Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected with vundo halawupe trojans


  • This topic is locked This topic is locked
8 replies to this topic

#1 sara5201

sara5201

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:25 PM

Posted 13 December 2009 - 08:35 PM

Referred from here: http://www.bleepingcomputer.com/forums/t/278504/internet-security-2010-hawalupe-netsky-unable-to-find-mbamexe/ ~ OB

hello

I found your website while trying to uninstall internet security 2010. I followed your instructions in the guide, which helped imensely. I have tried to run malware malbytes without any luck, it keeps telling me that mbam.exe cannot be found and I also get a pop up stating that logon.exe cannot be found. I ran Mcafee and it was able to quarantine several items found but not the following trojan hawalupe.dll, it states to scan after restart, which of course is a trick. I also receive a netsky message at startup. I ran the rkill and it seems to have worked mostly, at least that stopped the pop ups and I am able to acces the task manager now. At this point im at a loss as to what to do next???

Welcome to BC

hawalupe.dll,
http://www.prevx.com/filenames/X1862456121...WALUPE.DLL.html


Have you tried changing the name of Mbam.exe?
Name it mellowyellow.scr



We Need to check for Rootkits with RootRepeal
1.Download RootRepeal from the following location and save it to your desktop.
◦Direct Download (Recommended)
■Primary Mirror
■Secondary Mirror
■Secondary Mirror
■Secondary Mirror
◦Zip Mirrors (Recommended if you have a slower connection or if the Direct Download mirror is down)

■Primary Mirror

■Secondary Mirror

■Secondary Mirror
◦Rar Mirrors - Only if you know what a RAR is and can extract it.

■Primary Mirror

■Secondary Mirror

■Secondary Mirror
2.Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
3.Open on your desktop.
4.Click the tab.
5.Click the button.
6.Check all seven boxes:
7.Push Ok
8.Check the box for your main system drive (Usually C:), and press Ok.
9.Allow RootRepeal to run a scan of your system. This may take some time.
10.Once the scan completes, push the button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

============================


Please download Win32kDiag.exe by AD and save it to your desktop.
alternate download 1
alternate download 2•This tool will create a diagnostic report
•Double-click on Win32kDiag.exe to run and let it finish.
•When it states Finished! Press any key to exit..., press any key on your keyboard to close the program.
•A file called Win32kDiag.txt should be created on your Desktop.
•Open that file in Notepad and copy/paste the entire contents (from Starting up... to Finished! Press any key to exit...) in your next reply.
--------------------------------------


Go to > Run..., then copy and paste this command into the open box: cmd
Click OK.
At the command prompt C:\>, copy and paste the following command and press Enter:
CODE
DIR /a/s %windir%\scecli.dll %windir%\netlogon.dll %windir%\eventlog.dll >Log.txt & START notepad Log.txt
A file called log.txt should be created on your Desktop.
Open that file and copy/paste the contents in your next reply.

--------------------

ok, saving as mellowyellow worked for the malbytes software...it ran and it found about 68 items.

I attempted the rootrepeal but was unsucessful I got an error message (which appears to be the fake type) stating Error-Invalid PE Image found.

I was able to run the win 32 diag and the results are as follows:

Running from: C:\Documents and Settings\Sara Bowen\Desktop\Win32kDiag.exe

Log file at : C:\Documents and Settings\Sara Bowen\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...





Finished!



The system 32 log from the cmd prompt is a follows

Volume in drive C has no label.
Volume Serial Number is C855-D934

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 05:00 AM 180,224 scecli.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 05:00 AM 407,040 netlogon.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 05:00 AM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 07:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 07:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 07:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Directory of C:\WINDOWS\SYSTEM32

04/13/2008 07:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\SYSTEM32

04/13/2008 07:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\SYSTEM32

04/13/2008 07:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Total Files Listed:
9 File(s) 1,932,288 bytes
0 Dir(s) 109,941,231,616 bytes free




DDS (Ver_09-12-01.01) - NTFSx86
Run by Sara Bowen at 20:22:34.10 on Sun 12/13/2009
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.5.0_12
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2046.1498 [GMT -5:00]

AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\brsvc01a.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\brss01a.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\PRISMSVR.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\program files\common files\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe
C:\Program Files\PCI Audio Applications\Bin\EchoCtrl.exe
C:\Program Files\Dell Photo AIO Printer 922\dlbtbmon.exe
C:\WINDOWS\Mixer.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Dell Wireless\PRISMCFG.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Sara Bowen\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
uDefault_Page_URL = hxxp://www.dell4me.com/myway
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\tfswshx.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [cdloader] "c:\documents and settings\sara bowen\application data\mjusbsp\cdloader2.exe" MAGICJACK
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Search Protection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [ISUSPM] "c:\program files\common files\installshield\updateservice\ISUSPM.exe" -scheduler
uRun: [Desktop Software] "c:\program files\common files\supportsoft\bin\bcont.exe" /ini "c:\program files\comcastui\desktop software\uinstaller.ini" /fromrun /starthidden
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [IntelMeM] c:\program files\intel\modem event monitor\IntelMEM.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [Dell Photo AIO Printer 922] "c:\program files\dell photo aio printer 922\dlbtbmgr.exe"
mRun: [DLBTCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\DLBTtime.dll,_RunDLLEntry@16
mRun: [C-Media Echo Control] c:\program files\pci audio applications\bin\EchoCtrl.exe
mRun: [C-Media Mixer] Mixer.exe /startup
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [RoxWatchTray] "c:\program files\common files\roxio shared\9.0\sharedcom\RoxWatchTray9.exe"
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\wirele~1.lnk - c:\program files\dell wireless\PRISMCFG.exe
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
dPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-system: DisableTaskMgr = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office10\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - c:\program files\yahoo!\messenger\YahooMessenger.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
Trusted Zone: internet
Trusted Zone: mcafee.com
DPF: {02BCC737-B171-4746-94C9-0D8A0B2C0089} - hxxp://office.microsoft.com/templates/ieawsdc.cab
DPF: {1663ed61-23eb-11d2-b92f-008048fdd814} - hxxps://www.taylorbeanonline.com/scriptx/smsx.cab
DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - hxxp://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,99/mcinsctl.cab
DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - hxxp://atv.disney.go.com/global/download/otoy/OTOYAX29b.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {9B03C5F1-F5AB-47EE-937D-A8EDA626F876} - hxxp://download.zonelabs.com/bin/promotions/spywaredetector/WebAAS.cab
DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - hxxp://download.mcafee.com/molbin/shared/mcgdmgr/1,0,0,26/mcgdmgr.cab
DPF: {CAFEEFAC-0015-0000-0012-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_12-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} - hxxp://a532.g.akamai.net/f/532/6712/5m/virtools.download.akamai.com/6712/player/install/installer.exe
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} - hxxp://download.mcafee.com/molbin/iss-loc/mcfscan/2,2,0,5829/mcfscan.cab
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: c:\windows\system32\jilulode.dll,nitukito.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SSODL: hefugihus - {1467ed28-2399-49a5-9d7d-845ef0410014} - No File
SSODL: ziduvolas - {87e82896-8f3f-4e3e-a706-a9f00743bc4e} - No File
STS: {1467ed28-2399-49a5-9d7d-845ef0410014} - No File
STS: {87e82896-8f3f-4e3e-a706-a9f00743bc4e} - No File
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-9-8 64288]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2007-8-20 214664]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-11-23 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-11-23 74480]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2008-7-10 359952]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2007-8-20 144704]
R3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2007-8-20 606736]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2007-8-20 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2007-8-20 35272]
R3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2007-8-20 40552]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-11-23 7408]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-9-24 1184912]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2007-8-20 34248]
S4 LMIRfsClientNP;LMIRfsClientNP; [x]
S4 PRISMSVC;PRISMSVC;c:\windows\system32\PRISMSVC.exe [2005-5-3 57344]

=============== Created Last 30 ================

2009-12-14 00:05:58 524016 ----a-w- c:\windows\system32\PerfStringBackup.INI
2009-12-13 22:59:01 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-12-13 15:18:18 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-12-13 15:18:12 0 d-----w- c:\program files\SUPERAntiSpyware
2009-12-13 15:18:12 0 d-----w- c:\docume~1\sarabo~1\applic~1\SUPERAntiSpyware.com
2009-12-12 19:02:19 0 d-----w- c:\docume~1\sarabo~1\applic~1\Malwarebytes
2009-12-12 18:53:44 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-12 18:53:42 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-12 18:53:42 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-12 18:53:42 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-12-12 16:41:00 0 d-----w- c:\windows\McAfee.com
2009-12-12 16:25:53 0 d-----w- c:\docume~1\sarabo~1\applic~1\McAfee
2009-12-12 15:27:11 2148 ----a-w- c:\windows\system32\wpa.dbl
2009-12-12 15:24:38 0 ----a-w- c:\windows\system32\28703.exe
2009-12-12 15:04:30 0 ----a-w- c:\windows\system32\9894.exe
2009-12-12 14:44:30 0 ----a-w- c:\windows\system32\17035.exe
2009-12-12 14:24:19 0 ----a-w- c:\windows\system32\26299.exe
2009-12-12 13:56:30 0 ----a-w- c:\windows\system32\25667.exe
2009-12-12 13:36:27 0 ----a-w- c:\windows\system32\19912.exe
2009-12-12 13:16:19 0 ----a-w- c:\windows\system32\1869.exe
2009-12-12 12:56:19 0 ----a-w- c:\windows\system32\11538.exe
2009-12-12 12:36:19 0 ----a-w- c:\windows\system32\14771.exe
2009-12-12 12:16:15 0 ----a-w- c:\windows\system32\21726.exe
2009-12-12 11:56:15 0 ----a-w- c:\windows\system32\5447.exe
2009-12-12 11:36:08 0 ----a-w- c:\windows\system32\19895.exe
2009-12-12 11:16:08 0 ----a-w- c:\windows\system32\19718.exe
2009-12-12 10:56:07 0 ----a-w- c:\windows\system32\18716.exe
2009-12-12 10:36:07 0 ----a-w- c:\windows\system32\17421.exe
2009-12-12 10:16:07 0 ----a-w- c:\windows\system32\12382.exe
2009-12-12 09:56:01 0 ----a-w- c:\windows\system32\292.exe
2009-12-12 09:36:00 0 ----a-w- c:\windows\system32\153.exe
2009-12-12 09:16:00 0 ----a-w- c:\windows\system32\3902.exe
2009-12-12 08:55:59 0 ----a-w- c:\windows\system32\14604.exe
2009-12-12 08:35:59 0 ----a-w- c:\windows\system32\32391.exe
2009-12-12 07:55:54 0 ----a-w- c:\windows\system32\4827.exe
2009-12-12 07:35:46 0 ----a-w- c:\windows\system32\11942.exe
2009-12-12 07:15:42 0 ----a-w- c:\windows\system32\2995.exe
2009-12-12 06:55:42 0 ----a-w- c:\windows\system32\491.exe
2009-12-12 06:35:42 0 ----a-w- c:\windows\system32\9961.exe
2009-12-12 06:15:42 0 ----a-w- c:\windows\system32\16827.exe
2009-12-12 05:55:33 0 ----a-w- c:\windows\system32\23281.exe
2009-12-12 05:35:33 0 ----a-w- c:\windows\system32\28145.exe
2009-12-12 05:15:33 0 ----a-w- c:\windows\system32\5705.exe
2009-12-12 04:55:24 0 ----a-w- c:\windows\system32\24464.exe
2009-12-12 04:35:19 0 ----a-w- c:\windows\system32\26962.exe
2009-12-12 04:15:13 0 ----a-w- c:\windows\system32\29358.exe
2009-12-12 03:55:07 0 ----a-w- c:\windows\system32\11478.exe
2009-12-12 03:35:07 0 ----a-w- c:\windows\system32\15724.exe
2009-12-11 16:23:20 0 ----a-w- c:\windows\system32\5436.exe
2009-12-10 16:32:41 0 ----a-w- c:\windows\system32\19169.exe
2009-12-10 16:12:40 0 ----a-w- c:\windows\system32\26500.exe
2009-12-10 15:52:40 0 ----a-w- c:\windows\system32\6334.exe
2009-12-10 15:32:39 0 ----a-w- c:\windows\system32\18467.exe
2009-12-04 22:33:26 0 d-----w- c:\program files\iPod
2009-12-04 22:33:20 0 d-----w- c:\program files\iTunes
2009-12-04 22:05:06 0 d-----w- c:\docume~1\sarabo~1\applic~1\Cosmi
2009-12-04 22:03:55 7092224 ----a-w- C:\iMusic Tools Essentials.msi
2009-12-04 22:02:56 0 d-----w- c:\program files\Cosmi
2009-12-04 22:01:55 0 d-----w- c:\docume~1\alluse~1\applic~1\Cached Installers

==================== Find3M ====================

2009-11-12 14:21:43 6147544 ----a-w- C:\GOMPLAYERENSETUP.EXE
2009-11-07 17:40:28 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-07 17:40:26 15880 ----a-w- c:\windows\system32\lsdelete.exe
2009-10-28 14:40:47 173056 ------w- c:\windows\system32\dllcache\ie4uinit.exe
2009-10-21 05:38:36 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38:36 75776 ------w- c:\windows\system32\dllcache\strmfilt.dll
2009-10-21 05:38:36 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-21 05:38:36 25088 ------w- c:\windows\system32\dllcache\httpapi.dll
2009-10-20 16:20:16 265728 ----a-w- c:\windows\system32\drivers\http.sys
2009-10-20 16:20:16 265728 ------w- c:\windows\system32\dllcache\http.sys
2009-10-13 10:30:16 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-13 10:30:16 270336 ------w- c:\windows\system32\dllcache\oakley.dll
2009-10-12 13:38:19 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38:19 149504 ------w- c:\windows\system32\dllcache\rastls.dll
2009-10-12 13:38:18 79872 ----a-w- c:\windows\system32\raschap.dll
2009-10-12 13:38:18 79872 ------w- c:\windows\system32\dllcache\raschap.dll
2009-10-11 09:17:27 411368 ----a-w- c:\windows\system32\deploytk.dll
2005-05-13 18:10:27 848 -csha-w- c:\windows\system32\KGyGaAvL.sys
2009-04-08 10:17:13 32768 -csha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009040820090409\index.dat

============= FINISH: 20:23:05.45 ===============


still getting the root repeal error, these are the only things i could get to run

Attached Files


Edited by Orange Blossom, 13 December 2009 - 09:47 PM.


BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:06:25 PM

Posted 14 December 2009 - 08:58 AM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.

Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please copy and paste the contents of C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 sara5201

sara5201
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:25 PM

Posted 19 December 2009 - 11:47 PM

Hi Sam!

Sorry for the delay...I had to take a few days off to have a baby. :(

here are the results of the combor fix.

ComboFix 09-12-18.07 - Sara Bowen 12/19/2009 23:36:07.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2046.1652 [GMT -5:00]
Running from: c:\documents and settings\Sara Bowen\Desktop\ComboFix.exe
AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\11478.exe
c:\windows\system32\11538.exe
c:\windows\system32\11942.exe
c:\windows\system32\12382.exe
c:\windows\system32\14604.exe
c:\windows\system32\14771.exe
c:\windows\system32\153.exe
c:\windows\system32\15724.exe
c:\windows\system32\16827.exe
c:\windows\system32\17035.exe
c:\windows\system32\17421.exe
c:\windows\system32\18467.exe
c:\windows\system32\1869.exe
c:\windows\system32\18716.exe
c:\windows\system32\19169.exe
c:\windows\system32\19718.exe
c:\windows\system32\19895.exe
c:\windows\system32\19912.exe
c:\windows\system32\21726.exe
c:\windows\system32\23281.exe
c:\windows\system32\24464.exe
c:\windows\system32\25667.exe
c:\windows\system32\26299.exe
c:\windows\system32\26500.exe
c:\windows\system32\26962.exe
c:\windows\system32\28145.exe
c:\windows\system32\28703.exe
c:\windows\system32\292.exe
c:\windows\system32\29358.exe
c:\windows\system32\2995.exe
c:\windows\system32\32391.exe
c:\windows\system32\3902.exe
c:\windows\system32\4827.exe
c:\windows\system32\491.exe
c:\windows\system32\5436.exe
c:\windows\system32\5447.exe
c:\windows\system32\5705.exe
c:\windows\system32\6334.exe
c:\windows\system32\9894.exe
c:\windows\system32\9961.exe
c:\windows\Tasks\itugeqrb.job
c:\windows\Tasks\zolariuh.job

.
((((((((((((((((((((((((( Files Created from 2009-11-20 to 2009-12-20 )))))))))))))))))))))))))))))))
.

2009-12-26 08:20 . 2009-12-08 01:26 -------- d-----w- c:\documents and settings\Sara Bowen\Local Settings\Application Data\Google
2009-12-26 08:19 . 2009-12-08 01:26 -------- d-----w- c:\program files\Google
2009-12-26 08:19 . 2009-12-28 22:34 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2009-12-19 21:27 . 2009-12-20 02:25 52224 ----a-w- c:\documents and settings\Sara Bowen\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2009-12-13 22:59 . 2009-12-19 21:27 117760 ----a-w- c:\documents and settings\Sara Bowen\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-12-13 22:59 . 2009-12-13 22:59 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-12-13 15:18 . 2009-12-13 15:18 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-12-13 15:18 . 2009-12-19 21:28 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-12-13 15:18 . 2009-12-13 22:59 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\SUPERAntiSpyware.com
2009-12-12 19:02 . 2009-12-12 19:02 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\Malwarebytes
2009-12-12 18:53 . 2009-12-03 21:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-12 18:53 . 2009-12-12 21:40 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-12 18:53 . 2009-12-12 18:53 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-12-12 18:53 . 2009-12-03 21:13 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-12 16:41 . 2009-12-12 16:41 -------- d-----w- c:\windows\McAfee.com
2009-12-12 16:26 . 2009-09-30 17:11 288096 ----a-r- c:\documents and settings\Sara Bowen\Application Data\McAfee\Supportability\MVTLogs\Results\detect.dll
2009-12-12 16:25 . 2009-12-12 16:25 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\McAfee
2009-12-11 19:31 . 2009-12-11 19:31 -------- d-sh--w- c:\windows\system32\config\systemprofile\UserData
2009-12-11 19:31 . 2009-12-11 19:31 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2009-12-11 19:31 . 2009-12-11 19:31 -------- d-sh--w- c:\windows\system32\config\systemprofile\IECompatCache
2009-12-04 22:33 . 2009-12-04 22:33 -------- d-----w- c:\program files\iPod
2009-12-04 22:33 . 2009-12-04 22:35 -------- d-----w- c:\program files\iTunes
2009-12-04 22:27 . 2009-12-04 22:29 -------- d-----w- c:\program files\QuickTime
2009-12-04 22:08 . 2009-12-04 22:08 -------- d-----w- c:\documents and settings\Sara Bowen\Local Settings\Application Data\Cosmi
2009-12-04 22:05 . 2009-12-04 22:05 -------- d-----w- c:\documents and settings\Sara Bowen\Local Settings\Application Data\IsolatedStorage
2009-12-04 22:05 . 2009-12-04 22:05 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\Cosmi
2009-12-04 22:03 . 2009-12-04 22:01 7092224 ----a-w- C:\iMusic Tools Essentials.msi
2009-12-04 22:03 . 2009-12-04 22:51 147456 ----a-r- c:\documents and settings\Sara Bowen\Application Data\Microsoft\Installer\{E8E67406-554B-4ABB-9841-D4B744D30C2E}\NewShortcut11_EB7DF0DD9405432BB9BB932BBAB7D6C7.exe
2009-12-04 22:03 . 2009-12-04 22:51 147456 ----a-r- c:\documents and settings\Sara Bowen\Application Data\Microsoft\Installer\{E8E67406-554B-4ABB-9841-D4B744D30C2E}\NewShortcut1_EB7DF0DD9405432BB9BB932BBAB7D6C7.exe
2009-12-04 22:03 . 2009-12-04 22:51 106606 ----a-r- c:\documents and settings\Sara Bowen\Application Data\Microsoft\Installer\{E8E67406-554B-4ABB-9841-D4B744D30C2E}\ARPPRODUCTICON.exe
2009-12-04 22:02 . 2009-12-11 19:38 -------- d-----w- c:\program files\Cosmi
2009-12-04 22:01 . 2009-12-04 22:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Cached Installers

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-24 19:49 . 2008-11-27 14:15 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\U3
2009-12-23 17:41 . 2007-08-20 23:00 -------- d-----w- c:\program files\LimeWire
2009-12-19 17:55 . 2009-09-21 23:54 862040 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\threatwork.exe
2009-12-19 17:55 . 2009-09-21 23:54 206944 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavamessage.dll
2009-12-19 17:54 . 2009-09-21 23:53 390288 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavalicense.dll
2009-12-19 17:54 . 2009-11-07 17:40 537576 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\aawapi.dll
2009-12-19 17:54 . 2009-09-21 23:53 370744 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\UpdateManager.dll
2009-12-19 17:54 . 2009-09-21 23:54 194104 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Savapibridge.dll
2009-12-19 17:45 . 2009-09-21 23:53 6296864 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Resources.dll
2009-12-19 17:43 . 2009-09-21 23:53 933120 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\CEAPI.dll
2009-12-19 17:42 . 2009-09-21 23:52 816272 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareCommand.exe
2009-12-19 17:42 . 2009-09-21 23:52 822904 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareAdmin.exe
2009-12-19 17:41 . 2009-09-21 23:52 1643272 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-12-19 17:41 . 2009-09-21 23:52 788880 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWTray.exe
2009-12-19 17:40 . 2009-09-21 23:52 0 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWService.exe
2009-12-19 17:40 . 2009-09-21 23:53 163728 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\ShellExt.dll
2009-12-19 17:40 . 2009-09-21 23:53 327000 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\RPAPI.dll
2009-12-19 17:40 . 2009-09-21 23:53 87496 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\PrivacyClean.dll
2009-12-19 17:40 . 2009-09-21 23:53 641632 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AutoLaunch.exe
2009-12-12 16:25 . 2007-08-20 23:57 -------- d-----w- c:\program files\McAfee
2009-12-12 16:25 . 2007-08-05 23:22 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-12-10 07:21 . 2007-08-20 23:33 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\LimeWire
2009-12-04 22:43 . 2006-07-30 00:13 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\Apple Computer
2009-12-04 22:33 . 2007-09-29 14:56 -------- d-----w- c:\program files\Common Files\Apple
2009-12-04 22:05 . 2005-05-06 17:56 118400 -c--a-w- c:\documents and settings\Sara Bowen\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-11-12 22:07 . 2009-11-12 22:07 79144 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.0.2.25\SetupAdmin.exe
2009-11-12 14:23 . 2009-11-12 14:23 -------- d-----w- c:\documents and settings\Sara Bowen\Application Data\Gretech
2009-11-12 14:23 . 2009-11-12 14:23 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-11-12 14:23 . 2009-11-12 14:21 -------- d-----w- c:\program files\GRETECH
2009-11-12 14:23 . 2009-11-12 14:23 -------- d-----w- c:\program files\CoreAAC
2009-11-12 14:21 . 2009-11-12 14:21 6147544 ----a-w- C:\GOMPLAYERENSETUP.EXE
2009-11-07 19:15 . 2009-09-19 14:59 -------- d-----w- c:\program files\Common Files\SupportSoft
2009-11-07 19:15 . 2009-09-19 15:01 -------- d-----w- c:\documents and settings\All Users\Application Data\SupportSoft
2009-11-07 19:04 . 2005-05-03 22:34 -------- d-----w- c:\program files\Java
2009-11-07 19:04 . 2009-11-07 19:04 152576 ----a-w- c:\documents and settings\Sara Bowen\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2009-11-07 17:40 . 2009-11-07 17:40 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-07 17:40 . 2009-11-07 17:40 93360 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\SBREDrv.sys
2009-11-07 17:40 . 2009-11-07 17:40 554280 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\sbap.dll
2009-11-07 17:40 . 2009-09-21 23:54 15880 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lsdelete.exe
2009-11-07 17:40 . 2009-09-09 00:00 15880 ----a-w- c:\windows\system32\lsdelete.exe
2009-11-07 17:40 . 2009-11-07 17:40 283944 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Vipre.dll
2009-11-07 17:40 . 2009-11-07 17:40 212480 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\VipreBridge.dll
2009-11-07 17:40 . 2009-11-07 17:40 242984 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\SBRE.dll
2009-11-07 17:40 . 2009-11-07 17:40 1223976 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\SBTE.dll
2009-11-07 17:38 . 2009-11-07 17:38 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
2009-11-07 17:13 . 2005-05-06 18:16 -------- d-----w- c:\program files\Brother
2009-11-07 17:11 . 2006-11-28 23:07 -------- d-----w- c:\program files\Kodak
2009-10-29 07:45 . 2004-08-04 10:00 916480 ----a-w- c:\windows\system32\wininet.dll
2009-10-21 05:38 . 2004-08-04 10:00 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38 . 2004-08-04 10:00 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-20 16:20 . 2004-08-04 10:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2009-10-13 10:30 . 2004-08-04 10:00 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38 . 2004-08-04 10:00 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38 . 2004-08-04 10:00 79872 ----a-w- c:\windows\system32\raschap.dll
2009-10-11 09:17 . 2009-04-07 22:58 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-10-03 08:15 . 2009-11-07 17:38 2924848 -c--a-w- c:\documents and settings\All Users\Application Data\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}\Ad-AwareInstallation.exe
2009-09-23 12:55 . 2009-09-08 23:52 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-09-21 23:53 . 2009-09-21 23:53 17632 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\WSCUpdate.dll
2009-09-21 23:53 . 2009-09-21 23:53 68640 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\64\lbd.sys
2009-09-21 23:53 . 2009-09-21 23:53 525792 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\64\DIFxAPI.dll
2009-09-21 23:53 . 2009-09-21 23:53 303976 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\64\AAWDriverTool.exe
2009-09-21 23:52 . 2009-09-21 23:52 640760 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWWSC.exe
2005-05-13 18:10 . 2005-05-13 18:10 848 -csha-w- c:\windows\SYSTEM32\KGyGaAvL.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"cdloader"="c:\documents and settings\Sara Bowen\Application Data\mjusbsp\cdloader2.exe" [2008-06-12 50520]
"ISUSPM"="c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe" [2007-08-30 205480]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-12-19 2002160]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IntelMeM"="c:\program files\Intel\Modem Event Monitor\IntelMEM.exe" [2003-09-04 221184]
"UpdateManager"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2004-01-07 110592]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-12-06 127035]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"Dell Photo AIO Printer 922"="c:\program files\Dell Photo AIO Printer 922\dlbtbmgr.exe" [2004-11-10 290816]
"DLBTCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\DLBTtime.dll" [2004-11-09 69632]
"C-Media Echo Control"="c:\program files\PCI Audio Applications\Bin\EchoCtrl.exe" [2001-12-05 147456]
"C-Media Mixer"="Mixer.exe" [2002-01-28 1228800]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2009-10-29 1218008]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2008-03-06 236016]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-10-11 149280]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
Wireless USB 2.0 WLAN Card Utility.lnk - c:\program files\Dell Wireless\PRISMCFG.exe [2005-5-3 917611]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoSetActiveDesktop"= 1 (0x1)
"NoActiveDesktopChanges"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\SYSTEM32\\USMT\\MIGWIZ.EXE"=
"c:\\StubInstaller.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\WINDOWS\\SYSTEM32\\dlbtcoms.exe"=
"c:\\WINDOWS\\SYSTEM32\\DPVSETUP.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Documents and Settings\\Sara Bowen\\Application Data\\mjusbsp\\magicJack.exe"=
"c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"6404:TCP"= 6404:TCP:limwire
"6404:UDP"= 6404:UDP:limewire

R0 Lbd;Lbd;c:\windows\SYSTEM32\DRIVERS\Lbd.sys [9/8/2009 6:52 PM 64288]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [11/23/2009 8:43 AM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [11/23/2009 8:43 AM 74480]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [11/23/2009 8:43 AM 7408]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [9/24/2009 6:17 AM 1184912]
S4 LMIRfsClientNP;LMIRfsClientNP; [x]
S4 PRISMSVC;PRISMSVC;c:\windows\SYSTEM32\PRISMSVC.exe [5/3/2005 5:35 PM 57344]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - SASDIFSV
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\Office10\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
Trusted Zone: internet
Trusted Zone: mcafee.com
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Search Protection - c:\program files\Yahoo!\Search Protection\SearchProtection.exe
HKCU-Run-Desktop Software - c:\program files\Common Files\SupportSoft\bin\bcont.exe
SharedTaskScheduler-{1467ed28-2399-49a5-9d7d-845ef0410014} - (no file)
SharedTaskScheduler-{87e82896-8f3f-4e3e-a706-a9f00743bc4e} - (no file)
SSODL-hefugihus-{1467ed28-2399-49a5-9d7d-845ef0410014} - (no file)
SSODL-ziduvolas-{87e82896-8f3f-4e3e-a706-a9f00743bc4e} - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-19 23:40
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
DLBTCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\DLBTtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\.application\bootstrap]
@DACL=(02 0000)
@="bootstrap.application.1"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(672)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
.
Completion time: 2009-12-19 23:43:07
ComboFix-quarantined-files.txt 2009-12-20 04:42

Pre-Run: 109,858,816,000 bytes free
Post-Run: 110,035,787,776 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - 2326FA0FCB712FD6F1FE6F0CC81F9B70


Thanks for all your help!

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:06:25 PM

Posted 20 December 2009 - 08:28 AM

Congratulations!! :(
I've got two myself, but then I'm the Daddy so I didn't have quite the experience you just did. :(


Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Let me know how your computer is behaving now.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 sara5201

sara5201
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:25 PM

Posted 22 December 2009 - 09:16 PM

Hi Sam

here are the results from your last post. Computer seems to be running better than before I discovered the infection.


Malwarebytes' Anti-Malware 1.42
Database version: 3398
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

12/20/2009 5:59:04 PM
mbam-log-2009-12-20 (17-59-04).txt

Scan type: Full Scan (A:\|C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 239876
Time elapsed: 2 hour(s), 1 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
G:\Whole d Drive\programs frm cuz\MUSICSOFT 09\music setup\Sony Media Software\keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
G:\Whole d Drive\programs frm cuz\MUSICSOFT 09\music setup\Sony Media Software\Sony DVD Architect 3.0\SSG KeyGen\keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
G:\Whole d Drive\programs frm cuz\MUSICSOFT 09\music setup\Sony Media Software\Sony Vegas 6.0a\SSG KeyGen\keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:06:25 PM

Posted 23 December 2009 - 08:31 AM

Looks good to me! :(
If everything is running smoothly, here are some final steps and recommendations for you.


We need to remove Combofix now that we're done with it.
  • Click Start -> Run
  • Now type Combofix /uninstall in the runbox and click OK

==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :)
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 sara5201

sara5201
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:25 PM

Posted 01 January 2010 - 02:23 PM

Sam, you are the MAN!


Thanks for all your help...you saved me from having to buy a new pc or be taken advantage of by some computer fix it squad, much appreciation!! a donation will be forth coming on payday.

and I have to say it...even if its embarrasing...GO BLUE!! LOL :(

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:06:25 PM

Posted 01 January 2010 - 03:26 PM

Glad I could help! :(
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:06:25 PM

Posted 24 January 2010 - 03:47 AM

Now that your malware problem appears to be resolved, this topic will be closed.
If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this topic in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users