Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

antispyware 2010


  • This topic is locked This topic is locked
3 replies to this topic

#1 bongorider

bongorider

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:05:46 AM

Posted 24 October 2009 - 03:00 AM

I'm currently plagued by these two, and have tried numerous removal programs to no avail, malwarebytes removes some vundo trojans and other stuff too, but after a reboot as soon as the comp reconnects to the internet I get some combination of antispyware2010 or security tool presenting themselves again. I've tried some of the guides in other topics for removing Antispyware2010, but nothing seems to work, everything just keeps coming back after being cleaned out

here is my DDS log


DDS (Ver_09-10-24.02) - NTFSx86
Run by XXXX at 0:12:49.00 on 25/10/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_13

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.friendster.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
mWinlogon: Userinit=c:windowssystem32userinit.exe,c:windowssystem32sdra64.exe,
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:program filesadobeacrobat 7.0activexAcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:progra~1spybot~1SDHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:windowssystem32dlatfswshx.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:program filesjavajre6binssv.dll
BHO: {7E853D72-626A-48EC-A868-BA8D5E23E045} - No File
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:program filescommon filesmicrosoft sharedwindows liveWindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:program filesjavajre6binjp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:program filesjavajre6libdeployjqsiejqs_plugin.dll
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [msnmsgr] "c:program fileswindows livemessengermsnmsgr.exe" /background
uRun: [restorer64_a] c:documents and settingsXXXXrestorer64_a.exe
uRun: [mserv] c:documents and settingsXXXXapplication dataseres.exe
uRun: [svchost] c:documents and settingsXXXXapplication datasvcst.exe
mRun: [TPSMain] TPSMain.exe
mRun: [TouchED] c:program filestoshibatouchedTouchED.Exe
mRun: [TFNF5] TFNF5.exe
mRun: [TFncKy] TFncKy.exe
mRun: [SmoothView] c:program filestoshibatoshiba zooming utilitySmoothView.exe
mRun: [SigmaTel StacMon] c:program filessigmatelsigmatel ac97 audio driversstacmon.exe
mRun: [PadTouch] "c:program filestoshibapadtouchPadExe.exe
mRun: [LTSMMSG] LTSMMSG.exe
mRun: [Apoint] c:program filesapoint2kApoint.exe
mRun: [00THotkey] c:windowssystem3200THotkey.exe
mRun: [000StTHK] 000StTHK.exe
mRun: [avgnt] "c:program filesaviraantivir personaledition classicavgnt.exe" /min
mRun: [AppleSyncNotifier] c:program filescommon filesapplemobile device supportbinAppleSyncNotifier.exe
mRun: [SunJavaUpdateSched] "c:program filesjavajre6binjusched.exe"
mRun: [QuickTime Task] "c:program filesquicktimeqttask.exe" -atboottime
mRun: [iTunesHelper] "c:program filesitunesiTunesHelper.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:program filesmalwarebytes' anti-malwarembam.exe" /runcleanupscript
mRun: [sysgif32] c:windowstempwpv461255703227.exe
mRun: [restorer64_a] c:windowssystem32restorer64_a.exe
mRun: [PromoReg] c:windowstemp_ex-08.exe
mRun: [Regedit32] c:windowssystem32regedit.exe
dRun: [CTFMON.EXE] c:windowssystem32CTFMON.EXE
IE:
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%Network Diagnosticxpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:program filesmessengermsmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBC} - c:program filesjavajre6binjp2iexp.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:progra~1micros~2office11REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:progra~1spybot~1SDHelper.dll
DPF: Microsoft XML Parser for Java - file://c:windowsjavaclassesxmldso.cab
DPF: Yahoo! Go Fish - hxxp://download2.games.yahoo.com/games/clients/y/zt3_x.cab
DPF: Yahoo! Graffiti - hxxp://download2.games.yahoo.com/games/clients/y/grt5_x.cab
DPF: Yahoo! Hearts - hxxp://download2.games.yahoo.com/games/clients/y/ht1_x.cab
DPF: Yahoo! Literati - hxxp://download2.games.yahoo.com/games/clients/y/tt5_x.cab
DPF: Yahoo! Reversi - hxxp://download2.games.yahoo.com/games/clients/y/rt0_x.cab
DPF: Yahoo! Word Racer - hxxp://download2.games.yahoo.com/games/clients/y/wt1_x.cab
DPF: {1239CC52-59EF-4DFA-8C61-90FFA846DF7E} - hxxp://www.musicnotes.com/download/mnviewer.cab
DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - hxxp://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} - hxxp://upload.facebook.com/controls/FacebookPhotoUploader3.cab
DPF: {5D6F45B3-9043-443D-A792-115447494D24} - hxxp://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} - hxxp://upload.facebook.com/controls/FacebookPhotoUploader.cab
DPF: {62789780-B744-11D0-986B-00609731A21D} - hxxp://www.mapguide.com/Downloads/MG_R6.3/En/Viewer/mgaxctrl.cab
DPF: {70EE0AA4-5A3A-4052-8FFA-2EEDA43F7942} - hxxp://www.innotive.com/download/cibrowser11.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos-beta/OnlineScanner.cab
DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} - hxxp://messenger.zone.msn.com/EN-US/a-LUXR/mjolauncher.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {A8F2B9BD-A6A0-486A-9744-18920D898429} - hxxp://www.sibelius.com/download/software/win/ActiveXPlugin.cab
DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} - hxxp://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
DPF: {BF985246-09BF-11D2-BE62-006097DF57F6} - hxxp://simcity.ea.com/play/classic/SimCityX.cab
DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} - hxxp://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
DPF: {CAFEEFAC-0015-0000-0008-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_08-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0010-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_10-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} - hxxp://by107fd.bay107.hotmail.msn.com/activex/HMAtchmt.ocx
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:program filescommon filesmicrosoft sharedweb foldersPKMCDO.DLL
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:windowssystem32WPDShServiceObj.dll
LSA: Notification Packages = scecli kuatut20.dll

================= FIREFOX ===================

FF - ProfilePath - c:docume~1XXXapplic~1mozillafirefoxprofilesfgcy8hk9.default
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - www.friendster.com
FF - component: c:progra~1mozill~1extensionstalkback@mozilla.orgcomponentsqfaservices.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:windowsmicrosoft.netframeworkv3.5windows presentation foundationdotnetassistantextension
FF - HiddenExtension: XULRunner: {BDC03796-9A5B-48BB-9936-0B201B8EBBFF} - c:documents and settingsXXXXlocal settingsapplication data{BDC03796-9A5B-48BB-9936-0B201B8EBBFF}
FF - HiddenExtension: XULRunner: {05CCC319-02CD-4D4E-BB2A-E62179E40469} - c:documents and settingsadministratorlocal settingsapplication data{05CCC319-02CD-4D4E-BB2A-E62179E40469}
FF - HiddenExtension: Java Console: No Registry Reference - c:program filesmozilla firefoxextensions{CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:program filesmozilla firefoxextensions{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:program filesmozilla firefoxextensions{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2009-10-24 23:02:59 1 ----a-w- c:documents and settingsXXXXoashdihasidhasuidhiasdhiashdiuasdhasd
2009-10-24 23:00:46 44032 ----a-w- c:docume~1XXXXapplic~1svcst.exe
2009-10-24 23:00:36 44032 ----a-w- c:docume~1XXXXapplic~1seres.exe
2009-10-24 22:59:28 58729 ----a-w- c:documents and settingsXXXXrestorer64_a.exe
2009-10-24 22:59:25 58729 ----a-w- c:windowssystem32restorer64_a.exe
2009-10-24 13:24:27 0 d-sha-r- C:cmdcons
2009-10-24 11:12:04 16837 ----a-w- c:windowslerabowiqu.db
2009-10-24 11:12:00 19594 ----a-w- c:windowssystem32uwata.db
2009-10-24 11:12:00 10290 ----a-w- c:windowsalib.com
2009-10-24 10:31:55 159600 ----a-w- c:windowssystem32driverspctgntdi.sys
2009-10-24 10:30:45 73840 ----a-w- c:windowssystem32driversPCTAppEvent.sys
2009-10-24 10:30:45 130424 ----a-w- c:windowssystem32driversPCTCore.sys
2009-10-24 10:29:39 64392 ----a-w- c:windowssystem32driverspctplsg.sys
2009-10-24 10:29:39 0 d-----w- c:program filescommon filesPC Tools
2009-10-24 10:28:57 0 d-----w- c:docume~1alluse~1applic~1PC Tools
2009-10-24 10:28:56 0 d-----w- c:docume~1XXXXapplic~1PC Tools
2009-10-24 10:28:55 0 d-----w- c:program filesSpyware Doctor
2009-10-24 05:46:19 98816 ----a-w- c:windowssed.exe
2009-10-24 05:46:19 236544 ----a-w- c:windowsPEV.exe
2009-10-24 05:46:19 161792 ----a-w- c:windowsSWREG.exe
2009-10-19 20:20:33 0 d-----w- c:docume~1XXXXapplic~1Malwarebytes
2009-10-19 20:19:37 38224 ----a-w- c:windowssystem32driversmbamswissarmy.sys
2009-10-19 20:18:19 0 d-----w- c:docume~1alluse~1applic~1Malwarebytes
2009-10-19 20:18:14 19160 ----a-w- c:windowssystem32driversmbam.sys
2009-10-19 20:17:47 0 d-----w- c:program filesMalwarebytes' Anti-Malware
2009-10-19 07:03:01 552 ----a-w- c:windowssystem32d3d8caps.dat
2009-10-18 14:24:38 0 ----a-w- c:windowsCpifi.bin
2009-10-18 14:24:34 120 ----a-w- c:windowsUjolijovapu.dat
2009-10-17 22:58:34 64288 ----a-w- c:windowssystem32driversLbd.sys
2009-10-17 22:55:23 0 dc-h--w- c:docume~1alluse~1applic~1{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}

==================== Find3M ====================

2009-09-11 14:18:39 136192 ----a-w- c:windowssystem32msv1_0.dll
2009-09-04 21:03:36 58880 ----a-w- c:windowssystem32msasn1.dll
2009-08-29 07:36:27 832512 ------w- c:windowssystem32wininet.dll
2009-08-29 07:36:24 78336 ----a-w- c:windowssystem32ieencode.dll
2009-08-29 07:36:24 17408 ----a-w- c:windowssystem32corpol.dll
2009-08-26 08:00:21 247326 ----a-w- c:windowssystem32strmdll.dll
2009-08-06 18:23:46 274288 ----a-w- c:windowssystem32mucltui.dll
2009-08-06 18:23:46 215920 ----a-w- c:windowssystem32muweb.dll
2009-08-05 09:01:48 204800 ----a-w- c:windowssystem32mswebdvd.dll
2009-08-04 19:44:46 2189184 ------w- c:windowssystem32ntoskrnl.exe
2009-08-04 14:20:08 2066048 ------w- c:windowssystem32ntkrnlpa.exe

============= FINISH: 0:16:55.02 ===============


*****************************************************************************


after this I followed adive in following topic

http://www.bleepingcomputer.com/forums/ind...076&hl=2010

and ran malwarebytes in safe mode etc
*********************************************************************************




Malwarebytes' Anti-Malware 1.41
Database version: 2990
Windows 5.1.2600 Service Pack 3

20/10/2009 13:03:36
mbam-log-2009-10-20 (13-03-36).txt

Scan type: Full Scan (C:|)
Objects scanned: 199484
Time elapsed: 2 hour(s), 30 minute(s), 6 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 0
Registry Keys Infected: 27
Registry Values Infected: 7
Registry Data Items Infected: 4
Folders Infected: 1
Files Infected: 20

Memory Processes Infected:
C:Documents and SettingsXXXXApplication Dataseres.exe (Rogue.AntiVirusPro) -> Unloaded process successfully.
C:Documents and SettingsXXXXApplication Datasvcst.exe (Rogue.AntiVirusPro) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{2b3cbdc2-8ab6-45b1-b59e-7b0dee595917} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifyiifdeef (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSID{2b3cbdc2-8ab6-45b1-b59e-7b0dee595917} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTsaix.installercaller (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTsaix.installercaller.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtStats{2e9d4c81-9f27-4c14-b804-7b0f6bc88a4f} (Adware.PurityScan) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtStats{1a26f07f-0d60-4835-91cf-1e1766a0ec56} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtStats{2b3cbdc2-8ab6-45b1-b59e-7b0dee595917} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionModuleUsageC:/WINDOWS/Downloaded Program Files/popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTTypeLib{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTInterface{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTInterface{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSID{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtStats{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCode Store DatabaseDistribution Units{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTpopcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTpopcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftaffltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREWakeNet (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftaffltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifywinvwx32 (Trojan.Dialer) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks{2b3cbdc2-8ab6-45b1-b59e-7b0dee595917} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionSharedDLLsC:WINDOWSDownloaded Program Filespopcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRunmserv (Rogue.AntiVirusPro) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRunsvchost (Rogue.AntiVirusPro) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERControl Paneldon't loadwscui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerForceClassicControlPanel (Hijack.ControlPanelStyle) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunrestorer64_a (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSANotification Packages (Trojan.Vundo.H) -> Data: kuatut20.dll -> Delete on reboot.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterFirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:WINDOWSsystem32lowsec (Stolen.data) -> Quarantined and deleted successfully.

Files Infected:
C:WINDOWSsystem32iifdeef.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:WINDOWSkuatut20.dll (Trojan.Vundo.H) -> Delete on reboot.
C:System Volume Information_restore{58837669-1590-4B2B-A336-32AC0731AEC9}RP422A0042878.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:System Volume Information_restore{58837669-1590-4B2B-A336-32AC0731AEC9}RP422A0042912.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:System Volume Information_restore{58837669-1590-4B2B-A336-32AC0731AEC9}RP422A0042916.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:System Volume Information_restore{58837669-1590-4B2B-A336-32AC0731AEC9}RP423A0043032.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:System Volume Information_restore{58837669-1590-4B2B-A336-32AC0731AEC9}RP423A0044036.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:System Volume Information_restore{58837669-1590-4B2B-A336-32AC0731AEC9}RP423A0044040.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:WINDOWSsystem32_scui.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:WINDOWSDownloaded Program Filespopcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
C:Documents and SettingsxxxxApplication Dataseres.exe (Rogue.AntiVirusPro) -> Delete on reboot.
C:Documents and SettingsxxxxApplication Datasvcst.exe (Rogue.AntiVirusPro) -> Delete on reboot.
C:Documents and SettingsxxxxApplication Datawiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.
C:1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:Documents and SettingsxxxxStart MenuProgramsStartupikowin32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:Documents and Settingsxxxxoashdihasidhasuidhiasdhiashdiuasdhasd (Malware.Trace) -> Quarantined and deleted successfully.
C:WINDOWSsystem32winvwx32.dll (Trojan.Dialer) -> Quarantined and deleted successfully.
C:Documents and Settingsxxxxrestorer64_a.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:WINDOWSsystem32restorer64_a.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:WINDOWSsmdat32m.sys (Rootkit.Agent) -> Quarantined and deleted successfully.

Merged posts. ~ OB

Edited by Orange Blossom, 27 October 2009 - 08:53 PM.


BC AdBot (Login to Remove)

 


#2 bongorider

bongorider
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:05:46 AM

Posted 25 October 2009 - 05:34 AM

ok next step in other topic was combofix, so I've gone ahead and done that too

ComboFix 09-10-22.01 - XXXX25/10/2009 3:55.2.1 - NTFSx86
Running from: c:\documents and settings\All Users\Documents\Combo-Fix.exe
AV: Avira AntiVir PersonalEdition *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Juita\Application Data\wiaserva.log

.
((((((((((((((((((((((((( Files Created from 2009-09-25 to 2009-10-25 )))))))))))))))))))))))))))))))
.

2009-10-24 11:12 . 2009-10-24 11:12 10290 ----a-w- c:\windows\alib.com
2009-10-24 10:31 . 2008-12-11 07:38 159600 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2009-10-24 10:30 . 2009-03-06 15:45 130424 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2009-10-24 10:30 . 2008-12-18 11:16 73840 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2009-10-24 10:29 . 2009-10-24 10:34 -------- d-----w- c:\program files\Common Files\PC Tools
2009-10-24 10:29 . 2008-12-10 11:36 64392 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2009-10-24 10:28 . 2009-10-24 10:28 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2009-10-24 10:28 . 2009-10-24 10:28 -------- d-----w- c:\documents and settings\XXX\Application Data\PC Tools
2009-10-24 10:28 . 2009-10-24 11:27 -------- d-----w- c:\program files\Spyware Doctor
2009-10-24 02:38 . 2009-10-24 02:38 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Apple Computer
2009-10-24 02:37 . 2009-10-24 02:37 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-10-24 02:37 . 2009-10-24 02:37 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\{05CCC319-02CD-4D4E-BB2A-E62179E40469}
2009-10-24 02:34 . 2009-10-24 02:34 81304 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-19 20:20 . 2009-10-19 20:20 -------- d-----w- c:\documents and settings\XX\Application Data\Malwarebytes
2009-10-19 20:19 . 2009-09-10 13:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-19 20:18 . 2009-10-19 20:18 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-10-19 20:18 . 2009-09-10 13:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-19 20:17 . 2009-10-25 03:08 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-19 07:03 . 2009-10-19 07:03 552 ----a-w- c:\windows\system32\d3d8caps.dat
2009-10-18 14:24 . 2009-10-24 00:04 0 ----a-w- c:\windows\Cpifi.bin
2009-10-18 14:24 . 2009-10-24 02:19 120 ----a-w- c:\windows\Ujolijovapu.dat
2009-10-18 14:24 . 2009-10-18 14:24 -------- d-----w- c:\documents and settings\XX\Local Settings\Application Data\{BDC03796-9A5B-48BB-9936-0B201B8EBBFF}
2009-10-17 22:58 . 2009-09-23 12:55 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-10-17 22:55 . 2009-10-17 22:55 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
2009-10-17 22:54 . 2009-10-17 22:58 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-24 23:12 . 2009-05-10 21:45 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-10-23 18:01 . 2004-10-23 07:01 81304 ----a-w- c:\documents and settings\XXX\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-23 09:00 . 2004-04-07 17:05 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-10-23 08:18 . 2005-11-07 18:54 -------- d-----w- c:\documents and settings\Juita\Application Data\Azureus
2009-10-18 03:08 . 2004-10-23 07:36 -------- d-----w- c:\program files\Lavasoft
2009-10-18 03:00 . 2008-01-06 07:05 -------- d-----w- c:\documents and settings\All Users\Application Data\DAEMON Tools Pro
2009-10-17 23:08 . 2005-09-05 12:10 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-10-17 20:02 . 2005-09-05 12:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-09-16 17:44 . 2004-10-24 00:26 -------- d-----w- c:\program files\MSN Messenger
2009-09-16 17:43 . 2009-09-16 17:43 -------- d-----w- c:\program files\Microsoft
2009-09-16 17:42 . 2009-09-16 17:41 -------- d-----w- c:\program files\Windows Live
2009-09-16 17:42 . 2009-09-16 17:42 -------- d-----w- c:\program files\Windows Live SkyDrive
2009-09-16 17:24 . 2009-09-16 17:24 -------- d-----w- c:\program files\Common Files\Windows Live
2009-09-13 14:01 . 2009-09-13 14:01 534 ----a-w- c:\windows\eReg.dat
2009-09-11 14:18 . 2004-04-07 16:45 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 21:03 . 2004-04-07 16:45 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-08-29 07:36 . 2005-06-17 15:49 832512 ------w- c:\windows\system32\wininet.dll
2009-08-29 07:36 . 2004-08-04 07:56 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-08-29 07:36 . 2004-04-07 16:45 17408 ----a-w- c:\windows\system32\corpol.dll
2009-08-26 08:00 . 2004-04-07 16:45 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-06 18:24 . 2004-10-24 00:03 327896 ----a-w- c:\windows\system32\wucltui.dll
2009-08-06 18:24 . 2004-10-24 00:03 209632 ----a-w- c:\windows\system32\wuweb.dll
2009-08-06 18:24 . 2005-05-25 20:16 44768 ----a-w- c:\windows\system32\wups2.dll
2009-08-06 18:24 . 2004-10-24 00:03 35552 ----a-w- c:\windows\system32\wups.dll
2009-08-06 18:24 . 2004-04-07 16:55 53472 ------w- c:\windows\system32\wuauclt.exe
2009-08-06 18:24 . 2004-04-07 16:45 96480 ----a-w- c:\windows\system32\cdm.dll
2009-08-06 18:23 . 2004-10-24 00:03 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-08-06 18:23 . 2009-09-17 16:58 215920 ----a-w- c:\windows\system32\muweb.dll
2009-08-06 18:23 . 2009-09-17 16:58 274288 ----a-w- c:\windows\system32\mucltui.dll
2009-08-06 18:23 . 2004-04-07 16:55 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2009-08-05 09:01 . 2002-12-12 07:14 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-08-04 19:44 . 2004-04-07 16:45 2189184 ------w- c:\windows\system32\ntoskrnl.exe
2009-08-04 14:20 . 2002-08-29 01:04 2066048 ------w- c:\windows\system32\ntkrnlpa.exe
2009-06-08 15:35 . 2005-04-04 22:17 67688 ----a-w- c:\program files\mozilla firefox\components\jar50.dll
2009-06-08 15:35 . 2005-04-04 22:18 54368 ----a-w- c:\program files\mozilla firefox\components\jsd3250.dll
2009-06-08 15:35 . 2007-02-05 22:28 34944 ----a-w- c:\program files\mozilla firefox\components\myspell.dll
2009-06-08 15:35 . 2007-02-05 22:28 46712 ----a-w- c:\program files\mozilla firefox\components\spellchk.dll
2009-06-08 15:35 . 2005-04-04 22:17 172136 ----a-w- c:\program files\mozilla firefox\components\xpinstal.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-10-24_22.17.51 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-10-25 03:28 . 2009-10-25 03:28 16384 c:\windows\TEMP\Perflib_Perfdata_654.dat
- 2004-04-07 16:45 . 2009-10-14 22:01 72134 c:\windows\system32\perfc009.dat
+ 2004-04-07 16:45 . 2009-10-25 01:07 72134 c:\windows\system32\perfc009.dat
+ 2009-10-24 08:51 . 2009-10-25 02:51 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2009-10-24 08:51 . 2009-10-24 12:03 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2009-10-23 17:58 . 2009-10-25 02:51 16384 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2009-10-23 17:58 . 2009-10-24 12:03 16384 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-10-24 22:58 . 2009-10-25 02:51 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2004-04-07 16:45 . 2009-10-25 01:07 443034 c:\windows\system32\perfh009.dat
- 2004-04-07 16:45 . 2009-10-14 22:01 443034 c:\windows\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TouchED"="c:\program files\TOSHIBA\TouchED\TouchED.Exe" [2008-01-14 126976]
"SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2008-01-14 135168]
"SigmaTel StacMon"="c:\program files\SigmaTel\SigmaTel AC97 Audio Drivers\stacmon.exe" [2008-01-14 86073]
"PadTouch"="c:\program files\TOSHIBA\PadTouch\PadExe.exe" [2008-01-14 1089589]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2008-01-14 192512]
"00THotkey"="c:\windows\System32\00THotkey.exe" [2008-01-14 258048]
"avgnt"="c:\program files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-07-17 266497]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2009-05-13 177472]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-05-26 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-06-05 292136]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\clear.exe" [2009-09-10 1312080]
"TPSMain"="TPSMain.exe" - c:\windows\system32\TPSMain.exe [2004-03-03 278528]
"TFNF5"="TFNF5.exe" - c:\windows\system32\TFNF5.exe [2003-12-02 73728]
"TFncKy"="TFncKy.exe" [BU]
"LTSMMSG"="LTSMMSG.exe" - c:\windows\ltsmmsg.exe [2003-04-18 32768]
"000StTHK"="000StTHK.exe" - c:\windows\system32\000StTHK.exe [2001-06-24 24576]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\XXXX\Start Menu\Programs\Startup\
zavupd32.exe [2008-4-14 17408]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-3-8 113664]
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-9-23 29696]
RAMASST.lnk - c:\windows\system32\RAMASST.exe [2004-4-7 155648]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\iifdeef]
[BU]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
@=""

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office OneNote 2003 Quick Launch.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office OneNote 2003 Quick Launch.lnk
backup=c:\windows\pss\Microsoft Office OneNote 2003 Quick Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^XXXX^Start Menu^Programs^Startup^Civilization Registration.lnk]
path=c:\documents and settings\XXXX\Start Menu\Programs\Startup\Civilization Registration.lnk
backup=c:\windows\pss\Civilization Registration.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^XXX^Start Menu^Programs^Startup^zavupd32.exe]
path=c:\documents and settings\Juita\Start Menu\Programs\Startup\zavupd32.exe
backup=c:\windows\pss\zavupd32.exeStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Symantec Core LC"=2 (0x2)
"SNDSrvc"=3 (0x3)
"ccSetMgr"=2 (0x2)
"ccPwdSvc"=3 (0x3)
"ccEvtMgr"=2 (0x2)
"Adobe LM Service"=3 (0x3)
"SBService"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Azureus\\Azureus.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\WINDOWS\\system32\\dpnsvr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\LimeWire\\LimeWire 4.0.7\\LimeWire.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1723:TCP"= 1723:TCP:@xpsp2res.dll,-22015
"1701:UDP"= 1701:UDP:@xpsp2res.dll,-22016
"500:UDP"= 500:UDP:@xpsp2res.dll,-22017

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [17/10/2009 22:58 64288]
R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [24/10/2009 10:30 130424]
S3 BRGSp50;BRGSp50 NDIS Protocol Driver;c:\windows\system32\drivers\BRGSp50.sys [26/09/2008 15:33 20608]
S3 CBEN5;Xircom CardBus Ethernet 10/100 Adapter family Driver;c:\windows\system32\drivers\cben5.sys [07/04/2004 09:53 46108]
.
Contents of the 'Scheduled Tasks' folder

2009-10-25 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 22:56]

2009-10-21 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.friendster.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
IE:
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {70EE0AA4-5A3A-4052-8FFA-2EEDA43F7942} - hxxp://www.innotive.com/download/cibrowser11.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos-beta/OnlineScanner.cab
FF - ProfilePath - c:\documents and settings\XXXX\Application Data\Mozilla\Firefox\Profiles\fgcy8hk9.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - www.friendster.com
FF - component: c:\progra~1\MOZILL~1\extensions\talkback@mozilla.org\components\qfaservices.dll
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
FF - HiddenExtension: XULRunner: {BDC03796-9A5B-48BB-9936-0B201B8EBBFF} - c:\documents and settings\Juita\Local Settings\Application Data\{BDC03796-9A5B-48BB-9936-0B201B8EBBFF}
FF - HiddenExtension: XULRunner: {05CCC319-02CD-4D4E-BB2A-E62179E40469} - c:\documents and settings\Administrator\Local Settings\Application Data\{05CCC319-02CD-4D4E-BB2A-E62179E40469}
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-25 08:41
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-364327265-2205036341-3398716462-1005\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:53,71,13,1e,1f,a6,17,0f,af,77,17,d9,8c,a1,6d,ed,34,67,c4,2b,5b,08,e7,
8c,60,20,b8,9b,89,7e,69,b9,7b,99,ec,22,e5,e4,12,1c,2c,2f,4d,8b,75,58,16,4b,\
"??"=hex:82,c5,55,c9,72,1d,1c,4c,a6,8b,f1,af,10,cd,eb,c3
.
Completion time: 2009-10-25 11:17
ComboFix-quarantined-files.txt 2009-10-25 11:13
ComboFix.txt 2008-01-14 15:00
ComboFix2.txt 2009-10-24 22:31
ComboFix3.txt 2009-10-24 14:04
ComboFix4.txt 2009-10-24 06:45
ComboFix5.txt 2009-10-25 03:37

Pre-Run: 9,338,482,688 bytes free
Post-Run: 9,304,317,952 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

- - End Of File - - B3A0CF064CD10A0D259BD9479ECA41F4

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 01 November 2009 - 08:30 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.

    First Location
    Second Location
    Third Location

  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Posted Image
m0le is a proud member of UNITE

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 04 November 2009 - 06:36 AM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. :(

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users