Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rogue Trojan, Google Indexer, Malware Defense, Windows Security Alerts, Multiple Infections.


  • This topic is locked This topic is locked
21 replies to this topic

#1 frozenesper

frozenesper

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 08 January 2010 - 11:05 PM

I have multiple infections on my computer. The few that I am aware of are: RogueTrojan, Google Indexer, Malware Defense, Windows Security Alerts, and a unknown virus which I have no name for. The unknown virus seems to only do one thing: Hijacks my sound to play audio advertisements.

It happens even when there are no sources for it to come from. It acts on its own, choosing random intervals/time periods to play its oh so annoying sound bites. Some of the adverts have been for: Lysol, Swiffer, and Condoms. It also plays audio that isn't advertisement, but I haven't been able to understand what its saying. At least 80-90% of it was in english.

As for Malware Defense and Windows Security Alerts; It came packaged together and tricked me into thinking it was a authentic alert from Microsoft. It automatically installed itself, even after I had tried to exit or cancel. Upon realizing my mistake, I found that the programs had placed multiple viruses on my computer. It even downloaded links to porn websites.

When I looked on google to learn a little about it. I found out that the programs are also known as FakeAlert? Additionally the programs were meant to hijack my computers processes. (Which they did.) According to the website, in order to trick me into purchasing products from them and to steal my personal information?

Spyware Doctor from PC Tools claimed that it could remove this problem. So I downloaded the software and paid for the key. It appears to have removed traces of the program. But I still have some of its symptoms. I also noticed there are ALOT of processes in my process list that I dont recognize. Which weren't there until after this had occured.

A family friend suggested that I use Spybot S&D. So I downloaded it to check to see if the infection was really removed. The software is installed but refuses to open. Soon after, I found that Spyware Doctor will only stay in disconnected mode. Which prevents me from running any other scans.

I contacted PC tools to let them know that their software wasn't working and that I was experiencing problems with viruses. They sent me a email of instructions to fix the issue and send in a new report to them. I than followed their instructions to the point where it asked me to engage windows safe mode. But after getting into safe mode the computer will freeze.

With no luck, I went back to normal windows mode. Thats when I tried PCPitstop and found their software. Which I didn't follow through with because it cost more money. Afterwards I went to trend micro to use housecall. It found a few infections I hadn't heard of yet and removed them. I am uncertain however to how clean my computer is at this moment.

I have tried finding the answers myself. Though I have been unable to find a reasonable yet easy method of removal. Google Indexer is also as persistant as the other viruses. It has the habit of popping up randomly. Apparently it came bundled with Google Chrome? The virus askes that I tell microsoft about the problem. Regardless of which button I press it appears to do nothing.

According to some of what I have read online; it is the source reason that I am having conflicting issues with my anti virus software running correctly. I do not know how to remove it and it is unclear how to. One of the methods for removal askes that you change the registry. I am sort of scared to touch anything in the registry. Since the advice that I was reading was given for the individual whom had sepereate issues for someone elses computer problems; Not my own. I decided that I should seek further help.

Currently that is all I know right now. Which is why I really hope someone from here can help me. Please help me get my computer to check out with a clean bill of health? =/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


DDS (Ver_09-12-01.01) - NTFSx86
Run by Administrator at 18:42:58.34 on Fri 01/08/2010
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_16
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.155 [GMT -8:00]

AV: Spyware Doctor with AntiVirus *On-access scanning disabled* (Updated) {D3C23B96-C9DC-477F-8EF1-69AF17A6EFF6}
AV: Malware Defense *On-access scanning enabled* (Outdated) {28e00e3b-806e-4533-925c-f4c3d79514b9}
AV: Trend Micro AntiVirus *On-access scanning disabled* (Updated) {7D2296BC-32CC-4519-917E-52E652474AF5}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Trend Micro\RUBotted\TMRUBottedTray.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\Veoh Networks\VeohWebPlayer\veohwebplayer.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
svchost.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\lxbkcoms.exe
C:\Program Files\Trend Micro\RUBotted\TMRUBotted.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\mqsvc.exe
C:\WINDOWS\system32\mqtgsvc.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Documents and Settings\Administrator\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uDefault_Search_URL = hxxp://www.google.com/ie
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: TSToolbarBHO: {43c6d902-a1c5-45c9-91f6-fd9e90337e18} - c:\program files\trend micro\trendsecure\tisprotoolbar\TSToolbar.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Trend Micro Toolbar: {ccac5586-44d7-4c43-b64a-f042461a97d2} - c:\program files\trend micro\trendsecure\tisprotoolbar\TSToolbar.dll
TB: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
uRun: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\ahead\lib\NMBgMonitor.exe"
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
uRun: [Uniblue RegistryBooster 2] c:\program files\uniblue\registrybooster 2\RegistryBooster.exe /S
uRun: [VeohPlugin] "c:\program files\veoh networks\veohwebplayer\veohwebplayer.exe"
uRun: [settdebugx.exe] c:\docume~1\admini~1\locals~1\temp\settdebugx.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
mRun: [IgfxTray] "c:\windows\system32\igfxtray.exe"
mRun: [HotKeysCmds] "c:\windows\system32\hkcmd.exe"
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [LanguageShortcut] "c:\program files\cyberlink\powerdvd\language\Language.exe"
mRun: [NeroFilterCheck] "c:\program files\common files\ahead\lib\NeroCheck.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [MsmqIntCert] regsvr32 /s mqrt.dll
mRun: [UfSeAgnt.exe] "c:\program files\trend micro\internet security\UfSeAgnt.exe"
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [lxbkbmgr.exe] "c:\program files\lexmark x1100 series\lxbkbmgr.exe"
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [PC Pitstop Diskmd3 Reminder] c:\program files\pcpitstop\diskmd3\Reminder-Diskmd3.exe
mRun: [PC Pitstop Optimize Reminder] c:\program files\pcpitstop\optimize3\Reminder-Optimize3.exe
mRun: [TMRUBottedTray] "c:\program files\trend micro\rubotted\TMRUBottedTray.exe"
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
LSP: c:\program files\common files\pc tools\lsp\PCTLsp.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1241466271413
DPF: {6824D897-F7E1-4E41-B84B-B1D3FA4BF1BD} - hxxp://utilities.pcpitstop.com/Exterminate2/pcpitstopAntiVirus.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {94E5218F-9737-4FC2-8457-567B1FF23DC0} - hxxp://utilities.pcpitstop.com/DiskMD3/DiskMD3Ctrl.dll
DPF: {CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {FFB3A759-98B1-446F-BDA9-909C6EB18CC7} - hxxp://utilities.pcpitstop.com/Optimize3/pcpitstop2.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: tmtb - {04EAF3FB-4BAC-4B5A-A37D-A1CF210A5A42} -
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\admini~1\applic~1\mozilla\firefox\profiles\t6i9hcxa.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - www.google.com
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom
c:\program files\mozilla firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true);

============= SERVICES / DRIVERS ===============

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2010-1-6 207792]
R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [2010-1-6 51984]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [2010-1-6 59664]
R1 pctgntdi;pctgntdi;c:\windows\system32\drivers\pctgntdi.sys [2010-1-6 233136]
R2 lxbk_device;lxbk_device;c:\windows\system32\lxbkcoms.exe -service --> c:\windows\system32\lxbkcoms.exe -service [?]
R2 RUBotted;Trend Micro RUBotted Service;c:\program files\trend micro\rubotted\TMRUBotted.exe [2010-1-8 582992]
R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2009-9-11 36368]
R3 TMPassthruMP;TMPassthruMP;c:\windows\system32\drivers\TMPassthru.sys [2010-1-8 206608]
S2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\spyware doctor\bdt\BDTUpdateService.exe [2010-1-6 112592]
S2 gupdate1ca8aeb3ddcab7c;Google Update Service (gupdate1ca8aeb3ddcab7c);c:\program files\google\update\GoogleUpdate.exe [2010-1-1 133104]
S2 Security Activity Dashboard Service;Security Activity Dashboard Service;c:\program files\trend micro\trendsecure\securityactivitydashboard\tmarsvc.exe --> c:\program files\trend micro\trendsecure\securityactivitydashboard\tmarsvc.exe [?]
S3 Mkd2kfNt;Mkd2kfNt;c:\windows\system32\drivers\Mkd2kfNT.sys [2009-12-8 133632]
S3 Mkd2Nadr;Mkd2Nadr;c:\windows\system32\drivers\Mkd2Nadr.sys [2009-12-8 79360]
S3 MOSUMAC;USB-Ethernet Driver;c:\windows\system32\drivers\mosumac.sys --> c:\windows\system32\drivers\MOSUMAC.SYS [?]
S3 pctplsg;pctplsg;c:\windows\system32\drivers\pctplsg.sys [2010-1-6 70408]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2010-1-6 359624]
S3 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2010-1-6 1141712]
S3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [2010-1-6 33552]
S3 ThreatFire;ThreatFire;c:\program files\spyware doctor\tfengine\tfservice.exe service --> c:\program files\spyware doctor\tfengine\TFService.exe service [?]
S3 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [2009-9-11 50704]
S3 TMPassthru;Trend Micro Passthru Ndis Service;c:\windows\system32\drivers\TMPassthru.sys [2010-1-8 206608]
S3 TmProxy;Trend Micro Proxy Service;c:\program files\trend micro\internet security\TmProxy.exe [2009-9-11 689416]
S4 PCPitstop Scheduling;PCPitstop Scheduling;c:\program files\pcpitstop\PCPitstopScheduleService.exe [2010-1-8 85504]

=============== Created Last 30 ================

2010-01-08 19:24:22 206608 ----a-w- c:\windows\system32\drivers\TMPassthru.sys
2010-01-08 18:50:49 0 dc----w- c:\docume~1\admini~1\applic~1\PCPitstop
2010-01-08 18:50:19 0 d-----w- c:\docume~1\alluse~1\applic~1\PCPitstop
2010-01-08 18:49:33 0 d-----w- c:\program files\PCPitstop
2010-01-08 18:08:46 0 d-----w- c:\windows\system32\appmgmt
2010-01-07 03:58:44 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-01-07 03:58:44 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2010-01-07 03:40:44 59664 --s---w- c:\windows\system32\drivers\TfSysMon.sys
2010-01-07 03:40:44 51984 --s---w- c:\windows\system32\drivers\TfFsMon.sys
2010-01-07 03:40:44 33552 --s---w- c:\windows\system32\drivers\TfNetMon.sys
2010-01-07 02:18:56 882 ----a-w- c:\windows\RegSDImport.xml
2010-01-07 02:18:56 880 ----a-w- c:\windows\RegISSImport.xml
2010-01-07 02:18:56 767952 ----a-w- c:\windows\BDTSupport.dll
2010-01-07 02:18:56 149456 ----a-w- c:\windows\SGDetectionTool.dll
2010-01-07 02:18:56 131 ----a-w- c:\windows\IDB.zip
2010-01-07 02:18:56 1152444 ----a-w- c:\windows\UDB.zip
2010-01-07 02:18:55 165840 ----a-w- c:\windows\PCTBDRes.dll
2010-01-07 02:18:55 1640400 ----a-w- c:\windows\PCTBDCore.dll
2010-01-07 02:17:30 7387 ----a-w- c:\windows\system32\drivers\pctgntdi.cat
2010-01-07 02:17:30 233136 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2010-01-07 02:17:19 87784 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2010-01-07 02:17:19 7412 ----a-w- c:\windows\system32\drivers\PCTAppEvent.cat
2010-01-07 02:17:19 7383 ----a-w- c:\windows\system32\drivers\pctcore.cat
2010-01-07 02:17:19 207792 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2010-01-07 02:17:10 7383 ----a-w- c:\windows\system32\drivers\pctplsg.cat
2010-01-07 02:17:10 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2010-01-07 02:16:59 0 dc----w- c:\docume~1\admini~1\applic~1\PC Tools
2010-01-07 02:16:59 0 d-----w- c:\program files\Spyware Doctor
2010-01-07 02:16:59 0 d-----w- c:\program files\common files\PC Tools
2010-01-07 02:16:59 0 d-----w- c:\docume~1\alluse~1\applic~1\PC Tools
2010-01-07 01:14:03 878 ----a-w- c:\windows\system32\krl32mainweq.dll
2010-01-06 07:12:57 41 ----a-w- c:\windows\Filzip.ini
2010-01-06 05:22:51 0 d-----w- c:\program files\Filzip
2010-01-01 14:15:39 0 d-----w- c:\windows\system32\custom matrices
2010-01-01 14:15:26 0 d-----w- c:\windows\system32\C2MP
2010-01-01 14:03:32 0 d-----w- c:\program files\common files\DivX Shared
2010-01-01 14:03:31 0 d-----w- c:\program files\DivX
2010-01-01 14:01:15 0 d-----w- c:\program files\Veoh Networks
2009-12-23 16:07:23 0 dc----w- C:\temp
2009-12-23 15:54:50 231 ----a-w- c:\windows\Lexstat.ini
2009-12-23 15:54:14 40960 ----a-w- c:\windows\system32\lxbkvs.dll
2009-12-23 15:54:14 344064 ----a-w- c:\windows\system32\lxbkcoin.dll
2009-12-23 15:53:44 15104 -c--a-w- c:\windows\system32\dllcache\usbscan.sys
2009-12-23 15:53:44 15104 ----a-w- c:\windows\system32\drivers\usbscan.sys
2009-12-23 15:53:40 87040 -c--a-w- c:\windows\system32\dllcache\wiafbdrv.dll
2009-12-23 15:53:40 87040 ----a-w- c:\windows\system32\wiafbdrv.dll
2009-12-23 15:53:32 61440 ----a-w- c:\windows\system32\lxbkcnv5.dll
2009-12-23 15:53:32 61440 ----a-w- c:\windows\system32\lxbkcnv4.dll
2009-12-23 15:53:32 421888 ----a-w- c:\windows\system32\lxbkdrs.dll
2009-12-23 15:53:32 39899 ----a-w- c:\windows\system32\rtsicis.ini
2009-12-23 15:53:32 114688 ----a-w- c:\windows\system32\rtscan.dll
2009-12-23 15:53:09 0 d-----w- c:\program files\Lexmark X1100 Series
2009-12-23 15:48:45 0 d-----w- c:\windows\LMI649.tmp
2009-12-23 15:29:09 0 d-----w- c:\docume~1\alluse~1\applic~1\PC Drivers HeadQuarters
2009-12-23 15:18:51 0 dc----w- C:\VueScan
2009-12-23 14:17:04 0 dc----w- C:\LXK1000
2009-12-23 14:00:30 25856 -c--a-w- c:\windows\system32\dllcache\usbprint.sys
2009-12-23 14:00:30 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2009-12-10 21:08:53 0 d-----w- c:\program files\AMT Media Manager

==================== Find3M ====================

2010-01-08 19:25:08 161296 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-01-04 04:53:02 65536 ----a-w- c:\windows\IFinst27.exe
2009-12-02 17:02:50 1632887 ----a-w- c:\windows\system32\ffmpegmt.dll
2009-12-02 16:56:10 4840081 ----a-w- c:\windows\system32\libavcodec.dll
2009-11-25 08:14:31 2516 -csha-w- c:\docume~1\alluse~1\applic~1\KGyGaAvL.sys
2009-11-25 08:13:33 88 -csh--r- c:\docume~1\alluse~1\applic~1\038E5C0D7B.sys
2009-11-04 18:45:44 611638 ----a-w- c:\windows\system32\libmplayer.dll
2009-11-04 18:43:20 324096 ----a-w- c:\windows\system32\TomsMoComp_ff.dll
2009-11-03 20:11:22 113152 ----a-w- c:\windows\system32\ff_unrar.dll
2009-11-03 20:11:00 146944 ----a-w- c:\windows\system32\ff_tremor.dll
2009-11-03 20:10:42 183296 ----a-w- c:\windows\system32\ff_samplerate.dll
2009-11-03 20:09:18 178688 ----a-w- c:\windows\system32\ff_libmad.dll
2009-11-03 20:08:58 484864 ----a-w- c:\windows\system32\ff_libfaad2.dll
2009-11-03 20:08:12 257024 ----a-w- c:\windows\system32\ff_libdts.dll
2009-11-03 20:07:16 142848 ----a-w- c:\windows\system32\ff_liba52.dll
2009-11-03 19:36:06 145408 ----a-w- c:\windows\system32\libmpeg2_ff.dll
2009-11-03 19:34:56 100864 ----a-w- c:\windows\system32\ff_wmv9.dll
2009-11-03 19:34:38 85504 ----a-w- c:\windows\system32\ff_vfw.dll
2009-11-03 18:07:24 895308 ----a-w- c:\windows\system32\xvidcore.dll
2009-11-03 18:05:02 957047 ----a-w- c:\windows\system32\ff_x264.dll
2009-10-29 07:46:59 832512 ----a-w- c:\windows\system32\wininet.dll
2009-10-29 07:46:52 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-10-29 07:46:50 17408 ------w- c:\windows\system32\corpol.dll
2009-10-27 22:46:26 248320 ----a-w- c:\windows\system32\ff_kernelDeint.dll
2009-10-21 06:00:55 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 06:00:55 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-13 10:53:29 266752 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:54:17 69632 ----a-w- c:\windows\system32\raschap.dll
2009-10-12 13:54:17 112128 ----a-w- c:\windows\system32\rastls.dll

============= FINISH: 18:44:10.73 ===============

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

tv_horror.gif

One other detail I forgot but would like to include that wasn't in the original post: Anytime I try to visit ANY website, my web browser will get redirected away from the page I am viewing to another website. The website url's are always with different names. They are never the same places. If I notice any changes or need to add any additional details.. Than I will update this post! In the mean time, I'll still be waiting.. blink.gif

Merge posts. ~ OB

Attached Files


Edited by Orange Blossom, 09 January 2010 - 06:35 PM.


BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:57 AM

Posted 15 January 2010 - 02:01 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:57 AM

Posted 20 January 2010 - 12:26 PM

Due to the lack of feedback, this topic is now closed.
If you need this topic reopened, please PM a staff member and we will reopen it for you (include the address of this thread in your request). This applies to the original topic starter only. Everyone else with similar problems, please start a new topic.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#4 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:57 AM

Posted 21 January 2010 - 02:09 PM

Reopened by user request.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#5 frozenesper

frozenesper
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 22 January 2010 - 07:52 PM

I am still experiencing the same problems as before. The computer is still infected and does not have a working anti virus program. I think this is because of the virus. I can no longer access the bleeping computer website from my own computer. When I try to load the website it only gives a 404 error. But when I reload and check other websites, it still works. The browser is constantly hijacked to websites I don't know. They are randomized in name. Though the content is almost always the same. One of the more common websites is: Questbooster. I have also tried running the dds scanner. It doesn't seem to work at all. I can't explain why.. Because when I click on it, it opens - Than there is no text document generated by dds. It only opens than closes. Is there anything I can do to get the computer working like normal?

#6 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:57 AM

Posted 23 January 2010 - 03:36 PM

Hello, frozenesper and again
Welcome to the Bleeping Computer Forums. My name is Thomas (Tom is fine), and I will be helping you fixing your problems.

If you do not make a reply in 5 days, we will have to close your topic.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.
  • Please set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.



Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.



  1. Please download OTL from one of the following mirrors:
  2. Save it to your desktop.
  3. Double click on the icon on your desktop.
  4. Under the Custom Scan box paste this in
    netsvcs
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
  5. Push the Quick Scan button.
  6. Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#7 frozenesper

frozenesper
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 26 January 2010 - 10:56 PM

Just checking in to say I'm still here. Still having problems. I still haven't been able to click the links on the infected computer. And can't visit the bleeping computer website. I think I'm going to try emailing the details to myself. I don't know how that will go. But hopefully it will work. Seeing as my computer still allows me to visit my email website.

I'm going to be busy with kids for the next couple of days. (I'll be back whenever I'm able to get a break from that..) So I will check back in again this weekend. Hopefully with good news. =/

#8 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:57 AM

Posted 27 January 2010 - 01:06 PM

Ok smile.gif
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#9 frozenesper

frozenesper
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 30 January 2010 - 09:27 PM

Hey! Checking in, will be back tomorrow (Sunday) with results!

#10 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:57 AM

Posted 31 January 2010 - 12:40 PM

Alright smile.gif
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#11 frozenesper

frozenesper
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 31 January 2010 - 03:20 PM

Is there a mirror for the otl? Even after emailing the info to myself I can't view the webpage.

#12 frozenesper

frozenesper
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 31 January 2010 - 04:51 PM

GMER Logfile:

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-01-31 13:25:04
Windows 5.1.2600 Service Pack 2
Running: k4e4h3xg.exe; Driver:
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\fgtyrfod.sys


---- System - GMER 1.0.15 ----

Code 81F22DF0
ZwEnumerateKey
Code 81F1CC58
ZwFlushInstructionCache
Code 81EC0DEE
IofCallDriver
Code 81B6F9C6
IofCompleteRequest

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!IofCallDriver
804E37C5 5 Bytes JMP 81EC0DF3
.text ntoskrnl.exe!IofCompleteRequest
804E3BF6 5 Bytes JMP 81B6F9CB
PAGE ntoskrnl.exe!ZwEnumerateKey
8056EF20 5 Bytes JMP 81F22DF4
PAGE ntoskrnl.exe!ZwFlushInstructionCache
80576A5A 5 Bytes JMP 81F1CC5C

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\spoolsv.exe[248]
kernel32.dll!CreateProcessW
7C802332 5 Bytes JMP 00A9000A
.text C:\WINDOWS\Explorer.EXE[612] kernel32.dll!CreateProcessW
7C802332 5 Bytes JMP 00C1000A
.text C:\WINDOWS\system32\mqsvc.exe[908]
kernel32.dll!CreateProcessW
7C802332 5 Bytes JMP 0094000A
.text C:\WINDOWS\system32\services.exe[1016]
kernel32.dll!CreateProcessW
7C802332 5 Bytes JMP 0082000A
.text C:\WINDOWS\system32\lsass.exe[1028]
kernel32.dll!CreateProcessW
7C802332 5 Bytes JMP 0081000A
.text ...
.text C:\Program Files\Mozilla Firefox\firefox.exe[4348]
WS2_32.dll!connect
71AB406A 5 Bytes JMP 0381000A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4348]
WS2_32.dll!send
71AB428A 5 Bytes JMP 0383000A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4348]
WS2_32.dll!closesocket
71AB9639 5 Bytes JMP 0382000A
.text C:\Documents and
Settings\Administrator\Desktop\k4e4h3xg.exe[4892]
kernel32.dll!CreateProcessW
7C802332 5 Bytes JMP 00B5000A

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs
TfFsMon.sys (ThreatFire Filesystem Monitor/PC Tools)
AttachedDevice \Driver\Tcpip \Device\Ip
pctgntdi.sys (PC Tools Generic TDI Driver/PC Tools)
AttachedDevice \Driver\Tcpip \Device\Ip
tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp
pctgntdi.sys (PC Tools Generic TDI Driver/PC Tools)
AttachedDevice \Driver\Tcpip \Device\Tcp
tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp
pctgntdi.sys (PC Tools Generic TDI Driver/PC Tools)
AttachedDevice \Driver\Tcpip \Device\Udp
tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp
pctgntdi.sys (PC Tools Generic TDI Driver/PC Tools)
AttachedDevice \Driver\Tcpip \Device\RawIp
tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \FileSystem\Fastfat \Fat
fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat
TfFsMon.sys (ThreatFire Filesystem Monitor/PC Tools)

---- Modules - GMER 1.0.15 ----

Module \systemroot\system32\drivers\H8SRTqlufjqnirp.sys (***
hidden *** )
EFD3F000-EFD5B000 (114688 bytes)
---- Processes - GMER 1.0.15 ----

Library
C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
(*** hidden *** ) @ C:\WINDOWS\system32\spoolsv.exe [248] 0x78130000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [260]
0x006F0000
Library
C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
(*** hidden *** ) @ C:\WINDOWS\Explorer.EXE [612] 0x78130000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\WINDOWS\system32\winlogon.exe [972]
0x10000000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [1588]
0x006F0000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1708]
0x006F0000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [1756]
0x006F0000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [1932]
0x006F0000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [2032]
0x006F0000
Library \\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
(*** hidden *** ) @ C:\Program Files\Mozilla Firefox\firefox.exe [4348]
0x011F0000

---- Services - GMER 1.0.15 ----

Service C:\WINDOWS\system32\drivers\H8SRTqlufjqnirp.sys (***
hidden *** )
[SYSTEM] H8SRTd.sys
<-- ROOTKIT !!!

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@start
1
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@type
1
Reg
HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@imagepath
\systemroot\system32\drivers\H8SRTqlufjqnirp.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@group
file system
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules
Reg
HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@H8SRTd
\\?\globalroot\systemroot\system32\drivers\H8SRTqlufjqnirp.sys
Reg
HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@H8SRTc
\\?\globalroot\systemroot\system32\H8SRTlfisayiltr.dll
Reg
HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@H8SRTsrcr
\\?\globalroot\systemroot\system32\H8SRTjnfoxwmbpa.dat
Reg
HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@h8srtserf
\\?\globalroot\systemroot\system32\H8SRTuvovmlenvu.dll
Reg
HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@h8srtbbr
\\?\globalroot\systemroot\system32\H8SRTjqscrmodfu.dll
Reg
HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@h8srtmsg
\\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys (not active
ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@start
1
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@type
1
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@imagepath
\systemroot\system32\drivers\H8SRTqlufjqnirp.sys
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@group
file system
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules
(not active ControlSet)
Reg
HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@H8SRTd
\\?\globalroot\systemroot\system32\drivers\H8SRTqlufjqnirp.sys
Reg
HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@H8SRTc
\\?\globalroot\systemroot\system32\H8SRTlfisayiltr.dll
Reg
HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@H8SRTsrcr
\\?\globalroot\systemroot\system32\H8SRTjnfoxwmbpa.dat
Reg
HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@h8srtserf
\\?\globalroot\systemroot\system32\H8SRTuvovmlenvu.dll
Reg
HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@h8srtbbr
\\?\globalroot\systemroot\system32\H8SRTjqscrmodfu.dll
Reg
HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@h8srtmsg
\\?\globalroot\systemroot\system32\H8SRTbawykldlnh.dll

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\Administrator\Local
Settings\Temp\H8SRT69b0.tmp
343040 bytes executable
File C:\Documents and Settings\Administrator\Local
Settings\Temp\h8srtmainqt.dll
16700 bytes
File C:\Documents and Settings\All Users\Application
Data\h8srtkrl32mainweq.dll
1013 bytes
File C:\Documents and Settings\All Users\Application
Data\h8srtmainqt.dll
10555 bytes
File C:\WINDOWS\system32\drivers\H8SRTqlufjqnirp.sys
39936 bytes executable
<-- ROOTKIT !!!
File C:\WINDOWS\system32\H8SRTbawykldlnh.dll
16896 bytes executable
File C:\WINDOWS\system32\H8SRTjnfoxwmbpa.dat
168 bytes
File C:\WINDOWS\system32\H8SRTjqscrmodfu.dll
40960 bytes executable
File C:\WINDOWS\system32\h8srtkrl32mainweq.dll
773 bytes
File C:\WINDOWS\system32\H8SRTlfisayiltr.dll
23552 bytes executable
File C:\WINDOWS\system32\h8srtshsyst.dll
1572 bytes
File C:\WINDOWS\system32\H8SRTuvovmlenvu.dll
40960 bytes executable
File C:\WINDOWS\Temp\H8SRT4060.tmp
241 bytes
File C:\WINDOWS\Temp\H8SRT41bc.tmp
175 bytes
File C:\WINDOWS\Temp\H8SRT5afc.tmp
249 bytes
File C:\WINDOWS\Temp\H8SRT653d.tmp
40960 bytes executable
File C:\WINDOWS\Temp\H8SRT6a9c.tmp
27136 bytes executable
File C:\WINDOWS\Temp\H8SRT7980.tmp
248 bytes
File C:\WINDOWS\Temp\H8SRTa696.tmp
247 bytes
File C:\WINDOWS\Temp\H8SRTb2e0.tmp
243 bytes
File C:\WINDOWS\Temp\H8SRTb41.tmp
247 bytes
File C:\WINDOWS\Temp\H8SRTb67e.tmp
244 bytes
File C:\WINDOWS\Temp\H8SRTc469.tmp
241 bytes
File C:\WINDOWS\Temp\H8SRTc918.tmp
40960 bytes executable
File C:\WINDOWS\Temp\H8SRTd23f.tmp
27136 bytes executable
File C:\WINDOWS\Temp\H8SRTdea8.tmp
175 bytes

---- EOF - GMER 1.0.15 ----

#13 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:57 AM

Posted 01 February 2010 - 01:26 PM

Hi,

Please go here and have a look how you can disable your security software.

Download Combofix from any of the links below but rename it to before saving it to your desktop.

Link 1
Link 2



--------------------------------------------------------------------

Double click on the renamed Combofix.exe & follow the prompts.
    When finished, it will produce a report for you.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#14 frozenesper

frozenesper
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 03 February 2010 - 11:29 PM

After starting ComboFix, it found the following Rootkit activity:
C:WINDOWS\system32\drivers\H8SRTqlufjqnirp.sys & C:WINDOWS\system32\H8SRTlfisayilltr.dll & C:WINDOWS\system32\H8SRTjnfoxwmbpa.dat & C:WINDOWS\system32\H8SRTuvovmlenvu.dll & C:WINDOWS\system32\H8SRTjqscrmodfu.dll & C:WINDOWS\system32\H8SRTbawykldlnh.dll Posting this here while the PC is restarting.

#15 frozenesper

frozenesper
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:57 PM

Posted 04 February 2010 - 12:07 AM

This PC can only handle the Fast Reply. Sorry that I wasn't able to attach. This is the log that the infected PC generated:

ComboFix 10-02-03.04 - Administrator 02/03/2010 20:33:18.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.114 [GMT -8:00]
Running from: c:\documents and settings\Administrator\Desktop\schrauber.exe
AV: McAfee VirusScan Enterprise *On-access scanning enabled* (Outdated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
AV: Spyware Doctor with AntiVirus *On-access scanning disabled* (Updated) {D3C23B96-C9DC-477F-8EF1-69AF17A6EFF6}
AV: Trend Micro AntiVirus *On-access scanning disabled* (Updated) {7D2296BC-32CC-4519-917E-52E652474AF5}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\h8srtkrl32mainweq.dll
c:\documents and settings\All Users\Application Data\h8srtmainqt.dll
c:\windows\system32\drivers\H8SRTqlufjqnirp.sys
c:\windows\system32\H8SRTbawykldlnh.dll
c:\windows\system32\H8SRTjnfoxwmbpa.dat
c:\windows\system32\H8SRTjqscrmodfu.dll
c:\windows\system32\h8srtkrl32mainweq.dll
c:\windows\system32\H8SRTlfisayiltr.dll
c:\windows\system32\h8srtshsyst.dll
c:\windows\system32\H8SRTuvovmlenvu.dll
c:\windows\system32\krl32mainweq.dll
c:\windows\system32\service
c:\windows\system32\service\28072009_TIS17_SfFniAU.log

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_H8SRTd.sys
-------\Legacy_H8SRTd.sys


((((((((((((((((((((((((( Files Created from 2010-01-04 to 2010-02-04 )))))))))))))))))))))))))))))))
.

2010-01-31 19:31 . 2010-01-31 19:31 -------- dc----w- c:\documents and settings\Administrator\Application Data\DivX
2010-01-27 14:05 . 2010-01-27 14:05 15880 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lsdelete.exe
2010-01-27 14:05 . 2010-01-27 14:05 163728 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\ShellExt.dll
2010-01-27 14:05 . 2010-01-27 14:05 87496 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\PrivacyClean.dll
2010-01-13 14:03 . 2010-01-13 14:03 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{BC9FCCF7-E686-494B-8C9B-55C9A39A7CA9}
2010-01-13 14:03 . 2009-12-07 14:10 2953352 -c--a-w- c:\documents and settings\All Users\Application Data\{BC9FCCF7-E686-494B-8C9B-55C9A39A7CA9}\Ad-AwareInstallation.exe
2010-01-13 14:02 . 2010-01-13 14:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-01-13 14:02 . 2010-01-13 14:02 -------- d-----w- c:\program files\Lavasoft
2010-01-08 19:24 . 2008-03-02 11:28 206608 ----a-w- c:\windows\system32\drivers\TMPassthru.sys
2010-01-08 18:50 . 2010-01-08 19:02 -------- d-----w- c:\documents and settings\All Users\Application Data\PCPitstop
2010-01-08 18:49 . 2010-01-31 19:23 -------- d-----w- c:\program files\PCPitstop
2010-01-07 03:58 . 2010-01-08 19:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-01-07 03:58 . 2010-01-07 03:59 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-01-07 03:40 . 2009-11-12 18:03 59664 --s---w- c:\windows\system32\drivers\TfSysMon.sys
2010-01-07 03:40 . 2009-11-12 18:03 51984 --s---w- c:\windows\system32\drivers\TfFsMon.sys
2010-01-07 03:40 . 2009-11-12 18:03 33552 --s---w- c:\windows\system32\drivers\TfNetMon.sys
2010-01-07 02:20 . 2010-01-07 02:20 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Threat Expert
2010-01-07 02:18 . 2009-11-10 18:28 149456 ----a-w- c:\windows\SGDetectionTool.dll
2010-01-07 02:18 . 2009-11-10 18:26 767952 ----a-w- c:\windows\BDTSupport.dll
2010-01-07 02:18 . 2009-10-28 09:36 1152444 ----a-w- c:\windows\UDB.zip
2010-01-07 02:18 . 2008-11-26 20:08 131 ----a-w- c:\windows\IDB.zip
2010-01-07 02:18 . 2009-11-10 18:28 165840 ----a-w- c:\windows\PCTBDRes.dll
2010-01-07 02:18 . 2009-11-10 18:28 1640400 ----a-w- c:\windows\PCTBDCore.dll
2010-01-07 02:17 . 2009-10-30 19:11 233136 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2010-01-07 02:17 . 2009-11-09 19:20 207792 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2010-01-07 02:17 . 2009-10-07 00:31 87784 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2010-01-07 02:17 . 2009-09-03 17:45 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2010-01-07 02:16 . 2010-01-08 03:55 -------- d-----w- c:\program files\Spyware Doctor
2010-01-07 02:16 . 2010-01-07 03:40 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2010-01-07 02:16 . 2010-01-07 02:17 -------- d-----w- c:\program files\Common Files\PC Tools
2010-01-07 02:16 . 2010-01-07 02:16 -------- dc----w- c:\documents and settings\Administrator\Application Data\PC Tools
2010-01-07 02:15 . 2010-02-04 04:30 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-01-06 05:22 . 2010-01-06 05:23 -------- d-----w- c:\program files\Filzip

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-03 14:49 . 2010-01-01 14:03 -------- d-----w- c:\program files\DivX
2010-01-31 19:18 . 2009-12-09 06:42 65536 ----a-w- c:\windows\IFinst27.exe
2010-01-14 16:10 . 2010-01-14 15:34 -------- dc----w- c:\documents and settings\Administrator\Application Data\Winamp
2010-01-14 15:34 . 2010-01-14 15:34 -------- d-----w- c:\program files\Winamp
2010-01-14 10:19 . 2010-01-14 10:19 -------- d-----w- c:\program files\Common Files\Cisco Systems
2010-01-13 11:08 . 2009-05-04 20:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-01-13 05:29 . 2009-06-05 00:39 -------- dc----w- c:\documents and settings\Administrator\Application Data\gtk-2.0
2010-01-08 19:25 . 2009-09-11 12:32 161296 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-01-08 19:24 . 2009-07-02 12:41 -------- d-----w- c:\program files\Trend Micro
2010-01-08 19:24 . 2009-05-04 18:20 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-01-08 18:30 . 2009-12-10 21:08 -------- d-----w- c:\program files\AMT Media Manager
2010-01-08 18:26 . 2009-10-29 00:59 -------- d-----w- c:\program files\Pando Networks
2010-01-08 18:22 . 2009-10-31 07:43 -------- d-----w- c:\documents and settings\All Users\Application Data\WinZip
2010-01-08 18:10 . 2009-05-04 23:08 -------- d-----w- c:\program files\Google
2010-01-01 14:01 . 2010-01-01 14:01 -------- d-----w- c:\program files\Veoh Networks
2010-01-01 03:05 . 2010-01-01 03:05 45056 -c--a-r- c:\documents and settings\Administrator\Application Data\Microsoft\Installer\{24EEF6D7-A7B6-4AA9-AFD9-407185A7769F}\MapleStory.exe1_24EEF6D7A7B64AA9AFD9407185A7769F.exe
2010-01-01 03:05 . 2010-01-01 03:05 45056 -c--a-r- c:\documents and settings\Administrator\Application Data\Microsoft\Installer\{24EEF6D7-A7B6-4AA9-AFD9-407185A7769F}\MapleStory.exe_24EEF6D7A7B64AA9AFD9407185A7769F.exe
2010-01-01 03:05 . 2010-01-01 03:05 10134 -c--a-r- c:\documents and settings\Administrator\Application Data\Microsoft\Installer\{24EEF6D7-A7B6-4AA9-AFD9-407185A7769F}\ARPPRODUCTICON.exe
2009-12-23 15:59 . 2009-12-23 15:53 -------- d-----w- c:\program files\Lexmark X1100 Series
2009-12-23 15:29 . 2009-12-23 15:29 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Drivers HeadQuarters
2009-12-22 05:42 . 2004-08-04 12:00 662016 ----a-w- c:\windows\system32\wininet.dll
2009-12-09 06:57 . 2009-12-09 06:57 -------- d-----w- c:\program files\AhnLab
2009-12-02 17:02 . 2009-12-02 17:02 1632887 ----a-w- c:\windows\system32\ffmpegmt.dll
2009-12-02 16:56 . 2009-12-02 16:56 4840081 ----a-w- c:\windows\system32\libavcodec.dll
2009-12-02 13:19 . 2010-01-13 14:05 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-12-02 13:19 . 2010-01-13 15:41 15880 ----a-w- c:\windows\system32\lsdelete.exe
2009-11-25 08:14 . 2009-06-05 01:39 2516 -csha-w- c:\documents and settings\All Users\Application Data\KGyGaAvL.sys
2009-11-25 08:14 . 2009-06-05 01:39 2516 -csha-w- c:\documents and settings\All Users\Application Data\KGyGaAvL.sys
2009-11-25 08:13 . 2009-06-05 01:39 88 -csh--r- c:\documents and settings\All Users\Application Data\038E5C0D7B.sys
2009-11-25 08:13 . 2009-06-05 01:39 88 -csh--r- c:\documents and settings\All Users\Application Data\038E5C0D7B.sys
2009-11-21 16:36 . 2004-08-04 12:00 470528 ----a-w- c:\windows\AppPatch\aclayers.dll
2009-12-05 20:54 . 2009-05-04 23:05 61038 ----a-w- c:\program files\mozilla firefox\components\jar50.dll
2009-12-05 20:54 . 2009-05-04 23:05 49256 ----a-w- c:\program files\mozilla firefox\components\jsd3250.dll
2009-12-05 20:54 . 2009-05-04 23:05 166000 ----a-w- c:\program files\mozilla firefox\components\xpinstal.dll
.

------- Sigcheck -------

[-] 2008-04-14 . 574738F61FCA2935F5265DC4E5691314 . 409088 . . [6.7.2600.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\qmgr.dll
[-] 2008-04-14 . 574738F61FCA2935F5265DC4E5691314 . 409088 . . [6.7.2600.5512] . . c:\windows\SoftwareDistribution\Download\e9500597a78495f397efb821e37bf356\qmgr.dll
[-] 2007-03-29 . CC431E6DEAAD867A583EE5E804EE4CF2 . 409600 . . [6.7.2600.3109] . . c:\windows\system32\qmgr.dll
[-] 2007-03-29 . CC431E6DEAAD867A583EE5E804EE4CF2 . 409600 . . [6.7.2600.3109] . . c:\windows\system32\bits\qmgr.dll
[-] 2007-03-29 . CC431E6DEAAD867A583EE5E804EE4CF2 . 409600 . . [6.7.2600.3109] . . c:\windows\system32\dllcache\qmgr.dll
[-] 2007-03-29 . 65E23953D337574E549B1EF34FE0B1DA . 409600 . . [6.7.2600.3109] . . c:\windows\$hf_mig$\KB923845\SP2QFE\qmgr.dll
[7] 2004-08-04 . 2C69EC7E5A311334D10DD95F338FCCEA . 382464 . . [6.6.2600.2180] . . c:\windows\$NtUninstallKB923845$\qmgr.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Aim6"="c:\program files\AIM6\aim6.exe" [2009-07-09 49968]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2009-12-21 39424]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2009-02-28 00:10 35696 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Aim6]
2009-07-09 20:07 49968 ----a-w- c:\program files\AIM6\aim6.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}]
2006-12-24 01:05 143360 ----a-w- c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2004-08-04 12:00 15360 ------w- c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\GrooveMonitor]
2008-10-25 18:44 31072 ----a-w- c:\program files\Microsoft Office\Office12\GrooveMonitor.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
2006-05-25 15:43 126976 ----a-w- c:\windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
2006-05-25 15:43 155648 ----a-w- c:\windows\system32\igfxtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ISTray]
2009-11-18 20:47 1243088 ----a-w- c:\program files\Spyware Doctor\pctsTray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LanguageShortcut]
2006-12-06 05:55 54832 ----a-w- c:\program files\CyberLink\PowerDVD\Language\Language.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\lxbkbmgr.exe]
2008-02-28 19:57 74408 ----a-w- c:\program files\Lexmark X1100 Series\LXBKbmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MsmqIntCert]
2009-06-25 18:36 177152 ----a-w- c:\windows\system32\mqrt.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2006-01-12 22:40 155648 ----a-w- c:\program files\Common Files\Ahead\Lib\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RemoteControl]
2006-11-23 22:10 56928 ------w- c:\program files\CyberLink\PowerDVD\PDVDServ.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
2009-01-26 23:31 2144088 --sha-r- c:\program files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2009-09-14 15:26 149280 ----a-w- c:\program files\Java\jre6\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TMRUBottedTray]
2008-11-06 19:33 288088 ----a-w- c:\program files\Trend Micro\RUBotted\TMRUBottedTray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UfSeAgnt.exe]
2009-09-11 12:28 1020248 ----a-w- c:\program files\Trend Micro\Internet Security\UfSeAgnt.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VeohPlugin]
2009-12-23 19:18 2642168 ----a-w- c:\program files\Veoh Networks\VeohWebPlayer\veohwebplayer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"WMPNetworkSvc"=3 (0x3)
"RichVideo"=2 (0x2)
"PSI_SVC_2"=2 (0x2)
"ose"=3 (0x3)
"odserv"=3 (0x3)
"NMIndexingService"=3 (0x3)
"NBService"=3 (0x3)
"Microsoft Office Groove Audit Service"=3 (0x3)
"LightScribeService"=2 (0x2)
"JavaQuickStarterService"=2 (0x2)
"iPod Service"=3 (0x3)
"idsvc"=3 (0x3)
"gusvc"=3 (0x3)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\WINDOWS\\system32\\mqsvc.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"c:\\Documents and Settings\\All Users\\Application Data\\NexonUS\\NGM\\NGM.exe"=
"c:\\Nexon\\DFO\\DFO.exe"=
"c:\\WINDOWS\\system32\\lxbkcoms.exe"=
"c:\\Program Files\\Veoh Networks\\VeohWebPlayer\\veohwebplayer.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"58039:TCP"= 58039:TCP:Pando Media Booster
"58039:UDP"= 58039:UDP:Pando Media Booster

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [1/13/2010 6:05 AM 64288]
R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [1/6/2010 6:17 PM 207792]
R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [1/6/2010 7:40 PM 51984]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [1/6/2010 7:40 PM 59664]
R1 pctgntdi;pctgntdi;c:\windows\system32\drivers\pctgntdi.sys [1/6/2010 6:17 PM 233136]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [12/2/2009 5:19 AM 1181328]
R2 lxbk_device;lxbk_device;c:\windows\system32\lxbkcoms.exe -service --> c:\windows\system32\lxbkcoms.exe -service [?]
R2 RUBotted;Trend Micro RUBotted Service;c:\program files\Trend Micro\RUBotted\TMRUBotted.exe [1/8/2010 11:24 AM 582992]
R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [9/11/2009 4:28 AM 36368]
R3 TMPassthruMP;TMPassthruMP;c:\windows\system32\drivers\TMPassthru.sys [1/8/2010 11:24 AM 206608]
S2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\Spyware Doctor\BDT\BDTUpdateService.exe [1/6/2010 6:18 PM 112592]
S2 gupdate1ca8aeb3ddcab7c;Google Update Service (gupdate1ca8aeb3ddcab7c);c:\program files\Google\Update\GoogleUpdate.exe [1/1/2010 6:03 AM 133104]
S2 Security Activity Dashboard Service;Security Activity Dashboard Service;c:\program files\Trend Micro\TrendSecure\SecurityActivityDashboard\tmarsvc.exe --> c:\program files\Trend Micro\TrendSecure\SecurityActivityDashboard\tmarsvc.exe [?]
S3 Mkd2kfNt;Mkd2kfNt;c:\windows\system32\drivers\Mkd2kfNT.sys [12/8/2009 10:58 PM 133632]
S3 Mkd2Nadr;Mkd2Nadr;c:\windows\system32\drivers\Mkd2Nadr.sys [12/8/2009 10:58 PM 79360]
S3 MOSUMAC;USB-Ethernet Driver;c:\windows\system32\DRIVERS\MOSUMAC.SYS --> c:\windows\system32\DRIVERS\MOSUMAC.SYS [?]
S3 pctplsg;pctplsg;c:\windows\system32\drivers\pctplsg.sys [1/6/2010 6:17 PM 70408]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [1/6/2010 6:17 PM 359624]
S3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [1/6/2010 7:40 PM 33552]
S3 ThreatFire;ThreatFire;c:\program files\Spyware Doctor\TFEngine\TFService.exe service --> c:\program files\Spyware Doctor\TFEngine\TFService.exe service [?]
S3 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [9/11/2009 4:32 AM 50704]
S3 TMPassthru;Trend Micro Passthru Ndis Service;c:\windows\system32\drivers\TMPassthru.sys [1/8/2010 11:24 AM 206608]
S3 TmProxy;Trend Micro Proxy Service;c:\program files\Trend Micro\Internet Security\TmProxy.exe [9/11/2009 4:32 AM 689416]
.
Contents of the 'Scheduled Tasks' folder

2010-02-04 c:\windows\Tasks\Ad-Aware Update (Daily 1).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-12-02 14:05]

2010-02-04 c:\windows\Tasks\Ad-Aware Update (Daily 2).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-12-02 14:05]

2010-02-04 c:\windows\Tasks\Ad-Aware Update (Daily 3).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-12-02 14:05]

2010-02-04 c:\windows\Tasks\Ad-Aware Update (Daily 4).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-12-02 14:05]

2010-02-04 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-12-02 14:05]

2010-02-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-01 14:03]

2010-02-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-01 14:03]

2010-02-04 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 22:07]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uDefault_Search_URL = hxxp://www.google.com/ie
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
LSP: c:\program files\Common Files\PC Tools\Lsp\PCTLsp.dll
DPF: {6824D897-F7E1-4E41-B84B-B1D3FA4BF1BD} - hxxp://utilities.pcpitstop.com/Exterminate2/pcpitstopAntiVirus.dll
DPF: {94E5218F-9737-4FC2-8457-567B1FF23DC0} - hxxp://utilities.pcpitstop.com/DiskMD3/DiskMD3Ctrl.dll
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\t6i9hcxa.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - www.google.com
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true);
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)
MSConfigStartUp-PC Pitstop Diskmd3 Reminder - c:\program files\PCPitstop\DiskMD3\Reminder-Diskmd3.exe
MSConfigStartUp-PC Pitstop Optimize Reminder - c:\program files\PCPitstop\Optimize3\Reminder-Optimize3.exe
MSConfigStartUp-settdebugx - c:\docume~1\ADMINI~1\LOCALS~1\Temp\settdebugx.exe
MSConfigStartUp-Uniblue RegistryBooster 2 - c:\program files\Uniblue\RegistryBooster 2\RegistryBooster.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-03 20:41
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'lsass.exe'(1044)
c:\program files\Common Files\PC Tools\Lsp\PCTLsp.dll
.
Completion time: 2010-02-03 20:44:41
ComboFix-quarantined-files.txt 2010-02-04 04:44

Pre-Run: 9,056,419,840 bytes free
Post-Run: 9,077,977,088 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
[spybotsd]
timeout.old=30

- - End Of File - - C53E7B2C1E6F21D01A3F922D5A2431A1






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users