 06:48 . 2009-09-10 12:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-11 12:03 . 2009-10-11 12:03 1050713 ----a-w- c:\windows\system32\rss.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-18 08:39 . 2004-08-04 12:00 182912 ----a-w- c:\windows\system32\drivers\ndis.sys
2009-10-18 08:20 . 2007-01-29 16:03 -------- d-----w- c:\program files\Hunting Unlimited
2009-10-15 22:33 . 2005-09-03 05:28 22920 ----a-w- c:\documents and settings\user\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-15 17:59 . 2007-10-19 11:12 -------- d-----w- c:\program files\ESET
2009-10-15 17:57 . 2007-10-21 17:43 -------- d-----w- c:\program files\Google
2009-10-15 03:48 . 2008-09-10 16:38 -------- d-----w- c:\program files\2001 TetRize
2009-10-14 07:48 . 2008-01-30 12:00 81984 ----a-w- c:\windows\system32\bdod.bin
2009-10-12 18:58 . 2004-08-04 12:00 14336 ----a-w- c:\windows\system32\svchost.exe
2009-09-20 18:21 . 2006-04-19 13:45 -------- d-----w- c:\program files\Rocket Boards Demo
2009-08-30 16:54 . 2007-09-10 16:53 -------- d-----w- c:\documents and settings\All Users\Application Data\CanonIJPLM
2001-12-03 11:01 . 2001-12-03 11:01 92208 --s-a-w- c:\program files\Common Files\Wing.dll
2001-12-03 11:01 . 2001-12-03 11:01 72960 --s-a-w- c:\program files\Common Files\P3lib250.dll
2001-12-03 11:01 . 2001-12-03 11:01 188960 --s-a-w- c:\program files\Common Files\Wingde.dll
.

------- Sigcheck -------


[7] 2007-10-30 . 90CAFF4B094573449A0872A0F919B178 . 360064 . . [5.1.2600.3244] . . c:\windows\system32\dllcache\tcpip.sys
[-] 2007-10-30 . D1E0A099360A7AC279D883B057AB58A5 . 360064 . . [5.1.2600.3244] . . c:\windows\system32\drivers\tcpip.sys
[7] 2007-10-30 . 64798ECFA43D78C7178375FCDD16D8C8 . 360832 . . [5.1.2600.3244] . . c:\windows\$hf_mig$\KB941644\SP2QFE\tcpip.sys
[7] 2006-04-20 . B2220C618B42A2212A59D91EBD6FC4B4 . 360576 . . [5.1.2600.2892] . . c:\windows\$hf_mig$\KB917953\SP2QFE\tcpip.sys
[7] 2006-04-20 . 1DBF125862891817F374F407626967F4 . 359808 . . [5.1.2600.2892] . . c:\windows\$NtUninstallKB941644$\tcpip.sys
[7] 2004-08-04 . 9F4B36614A0FC234525BA224957DE55C . 359040 . . [5.1.2600.2180] . . c:\windows\$NtUninstallKB917953$\tcpip.sys
[7] 2004-08-03 . 9F4B36614A0FC234525BA224957DE55C . 359040 . . [5.1.2600.2180] . . c:\windows\ServicePackFiles\i386\tcpip.sys

c:\windows\system32\drivers\beep.sys ... is missing !!
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-10-14 2007832]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"SynchronousMachineGroupPolicy"= 0 (0x0)
"SynchronousUserGroupPolicy"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-10-14 08:11 11952 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ \0

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgnsx.exe"=

R1 avgldx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [10/14/2009 10:11 AM 335240]
R1 avgtdix;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [10/14/2009 10:11 AM 108552]
R2 antivirschedulerservice;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [10/14/2009 9:36 PM 108289]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [10/14/2009 10:10 AM 297752]
S1 f0b81992;f0b81992;c:\windows\system32\drivers\f0b81992.sys --> c:\windows\system32\drivers\f0b81992.sys [?]
S1 sasdifsv;SASDIFSV;\??\c:\docume~1\user\LOCALS~1\Temp\SuperAntiSpyware\SASDIFSV.SYS --> c:\docume~1\user\LOCALS~1\Temp\SuperAntiSpyware\SASDIFSV.SYS [?]
S1 saskutil;SASKUTIL;\??\c:\docume~1\user\LOCALS~1\Temp\SuperAntiSpyware\SASKUTIL.sys --> c:\docume~1\user\LOCALS~1\Temp\SuperAntiSpyware\SASKUTIL.sys [?]
S2 gupdate1c9639324b6e50;Google Update Service (gupdate1c9639324b6e50);c:\program files\Google\Update\GoogleUpdate.exe [12/21/2008 7:38 PM 133104]
S3 sasenum;SASENUM;\??\c:\docume~1\user\LOCALS~1\Temp\SuperAntiSpyware\SASENUM.SYS --> c:\docume~1\user\LOCALS~1\Temp\SuperAntiSpyware\SASENUM.SYS [?]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
bdx REG_MULTI_SZ scan
.
Contents of the 'Scheduled Tasks' folder

2009-10-18 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2008-12-21 17:38]

2009-10-18 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2008-12-21 17:38]

2009-10-16 c:\windows\Tasks\ParetoLogic Privacy Controls_{E191FDAC-F242-11DD-8FAE-0020ED82E480}.job
- c:\program files\ParetoLogic\Privacy Controls\Pareto_PC.exe [2008-11-25 09:30]

2009-10-17 c:\windows\Tasks\ParetoLogic Update Version2.job
- c:\program files\Common Files\ParetoLogic\UUS2\Pareto_Update.exe [2008-02-22 10:25]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: {0B535667-7FA6-4232-9F99-DEA6FB3FE0A5} = 192.168.0.1,196.252.255.35
.
- - - - ORPHANS REMOVED - - - -

HKU-Default-Run-Windows Live - c:\documents and settings\All Users\WindowsLive.exe
AddRemove-hijackthis - F:\HijackThis.exe
AddRemove-Jazz Jackrabbit 2 Shareware - c:\games\Jazz2Sw\UnInst.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-18 11:02
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\bdfsfltr]
"ImagePath"=hex:73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,44,00,52,\

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\bdfsfltr]
"ImagePath"=hex:73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,44,00,52,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(568)
c:\windows\system32\WPDShServiceObj.dll
c:\program files\Nokia\Nokia PC Suite 6\PhoneBrowser.dll
c:\program files\Nokia\Nokia PC Suite 6\PCSCM.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Avira\AntiVir Desktop\avguard.exe
c:\program files\Canon\IJPLM\ijplmsvc.exe
c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
c:\program files\Canon\MultiPASS4\mpservic.exe
c:\program files\CyberLink\Shared Files\RichVideo.exe
c:\windows\system32\locator.exe
c:\windows\system32\fxssvc.exe
c:\program files\AVG\AVG8\avgrsx.exe
c:\progra~1\AVG\AVG8\avgnsx.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-10-18 11:07 - machine was rebooted
ComboFix-quarantined-files.txt 2009-10-18 09:07

Pre-Run: 13,783,531,520 bytes free
Post-Run: 13,692,227,584 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

202 --- E O F --- 2008-01-12 16:05

Attached Files


Edited by Buckeye_Sam, 18 October 2009 - 08:46 AM.


#5 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:05:16 AM

Posted 18 October 2009 - 08:50 AM

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

Driver::
f0b81992

FCopy::
c:\windows\system32\dllcache\tcpip.sys | c:\windows\system32\drivers\tcpip.sys

File::
c:\windows\system32\drivers\f0b81992.sys 

Registry::
[-HKEY_LOCAL_MACHINE\System\ControlSet001\Services\bdfsfltr]
Prior to running Combofix.exe you should disable your antivirus program.

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.

Posted Image

This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.


======================



Download Dr.Web CureIt to the desktop:
ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe
  • Doubleclick the drweb-cureit.exe file and Allow to run the express scan
  • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it. This is only a short scan.
  • Once the short scan has finished, mark the drives that you want to scan.
  • Select all drives. A red dot shows which drives have been chosen.
  • Click the green arrow at the right, and the scan will start.
  • Click 'Yes to all' if it asks if you want to cure/move the file.
  • When the scan has finished, in the menu, click file and choose save report list
  • Save the report to your desktop. The report will be called DrWeb.csv
  • Close Dr.Web Cureit.
Note: If you have problems with DrWeb shutting down before it completes the scan you can perform a custom scan and select individual folders to scan. In that case start with C:\Windows\System32


Please post the contents of the log from DrWeb in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#6 Batim

Batim
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 18 October 2009 - 11:19 AM

Two logs as requested. Thanks for the help so far

Attached Files


Edited by Batim, 18 October 2009 - 11:22 AM.


#7 Batim

Batim
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 18 October 2009 - 11:25 AM

adimage.dll;C:\WINDOWS\system32;Adware.Aureate.origin;Deleted.;

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:05:16 AM

Posted 18 October 2009 - 06:33 PM

How is your computer behaving now?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 Batim

Batim
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 18 October 2009 - 11:20 PM

Hi

I don't see any more errors or funny things on the Pc. Feels a bit slow still but defenitly a lot better.

Thank you.

#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:05:16 AM

Posted 19 October 2009 - 07:03 AM

Glad I could help! :(


We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :)
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 Batim

Batim
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 19 October 2009 - 02:46 PM

Thanks for all the trouble.

Everything seems ok now.

#12 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:05:16 AM

Posted 19 October 2009 - 06:08 PM

:(

Now that your problem appears to be resolved, this thread will be closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users