Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Tried Everything- Unable to rid myself of Google hijack


  • This topic is locked This topic is locked
12 replies to this topic

#1 MisterH

MisterH

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:01 PM

Posted 06 December 2009 - 01:47 PM

In the few times I've had malware present on my computer I've been able to get rid of it without too much trouble. THis time I am stumped. My problem is I get redirection (via new pop-up page) in all my Google searches as well as pop-up pages that appear whenever I go to some popular sites. I have used just about every virus/malware detection tool and none have been able to find anything of substance.

I have used:

-ComboFix,
-GMER
- All the well-known online virus scanners
-MAB
- Rootkit buster
I will say that GMER came closest to giving me some useful information. In its malware scan is shows registry residue from an earlier UACD.SYS infection from a month ago, but none of the entries are highlighted in red, and therefore can't be removed via GMER.

I posted my HIjackTHis log below but of course there are no entries in it that give any hint of the nature of the infection,


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:38:43 AM, on 12/6/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Microsoft Office\Office10\OUTLOOK.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
F:\MoBo files\Utilities\Hijackit.exe



R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [amd_dc_opt] "C:\Program Files\AMD\Dual-Core Optimizer\amd_dc_opt.exe"
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [AdobeCS4ServiceManager] "C:\Program Files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" -launchedbylogin
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} (Microsoft Data Collection Control) - https://oas.support.microsoft.com/ActiveX/MSDcode.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/...can8/oscan8.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupd...b?1229907061109
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1237484329421
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 4897 bytes
-------------------------------------------

Also pasted below is my GMER rootkit scan result:
GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2009-12-04 18:55:07
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\RICH~1.EDM\LOCALS~1\Temp\pxtdapow.sys


---- Kernel code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB95A5360, 0x32DEFD, 0xE8000020]
init C:\WINDOWS\system32\drivers\SynasUSB.sys entry point in "init" section [0xB6286380]

---- Devices - GMER 1.0.15 ----

Device \Driver\00000308 -> \Driver\atapi \Device\Harddisk0\DR0 8AD33170

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 2
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E967-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 7
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E967-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E969-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 4
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E969-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E96A-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 4
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E96A-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E97B-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 4
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E97B-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E980-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 7
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E980-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Services\MRxDAV\EncryptedDirectories@

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sector 61: malicious code @ sector 0x4a85300 size 0x1e4
Disk \Device\Harddisk0\DR0 sector 62: copy of MBR

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----


Any advice you can offer is much appreciated!

BC AdBot (Login to Remove)

 


#2 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,228 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:08:01 PM

Posted 06 December 2009 - 02:40 PM

Hi, MisterH :(

Welcome.

Please post the C:\Combofix.log

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:

    :filefind
    atapi.sys

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Edited by JSntgRvr, 06 December 2009 - 02:44 PM.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#3 MisterH

MisterH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:01 PM

Posted 06 December 2009 - 02:48 PM

Thanks for your quick reply!

Here is the CF log:

ComboFix 09-11-29.02 - Rich 11/29/2009 14:51.3.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3071.2673 [GMT -8:00]
Running from: c:\documents and settings\Rich.EDMPC\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\msvcsv60.dll
c:\windows\system32\twain_32.dll
G:\install.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_6TO4


((((((((((((((((((((((((( Files Created from 2009-10-28 to 2009-11-29 )))))))))))))))))))))))))))))))
.

2009-11-29 21:38 . 2009-11-29 21:38 117760 ----a-w- c:\documents and settings\Rich.EDMPC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-11-29 21:38 . 2009-11-29 21:38 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\SUPERAntiSpyware.com
2009-11-29 21:37 . 2009-11-29 21:37 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-11-29 21:37 . 2009-11-29 21:37 -------- d-----w- c:\documents and settings\Rich.EDMPC\Application Data\SUPERAntiSpyware.com
2009-11-29 21:37 . 2009-11-29 21:37 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-11-29 20:44 . 2009-11-29 20:44 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\UserData
2009-11-29 20:44 . 2009-11-29 20:44 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\PrivacIE
2009-11-29 20:44 . 2009-11-29 20:44 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\IECompatCache
2009-11-29 19:11 . 2009-11-29 19:11 -------- d-----w- c:\documents and settings\LocalService.NT AUTHORITY\Local Settings\Application Data\Mozilla
2009-11-29 18:37 . 2009-07-28 23:33 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2009-11-29 05:05 . 2008-12-09 23:12 377344 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\Equalizer.dll
2009-11-29 05:05 . 2008-10-17 19:12 376320 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\Delay.dll
2009-11-29 05:05 . 2008-07-18 17:22 359424 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\Chorus.dll
2009-11-29 05:05 . 2008-06-13 03:02 3317760 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\iZGuitarSuite.dll
2009-11-29 05:05 . 2008-06-13 03:02 913408 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\GuitarSuiteAdvanced.dll
2009-11-29 05:05 . 2009-11-29 05:04 765722 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\unins000.exe
2009-11-28 22:23 . 2009-11-29 04:12 -------- d-----w- c:\program files\Panda Security
2009-11-28 18:58 . 2009-11-28 18:58 -------- d-----w- c:\windows\system32\wbem\Repository
2009-11-28 18:57 . 2009-11-28 18:57 -------- d-----w- c:\program files\FREE Hi-Q Recorder
2009-11-28 18:57 . 2009-11-28 18:57 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-11-21 19:46 . 2008-12-09 23:12 377344 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\Equalizer.dll
2009-11-21 19:46 . 2008-10-17 19:12 376320 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\Delay.dll
2009-11-21 19:46 . 2008-07-18 17:22 359424 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\Chorus.dll
2009-11-21 19:46 . 2008-06-13 03:02 3317760 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\iZGuitarSuite.dll
2009-11-21 19:46 . 2008-06-13 03:02 913408 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\GuitarSuiteAdvanced.dll
2009-11-21 19:45 . 2009-11-21 19:45 765722 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\unins000.exe
2009-11-20 18:10 . 2009-11-20 18:10 64936854 ----a-w- C:\Climate-FOI2009.zip
2009-11-17 20:29 . 2009-11-17 20:29 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-17 20:28 . 2009-11-28 19:11 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Lavasoft
2009-11-16 23:11 . 2009-11-17 18:45 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2009-11-13 06:32 . 2009-11-13 06:32 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\IETldCache
2009-11-12 18:50 . 2009-11-12 18:50 -------- d-----w- c:\program files\Xvid
2009-11-12 18:50 . 2008-12-05 05:46 180224 ----a-w- c:\windows\system32\xvidvfw.dll
2009-11-12 18:50 . 2008-12-05 05:42 815104 ----a-w- c:\windows\system32\xvidcore.dll
2009-11-02 16:52 . 2008-06-20 17:46 245248 -c----w- c:\windows\system32\dllcache\mswsock.dll
2009-11-02 16:52 . 2008-06-20 17:46 147968 -c----w- c:\windows\system32\dllcache\dnsapi.dll
2009-11-02 16:52 . 2008-06-20 11:51 361600 -c----w- c:\windows\system32\dllcache\tcpip.sys
2009-11-02 16:52 . 2008-06-20 11:08 225856 -c----w- c:\windows\system32\dllcache\tcpip6.sys
2009-11-02 16:11 . 2009-10-02 04:44 92160 -c----w- c:\windows\system32\dllcache\iecompat.dll
2009-11-02 16:10 . 2009-08-29 08:08 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
2009-11-02 16:10 . 2009-08-29 08:08 594432 -c----w- c:\windows\system32\dllcache\msfeeds.dll
2009-11-02 16:10 . 2009-08-29 08:08 55296 -c----w- c:\windows\system32\dllcache\msfeedsbs.dll
2009-11-02 16:10 . 2009-08-29 08:08 1985536 -c----w- c:\windows\system32\dllcache\iertutil.dll
2009-11-02 16:10 . 2009-08-29 08:08 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
2009-11-02 16:10 . 2009-08-29 08:08 11069440 -c----w- c:\windows\system32\dllcache\ieframe.dll
2009-11-02 15:29 . 2002-10-24 19:02 403 -c----w- c:\windows\system32\dllcache\npdrmv2.zip
2009-11-02 15:29 . 2001-08-23 12:00 22060 -c----w- c:\windows\system32\dllcache\npds.zip
2009-11-02 15:29 . 2008-09-10 01:14 1307648 -c----w- c:\windows\system32\dllcache\msxml6.dll
2009-11-02 15:29 . 2008-04-13 17:27 79872 -c----w- c:\windows\system32\dllcache\msxml6r.dll
2009-11-02 15:27 . 2008-04-14 00:12 294912 -c----w- c:\windows\system32\dllcache\dlimport.exe
2009-11-02 15:27 . 2009-04-15 14:51 585216 -c----w- c:\windows\system32\dllcache\rpcrt4.dll
2009-11-02 15:27 . 2009-08-14 13:21 1850624 -c----w- c:\windows\system32\dllcache\win32k.sys
2009-11-02 15:27 . 2008-12-16 12:30 354304 -c----w- c:\windows\system32\dllcache\winhttp.dll
2009-11-02 15:26 . 2009-06-25 08:25 56832 -c----w- c:\windows\system32\dllcache\secur32.dll
2009-11-02 15:26 . 2009-06-25 08:25 54272 -c----w- c:\windows\system32\dllcache\wdigest.dll
2009-11-02 15:26 . 2009-06-25 08:25 301568 -c----w- c:\windows\system32\dllcache\kerberos.dll
2009-11-02 15:26 . 2009-06-24 11:18 92928 -c----w- c:\windows\system32\dllcache\ksecdd.sys
2009-11-02 15:20 . 2009-06-10 14:13 84992 -c----w- c:\windows\system32\dllcache\avifil32.dll
2009-11-02 15:19 . 2008-06-17 19:02 8461312 -c----w- c:\windows\system32\dllcache\shell32.dll
2009-11-02 15:19 . 2009-08-05 03:44 2189184 -c----w- c:\windows\system32\dllcache\ntoskrnl.exe
2009-11-02 15:19 . 2009-08-04 15:13 2145280 -c----w- c:\windows\system32\dllcache\ntkrnlmp.exe
2009-11-02 15:19 . 2009-08-04 14:20 2023936 -c----w- c:\windows\system32\dllcache\ntkrpamp.exe
2009-11-02 15:19 . 2009-08-04 14:20 2066048 -c----w- c:\windows\system32\dllcache\ntkrnlpa.exe
2009-11-02 15:19 . 2008-10-24 11:21 455296 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2009-11-02 15:19 . 2009-06-10 06:14 132096 -c----w- c:\windows\system32\dllcache\wkssvc.dll
2009-11-02 15:19 . 2009-09-04 21:03 58880 -c----w- c:\windows\system32\dllcache\msasn1.dll
2009-11-02 15:19 . 2009-07-17 16:22 1435648 -c----w- c:\windows\system32\dllcache\query.dll
2009-11-02 15:18 . 2009-09-25 05:48 81920 -c----w- c:\windows\system32\dllcache\ieencode.dll
2009-11-02 15:18 . 2009-09-25 05:48 81920 ------w- c:\windows\system32\ieencode.dll
2009-11-02 15:18 . 2008-10-15 16:34 337408 -c----w- c:\windows\system32\dllcache\netapi32.dll
2009-11-02 15:18 . 2008-10-23 12:36 286720 -c----w- c:\windows\system32\dllcache\gdi32.dll
2009-11-02 15:18 . 2008-04-21 12:08 215552 -c----w- c:\windows\system32\dllcache\wordpad.exe
2009-11-02 15:17 . 2008-06-24 16:43 74240 -c----w- c:\windows\system32\dllcache\mscms.dll
2009-11-02 15:17 . 2009-06-12 12:31 80896 -c----w- c:\windows\system32\dllcache\tlntsess.exe
2009-11-02 15:17 . 2009-06-12 12:31 76288 -c----w- c:\windows\system32\dllcache\telnet.exe
2009-11-02 15:17 . 2009-07-29 04:37 81920 -c----w- c:\windows\system32\dllcache\fontsub.dll
2009-11-02 15:17 . 2009-07-29 04:37 119808 -c----w- c:\windows\system32\dllcache\t2embed.dll
2009-11-02 15:15 . 2008-12-11 10:57 333952 -c----w- c:\windows\system32\dllcache\srv.sys
2009-11-02 15:15 . 2009-07-10 13:27 1315328 -c----w- c:\windows\system32\dllcache\msoe.dll
2009-11-02 15:15 . 2008-04-11 19:04 691712 -c----w- c:\windows\system32\dllcache\inetcomm.dll
2009-11-02 15:14 . 2009-08-05 09:01 204800 -c----w- c:\windows\system32\dllcache\mswebdvd.dll
2009-11-02 15:05 . 2009-03-21 14:06 989696 -c----w- c:\windows\system32\dllcache\kernel32.dll
2009-10-30 23:32 . 2009-10-30 23:34 -------- d-----w- C:\EyE Beam Softphone

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-11-29 05:05 . 2009-10-14 00:10 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX
2009-11-28 18:57 . 2007-01-20 21:58 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-28 18:37 . 2008-01-21 20:28 -------- d-----w- c:\program files\Trend Micro
2009-11-26 06:42 . 2008-07-03 23:58 112 ----a-w- c:\windows\msocreg32.dat
2009-11-24 04:44 . 2009-07-08 00:06 -------- d--h--w- c:\documents and settings\Rich.EDMPC\Application Data\IFBuilder
2009-11-23 05:24 . 2009-04-10 04:08 -------- d-----w- c:\program files\Zoom Player
2009-11-16 22:09 . 2007-01-20 21:59 -------- d-----w- c:\program files\AMD
2009-11-01 20:34 . 2008-06-23 20:39 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\FLEXnet
2009-10-31 05:50 . 2008-06-23 00:45 83584 ----a-w- c:\documents and settings\Rich.EDMPC\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-29 21:40 . 2007-09-06 22:58 -------- d-----w- c:\program files\Toontrack
2009-10-29 21:10 . 2009-03-31 02:24 -------- d-----w- c:\program files\Any Video Converter Professional
2009-10-29 18:35 . 2009-10-22 03:24 4045527 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-10-29 17:28 . 2008-06-23 00:31 23392 ----a-w- c:\windows\system32\emptyregdb.dat
2009-10-29 16:50 . 2009-10-29 16:49 0 ----a-w- c:\windows\system32\drivers\73e3b64c.sys
2009-10-29 16:45 . 2009-10-29 05:32 0 ----a-w- c:\windows\system32\drivers\6f3e1a94.sys
2009-10-29 16:45 . 2009-10-29 05:03 0 ----a-w- c:\windows\system32\drivers\f27190fd.sys
2009-10-29 16:35 . 2009-10-29 16:35 -------- d-----w- c:\documents and settings\Administrator.EDMPC\Application Data\Malwarebytes
2009-10-29 09:40 . 2008-09-17 02:57 -------- d---a-w- c:\documents and settings\All Users.WINDOWS\Application Data\TEMP
2009-10-22 08:39 . 2007-07-10 16:05 -------- d-----w- c:\program files\Java
2009-10-22 04:35 . 2009-03-16 21:41 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-22 04:12 . 2009-10-22 04:12 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-10-18 03:18 . 2009-10-18 03:18 -------- d-----w- c:\documents and settings\Rich.EDMPC\Application Data\PACE Anti-Piracy
2009-10-18 03:18 . 2009-10-18 03:18 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\PACE Anti-Piracy
2009-10-18 03:18 . 2009-10-18 03:18 -------- d-----w- c:\program files\Common Files\PACE Anti-Piracy
2009-10-15 01:49 . 2009-10-15 01:49 -------- d-----w- c:\program files\PFPortChecker
2009-10-14 21:00 . 2009-10-14 21:01 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-10-14 00:09 . 2009-10-14 00:10 765722 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Dynamic Acoustic Bass\unins000.exe
2009-10-08 04:54 . 2007-01-21 19:43 -------- d-----w- c:\program files\IK Multimedia
2009-09-11 14:18 . 2004-08-04 08:56 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-10 22:54 . 2009-03-16 21:41 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 22:53 . 2009-03-16 21:41 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-09-04 21:03 . 2004-08-04 08:56 58880 ----a-w- c:\windows\system32\msasn1.dll
2002-11-11 22:56 . 2002-11-11 22:56 155648 ----a-w- c:\program files\Common Files\MTron Sounds Installer.exe
2007-03-09 07:12 . 2007-03-09 07:12 27648 --sha-w- c:\windows\system32\AVSredirect.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-09-18 13574144]
"amd_dc_opt"="c:\program files\AMD\Dual-Core Optimizer\amd_dc_opt.exe" [2007-07-23 77824]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-05-30 292136]
"AdobeCS4ServiceManager"="c:\program files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" [2008-08-14 611712]
"Malwarebytes Anti-Malware (reboot)"="c:\malwarebytes' anti-malware\mbam.exe" [2009-09-10 1312080]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ \0

[HKLM\~\startupfolder\C:^Documents and Settings^All Users.WINDOWS^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users.WINDOWS^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Pml Driver HPZ12"=3 (0x3)
"ImapiService"=3 (0x3)
"WMPNetworkSvc"=3 (0x3)
"Apple Mobile Device"=2 (0x2)
"RichVideo"=2 (0x2)
"wuauserv"=2 (0x2)
"sdcoreservice"=2 (0x2)
"sdauxservice"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Adobe\\Adobe Dreamweaver CS3\\Dreamweaver.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\WinHTTrack\\WinHTTrack.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Common Files\\Adobe\\CS4ServiceManager\\CS4ServiceManager.exe"=
"c:\\Program Files\\PFPortChecker\\PFPortChecker.exe"=
"f:\\Games\\Left 4 Dead\\left4dead.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5353:TCP"= 5353:TCP:Adobe CSI CS4
"4100:UDP"= 4100:UDP:uPNP Router Control Port

R0 phmcd;phmcd;c:\windows\system32\drivers\phmcd.sys [4/8/2008 10:41 AM 40960]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [11/23/2009 8:43 AM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [11/23/2009 8:43 AM 74480]
R3 AtcL001;NDIS Miniport Driver for Atheros L1 Gigabit Ethernet Controller;c:\windows\system32\drivers\l151x86.sys [8/30/2007 3:41 AM 37376]
R3 SynasUSB;SynasUSB;c:\windows\system32\drivers\synasUSB.sys [6/22/2008 5:35 PM 16896]
S0 tvjqeth;tvjqeth;c:\windows\system32\drivers\vicvioxx.sys --> c:\windows\system32\drivers\vicvioxx.sys [?]
S0 xpxgmgzb;xpxgmgzb;c:\windows\system32\drivers\fpkmkl.sys --> c:\windows\system32\drivers\fpkmkl.sys [?]
S1 19c33a5e;19c33a5e;c:\windows\system32\drivers\19c33a5e.sys --> c:\windows\system32\drivers\19c33a5e.sys [?]
S1 21c49aa2;21c49aa2;c:\windows\system32\drivers\21c49aa2.sys --> c:\windows\system32\drivers\21c49aa2.sys [?]
S1 6f3e1a94;6f3e1a94;c:\windows\system32\drivers\6f3e1a94.sys [10/28/2009 9:32 PM 0]
S1 8ba84a1b;8ba84a1b;c:\windows\system32\drivers\8ba84a1b.sys --> c:\windows\system32\drivers\8ba84a1b.sys [?]
S1 f27190fd;f27190fd;c:\windows\system32\drivers\f27190fd.sys [10/28/2009 9:03 PM 0]
S3 ak1avs;ak1avs;c:\windows\system32\drivers\ak1avs.sys [7/5/2008 12:45 PM 25600]
S3 ak1usb;ak1usb;c:\windows\system32\drivers\ak1usb.sys [7/5/2008 12:45 PM 186368]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [4/9/2009 10:41 PM 1684736]
S3 hypaudio;hypaudio;c:\windows\system32\drivers\hypaudio.sys [3/3/2008 11:07 AM 1194496]
S3 hypkern;hypkern;c:\windows\system32\drivers\hypkern.sys [3/3/2008 11:07 AM 164864]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [11/23/2009 8:43 AM 7408]
S4 pcdservice;pcdservice;c:\program files\Phantombility\Phantom CD\pcdservice.exe [8/29/2008 10:49 PM 258048]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{FCC6FFB5-396C-6A39-B6D0-B8DFD6947CBE}]
c:\windows\system32:winsock32.exe
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Rich.EDMPC\Application Data\Mozilla\Firefox\Profiles\8ldvtp5r.default\
FF - prefs.js: browser.startup.homepage - about:blank
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
.
- - - - ORPHANS REMOVED - - - -

AddRemove-HijackThis - f:\mobo files\Utilities\HijackThis.exe
AddRemove-Native Instruments - Audio Kontrol 1 Driver - c:\program files\Native Instruments\Audio Kontrol 1 Driver\uninst.exe Software\Native Instruments\Audio Kontrol 1 Driver\Setup
AddRemove-Native Instruments Kontakt 3 - c:\documents and settings\All Users.WINDOWS\Application Data\{A7689876-F0D2-4DC6-9C70-CA306AA80853}\Kontakt 3 Setup.exe REMOVE=TRUE MODIFY=FALSE
AddRemove-Native Instruments Service Center - c:\documents and settings\All Users.WINDOWS\Application Data\{8E4DC1D0-364F-4942-85CD-BCD7298D633E}\Service Center Setup.exe REMOVE=TRUE MODIFY=FALSE
AddRemove-NVIDIA Drivers - c:\windows\system32\nvuninst.exe UninstallGUI



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-11-29 15:04
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8AD74170]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xba8fcf28
\Driver\ACPI -> ACPI.sys @ 0xba77fcb8
\Driver\atapi -> atapi.sys @ 0xba711852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
NDIS: Atheros L1 Gigabit Ethernet 10/100/1000Base-T Controller -> SendCompleteHandler -> NDIS.sys @ 0xba5e7bb0
PacketIndicateHandler -> NDIS.sys @ 0xba5f4a21
SendHandler -> NDIS.sys @ 0xba5d287b
user & kernel MBR OK
malicious code @ sector 0x4a85300 size 0x1e4 !
copy of MBR has been found in sector 62 !
PE file found in sector at 0x04A85300 !

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(748)
c:\windows\system32\WININET.dll
c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'lsass.exe'(812)
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(548)
c:\windows\system32\WININET.dll
c:\program files\iTunes\iTunesMiniPlayer.dll
c:\program files\iTunes\iTunesMiniPlayer.Resources\en.lproj\iTunesMiniPlayerLocalized.dll
c:\program files\iTunes\iTunesMiniPlayer.Resources\iTunesMiniPlayer.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\locator.exe
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2009-11-29 15:14 - machine was rebooted
ComboFix-quarantined-files.txt 2009-11-29 23:14

Pre-Run: 6,543,511,552 bytes free
Post-Run: 6,444,630,016 bytes free

Current=4 Default=4 Failed=0 LastKnownGood=7 Sets=1,2,3,4,5,6,7
- - End Of File - - 4E3C12D1ED35A0330A1E0D250948778B
----------

Here is the log from System Look:
SystemLook v1.0 by jpshortstuff (29.08.09)
Log created at 11:43 on 06/12/2009 by Rich (Administrator - Elevation successful)

========== filefind ==========

Searching for "atapi.sys"
C:\WINDOWS\$NtServicePackUninstall$\atapi.sys -----c 95360 bytes [16:34 02/11/2009] [06:59 04/08/2004] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\ERDNT\cache\atapi.sys --a--- 96512 bytes [23:11 29/11/2009] [18:40 13/04/2008] 9F3A2F5AA6875C72BF062C712CFA2674
C:\WINDOWS\ServicePackFiles\i386\atapi.sys ------ 96512 bytes [15:27 02/11/2009] [18:40 13/04/2008] 9F3A2F5AA6875C72BF062C712CFA2674
C:\WINDOWS\system32\drivers\atapi.sys ------ 96512 bytes [06:59 04/08/2004] [18:40 13/04/2008] 9F3A2F5AA6875C72BF062C712CFA2674

-=End Of File=-

#4 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,228 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:08:01 PM

Posted 06 December 2009 - 03:06 PM

  • Copy the entire contents of the Quote Box below to Notepad.
  • Name the file as CFScript.txt
  • Change the Save as Type to All Files
  • and Save it on the desktop

Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{FCC6FFB5-396C-6A39-B6D0-B8DFD6947CBE}]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\UACd.sys]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\UACd.sys]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\UACd.sys]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\UACd.sys]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet006\Services\UACd.sys]

Driver::
tvjqeth
xpxgmgzb
19c33a5e
21c49aa2
6f3e1a94
8ba84a1b

Fcopy::
C:\WINDOWS\ServicePackFiles\i386\atapi.sys | C:\atapi.sys


Posted Image

Once saved, referring to the picture above, drag CFScript.txt into ComboFix.exe, and post back the resulting report along with a Hijackthis log.

1. Please download The Avenger by Swandog46 to your Desktop.
  • Right click on the Avenger.zip folder and select "Extract All..."
  • Follow the prompts and extract the avenger folder to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):

Begin copying here:
Files to move:
C:\atapi.sys | C:\WINDOWS\system32\drivers\atapi.sys

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, open the avenger folder and start The Avenger program by clicking on its icon.
  • Right click on the window under Input script here:, and select Paste.
  • You can also click on this window and press (Ctrl+V) to paste the contents of the clipboard.
  • Click on Execute
  • Answer "Yes" twice when prompted.
4. The Avenger will automatically do the following:
  • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete", The Avenger will actually restart your system twice.)
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
5. Please copy/paste the content of c:\avenger.txt into your reply along with a fresh GMER log .

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#5 MisterH

MisterH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:01 PM

Posted 06 December 2009 - 04:44 PM

ComboFix executed per your instructions. Here is the resulting logfile:


ComboFix 09-12-06.07 - Rich 12/06/2009 13:09.4.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3071.2750 [GMT -8:00]
Running from: c:\documents and settings\Rich.EDMPC\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Rich.EDMPC\Desktop\CFScript.txt
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

Infected copy of c:\windows\system32\DRIVERS\atapi.sys was found and disinfected
Restored copy from - Kitty ate it :(
.
--------------- FCopy ---------------

c:\windows\ServicePackFiles\i386\atapi.sys --> C:\atapi.sys
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_19c33a5e
-------\Service_21c49aa2
-------\Service_6f3e1a94
-------\Service_8ba84a1b
-------\Service_tvjqeth
-------\Service_xpxgmgzb


((((((((((((((((((((((((( Files Created from 2009-11-06 to 2009-12-06 )))))))))))))))))))))))))))))))
.

2009-12-06 21:09 . 2008-04-13 18:40 96512 ----a-w- C:\atapi.sys
2009-12-06 19:09 . 2009-12-06 19:09 -------- d-----w- C:\Rooter$
2009-12-04 05:56 . 2009-12-04 05:56 -------- d-----w- c:\program files\AVG
2009-12-04 04:44 . 2009-12-04 04:44 -------- d-----w- c:\windows\system32\wbem\Repository
2009-12-04 04:44 . 2009-12-04 04:44 -------- d-----w- c:\program files\Trendnet
2009-12-03 06:00 . 2009-12-03 06:00 -------- d-----w- c:\temp\{F}
2009-11-30 18:51 . 2009-11-30 20:44 161296 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2009-11-29 21:38 . 2009-11-29 21:38 117760 ----a-w- c:\documents and settings\Rich.EDMPC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-11-29 21:38 . 2009-11-29 21:38 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\SUPERAntiSpyware.com
2009-11-29 21:37 . 2009-11-29 21:37 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-11-29 21:37 . 2009-11-29 21:37 -------- d-----w- c:\documents and settings\Rich.EDMPC\Application Data\SUPERAntiSpyware.com
2009-11-29 21:37 . 2009-11-29 21:37 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-11-29 20:44 . 2009-11-29 20:44 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\UserData
2009-11-29 20:44 . 2009-11-29 20:44 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\PrivacIE
2009-11-29 20:44 . 2009-11-29 20:44 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\IECompatCache
2009-11-29 19:11 . 2009-11-29 19:11 -------- d-----w- c:\documents and settings\LocalService.NT AUTHORITY\Local Settings\Application Data\Mozilla
2009-11-29 18:37 . 2009-07-28 23:33 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2009-11-29 05:05 . 2008-12-09 23:12 377344 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\Equalizer.dll
2009-11-29 05:05 . 2008-10-17 19:12 376320 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\Delay.dll
2009-11-29 05:05 . 2008-07-18 17:22 359424 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\Chorus.dll
2009-11-29 05:05 . 2008-06-13 03:02 3317760 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\iZGuitarSuite.dll
2009-11-29 05:05 . 2008-06-13 03:02 913408 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\Effects\GuitarSuiteAdvanced.dll
2009-11-29 05:05 . 2009-11-29 05:04 765722 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Hofner Beatle Bass\unins000.exe
2009-11-21 19:46 . 2008-12-09 23:12 377344 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\Equalizer.dll
2009-11-21 19:46 . 2008-10-17 19:12 376320 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\Delay.dll
2009-11-21 19:46 . 2008-07-18 17:22 359424 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\Chorus.dll
2009-11-21 19:46 . 2008-06-13 03:02 3317760 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\iZGuitarSuite.dll
2009-11-21 19:46 . 2008-06-13 03:02 913408 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\Effects\GuitarSuiteAdvanced.dll
2009-11-21 19:45 . 2009-11-21 19:45 765722 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Rickenbacker 12 String\unins000.exe
2009-11-20 18:10 . 2009-11-20 18:10 64936854 ----a-w- C:\Climate-FOI2009.zip
2009-11-17 20:29 . 2009-11-17 20:29 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-17 20:28 . 2009-11-28 19:11 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Lavasoft
2009-11-16 23:11 . 2009-11-17 18:45 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2009-11-13 06:32 . 2009-11-13 06:32 -------- d-sh--w- c:\documents and settings\LocalService.NT AUTHORITY\IETldCache
2009-11-12 18:50 . 2009-12-01 20:03 180224 ----a-w- c:\windows\system32\xvidvfw.dll
2009-11-12 18:50 . 2009-11-12 18:50 -------- d-----w- c:\program files\Xvid
2009-11-12 18:50 . 2008-12-05 05:42 815104 ----a-w- c:\windows\system32\xvidcore.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-06 04:32 . 2009-04-10 04:08 -------- d-----w- c:\program files\Zoom Player
2009-12-04 06:37 . 2007-01-21 01:32 -------- d-----w- c:\program files\Native Instruments
2009-11-29 05:05 . 2009-10-14 00:10 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX
2009-11-28 18:57 . 2007-01-20 21:58 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-28 18:37 . 2008-01-21 20:28 -------- d-----w- c:\program files\Trend Micro
2009-11-26 06:42 . 2008-07-03 23:58 112 ----a-w- c:\windows\msocreg32.dat
2009-11-24 04:44 . 2009-07-08 00:06 -------- d--h--w- c:\documents and settings\Rich.EDMPC\Application Data\IFBuilder
2009-11-16 22:09 . 2007-01-20 21:59 -------- d-----w- c:\program files\AMD
2009-11-01 20:34 . 2008-06-23 20:39 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\FLEXnet
2009-10-31 05:50 . 2008-06-23 00:45 83584 ----a-w- c:\documents and settings\Rich.EDMPC\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-29 21:40 . 2007-09-06 22:58 -------- d-----w- c:\program files\Toontrack
2009-10-29 21:10 . 2009-03-31 02:24 -------- d-----w- c:\program files\Any Video Converter Professional
2009-10-29 18:35 . 2009-10-22 03:24 4045527 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-10-29 17:28 . 2008-06-23 00:31 23392 ----a-w- c:\windows\system32\emptyregdb.dat
2009-10-29 16:35 . 2009-10-29 16:35 -------- d-----w- c:\documents and settings\Administrator.EDMPC\Application Data\Malwarebytes
2009-10-29 09:40 . 2008-09-17 02:57 -------- d---a-w- c:\documents and settings\All Users.WINDOWS\Application Data\TEMP
2009-10-22 08:39 . 2007-07-10 16:05 -------- d-----w- c:\program files\Java
2009-10-22 04:35 . 2009-03-16 21:41 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-22 04:12 . 2009-10-22 04:12 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-10-18 03:18 . 2009-10-18 03:18 -------- d-----w- c:\documents and settings\Rich.EDMPC\Application Data\PACE Anti-Piracy
2009-10-18 03:18 . 2009-10-18 03:18 -------- d-----w- c:\documents and settings\All Users.WINDOWS\Application Data\PACE Anti-Piracy
2009-10-18 03:18 . 2009-10-18 03:18 -------- d-----w- c:\program files\Common Files\PACE Anti-Piracy
2009-10-15 01:49 . 2009-10-15 01:49 -------- d-----w- c:\program files\PFPortChecker
2009-10-14 21:00 . 2009-10-14 21:01 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-10-14 00:09 . 2009-10-14 00:10 765722 ----a-w- c:\documents and settings\All Users.WINDOWS\Application Data\SONiVOX\DVI Dynamic Acoustic Bass\unins000.exe
2009-10-08 04:54 . 2007-01-21 19:43 -------- d-----w- c:\program files\IK Multimedia
2009-09-25 05:48 . 2009-11-02 15:18 81920 ------w- c:\windows\system32\ieencode.dll
2009-09-11 14:18 . 2004-08-04 08:56 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-10 22:54 . 2009-03-16 21:41 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 22:53 . 2009-03-16 21:41 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2002-11-11 22:56 . 2002-11-11 22:56 155648 ----a-w- c:\program files\Common Files\MTron Sounds Installer.exe
2007-03-09 07:12 . 2007-03-09 07:12 27648 --sha-w- c:\windows\system32\AVSredirect.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-09-18 13574144]
"amd_dc_opt"="c:\program files\AMD\Dual-Core Optimizer\amd_dc_opt.exe" [2007-07-23 77824]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-05-30 292136]
"AdobeCS4ServiceManager"="c:\program files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" [2008-08-14 611712]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ \0

[HKLM\~\startupfolder\C:^Documents and Settings^All Users.WINDOWS^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users.WINDOWS^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 00:12 15360 ------w- c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EasyLinkAdvisor]
2007-03-16 01:16 454784 ----a-w- c:\program files\Linksys EasyLink Advisor\LinksysAgent.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
2008-09-18 06:55 1657376 ----a-w- c:\windows\system32\nwiz.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
2009-03-27 18:22 17567744 ----a-w- c:\windows\RTHDCPL.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Pml Driver HPZ12"=3 (0x3)
"ImapiService"=3 (0x3)
"WMPNetworkSvc"=3 (0x3)
"Apple Mobile Device"=2 (0x2)
"RichVideo"=2 (0x2)
"wuauserv"=2 (0x2)
"sdcoreservice"=2 (0x2)
"sdauxservice"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Adobe\\Adobe Dreamweaver CS3\\Dreamweaver.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\WinHTTrack\\WinHTTrack.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Common Files\\Adobe\\CS4ServiceManager\\CS4ServiceManager.exe"=
"c:\\Program Files\\PFPortChecker\\PFPortChecker.exe"=
"f:\\Games\\Left 4 Dead\\left4dead.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5353:TCP"= 5353:TCP:Adobe CSI CS4
"4100:UDP"= 4100:UDP:uPNP Router Control Port

R0 phmcd;phmcd;c:\windows\system32\drivers\phmcd.sys [4/8/2008 10:41 AM 40960]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [11/23/2009 8:43 AM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [11/23/2009 8:43 AM 74480]
R3 AtcL001;NDIS Miniport Driver for Atheros L1 Gigabit Ethernet Controller;c:\windows\system32\drivers\l151x86.sys [8/30/2007 3:41 AM 37376]
R3 SynasUSB;SynasUSB;c:\windows\system32\drivers\synasUSB.sys [6/22/2008 5:35 PM 16896]
S1 f27190fd;f27190fd;c:\windows\system32\drivers\f27190fd.sys --> c:\windows\system32\drivers\f27190fd.sys [?]
S3 ak1avs;ak1avs;c:\windows\system32\drivers\ak1avs.sys [7/5/2008 12:45 PM 25600]
S3 ak1usb;ak1usb;c:\windows\system32\drivers\ak1usb.sys [7/5/2008 12:45 PM 186368]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [4/9/2009 10:41 PM 1684736]
S3 hypaudio;hypaudio;c:\windows\system32\drivers\hypaudio.sys [3/3/2008 11:07 AM 1194496]
S3 hypkern;hypkern;c:\windows\system32\drivers\hypkern.sys [3/3/2008 11:07 AM 164864]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [11/23/2009 8:43 AM 7408]
S4 pcdservice;pcdservice;c:\program files\Phantombility\Phantom CD\pcdservice.exe [8/29/2008 10:49 PM 258048]
.
------- Supplementary Scan -------
.
uStart Page = about:blank
IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Rich.EDMPC\Application Data\Mozilla\Firefox\Profiles\8ldvtp5r.default\
FF - prefs.js: browser.startup.homepage - about:blank
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
.
- - - - ORPHANS REMOVED - - - -

AddRemove-HijackThis - f:\mobo files\Utilities\HijackThis.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-06 13:24
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(752)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(3500)
c:\windows\system32\WININET.dll
c:\program files\iTunes\iTunesMiniPlayer.dll
c:\program files\iTunes\iTunesMiniPlayer.Resources\en.lproj\iTunesMiniPlayerLocalized.dll
c:\program files\iTunes\iTunesMiniPlayer.Resources\iTunesMiniPlayer.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\locator.exe
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2009-12-06 13:33 - machine was rebooted
ComboFix-quarantined-files.txt 2009-12-06 21:33
ComboFix2.txt 2009-11-29 23:14

Pre-Run: 7,546,384,384 bytes free
Post-Run: 7,740,243,968 bytes free

Current=4 Default=4 Failed=0 LastKnownGood=7 Sets=1,2,3,4,5,6,7
- - End Of File - - DC0387AE2C515552B3B941B9B32C8379

#6 MisterH

MisterH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:01 PM

Posted 06 December 2009 - 04:48 PM

Here is the Avenger log:




//////////////////////////////////////////
Avenger Pre-Processor log
//////////////////////////////////////////

Platform: Windows XP (build 2600, Service Pack 3)
Sun Dec 06 13:45:22 2009

13:45:12: Error: can't seek on file descriptor 3 (error 131: an attempt was made to move the file pointer before the beginning of the file.)


//////////////////////////////////////////


Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File move operation "C:\atapi.sys|C:\WINDOWS\system32\drivers\atapi.sys" completed successfully.

Completed script processing.

*******************

Finished! Terminate.

#7 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,228 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:08:01 PM

Posted 06 December 2009 - 05:25 PM

Hi, MisterH :(

Download TFC by OldTimer to your desktop
  • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start button to begin the process. Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two. Let it run uninterrupted to completion.
  • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.
=======================================================
  • Double click GMER.exe.
  • If it gives you a warning about rootkit activity and asks if you want to run a full scan...click on NO, then use the following settings for a more complete scan..

    Posted Image
    Click the image to enlarge it
  • In the right panel, you will see several boxes that have been checked. Ensure the following are UNCHECKED ...
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "ark.txt"
  • Save it where you can easily find it, such as your desktop and post its contents in your next reply.
**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#8 MisterH

MisterH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:01 PM

Posted 06 December 2009 - 11:40 PM

Here's the last GMER scan report.

GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2009-12-06 20:38:21
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\RICH~1.EDM\LOCALS~1\Temp\pxtdapow.sys


---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACiymfvpwb.sys
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACsibcrnsi.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACxduodbpj.dat
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uaclog \\?\globalroot\systemroot\system32\UACwxkmfpcb.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacmask \\?\globalroot\systemroot\system32\UACnipulnqw.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACmnrsmuxq.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACjqhxmebm.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACproc \\?\globalroot\systemroot\system32\UAClidmrrsy.log
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacurls \\?\globalroot\systemroot\system32\UACrypkedev.log
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacerrors \\?\globalroot\systemroot\system32\UACtnokpaax.log
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 2
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E967-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 7
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E967-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E969-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 4
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E969-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E96A-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 4
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E96A-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E97B-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 4
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E97B-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E980-E325-11CE-BFC1-08002BE10318}\Properties@DeviceType 7
Reg HKLM\SYSTEM\controlset007\Control\Class\{4D36E980-E325-11CE-BFC1-08002BE10318}\Properties@DeviceCharacteristics 256
Reg HKLM\SYSTEM\controlset007\Services\MRxDAV\EncryptedDirectories@

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sector 61: malicious code @ sector 0x4a85300 size 0x1e4
Disk \Device\Harddisk0\DR0 sector 62: copy of MBR

---- EOF - GMER 1.0.15 ----


Thanks again for your assistance!


#9 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,228 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:08:01 PM

Posted 07 December 2009 - 12:04 AM

There is a copy of the malicious code on sector 61, but that should not affect the performance of the computer. How is it doing?

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#10 MisterH

MisterH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:01 PM

Posted 07 December 2009 - 01:57 AM

There is a copy of the malicious code on sector 61, but that should not affect the performance of the computer. How is it doing?



Just tried some searches with Google and it appears to be gone- many thanks for your help! One more3 question. I noticed I still have code in the registry from UACD.sys. Since it all points to files that are non-existent, should I be concerned with leaving it there? (I Haven't been able to delete it directly anyway),

I appreciate it!!

#11 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,228 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:08:01 PM

Posted 07 December 2009 - 10:47 AM

There is a copy of the malicious code on sector 61, but that should not affect the performance of the computer. How is it doing?



Just tried some searches with Google and it appears to be gone- many thanks for your help! One more3 question. I noticed I still have code in the registry from UACD.sys. Since it all points to files that are non-existent, should I be concerned with leaving it there? (I Haven't been able to delete it directly anyway),

I appreciate it!!

Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules (not active ControlSet)


They are also non active Control Sets. It happens when you recur to the Last Known Configuration to boot the computer. A new Control Set is created. Unfortunately, removing these sets can corrupt the registry hive. They do not represent a threat.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#12 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,228 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:08:01 PM

Posted 08 December 2009 - 03:48 AM

Hi, MisterH

Lets attempt to remove some of those registry keys.
  • Copy the entire contents of the Quote Box below to Notepad.
  • Name the file as fix.bat
  • Change the Save as Type to All Files
  • and Save it on the desktop
  • Once saved, click on the fix.bat file. The computer will restart. That is normal.

@echo Off
SWREG ACL "HKLM\SYSTEM\ControlSet001\Services\UACd.sys" /RE-SET /Q
SWREG ACL "HKLM\SYSTEM\ControlSet002\Services\UACd.sys" /RE-SET /Q
SWREG ACL "HKLM\SYSTEM\ControlSet003\Services\UACd.sys" /RE-SET /Q
SWREG ACL "HKLM\SYSTEM\ControlSet005\Services\UACd.sys" /RE-SET /Q
SWREG ACL "HKLM\SYSTEM\ControlSet006\Services\UACd.sys" /RE-SET /Q
Shutdown -r -t 01
Exit


Upon restart, run GMER and post its report.

In addition, go to start ->run, type CMD and click Ok. At the prompt copy and paste the following command and press Enter:

Reg Query "HKEY_LOCAL_MACHINE\SYSTEM" >%Userprofile%\Desktop\Log.txt

A log.txt will be produced on the desktop. Post its contents in your next replay. To close the MSDOS window and return to Windows, type Exit and press Enter.

Edited by JSntgRvr, 08 December 2009 - 03:52 AM.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#13 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,228 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:08:01 PM

Posted 14 December 2009 - 12:24 AM

Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member with address of this thread. This applies only to the original topic starter. Everyone else please begin a New Topic.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users