Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Removing Internet Security 2010 Infection

  • This topic is locked This topic is locked
3 replies to this topic

#1 ArdRi


  • Members
  • 3 posts
  • Local time:03:13 PM

Posted 27 December 2009 - 02:59 AM

Definitely have the Internet Security 2010 Infection. The Screen Shots posted match what I was seeing. This Malware was preventing me from connecting to virtually all Anti Virus Program Web Sites. AVG,Trend,A Squared,Symantec, McAfee.. It would allow me to access Google and return valid search results but never let me connect to any Virus Removal sites. It also was blocking updates from within all Virus Scan Programs I could get or had so no new definitons. I ran repeated Malwarebites scans but the same infections keep appearing. AVG would not install.

This appeared on a drive again after formatting it twice. Once from the XP Repair console then after I deleted the partition it formatted again. I then installed XP fresh and soon after finally updating to SP3 I saw the three 'Porn' Icons on my desktop and knew it had returned somehow.

DDS Log:

DDS (Ver_09-12-01.01) - NTFSx86
Run by Chris at 2:36:53.71 on Sun 12/27/2009
Internet Explorer: 6.0.2900.5512
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2175.1905 [GMT -5:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\PCI Latency Tool 3\LtcyCfgSvc.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\Creative\SBAudigy\Surround Mixer\CTSysVol.exe
C:\Documents and Settings\Chris\My Documents\Downloads\dds.scr

============== Pseudo HJT Report ===============

EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [Messenger (Yahoo!)] "c:\progra~1\yahoo!\messenger\YahooMessenger.exe" -quiet
mRun: [CTSysVol] c:\program files\creative\sbaudigy\surround mixer\CTSysVol.exe /r
mRun: [P17Helper] Rundll32 P17.dll,P17Helper
mRun: [UpdReg] c:\windows\UpdReg.EXE
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1261873099405
DPF: {F6ACF75C-C32C-447B-9BEF-46B766368D29} - hxxp://ccfiles.creative.com/Web/softwareupdate/su2/ocx/15111/CTPID.cab
AppInit_DLLs: c:\windows\system32\kbdsock.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\chris\applic~1\mozilla\firefox\profiles\hyf8i8v7.default\

c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R2 LtcyCfgSvc;PCI Latency Tool Service;c:\program files\pci latency tool 3\LtcyCfgSvc.exe [2005-12-26 25600]
R3 LtcyCfgWDM;PCI Latency Tool Driver Service;c:\windows\system32\drivers\LtcyCfgWDM.sys [2005-12-26 6656]
S0 vmhsv;vmhsv;c:\windows\system32\drivers\rbavhc.sys --> c:\windows\system32\drivers\rbavhc.sys [?]
S0 whmj;whmj;c:\windows\system32\drivers\mmlhvsix.sys --> c:\windows\system32\drivers\mmlhvsix.sys [?]

=============== Created Last 30 ================

2009-12-27 06:37:18 0 d-----w- c:\program files\Cobian Backup 9
2009-12-27 06:00:20 0 d-----w- c:\program files\PCI Latency Tool 3
2009-12-27 05:33:53 0 d-----w- c:\program files\Yahoo!
2009-12-27 05:15:46 0 d--h--w- c:\windows\PIF
2009-12-27 05:13:14 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-27 05:03:33 409600 ----a-w- c:\windows\system32\CF29882.exe
2009-12-27 05:03:33 0 d-----w- C:\ComboFix
2009-12-27 04:18:01 0 d-----w- c:\docume~1\chris\applic~1\AVG8
2009-12-27 03:23:34 786 ----a-w- c:\windows\system32\tmp.reg
2009-12-27 03:08:10 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-12-27 03:03:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-27 03:03:46 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-27 03:03:46 0 d-----w- c:\docume~1\chris\applic~1\Malwarebytes
2009-12-27 03:03:45 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-12-27 02:29:58 0 d-----w- C:\Downloads
2009-12-27 02:16:55 0 ----a-w- c:\windows\SC.INS
2009-12-27 02:16:23 241 ----a-w- c:\windows\ULead32.ini
2009-12-27 02:00:26 584 ----a-w- c:\windows\system32\settingsbkup.sfm
2009-12-27 02:00:26 584 ----a-w- c:\windows\system32\settings.sfm
2009-12-27 01:56:43 7062 ----a-w- c:\windows\system32\audiopid.vxd
2009-12-27 01:56:12 73728 ------w- c:\windows\Ctregrun.exe
2009-12-27 01:56:12 647872 ------w- c:\windows\system32\Mscomct2.ocx
2009-12-27 01:54:56 5627 ----a-r- c:\windows\system32\Ludap17.ini
2009-12-27 01:54:56 39 ----a-r- c:\windows\system32\ctzapxx.ini
2009-12-27 01:54:56 11264 ----a-w- c:\windows\INRES.DLL
2009-12-27 01:54:56 0 d-----w- c:\windows\system32\Data
2009-12-27 01:53:57 0 d-----w- c:\program files\Creative
2009-12-27 01:25:37 33792 -c----w- c:\windows\system32\dllcache\custsat.dll
2009-12-27 01:25:01 0 d-----w- c:\program files\Realtek
2009-12-27 01:22:30 0 d-----w- c:\windows\network diagnostic
2009-12-27 01:22:26 144384 ------w- c:\windows\system32\drivers\hdaudbus.sys
2009-12-27 01:22:25 10240 ------w- c:\windows\system32\drivers\sffp_mmc.sys
2009-12-27 01:21:02 19569 ----a-w- c:\windows\005502_.tmp
2009-12-27 01:08:17 0 d-----w- c:\windows\system32\wbem\AutoRecover
2009-12-27 01:01:04 316640 ----a-w- c:\windows\WMSysPr9.prx
2009-12-27 00:59:59 0 d-----w- c:\windows\peernet
2009-12-27 00:59:58 0 d-----w- c:\windows\provisioning
2009-12-27 00:55:57 2897920 ------w- c:\windows\system32\xpsp2res.dll
2009-12-27 00:54:58 19528 ----a-w- c:\windows\003654_.tmp
2009-12-27 00:54:53 0 d-----w- c:\windows\system32\ReinstallBackups
2009-12-27 00:54:28 26488 ----a-w- c:\windows\system32\spupdsvc.exe
2009-12-27 00:48:22 266360 ----a-w- c:\windows\system32\TweakUI.exe
2009-12-27 00:48:22 160217 ----a-w- c:\windows\system32\PowerToysLicense.rtf
2009-12-27 00:35:33 0 d-----w- c:\docume~1\chris\applic~1\foobar2000
2009-12-27 00:35:23 0 d-----w- c:\program files\foobar2000
2009-12-27 00:32:59 0 d-----w- c:\windows\ServicePackFiles
2009-12-27 00:32:59 0 d-----w- c:\windows\ehome
2009-12-27 00:28:59 86528 ----a-w- c:\windows\system32\wbem\stdprov.dll
2009-12-27 00:28:49 0 d-----w- c:\program files\CCleaner
2009-12-27 00:27:59 74752 ----a-w- c:\windows\system32\cryptdlg.dll
2009-12-27 00:20:03 0 d-----w- c:\windows\system32\bits
2009-12-27 00:19:42 8192 ------w- c:\windows\system32\bitsprx2.dll
2009-12-27 00:19:42 7168 ------w- c:\windows\system32\bitsprx3.dll
2009-12-27 00:19:42 438784 ------w- c:\windows\system32\xpob2res.dll
2009-12-27 00:19:42 354304 ----a-w- c:\windows\system32\winhttp.dll
2009-12-27 00:19:42 18944 ----a-w- c:\windows\system32\qmgrprxy.dll
2009-12-27 00:18:43 217816 ----a-w- c:\windows\system32\wuaucpl.cpl
2009-12-27 00:18:43 21728 ----a-w- c:\windows\system32\wucltui.dll.mui
2009-12-27 00:18:43 17632 ----a-w- c:\windows\system32\wuaueng.dll.mui
2009-12-27 00:18:43 15072 ----a-w- c:\windows\system32\wuaucpl.cpl.mui
2009-12-27 00:18:43 15064 ----a-w- c:\windows\system32\wuapi.dll.mui
2009-12-27 00:15:32 0 d-s---w- c:\windows\system32\Microsoft
2009-12-26 23:40:46 114688 ------w- C:\KillBox.exe
2009-12-26 23:40:34 393528 ------w- C:\HijackThis.exe
2009-12-26 22:33:38 0 d-sh--w- c:\documents and settings\all users\DRM
2009-12-26 22:32:16 0 d-----w- c:\program files\common files\MSSoap
2009-12-26 22:31:06 0 d--h--w- c:\program files\WindowsUpdate
2009-12-26 22:31:06 0 d-----w- c:\program files\Online Services
2009-12-26 22:30:59 0 d-----w- c:\program files\Messenger
2009-12-26 22:30:52 0 d-----w- c:\program files\MSN Gaming Zone
2009-12-26 22:30:44 0 d-----w- c:\program files\Windows NT
2009-12-26 17:24:20 0 d-----w- c:\program files\common files\ODBC
2009-12-26 17:24:17 0 d-----w- c:\program files\common files\SpeechEngines
2009-12-26 17:23:52 0 d-----r- c:\documents and settings\all users\Documents

==================== Find3M ====================

2009-12-27 01:24:39 73728 ----a-w- c:\windows\system32\RtNicProp32.dll
2009-12-27 01:24:39 130432 ----a-w- c:\windows\system32\drivers\Rtnicxp.sys
2009-12-26 22:31:40 21640 ----a-w- c:\windows\system32\emptyregdb.dat

============= FINISH: 2:37:29.50 ===============

Attached Files

BC AdBot (Login to Remove)


#2 Elise


    Bleepin' Blonde

  • Malware Study Hall Admin
  • 61,591 posts
  • Gender:Female
  • Location:Romania
  • Local time:10:13 PM

Posted 06 January 2010 - 04:10 PM

Hello ,
And :( to the Bleeping Computer Malware Removal Forum
. My name is Elise and I'll be glad to help you with your computer problems.

I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.

You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results. Post both logs (no need to zip attach.txt).
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

Please be patient and I'd be grateful if you would note the following
  • The cleaning process is not instant. DDS logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem

If you still need help, please include the following in your next reply
  • A detailed description of your problems
  • A new DDS log (don't forget attach.txt)
  • GMER log
Please do NOT post logs as attachments, unless you are unable to copy/paste a log directly in the reply box.

Thanks and again sorry for the delay.

regards, Elise

"Now faith is the substance of things hoped for, the evidence of things not seen."


Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome


Malware analyst @ Emsisoft



#3 ArdRi

  • Topic Starter

  • Members
  • 3 posts
  • Local time:03:13 PM

Posted 07 January 2010 - 01:07 AM

Thanks for taking the time to reply but I just eventually ended up using active@killdisk to Kill /wpie the drive..

It did seem to be removed after a few more runs with the several removal tools I tied :AVG,Trojan Remover,Smitfraudfix,Nortons Virut32 remover,Trend Micro anti virus and Malwarebites and THEN I ran the Killisc command pompt/Boot CD Wipe. After that I formatted and installed XP and after several days there was no evidence of infection infetion.

I was still not confident enough to put that into full use again so I attached a second HDD. Installed XP on that then from there I KIl Disc'ed the problem drive which I trust rendered it finally clean.

I eventually installed xp on that drive again and am using it now for several days again with no issues..

I suppose it would have been good to have been able to go thru a detailed removal perhaps to help others but I just needed to move on.

Edited by ArdRi, 07 January 2010 - 01:10 AM.

#4 Elise


    Bleepin' Blonde

  • Malware Study Hall Admin
  • 61,591 posts
  • Gender:Female
  • Location:Romania
  • Local time:10:13 PM

Posted 07 January 2010 - 04:04 AM

Thats no problem, I can understand that, and I am sorry not to have been able to help you more :(

This topic will now be closed.

regards, Elise

"Now faith is the substance of things hoped for, the evidence of things not seen."


Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome


Malware analyst @ Emsisoft



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users