Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Recurring Vundo (and other) Virus

  • This topic is locked This topic is locked
6 replies to this topic

#1 Wealthy Rabbit

Wealthy Rabbit

  • Members
  • 9 posts
  • Local time:04:17 PM

Posted 24 January 2010 - 03:14 PM

Referred from here: http://www.bleepingcomputer.com/forums/t/289097/various-nasties-keep-coming-back/ ~ OB

Computer is an Athlon powered homebrew, about two years old running Win XP. Normal browser is Firefox and Thunderbird for email.

For the last week I keep using Malwarebytes and SuperAntiSpyware to remove the Vundo virus and it keeps coming back.

On Jan 18 I got a major virus infection, including Rootkit.TDSS and Trojan FakeAlert.N. Installed WinXP on a spare drive to be able to get SuperAntiSpyware to work and then Malwarebytes. Had to repair WinXP on the C drive and get all the updates. Thought I had everything back to normal.

But every few days I start getting browser re-directs to scum sites... usually when I'm in Yahoo or MSNBC. Stuff like "lawyerhubnet" or "clicktofind" and a lot of "Download Registry Defender".

With the help of one of your other volunteers, I ran Kaspersky on-line last night and it found some potential virus's in some old email (which I deleted) but nothing else.

This afternoon it started acting up again; Malwarebytes couldn't find MBAM.EXE. SuperAntiSpyware found Vundo/Variant-EC and Vundo/Variant-[Fixed]. (I reloaded Malwarebytes).

It was suggested I follow the process and post here.

Here is the Kaspersky Scan Report from Last Night (before the latest Vundo):

Sunday, January 24, 2010
Operating system: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner version:
Last database update: Saturday, January 23, 2010 23:12:32
Records in database: 3363249

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:

Scan statistics:
Objects scanned: 349469
Threats found: 3
Infected objects found: 4
Suspicious objects found: 123
Scan duration: 06:37:19

File name / Threat / Threats count
C:\Documents and Settings\Richard Hare\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast-1.net\Inbox Suspicious: Trojan-Spy.HTML.Fraud.gen 1
C:\Documents and Settings\Richard Hare\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Junk Infected: Exploit.Win32.Pidief.avb 1
C:\Documents and Settings\Richard Hare\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Junk Suspicious: Trojan-Spy.HTML.Fraud.gen 1
C:\Documents and Settings\Richard Hare\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Sent Suspicious: Trojan-Spy.HTML.Fraud.gen 13
C:\Documents and Settings\Richard Hare\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Spam & Spoof Suspicious: Trojan-Spy.HTML.Fraud.gen 19
C:\Documents and Settings\Richard Hare\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Spam & Spoof Infected: Trojan-Spy.HTML.Fraud.ch 1
D:\LJBU080209\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\InboxOld Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU080209\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Marker Suspicious: Trojan-Spy.HTML.Fraud.gen 3
D:\LJBU080209\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Oldmail - 2007 Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU080209\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Sent Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU080209\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\InboxOld Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU080209\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Marker Suspicious: Trojan-Spy.HTML.Fraud.gen 3
D:\LJBU080209\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Oldmail - 2007 Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU080209\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Sent Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU080209\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Trash Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU020809\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\InboxOld Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU020809\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Marker Suspicious: Trojan-Spy.HTML.Fraud.gen 3
D:\LJBU020809\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Oldmail - 2007 Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU020809\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Sent Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU040909\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\InboxOld Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU040909\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Marker Suspicious: Trojan-Spy.HTML.Fraud.gen 3
D:\LJBU040909\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Oldmail - 2007 Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU040909\Thunderbird\Profiles\ji1ivoxh.default\Mail\mail.comcast.net\Sent Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU040909\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\InboxOld Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU040909\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Marker Suspicious: Trojan-Spy.HTML.Fraud.gen 3
D:\LJBU040909\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Oldmail - 2007 Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU040909\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Sent Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\LJBU040909\Mozilla\Profiles\DEFAULT\RS0DVYOI.SLT\Mail\mail.comcast.net\Trash Suspicious: Trojan-Spy.HTML.Fraud.gen 2
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Drafts Suspicious: Trojan-Spy.HTML.Fraud.gen 1
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Inbox Suspicious: Trojan-Spy.HTML.Fraud.gen 10
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Inbox Infected: Trojan-Spy.HTML.Fraud.ch 1
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Sent Suspicious: Trojan-Spy.HTML.Fraud.gen 13
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Spam & Spoof Suspicious: Trojan-Spy.HTML.Fraud.gen 14
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast.net\Spam & Spoof Infected: Trojan-Spy.HTML.Fraud.ch 1
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast-1.net\Inbox Suspicious: Trojan-Spy.HTML.Fraud.gen 1
D:\RHBU083108\Application Data\Thunderbird\Profiles\rssr31b8.default\Mail\mail.comcast-1.net\Trash Suspicious: Trojan-Spy.HTML.Fraud.gen 1

Selected area has been scanned.

Here is the DDS.txt taken just a little while ago:

DDS (Ver_09-12-01.01) - NTFSx86
Run by Richard Hare at 14:27:41.00 on Sun 01/24/2010
Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_17
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2046.1376 [GMT -5:00]

AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Visioneer OneTouch\OneTouchMon.exe
C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Microsoft ActiveSync\Wcescomm.exe
C:\Program Files\TomTom HOME 2\HOMERunner.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Microsoft Office\Office\OSA.EXE
C:\Program Files\ArcSoft\TotalMedia 3.5\TMMonitor.exe
C:\Documents and Settings\Richard Hare\My Documents\My Downloads\Timeclock\tclocklight-040702-3\tclock.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Smith Micro\StuffIt 2009\ArcNameService.exe
C:\Program Files\Iomega\AutoDisk\ADService.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Documents and Settings\Richard Hare\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.microsoft.com
uInternet Settings,ProxyServer = http=
uInternet Settings,ProxyOverride =
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [PPWebCap] c:\progra~1\scansoft\paperp~1\PPWebCap.exe
uRun: [BMUpdate] c:\windows\system32\BMUpdate.exe
uRun: [H/PC Connection Agent] "c:\program files\microsoft activesync\Wcescomm.exe"
uRun: [NBJ] "c:\program files\ahead\nero backitup\nbj.exe"
uRun: [TomTomHOME.exe] "c:\program files\tomtom home 2\HOMERunner.exe"
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [AdobeUpdater] "c:\program files\common files\adobe\updater5\AdobeUpdater.exe"
mRun: [C6501Sound] RunDll32 c6501.cpl,CMICtrlWnd
mRun: [AsusStartupHelp] c:\program files\asus\aasp\1.00.17\AsRunHelp.exe
mRun: [OneTouch Monitor] c:\program files\visioneer onetouch\OneTouchMon.exe
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [ADUserMon] c:\program files\iomega\autodisk\ADUserMon.exe
mRun: [Iomega Drive Icons] c:\program files\iomega\driveicons\ImgIcon.exe
mRun: [Deskup] c:\program files\iomega\driveicons\deskup.exe /IMGSTART
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [ArcSoft Connection Service] c:\program files\common files\arcsoft\connection service\bin\ACDaemon.exe
mRun: [Windows Defender] "c:\program files\windows defender\MSASCui.exe" -hide
mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /install
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
dRunOnce: [RunNarrator] Narrator.exe
dRunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe
StartupFolder: c:\docume~1\richar~1\startm~1\programs\startup\shortc~1.lnk - c:\documents and settings\richard hare\my documents\my downloads\timeclock\tclocklight-040702-3\tclock.exe
StartupFolder: c:\docume~1\richar~1\startm~1\programs\startup\webshots.lnk - c:\program files\webshots\Launcher.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\FINDFAST.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\office~1.lnk - c:\program files\microsoft office\office\OSA.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\tmmoni~1.lnk - c:\program files\arcsoft\totalmedia 3.5\TMMonitor.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\progra~1\micros~3\INetRepl.dll
IE: {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\progra~1\micros~3\INetRepl.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {0DB074F0-617E-4EE9-912C-2965CF2AA5A4} - hxxp://download.microsoft.com/download/7/0/7/707a44ad-52ad-49af-b7ef-e21b6b0656e4/VirtualEarth3D.cab
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase8942.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
AppInit_DLLs: jejowada.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SSODL: suwowikor - {3d27e4a9-11ba-4622-abf2-c34f93d2188b} - No File
SSODL: hamoremor - {bc1e2846-c62d-4918-9857-39b4825f4f27} - No File
SSODL: sosavojos - {aeabfb34-7a82-4af1-9a0e-8299db195e1f} - No File
SSODL: kehebugen - {cde15ade-15d2-4e39-886f-02fa43ee5e3f} - No File
SSODL: pazadamuf - {e417f43f-60d9-40e1-bfc9-3a2c10a9a728} - No File
SSODL: fokedopov - {a5f4fd2e-9212-46b3-838e-1546544770ad} - No File
SSODL: zumenomur - {6808c246-8252-44eb-b8b6-0afaf78da6cd} - No File
SSODL: nunawulal - {4f941220-9aef-439f-872a-96b12784c425} - No File
SSODL: fatayogid - {83dc9f2d-6515-4131-91ef-07f7fedad811} - No File
SSODL: wewedojik - {139f96af-30c4-487c-b6cf-8c54adabb701} - No File
SSODL: jatogifim - {3e74b158-17ee-4bae-94e6-f4f62e71bbd5} - No File
SSODL: vuwizekim - {3efe13a0-622e-4b93-9759-b1a93dcbd41f} - No File
STS: {3d27e4a9-11ba-4622-abf2-c34f93d2188b} - No File
STS: {bc1e2846-c62d-4918-9857-39b4825f4f27} - No File
STS: {9c49b684-f3f9-4d0b-8abb-c83c3021b335} - No File
STS: {042a7644-4f6f-4a5a-bdb7-b33eac8f3903} - No File
STS: {6de37da0-f820-4767-838f-939465ab95a9} - No File
STS: {a5f4fd2e-9212-46b3-838e-1546544770ad} - No File
STS: {b5104b18-d343-43f3-af9a-4a4ee6bd4063} - No File
STS: {e417f43f-60d9-40e1-bfc9-3a2c10a9a728} - No File
STS: {6808c246-8252-44eb-b8b6-0afaf78da6cd} - No File
STS: {4f941220-9aef-439f-872a-96b12784c425} - No File
STS: {83dc9f2d-6515-4131-91ef-07f7fedad811} - No File
STS: {aeabfb34-7a82-4af1-9a0e-8299db195e1f} - No File
STS: {cde15ade-15d2-4e39-886f-02fa43ee5e3f} - No File
STS: {139f96af-30c4-487c-b6cf-8c54adabb701} - No File
STS: {3e74b158-17ee-4bae-94e6-f4f62e71bbd5} - No File
STS: {3efe13a0-622e-4b93-9759-b1a93dcbd41f} - No File
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
LSA: Notification Packages = scecli piliwimo.dll limereju.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\richar~1\applic~1\mozilla\firefox\profiles\3honm5dm.default\
FF - prefs.js: browser.startup.homepage - hxxp://m.www.yahoo.com/
FF - component: c:\documents and settings\richard hare\application data\mozilla\firefox\profiles\3honm5dm.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\frozen.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npActiveGS.dll
FF - plugin: c:\program files\virtual earth 3d\npVE3D.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

FF - user.js: dom.disable_open_during_load - false // Popupblocker control handled by McAfee Privacy Service
FF - user.js: yahoo.homepage.dontask - truec:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 ppa;Iomega Parallel Port Filter Driver;c:\windows\system32\drivers\ppa.sys [2008-4-3 17792]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2007-10-18 214664]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-10-12 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-10-12 74480]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2007-10-18 359952]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2007-10-18 144704]
R2 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2007-10-18 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2007-10-18 35272]
R3 PhilMAS;ASUS SAA7164/7163 service;c:\windows\system32\drivers\PhilMAS.sys [2008-9-4 1222912]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-10-12 7408]
S2 JEPPDRIVE;Smart Modular JeppDrive USB Driver;c:\windows\system32\drivers\JeppD.sys [2009-6-24 28224]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2007-10-18 34248]
S3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2007-10-18 40552]
S3 USA19H;USA19H;c:\windows\system32\drivers\USA19H2k.sys [2008-7-24 727908]
S3 USA19H2KP;Keyspan USB Serial Port Driver;c:\windows\system32\drivers\USA19H2kp.sys [2008-7-24 44928]
S4 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2007-10-18 606736]

=============== Created Last 30 ================

2010-01-21 20:59:10 54156 ---ha-w- c:\windows\QTFont.qfn
2010-01-21 20:59:10 1409 ----a-w- c:\windows\QTFont.for
2010-01-20 16:12:31 1315328 -c----w- c:\windows\system32\dllcache\msoe.dll
2010-01-20 16:10:46 153088 -c----w- c:\windows\system32\dllcache\triedit.dll
2010-01-20 16:10:32 128512 -c----w- c:\windows\system32\dllcache\dhtmled.ocx
2010-01-20 16:09:37 455296 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-01-20 16:09:16 333952 -c----w- c:\windows\system32\dllcache\srv.sys
2010-01-20 16:09:09 331776 -c----w- c:\windows\system32\dllcache\msadce.dll
2010-01-20 16:08:54 691712 -c----w- c:\windows\system32\dllcache\inetcomm.dll
2010-01-20 16:08:40 272128 -c----w- c:\windows\system32\dllcache\bthport.sys
2010-01-20 16:08:28 203136 -c----w- c:\windows\system32\dllcache\rmcast.sys
2010-01-20 16:07:58 337408 -c----w- c:\windows\system32\dllcache\netapi32.dll
2010-01-20 16:07:55 1172480 -c----w- c:\windows\system32\dllcache\msxml3.dll
2010-01-20 16:07:33 215552 -c----w- c:\windows\system32\dllcache\wordpad.exe
2010-01-20 16:07:33 1206508 -c----w- c:\windows\system32\dllcache\sysmain.sdb
2010-01-20 16:07:07 81920 -c----w- c:\windows\system32\dllcache\fontsub.dll
2010-01-20 16:07:07 119808 -c----w- c:\windows\system32\dllcache\t2embed.dll
2010-01-20 16:07:02 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
2010-01-20 15:40:55 294912 -c----w- c:\windows\system32\dllcache\msaud32.acm
2010-01-20 14:41:22 3840 ----a-w- c:\windows\system32\drivers\BANTExt.sys
2010-01-20 14:41:22 0 d-----w- c:\program files\Belarc
2010-01-20 00:57:59 0 d-----w- c:\windows\system32\AGEIA
2010-01-20 00:55:17 0 d-----w- c:\program files\common files\Wise Installation Wizard
2010-01-20 00:54:29 0 d-----w- c:\docume~1\alluse~1\applic~1\NVIDIA Corporation
2010-01-20 00:54:21 0 d-----w- c:\program files\NVIDIA Corporation
2010-01-20 00:52:25 0 d-----w- C:\NVIDIA
2010-01-19 20:38:57 26112 -c--a-w- c:\windows\system32\dllcache\EXCH_seos.dll
2010-01-19 20:37:59 78848 -c--a-w- c:\windows\system32\dllcache\dayi.ime
2010-01-19 20:36:13 488 ---ha-r- c:\windows\system32\logonui.exe.manifest
2010-01-19 20:36:07 749 ---ha-r- c:\windows\WindowsShell.Manifest
2010-01-19 20:36:07 749 ---ha-r- c:\windows\system32\wuaucpl.cpl.manifest
2010-01-19 20:36:07 749 ---ha-r- c:\windows\system32\sapi.cpl.manifest
2010-01-19 20:36:07 749 ---ha-r- c:\windows\system32\ncpa.cpl.manifest
2010-01-19 20:35:52 16384 -c--a-w- c:\windows\system32\dllcache\isignup.exe
2010-01-19 20:32:16 5504 ----a-w- c:\windows\system32\drivers\mstee.sys
2010-01-19 20:23:47 24661 -c--a-w- c:\windows\system32\dllcache\spxcoins.dll
2010-01-19 20:23:47 24661 ----a-w- c:\windows\system32\spxcoins.dll
2010-01-19 20:23:47 13312 -c--a-w- c:\windows\system32\dllcache\irclass.dll
2010-01-19 20:23:47 13312 ----a-w- c:\windows\system32\irclass.dll
2010-01-19 20:23:35 8574 -c--a-w- c:\windows\system32\dllcache\IASNT4.CAT
2010-01-19 20:23:35 7382 -c--a-w- c:\windows\system32\dllcache\OEMBIOS.CAT
2010-01-19 20:23:35 399645 -c--a-w- c:\windows\system32\dllcache\MAPIMIG.CAT
2010-01-19 20:23:35 37484 -c--a-w- c:\windows\system32\dllcache\MW770.CAT
2010-01-19 20:23:35 13472 -c--a-w- c:\windows\system32\dllcache\HPCRDP.CAT
2010-01-19 20:23:34 797189 -c--a-w- c:\windows\system32\dllcache\NT5IIS.CAT
2010-01-19 17:02:19 0 d-----w- c:\windows\pss
2010-01-19 12:16:54 0 d-----w- c:\windows\msapps

==================== Find3M ====================

2010-01-23 20:56:54 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2010-01-19 20:35:14 23348 ----a-w- c:\windows\system32\emptyregdb.dat
2010-01-14 16:12:06 181120 ------w- c:\windows\system32\MpSigStub.exe
2010-01-07 21:07:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-07 21:07:04 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-22 05:21:05 667136 ----a-w- c:\windows\system32\wininet.dll
2009-12-22 05:20:58 81920 ----a-w- c:\windows\system32\ieencode.dll
2002-05-28 12:19:26 61440 ----a-w- c:\windows\inf\i386\onetUSD.dll
2002-05-20 12:22:08 36864 ----a-w- c:\windows\inf\i386\Vizmicro.dll
2002-05-20 12:20:36 172032 ----a-w- c:\windows\inf\i386\viceo.dll
2002-05-20 12:02:46 225280 ----a-w- c:\windows\inf\i386\rtscan.dll
2001-08-03 22:29:18 13824 ----a-w- c:\windows\inf\i386\Usbscan.sys

============= FINISH: 14:28:38.28 ===============

Here is the Root Repeal Report:

ROOTREPEAL AD, 2007-2009
Scan Start Time: 2010/01/24 14:34
Program Version: Version
Windows Version: Windows XP SP3

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA40F7000 Size: 49152 File Visible: No Signed: -
Status: -

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys" at address 0xadd260b0


I will attach the Attach:Txt report.

I am puzzled and (like everybody in this situation) somewhat frustrated. All I want is to be able to use my computer!

I surely appreciate any help I can get.

Wealthy Rabbit

Attached Files

Edited by Orange Blossom, 24 January 2010 - 07:40 PM.

BC AdBot (Login to Remove)


#2 schrauber



  • Malware Response Team
  • 24,794 posts
  • Gender:Male
  • Location:Munich,Germany
  • Local time:10:17 PM

Posted 30 January 2010 - 01:20 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 Wealthy Rabbit

Wealthy Rabbit
  • Topic Starter

  • Members
  • 9 posts
  • Local time:04:17 PM

Posted 31 January 2010 - 10:02 AM

Thank you, Schrauber, for your offer of assistance.

Subsequent to my posting, my computer seemed stable for about two days. (No unexpected re-directs). Then it began a NEW virus behavior whereby it would post an alert about "DCOM Server Process" and shut down within 60 seconds. I tried running "shutdown -a" to stop the process (others reported this would inhibit the shutdown), but it did not help on my machine.

I could not tolerate not having my computer available, nor potentially infected by a virus, so I renamed windows "Badwin", moved it to another drive, and reloaded windows. Reloading Windows and about 30 drivers and applications took about a day and a half, but that was still less frustrating and time consuming than the two and a half weeks I have been trying to remove this virus.

I thank you and others for your volunteer assistance... I can see many many people are still in need of help; so I will give up my place in line. I may (who knows) be back again at some date.

If, for the purpose of research, I can do any examination of my "Badwin" file for you, I would be happy to oblige.

Wealthy Rabbit
(Rich Hare)

#4 schrauber



  • Malware Response Team
  • 24,794 posts
  • Gender:Male
  • Location:Munich,Germany
  • Local time:10:17 PM

Posted 31 January 2010 - 01:05 PM


So this one is resolved? smile.gif

Edited by schrauber, 31 January 2010 - 01:06 PM.


Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#5 Wealthy Rabbit

Wealthy Rabbit
  • Topic Starter

  • Members
  • 9 posts
  • Local time:04:17 PM

Posted 31 January 2010 - 03:23 PM

"So this one is resolved? smile.gif"

No, this one did not get resolved.

It got sicker and sicker, died, and was buried.

Wealthy Rabbit

#6 schrauber



  • Malware Response Team
  • 24,794 posts
  • Gender:Male
  • Location:Munich,Germany
  • Local time:10:17 PM

Posted 01 February 2010 - 12:54 PM

Thanks for letting me know.

I only asked if I can close the thread, wasn't clear for me.

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#7 schrauber



  • Malware Response Team
  • 24,794 posts
  • Gender:Male
  • Location:Munich,Germany
  • Local time:10:17 PM

Posted 06 February 2010 - 04:39 AM

Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. smile.gif

If your the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users