Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Volcano Security Suite


  • This topic is locked This topic is locked
2 replies to this topic

#1 ntask

ntask

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:49 PM

Posted 15 November 2009 - 10:50 PM

I can not get rid of Volcano.
It has been popping up no matter what...


DDS (Ver_09-10-26.01) - NTFSx86
Run by NAIL at 21:26:23.64 on Sun 11/15/2009
Internet Explorer: 6.0.2900.5512
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1982.1565 [GMT -6:00]

AV: Volcano Security Suite *On-access scanning enabled* (Updated) {9031C864-5A3E-4208-B889-01596C8BC0F4}
AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
FW: Volcano Security Suite *enabled* {CC264005-69F3-4CCD-A265-254168F7C323}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\QuickTime\qttask.exe
C:\Documents and Settings\All Users\Application Data\e7221\VS139.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\NAIL\Local Settings\Temporary Internet Files\Content.IE5\PJQJD7A3\dds[1].scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
mDefault_Search_URL = hxxp://www.google.com/ie
mSearch Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
uInternet Connection Wizard,ShellNext = iexplore
uSearchAssistant = hxxp://www.google.com
mSearchAssistant = hxxp://www.google.com
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
TB: Comcast Toolbar: {4e7bd74f-2b8d-469e-93be-be2df4d9ae29} - c:\progra~1\comcas~1\COMCAS~1.DLL
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
uRun: [avgsys] regedit /s "c:\documents and settings\all users\application data\e7221\555655.reg"
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Volcano Security Suite] "c:\documents and settings\all users\application data\e7221\VS139.exe" /s /d
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
uPolicies-system: EnableProfileQuota = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
Trusted Zone: internet
Trusted Zone: mcafee.com
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {33564D57-0000-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB
LSA: Notification Packages = :\windows\system32\srrstr.dll scecli
IFEO: image file execution options - svchost.exe
IFEO: a.exe - svchost.exe
IFEO: aAvgApi.exe - svchost.exe
IFEO: AAWTray.exe - svchost.exe
IFEO: About.exe - svchost.exe

Note: multiple IFEO entries found. Please refer to Attach.txt

============= SERVICES / DRIVERS ===============

S2 0039321258340134mcinstcleanup;McAfee Application Installer Cleanup (0039321258340134);c:\docume~1\nail\locals~1\temp\003932~1.exe c:\progra~1\common~1\mcafee\instal~1\cleanup.ini -cleanup -nolog -service --> c:\docume~1\nail\locals~1\temp\003932~1.exe c:\progra~1\common~1\mcafee\instal~1\cleanup.ini -cleanup -nolog -service [?]
S2 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-5-10 356920]

=============== Created Last 30 ================

2009-11-16 02:58:23 4899 ----a-w- c:\windows\system32\Config.MPF
2009-11-16 02:55:47 40552 ----a-w- c:\windows\system32\drivers\mfesmfk.sys
2009-11-16 02:55:47 35272 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2009-11-16 02:55:46 79816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2009-11-16 02:55:42 120136 ----a-w- c:\windows\system32\drivers\Mpfp.sys
2009-11-16 02:55:08 0 d-----w- c:\program files\common files\McAfee
2009-11-16 02:55:05 0 d-----w- c:\program files\McAfee.com
2009-11-16 02:54:56 0 d-----w- c:\program files\McAfee
2009-11-16 02:49:47 34248 ----a-w- c:\windows\system32\drivers\mferkdk.sys
2009-11-15 18:00:17 0 d--h--w- c:\windows\$hf_mig$
2009-11-15 10:33:59 512000 ------w- c:\windows\system32\dllcache\jscript.dll
2009-11-15 06:00:26 0 d-----w- c:\windows\system32\scripting
2009-11-15 06:00:26 0 d-----w- c:\windows\system32\en
2009-11-15 06:00:26 0 d-----w- c:\windows\system32\bits
2009-11-15 06:00:26 0 d-----w- c:\windows\l2schemas
2009-11-15 05:57:31 0 d-----w- c:\windows\network diagnostic
2009-11-15 05:56:52 0 d-----w- c:\windows\system32\ReinstallBackups
2009-11-15 05:54:58 0 d-----w- c:\windows\EHome
2009-11-15 05:41:13 0 d-----w- c:\windows\system32\wbem\Repository
2009-11-15 04:35:11 0 d-----w- c:\program files\common files\McAfee(2)
2009-11-15 04:35:08 0 d-----w- c:\program files\McAfee(2).com
2009-11-15 04:34:58 0 d-----w- c:\program files\McAfee(2)
2009-11-14 03:42:55 8212 ----a-w- c:\windows\mfebcdata
2009-11-14 03:42:18 0 d-sh--w- c:\docume~1\alluse~1\applic~1\e7221
2009-11-14 03:42:15 0 d-sh--w- c:\docume~1\nail\applic~1\Volcano Security Suite
2009-11-14 03:42:14 0 d-sh--w- c:\docume~1\alluse~1\applic~1\VSSSys
2009-11-04 04:19:11 2568 ----a-w- c:\windows\system32\PerfStringBackup.TMP

==================== Find3M ====================

2009-11-15 16:22:23 5164 ----a-w- c:\docume~1\nail\applic~1\wklnhst.dat
2009-10-19 23:53:44 3070976 ------w- c:\windows\system32\dllcache\mshtml.dll
2009-09-25 05:37:11 667136 ----a-w- c:\windows\system32\wininet.dll
2009-09-25 05:37:11 667136 ------w- c:\windows\system32\dllcache\wininet.dll
2009-09-25 05:37:11 627712 ------w- c:\windows\system32\dllcache\urlmon.dll
2009-09-25 05:37:10 1509888 ------w- c:\windows\system32\dllcache\shdocvw.dll
2009-09-25 05:37:09 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-09-25 05:37:09 81920 ------w- c:\windows\system32\dllcache\ieencode.dll
2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-11 14:18:39 136192 ------w- c:\windows\system32\dllcache\msv1_0.dll
2009-09-04 21:03:36 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-09-04 21:03:36 58880 ------w- c:\windows\system32\dllcache\msasn1.dll
2009-08-26 08:00:21 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-26 08:00:21 247326 ------w- c:\windows\system32\dllcache\strmdll.dll
2009-07-25 14:02:14 19063 ----a-w- c:\program files\common files\avejyruhir._sy
2009-07-25 14:02:14 12240 ----a-w- c:\program files\common files\yxylut.dl
2009-07-25 00:02:34 14770 ----a-w- c:\program files\common files\labawokigi.bat
2009-07-25 00:02:34 12247 ----a-w- c:\program files\common files\asigido.pif
2009-07-25 00:02:34 11113 ----a-w- c:\program files\common files\irafegisac.exe
2009-07-24 14:54:08 19064 ----a-w- c:\program files\common files\ipokof.db
2009-07-24 14:54:08 15860 ----a-w- c:\program files\common files\guwyb.bat
2009-07-24 14:54:08 13743 ----a-w- c:\program files\common files\geqizip.db
2009-07-24 14:54:08 11337 ----a-w- c:\program files\common files\irad.com
2008-12-01 23:50:46 19987 ----a-w- c:\program files\common files\lodyqe.db
2008-12-01 23:50:46 10722 ----a-w- c:\program files\common files\esenubi.sys
2008-12-01 23:50:46 10267 ----a-w- c:\program files\common files\sexyqe.inf
2008-12-01 16:30:54 19802 ----a-w- c:\program files\common files\retemusok.vbs
2008-12-01 16:30:54 16775 ----a-w- c:\program files\common files\miruduq.dat
2008-12-01 16:30:54 14336 ----a-w- c:\program files\common files\ilude.dl
2008-11-22 20:15:00 17000 ----a-w- c:\program files\common files\ijeri.db
2008-11-22 20:14:59 17477 ----a-w- c:\program files\common files\owuluqin.dat
2008-11-14 05:38:29 15089 ----a-w- c:\program files\common files\qebeqohat.dl
2008-11-14 05:38:29 12329 ----a-w- c:\program files\common files\isimawuby.vbs
2008-12-15 02:36:14 880751 --sha-w- c:\windows\system32\eOqqrBeg.ini2

============= FINISH: 21:26:34.06 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:49 PM

Posted 16 November 2009 - 08:13 AM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I will ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.


Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.




We need to create an OTL Report
  • Please download OTL from here
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under the Custom Scan box paste this in

    netsvcs
    %systemdrive%\*.exe
    %systemroot%\system32\drivers\*.sys


  • Click the "Quick Scan" button.
  • The scan should take just a few minutes.
  • Please copy and paste both logs back here in your next reply.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:49 PM

Posted 03 December 2009 - 07:54 PM

As there has been no response, this topic will now be closed.

If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this topic in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users