Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Gen.trojan!IK, Firefox browser hijacked,


  • This topic is locked This topic is locked
52 replies to this topic

#1 LisaBe

LisaBe

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 04 February 2010 - 05:16 PM

This has been going on for about 2 weeks, maybe more. I can't start computer in safe mode. Symantec Endpoint and Malwarebytes didn't find a problem but my firefox browser got hijacked. I also run Lavasoft adwatch, which I recall found a few instances I dealt with. The browser problem got worse and worse in last few days. I did a few things and not 100% as bad but believe there is still malware trojan or rootkit problem. I believe at the very beginning I saw something with AntiVirus2010 (I did have a problem in 2009 with the 2009 version which I believe I got by clicking on the malware (a trick) but that was detected by malwarebytes and resolved).

A few days ago. I ran ESET online; it found the following before it slowed to a crawl at 40%:
W32/Adware.WBug.A application (twice) (associated with c:documentsandsettings\myname\localsettings\plugtmp-35\plugin-bribe.pdf AND c:documentsandsetings/myname\mydocuments\install_aim.exe)
AND
PDF/Exploit.Pidief.OVItrojan (associated with c:downloads\install_AIM.exe)
I quarantined... (note: I did not ad/change anything with AIM before this)

I found a variant of Win32/TrojanDropper (Agenttrojan in DVD123/updates) and deleted.
Then I downloaded Armor ++, it found 2 instances of Gen.trojan!IK, one under C:system volume restore and alot of numbers plus in a 2006 Turbo Tax file. I deleted the turbo tax but didn't know what to do more

I am now actively running Symantec Endpoint, Adaware/adwatch, and Armor ++ AntiVirus and Firewall.
After reading anothers log, I ran Win32diag log and the command log.txt and copied the results below.

Win32diag log tells me I don't have backup priveleges:
-----------------------------------
Running from: C:\Documents and Settings\L. Bergus\Desktop\Win32kDiag.exe

Log file at : C:\Documents and Settings\L. Bergus\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...





Finished!
-----------------------------------------------------------
THE COMMAND LOG is copied as follows:
Volume in drive C has no label.
Volume Serial Number is 04DB-F7E9

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/10/2004 07:00 AM 180,224 scecli.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/10/2004 07:00 AM 407,040 netlogon.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/10/2004 07:00 AM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 07:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 07:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 07:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Directory of C:\WINDOWS\SYSTEM32

04/13/2008 07:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\SYSTEM32

04/13/2008 07:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\SYSTEM32

04/13/2008 07:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Total Files Listed:
9 File(s) 1,932,288 bytes
0 Dir(s) 226,447,872,000 bytes free

What do I do?. I am afraid to go deeper and deeper or delete something called System Volume Restore. I also recall before I saw all of this going on I saw a message about Rootkit and also my computer would not start in safe mode. And oddly, I received an email with a webpage from Buy.com (something I looked at 2 months ago) from my aunt's email address. she said she didn't send me anything. Very odd.
What can I do? At the moment I do not seem hijacked in Firefox, but once before, I apparently didn't solve the problem and it came back. The Armor ++ is still saying Gen.trojan!IK with system volume restore which I didnot act on. Thank you.
Lisa

Edit: Moved topic from XP to the more appropriate forum. ~ Animal

Additional info on LisaBe computer
From a symantec scan 1/26/10,numerous instances of Hacktool.Rootkit (6) in Windows temp files, (3) Trojan.FakeAV in c:\system Volume Information and (1) Trojan.Adclicker. I cleaned all of these. After that, all that was stated in my original post occurred. Thank you. Lisa

Merged posts. Given the presence of the Win32diag log, moving to log forum. ~ OB

Edited by Orange Blossom, 20 February 2010 - 08:19 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:25 PM

Posted 21 February 2010 - 05:10 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below I will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

Please download DeFogger to your desktop.

Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.


Then

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 25 February 2010 - 02:01 PM

Hi MOle
Thank you for replying. I am downloading and running what you suggested. What I have seen since my initial email (I have basically staying off this computer awaiting help) was the Symantec scan that automatically ran everyday seemed to keep adding backdoor.diserv!inf entries.

On 2/20, it showed
A0137890.sys
A0138129.sys
A0138152.sys
A0138197.sys
iastor.sys (all backdoor.tidserv!inf)

each day it added one more entry. As of 2/25 it showed all of the above plus
A0138198.sys
A0138199.sys
A0138200.sys
A0138201.sys
A0138202.sys

Malwarebytes did not detect anything. I am also running online Armor (recently) and Adaware on this computer.
OK now, I will run the scans you request.
Thank you


#4 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 25 February 2010 - 02:31 PM

Ok, did the things requested.

1) after I downloaded DDS.scr, my N Cleaner Second asked me am I sure I want to permanently remove/shred the file (if I said yes, it was deleted, If I said no, it did nothing)

2) De/fogger log as follows:
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 14:16 on 25/02/2010 (L. Bergus)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-
(it never asked to reboot machine... window is open that asks me to select disable or re-enable)

3) re: GMER. did not get a warning. Log as follows

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit quick scan 2010-02-25 14:28:12
Windows 5.1.2600 Service Pack 3
Running: kp5px18y.exe; Driver: C:\DOCUME~1\L2E8A~1.BER\LOCALS~1\Temp\pxtdapoc.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwQueryDirectoryFile [0xA949DFB0]

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device \Driver\Tcpip \Device\Ip OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\Ip wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip Lbd.sys (Boot Driver/Lavasoft AB)

Device \Driver\Tcpip \Device\Tcp OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\Tcp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp Lbd.sys (Boot Driver/Lavasoft AB)

Device \Driver\Tcpip \Device\Udp OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\Udp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp Lbd.sys (Boot Driver/Lavasoft AB)

Device \Driver\Tcpip \Device\RawIp OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\RawIp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

---- EOF - GMER 1.0.15 ----

Thanks. Appreciate your help. Lisa

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:25 PM

Posted 25 February 2010 - 03:33 PM

Hi Lisa,

Your Symantec has spotted your problem. Tidserv is a nasty rootkit which is often tricky to remove. We will certainly give it a go though. tongue.gif
  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to leave the file alone
    .
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here (or attach it).
Thanks
Posted Image
m0le is a proud member of UNITE

#6 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 25 February 2010 - 09:07 PM

here is the TDSSKiller.txt

21:02:17:554 5280 TDSS rootkit removing tool 2.2.7 Feb 25 2010 10:44:44
21:02:17:554 5280 ================================================================================
21:02:17:554 5280 SystemInfo:

21:02:17:554 5280 OS Version: 5.1.2600 ServicePack: 3.0
21:02:17:554 5280 Product type: Workstation
21:02:17:554 5280 ComputerName: LISA
21:02:17:554 5280 UserName: L. Bergus
21:02:17:554 5280 Windows directory: C:\WINDOWS
21:02:17:554 5280 Processor architecture: Intel x86
21:02:17:554 5280 Number of processors: 1
21:02:17:554 5280 Page size: 0x1000
21:02:17:554 5280 Boot type: Normal boot
21:02:17:554 5280 ================================================================================
21:02:17:554 5280 UnloadDriverW: NtUnloadDriver error 2
21:02:17:554 5280 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
21:02:17:679 5280 Initialize success
21:02:17:679 5280
21:02:17:679 5280 Scanning Services ...
21:02:17:679 5280 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system
21:02:17:679 5280 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
21:02:17:679 5280 wfopen_ex: Trying to KLMD file open
21:02:17:679 5280 wfopen_ex: File opened ok (Flags 2)
21:02:17:679 5280 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software
21:02:17:679 5280 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
21:02:17:679 5280 wfopen_ex: Trying to KLMD file open
21:02:17:679 5280 wfopen_ex: File opened ok (Flags 2)
21:02:17:757 5280 GetAdvancedServicesInfo: Raw services enum returned 456 services
21:02:17:757 5280 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system
21:02:17:757 5280 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software
21:02:17:757 5280
21:02:17:757 5280 Scanning Kernel memory ...
21:02:17:757 5280 Devices to scan: 16
21:02:17:757 5280
21:02:17:757 5280 Driver Name: Disk
21:02:17:757 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:757 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:757 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:757 5280 IRP_MJ_READ : F75F2D1F
21:02:17:757 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:757 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:757 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:757 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:757 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:757 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:757 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:757 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:757 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:757 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:757 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:757 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:757 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:757 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:757 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:757 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:757 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:757 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:757 5280 IRP_MJ_POWER : F75F4C82
21:02:17:757 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:757 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:757 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:757 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:773 5280 sion
21:02:17:773 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:773 5280
21:02:17:773 5280 Driver Name: Disk
21:02:17:773 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:773 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:773 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:773 5280 IRP_MJ_READ : F75F2D1F
21:02:17:773 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:773 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:773 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:773 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:773 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:773 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:773 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:773 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:773 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:773 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:773 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:773 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:773 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:773 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:773 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:773 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:773 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:773 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:773 5280 IRP_MJ_POWER : F75F4C82
21:02:17:773 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:773 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:773 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:773 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:773 5280 sion
21:02:17:789 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:789 5280
21:02:17:789 5280 Driver Name: USBSTOR
21:02:17:789 5280 IRP_MJ_CREATE : B9EC5218
21:02:17:789 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:789 5280 IRP_MJ_CLOSE : B9EC5218
21:02:17:789 5280 IRP_MJ_READ : B9EC523C
21:02:17:789 5280 IRP_MJ_WRITE : B9EC523C
21:02:17:789 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:789 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:789 5280 IRP_MJ_FLUSH_BUFFERS : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_DEVICE_CONTROL : B9EC5180
21:02:17:789 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : B9EC09E6
21:02:17:789 5280 IRP_MJ_SHUTDOWN : 804F355A
21:02:17:789 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:789 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:789 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:789 5280 IRP_MJ_POWER : B9EC45F0
21:02:17:789 5280 IRP_MJ_SYSTEM_CONTROL : B9EC2A6E
21:02:17:789 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:789 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:789 5280 siohd: 0
21:02:17:789 5280 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: Clean
21:02:17:789 5280
21:02:17:789 5280 Driver Name: Disk
21:02:17:789 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:789 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:789 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:789 5280 IRP_MJ_READ : F75F2D1F
21:02:17:789 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:789 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:789 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:789 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:789 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:789 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:789 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:789 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:789 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:789 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:789 5280 IRP_MJ_POWER : F75F4C82
21:02:17:789 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:789 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:789 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:789 5280 sion
21:02:17:789 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:789 5280
21:02:17:789 5280 Driver Name: Disk
21:02:17:789 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:789 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:789 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:789 5280 IRP_MJ_READ : F75F2D1F
21:02:17:789 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:789 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:789 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:789 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:789 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:789 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:789 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:789 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:789 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:789 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:789 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:789 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:789 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:789 5280 IRP_MJ_POWER : F75F4C82
21:02:17:789 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:789 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:804 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:804 5280 sion
21:02:17:804 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:804 5280
21:02:17:804 5280 Driver Name: Disk
21:02:17:804 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:804 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:804 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:804 5280 IRP_MJ_READ : F75F2D1F
21:02:17:804 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:804 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:804 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:804 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:804 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:804 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:804 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:804 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:804 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:804 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:804 5280 IRP_MJ_POWER : F75F4C82
21:02:17:804 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:804 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:804 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:804 5280 sion
21:02:17:804 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:804 5280
21:02:17:804 5280 Driver Name: Disk
21:02:17:804 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:804 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:804 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:804 5280 IRP_MJ_READ : F75F2D1F
21:02:17:804 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:804 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:804 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:804 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:804 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:804 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:804 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:804 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:804 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:804 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:804 5280 IRP_MJ_POWER : F75F4C82
21:02:17:804 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:804 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:804 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:804 5280 sion
21:02:17:804 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:804 5280
21:02:17:804 5280 Driver Name: USBSTOR
21:02:17:804 5280 IRP_MJ_CREATE : B9EC5218
21:02:17:804 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:804 5280 IRP_MJ_CLOSE : B9EC5218
21:02:17:804 5280 IRP_MJ_READ : B9EC523C
21:02:17:804 5280 IRP_MJ_WRITE : B9EC523C
21:02:17:804 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:804 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:804 5280 IRP_MJ_FLUSH_BUFFERS : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:804 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_DEVICE_CONTROL : B9EC5180
21:02:17:804 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : B9EC09E6
21:02:17:804 5280 IRP_MJ_SHUTDOWN : 804F355A
21:02:17:804 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:804 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:804 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:804 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:804 5280 IRP_MJ_POWER : B9EC45F0
21:02:17:804 5280 IRP_MJ_SYSTEM_CONTROL : B9EC2A6E
21:02:17:804 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:804 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:804 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:804 5280 siohd: 0
21:02:17:820 5280 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: Clean
21:02:17:820 5280
21:02:17:820 5280 Driver Name: USBSTOR
21:02:17:820 5280 IRP_MJ_CREATE : B9EC5218
21:02:17:820 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:820 5280 IRP_MJ_CLOSE : B9EC5218
21:02:17:820 5280 IRP_MJ_READ : B9EC523C
21:02:17:820 5280 IRP_MJ_WRITE : B9EC523C
21:02:17:820 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:820 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:820 5280 IRP_MJ_FLUSH_BUFFERS : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_DEVICE_CONTROL : B9EC5180
21:02:17:820 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : B9EC09E6
21:02:17:820 5280 IRP_MJ_SHUTDOWN : 804F355A
21:02:17:820 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:820 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:820 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:820 5280 IRP_MJ_POWER : B9EC45F0
21:02:17:820 5280 IRP_MJ_SYSTEM_CONTROL : B9EC2A6E
21:02:17:820 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:820 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:820 5280 siohd: 0
21:02:17:820 5280 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: Clean
21:02:17:820 5280
21:02:17:820 5280 Driver Name: USBSTOR
21:02:17:820 5280 IRP_MJ_CREATE : B9EC5218
21:02:17:820 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:820 5280 IRP_MJ_CLOSE : B9EC5218
21:02:17:820 5280 IRP_MJ_READ : B9EC523C
21:02:17:820 5280 IRP_MJ_WRITE : B9EC523C
21:02:17:820 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:820 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:820 5280 IRP_MJ_FLUSH_BUFFERS : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_DEVICE_CONTROL : B9EC5180
21:02:17:820 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : B9EC09E6
21:02:17:820 5280 IRP_MJ_SHUTDOWN : 804F355A
21:02:17:820 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:820 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:820 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:820 5280 IRP_MJ_POWER : B9EC45F0
21:02:17:820 5280 IRP_MJ_SYSTEM_CONTROL : B9EC2A6E
21:02:17:820 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:820 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:820 5280 siohd: 0
21:02:17:820 5280 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: Clean
21:02:17:820 5280
21:02:17:820 5280 Driver Name: USBSTOR
21:02:17:820 5280 IRP_MJ_CREATE : B9EC5218
21:02:17:820 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:820 5280 IRP_MJ_CLOSE : B9EC5218
21:02:17:820 5280 IRP_MJ_READ : B9EC523C
21:02:17:820 5280 IRP_MJ_WRITE : B9EC523C
21:02:17:820 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:820 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:820 5280 IRP_MJ_FLUSH_BUFFERS : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:820 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_DEVICE_CONTROL : B9EC5180
21:02:17:820 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : B9EC09E6
21:02:17:820 5280 IRP_MJ_SHUTDOWN : 804F355A
21:02:17:820 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:820 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:820 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:820 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:820 5280 IRP_MJ_POWER : B9EC45F0
21:02:17:820 5280 IRP_MJ_SYSTEM_CONTROL : B9EC2A6E
21:02:17:820 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:820 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:820 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:820 5280 siohd: 0
21:02:17:836 5280 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: Clean
21:02:17:836 5280
21:02:17:836 5280 Driver Name: USBSTOR
21:02:17:836 5280 IRP_MJ_CREATE : B9EC5218
21:02:17:836 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:836 5280 IRP_MJ_CLOSE : B9EC5218
21:02:17:836 5280 IRP_MJ_READ : B9EC523C
21:02:17:836 5280 IRP_MJ_WRITE : B9EC523C
21:02:17:836 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:836 5280 IRP_MJ_FLUSH_BUFFERS : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_DEVICE_CONTROL : B9EC5180
21:02:17:836 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : B9EC09E6
21:02:17:836 5280 IRP_MJ_SHUTDOWN : 804F355A
21:02:17:836 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:836 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_POWER : B9EC45F0
21:02:17:836 5280 IRP_MJ_SYSTEM_CONTROL : B9EC2A6E
21:02:17:836 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:836 5280 siohd: 0
21:02:17:836 5280 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: Clean
21:02:17:836 5280
21:02:17:836 5280 Driver Name: Disk
21:02:17:836 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:836 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:836 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:836 5280 IRP_MJ_READ : F75F2D1F
21:02:17:836 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:836 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:836 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:836 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:836 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:836 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:836 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:836 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_POWER : F75F4C82
21:02:17:836 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:836 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:836 5280 sion
21:02:17:836 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:836 5280
21:02:17:836 5280 Driver Name: Disk
21:02:17:836 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:836 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:836 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:836 5280 IRP_MJ_READ : F75F2D1F
21:02:17:836 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:836 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:836 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:836 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:836 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:836 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:836 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:836 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_POWER : F75F4C82
21:02:17:836 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:836 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:836 5280 sion
21:02:17:836 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:836 5280
21:02:17:836 5280 Driver Name: Disk
21:02:17:836 5280 IRP_MJ_CREATE : F75F8BB0
21:02:17:836 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:836 5280 IRP_MJ_CLOSE : F75F8BB0
21:02:17:836 5280 IRP_MJ_READ : F75F2D1F
21:02:17:836 5280 IRP_MJ_WRITE : F75F2D1F
21:02:17:836 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:836 5280 IRP_MJ_FLUSH_BUFFERS : F75F32E2
21:02:17:836 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:836 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_DEVICE_CONTROL : F75F33BB
21:02:17:836 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75F6F28
21:02:17:836 5280 IRP_MJ_SHUTDOWN : F75F32E2
21:02:17:836 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:836 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:836 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:836 5280 IRP_MJ_POWER : F75F4C82
21:02:17:836 5280 IRP_MJ_SYSTEM_CONTROL : F75F999E
21:02:17:836 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:836 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:836 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:851 5280 sion
21:02:17:851 5280 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
21:02:17:851 5280
21:02:17:851 5280 Driver Name: iaStor
21:02:17:851 5280 IRP_MJ_CREATE : F72F8D1E
21:02:17:851 5280 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
21:02:17:851 5280 IRP_MJ_CLOSE : F72F8D1E
21:02:17:851 5280 IRP_MJ_READ : 804F355A
21:02:17:851 5280 IRP_MJ_WRITE : 804F355A
21:02:17:851 5280 IRP_MJ_QUERY_INFORMATION : 804F355A
21:02:17:851 5280 IRP_MJ_SET_INFORMATION : 804F355A
21:02:17:851 5280 IRP_MJ_QUERY_EA : 804F355A
21:02:17:851 5280 IRP_MJ_SET_EA : 804F355A
21:02:17:851 5280 IRP_MJ_FLUSH_BUFFERS : 804F355A
21:02:17:851 5280 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
21:02:17:851 5280 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
21:02:17:851 5280 IRP_MJ_DIRECTORY_CONTROL : 804F355A
21:02:17:851 5280 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
21:02:17:851 5280 IRP_MJ_DEVICE_CONTROL : F72FB056
21:02:17:851 5280 IRP_MJ_INTERNAL_DEVICE_CONTROL : F72FB316
21:02:17:851 5280 IRP_MJ_SHUTDOWN : 804F355A
21:02:17:851 5280 IRP_MJ_LOCK_CONTROL : 804F355A
21:02:17:851 5280 IRP_MJ_CLEANUP : 804F355A
21:02:17:851 5280 IRP_MJ_CREATE_MAILSLOT : 804F355A
21:02:17:851 5280 IRP_MJ_QUERY_SECURITY : 804F355A
21:02:17:851 5280 IRP_MJ_SET_SECURITY : 804F355A
21:02:17:851 5280 IRP_MJ_POWER : F72FF2B0
21:02:17:851 5280 IRP_MJ_SYSTEM_CONTROL : F72FF33C
21:02:17:851 5280 IRP_MJ_DEVICE_CHANGE : 804F355A
21:02:17:851 5280 IRP_MJ_QUERY_QUOTA : 804F355A
21:02:17:851 5280 IRP_MJ_SET_QUOTA : 804F355A
21:02:17:882 5280 sion
21:02:17:898 5280 C:\WINDOWS\system32\DRIVERS\iaStor.sys - Verdict: Infected
21:02:17:898 5280 File C:\WINDOWS\system32\DRIVERS\iaStor.sys infected by TDSS rootkit ... 21:02:17:898 5280 Processing driver file: C:\WINDOWS\system32\DRIVERS\iaStor.sys
21:02:17:898 5280 ProcessDirEnumEx: FindFirstFile(C:\WINDOWS\system32\DriverStore\FileRepository\*) error 3
21:02:18:164 5280 ProcessDirEnumEx: FindFirstFile(C:\WINDOWS\OemDir\*) error 3
21:02:18:695 5280 !fdfb7
21:02:18:742 5280 !vdf1: 2
21:02:18:742 5280 !ttfc3 1784
21:02:18:742 5280 cure failed
21:02:18:742 5280
21:02:18:742 5280 Completed
21:02:18:742 5280
21:02:18:742 5280 Results:
21:02:18:742 5280 Memory objects infected / cured / cured on reboot: 0 / 0 / 0
21:02:18:742 5280 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
21:02:18:742 5280 File objects infected / cured / cured on reboot: 1 / 0 / 0
21:02:18:742 5280
21:02:18:742 5280 KLMD(ARK) unloaded successfully

Thank you. Lisa

#7 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 25 February 2010 - 09:34 PM

Not sure if cleared now, but it said to reboot. So I will. Also, should I reenable CD Emulator drivers from fogger???

Darn, on reboot, it showed up again 10 parts. I did a screen capture from Symantec Endpoint. Trying to figure out how to attach it.. To follow...




Edited by LisaBe, 26 February 2010 - 12:34 AM.


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:25 PM

Posted 26 February 2010 - 07:19 AM

No need for the screenshot. TDSSKiller replaced the infected file so we now can go in and see what else needs to go.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop but rename it Combo-Fix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combo-Fix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#9 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 26 February 2010 - 02:50 PM

early after the download, it told me it cannot open n.pif..... what program should be used to open... Then it disappears and all else continued. At end, Got a message called anwendungsfehler - Exception ERzTray IconError in Modul Ad-Watch.exe bei 000AF667. Cannot create shell notification Icon.

Also, before I ran this scan, last nite, Malwarebytes found 1 problem, I quarantined, but then Symantec found even more instances of the ones before (maybe 13) when I awoke...

Now, here's the log contents:
ComboFix 10-02-26.01 - L. Bergus 02/26/2010 14:27:21.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.352 [GMT -5:00]
Running from: c:\documents and settings\L. Bergus\Desktop\Combo-Fix.exe
AV: Online Armor ++ *On-access scanning disabled* (Updated) {8A358D6D-9E8B-4685-9491-3F4817DF49A8}
AV: Symantec Endpoint Protection *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Online Armor Firewall *disabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}
FW: Symantec Endpoint Protection *disabled* {BE898FE3-CD0B-4014-85A9-03DB9923DDB6}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Administrator\My Documents\reg files.reg
c:\documents and settings\All Users\Start Menu\HP Image Zone .lnk
c:\documents and settings\L. Bergus\My Documents\ZbThumbnail.info
c:\recycler\NPROTECT
C:\s
c:\windows\EventSystem.log
c:\windows\system32\19169.exe
c:\windows\system32\26500.exe
c:\windows\system32\6334.exe
c:\windows\system32\BSTIEPrintCtl1.dll
c:\windows\system32\drivers\StMp3Recx64.sys
c:\windows\system32\NavLogon(2).dll
c:\windows\system32\NavLogon(3).dll
c:\windows\system32\w32apiw.dll

.
((((((((((((((((((((((((( Files Created from 2010-01-26 to 2010-02-26 )))))))))))))))))))))))))))))))
.

2010-02-26 08:37 . 2009-12-24 16:58 6515976 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\setup.exe
2010-02-26 08:36 . 2009-12-24 16:54 730032 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ar00000\install.exe
2010-02-25 19:49 . 2010-02-25 19:49 -------- d-----w- c:\program files\PCHand Screen Recorder
2010-02-25 19:47 . 2010-02-26 02:09 -------- d-----w- c:\program files\PCHand Screen Capture
2010-02-19 07:59 . 2010-02-19 07:59 598368 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\EmailScanner.dll
2010-02-19 07:59 . 2010-02-19 07:59 17480 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\EmailScannerBridge.dll
2010-02-19 07:56 . 2010-02-19 07:56 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-02-19 07:56 . 2010-02-04 15:53 2954656 -c--a-w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
2010-02-18 20:20 . 2010-02-18 20:21 -------- d-----w- c:\documents and settings\All Users\Application Data\SSScanAppDataDir
2010-02-18 20:19 . 2010-02-18 20:19 -------- d-----w- c:\documents and settings\All Users\Application Data\MSScanAppDataDir
2010-02-04 22:29 . 2010-02-04 22:28 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-04 22:26 . 2010-02-04 22:26 152576 ----a-w- c:\documents and settings\L. Bergus\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2010-02-04 22:26 . 2010-02-04 22:26 79488 ----a-w- c:\documents and settings\L. Bergus\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-02-04 03:41 . 2010-01-29 22:57 166612480 ----a-w- c:\program files\HDM2009Special_ea.msi
2010-01-29 15:19 . 2010-02-04 09:18 -------- d-----w- c:\documents and settings\All Users\Application Data\OnlineArmor
2010-01-29 15:19 . 2010-01-29 15:19 -------- d-----w- c:\documents and settings\L. Bergus\Application Data\OnlineArmor
2010-01-29 15:18 . 2009-12-05 12:28 24656 ----a-w- c:\windows\system32\drivers\OAmon.sys
2010-01-29 15:18 . 2009-12-05 12:27 29776 ----a-w- c:\windows\system32\drivers\OAnet.sys
2010-01-29 15:18 . 2009-12-05 12:27 223312 ----a-w- c:\windows\system32\drivers\OADriver.sys
2010-01-29 15:18 . 2010-01-29 16:48 -------- d-----w- c:\program files\Tall Emu
2010-01-29 14:15 . 2009-12-24 16:58 6515976 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\Upgrade\setup1.exe
2010-01-29 14:15 . 2009-12-24 16:54 730032 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\Upgrade\install1.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-26 08:38 . 2009-01-02 08:16 -------- d-----w- c:\documents and settings\L. Bergus\Application Data\mjusbsp
2010-02-26 05:38 . 2010-02-26 05:38 0 ----a-w- c:\windows\system32\drivers\tskE97.tmp
2010-02-26 02:02 . 2010-02-26 02:02 0 ----a-w- c:\windows\system32\drivers\tsk75B5.tmp
2010-02-25 20:13 . 2005-01-05 10:25 -------- d-----w- c:\program files\Common Files\Adobe
2010-02-19 07:56 . 2007-05-10 00:37 -------- d-----w- c:\program files\Lavasoft
2010-02-04 22:28 . 2004-12-30 03:50 -------- d-----w- c:\program files\Java
2010-02-04 16:53 . 2009-11-30 04:50 3803208 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AutoLaunch.exe
2010-02-04 15:53 . 2009-11-30 04:51 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-02-04 07:07 . 2005-11-02 06:54 -------- d-----w- c:\program files\123 Copy DVD
2010-02-04 03:49 . 2009-08-06 15:14 -------- d-----w- c:\program files\Paragon Software
2010-01-27 22:52 . 2009-11-30 04:51 8 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Savapibridge.dll
2010-01-20 08:27 . 2009-09-30 12:49 -------- d-----w- c:\program files\Microsoft Silverlight
2010-01-17 02:26 . 2009-11-29 03:14 -------- d-----w- c:\documents and settings\L. Bergus\Application Data\nCleaner
2010-01-17 02:03 . 2004-12-30 03:59 -------- d-----w- c:\program files\Common Files\AOL
2010-01-17 01:59 . 2004-12-30 03:59 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL
2010-01-16 04:23 . 2010-01-16 04:23 -------- d-----w- c:\documents and settings\Guest\Application Data\Malwarebytes
2010-01-16 01:37 . 2008-10-14 06:16 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-16 01:36 . 2008-10-18 22:16 5115824 -c--a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-01-07 21:07 . 2008-10-14 06:16 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-07 21:07 . 2008-10-14 06:16 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-05 10:00 . 2004-08-10 12:00 832512 ----a-w- c:\windows\system32\wininet.dll
2010-01-05 10:00 . 2004-08-10 12:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-01-05 10:00 . 2004-08-10 12:00 17408 ----a-w- c:\windows\system32\corpol.dll
2009-12-31 16:50 . 2004-08-10 12:00 353792 ----a-w- c:\windows\system32\drivers\srv.sys
2009-12-24 16:59 . 2009-12-24 16:59 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\magicJack.dll
2009-12-24 16:58 . 2009-12-24 16:58 6515976 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\setup.exe
2009-12-24 16:58 . 2009-12-24 16:58 416328 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJackLoader.exe
2009-12-24 16:58 . 2009-12-24 16:58 480608 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\octvqe1_apiw.dll
2009-12-24 16:58 . 2009-12-24 16:58 214360 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\TjVista.dll
2009-12-24 16:58 . 2009-12-24 16:58 337240 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\TjIpSys.dll
2009-12-24 16:58 . 2009-12-24 16:58 607600 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\SJHandsetMagicJack.dll
2009-12-24 16:58 . 2009-12-24 16:58 87384 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\st00000\mjsetup.exe
2009-12-24 16:57 . 2009-12-24 16:57 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\st00000\magicJack.dll
2009-12-24 16:57 . 2009-12-24 16:57 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJack.dll
2009-12-24 16:55 . 2009-12-24 16:55 12482904 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJack.exe
2009-12-24 16:54 . 2009-12-24 16:54 730032 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\install.exe
2009-12-24 16:53 . 2009-12-24 16:53 87384 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\mjsetup.exe
2009-12-24 16:53 . 2009-12-24 16:53 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\magicJack.dll
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\st00000\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 50520 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\cdloader2.exe
2009-12-16 18:43 . 2004-08-10 11:00 343040 ----a-w- c:\windows\system32\mspaint.exe
2009-12-14 07:08 . 2004-08-10 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2009-12-04 18:22 . 2004-08-10 12:00 455424 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2009-11-30 04:51 . 2009-11-30 04:51 283944 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Vipre.dll
2009-11-28 23:16 . 2004-08-19 22:22 88827 ----a-w- c:\windows\PCHEALTH\HELPCTR\OfflineCache\index.dat
2009-09-29 20:25 . 2009-09-30 23:11 115006464 ----a-w- c:\program files\PM10_Pers_ea_x32.msi
2009-08-13 17:52 . 2009-08-13 17:52 28488 ----a-w- c:\program files\mozilla firefox\plugins\atgpcdec.dll
2009-08-13 17:52 . 2009-08-13 17:52 185232 ----a-w- c:\program files\mozilla firefox\plugins\atgpcext.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"cdloader"="c:\documents and settings\L. Bergus\Application Data\mjusbsp\cdloader2.exe" [2009-12-24 50520]
"AWMON"="c:\program files\Lavasoft\Ad-Aware SE Plus\Ad-Watch.exe" [2005-05-25 517632]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"UpdReg"="c:\windows\UpdReg.EXE" [2000-05-11 90112]
"UMonit"="c:\windows\system32\umonit.exe" [2003-04-21 49152]
"CTHelper"="CTHELPER.EXE" [2007-04-09 19456]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-08-25 339968]
"@OnlineArmor GUI"="c:\program files\Tall Emu\Online Armor\oaui.exe" [2009-12-05 6722760]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2010-02-04 149280]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\TALLEM~1\ONLINE~1\oaevent.dll" [2009-12-05 923336]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"
path=
backup=

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^America Online 8.0 Tray Icon.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\America Online 8.0 Tray Icon.lnk
backup=c:\windows\pss\America Online 8.0 Tray Icon.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^LocalCooling.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\LocalCooling.lnk
backup=c:\windows\pss\LocalCooling.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^MediaChecker.lnk]
backup=c:\windows\pss\MediaChecker.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^setup.exe]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\setup.exe
backup=c:\windows\pss\setup.exeCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
backup=c:\windows\pss\Windows Search.lnkCommon Startup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DellSupport

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EbatesMoeMoneyMaker0]
||4 [X]
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IntelliPoint
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MCUpdateExe
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MPFExe
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MPSExe
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\point32
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VirusScan Online
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VSOCheckTask
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WildTangent CDA
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Zinio DLM

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2009-12-11 20:57 948672 ----a-r- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2009-12-18 13:58 40368 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Aim6]
2006-11-07 15:29 50736 ----a-w- c:\program files\AIM6\aim6.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AOLSoftware]
2006-09-26 00:52 50736 ----a-w- c:\program files\Common Files\AOL\1154749025\ee\aolsoftware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cdaEngine0500]
2004-09-09 22:35 1597440 ----a-w- c:\program files\AWS\WeatherBug\Weather.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ddoctorv2]
2008-04-24 17:25 202560 ----a-w- c:\program files\Comcast\Desktop Doctor\bin\sprtcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dla]
2004-11-16 05:05 127035 -c--a-w- c:\windows\SYSTEM32\dla\tfswctrl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HostManager]
2006-09-26 00:52 50736 ----a-w- c:\program files\Common Files\AOL\1154749025\ee\aolsoftware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\jusched]
2005-03-04 07:36 36975 -c--a-w- c:\program files\Java\jre1.5.0_02\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcagent]
2003-09-04 02:12 221184 ----a-w- c:\program files\Intel\Modem Event Monitor\IntelMEM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcmnhdlr]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcupdate]
2003-09-04 02:12 221184 ----a-w- c:\program files\Intel\Modem Event Monitor\IntelMEM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcvsshld]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mmtask]
2006-01-17 17:03 53248 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MMTray]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mm_tray]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MpfTray]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mscifapp]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OASClnt]
2008-04-14 00:12 1695232 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\qttask]
2004-12-30 04:00 98304 ----a-w- c:\program files\QuickTime\qttask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2004-12-30 04:00 98304 ----a-w- c:\program files\QuickTime\qttask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealPlay]
2008-08-16 00:33 26112 ----a-w- c:\program files\Real\RealPlayer\realplay.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealTray]
2008-08-16 00:33 26112 ----a-w- c:\program files\Real\RealPlayer\realplay.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\sgtray]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2005-03-04 07:36 36975 -c--a-w- c:\program files\Java\jre1.5.0_02\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdateManager]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Weather]
2004-09-09 22:35 1597440 ----a-w- c:\program files\AWS\WeatherBug\Weather.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YahooMessenger]
2006-12-01 02:49 4662776 ----a-w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Zinio Delivery Manager]
2006-12-01 02:49 4662776 ----a-w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLAcsd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1154749025\\ee\\aolsoftware.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Diskeeper Corporation\\Disk Performance Analyzer for Networks\\DPAN.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\123CopyDVD Gold 2009\\123CopyDVD.exe"=
"c:\\Program Files\\Symantec Client Security\\Symantec AntiVirus\\Smc.exe"=
"c:\\Program Files\\Symantec Client Security\\Symantec AntiVirus\\SNAC.EXE"=
"c:\\Program Files\\Common Files\\Symantec Shared\\ccApp.exe"=
"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"c:\\Documents and Settings\\L. Bergus\\Application Data\\mjusbsp\\magicJack.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5060:UDP"= 5060:UDP:magic jack
"443:TCP"= 443:TCP:Maja3
"10000:UDP"= 10000:UDP:MJ1
"20000:UDP"= 20000:UDP:MJ2
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service

R0 hotcore3;Hotcore helper;c:\windows\SYSTEM32\DRIVERS\hotcore3.sys [8/6/2009 10:14 AM 40560]
R0 Lbd;Lbd;c:\windows\SYSTEM32\DRIVERS\Lbd.sys [11/29/2009 11:51 PM 64288]
R1 OADevice;OADriver;c:\windows\SYSTEM32\DRIVERS\OADriver.sys [1/29/2010 10:18 AM 223312]
R1 OAmon;OAmon;c:\windows\SYSTEM32\DRIVERS\OAmon.sys [1/29/2010 10:18 AM 24656]
R1 OAnet;OAnet;c:\windows\SYSTEM32\DRIVERS\OAnet.sys [1/29/2010 10:18 AM 29776]
R2 OAcat;Online Armor Helper Service;c:\program files\Tall Emu\Online Armor\oacat.exe [1/29/2010 10:18 AM 1282248]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [8/18/2008 8:46 PM 24652]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [10/26/2009 1:43 PM 102448]
S2 CSHelper;CopySafe Helper Service;c:\windows\SYSTEM32\CSHelper.exe [5/26/2009 8:54 PM 266240]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2/4/2010 10:52 AM 1229232]
S2 NProtectService;Norton UnErase Protection;c:\progra~1\NORTON~1\NORTON~1\NPROTECT.EXE --> c:\progra~1\NORTON~1\NORTON~1\NPROTECT.EXE [?]
S2 SvcOnlineArmor;Online Armor;c:\program files\Tall Emu\Online Armor\oasrv.exe [1/29/2010 10:18 AM 3431112]
S3 brfilt;Brother MFC Filter Driver;c:\windows\SYSTEM32\DRIVERS\BrFilt.sys [1/5/2005 12:04 AM 2944]
S3 brparimg;Brother Multi Function Parallel Image driver;c:\windows\SYSTEM32\DRIVERS\BrParImg.sys [1/5/2005 12:04 AM 3168]
S3 BrParWdm;Brother WDM Parallel Driver;c:\windows\SYSTEM32\DRIVERS\BRPARWDM.SYS [1/5/2005 12:04 AM 39552]
S3 BrSerWDM;Brother Serial driver;c:\windows\SYSTEM32\DRIVERS\BrSerWdm.sys [1/5/2005 12:04 AM 60416]
S3 COH_Mon;COH_Mon;c:\windows\SYSTEM32\DRIVERS\COH_Mon.sys [7/14/2009 11:51 AM 23888]
S3 fixustor;fixustor;c:\windows\SYSTEM32\DRIVERS\fixustor.sys [4/8/2005 1:23 AM 6016]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2010-02-26 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-02-04 07:59]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
Trusted Zone: americansingles.com\www
Trusted Zone: intuit.com
Trusted Zone: magicjack.com\my
Trusted Zone: talk4free.com\reg
Trusted Zone: true.com\www
Trusted Zone: turbotax.com
DPF: {A7846ED2-9DE6-4E8A-B116-A8ACEBFA7DB1} - hxxp://rms2.invokesolutions.com/events/bin/6.2.0.1452/MILive.cab
DPF: {D8AA889B-2C65-47C3-8C16-3DCD4EF76A47} - hxxp://rms2.invokesolutions.com/events/bin/6.2.0.1450/MILive.cab
FF - ProfilePath - c:\documents and settings\L. Bergus\Application Data\Mozilla\Firefox\Profiles\gdm0ymgo.default\
FF - plugin: c:\progra~1\Yahoo!\Common\npyaxmpb.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npatgpc.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-vptray - c:\progra~1\SYMANT~1\SYMANT~2\VPTray.exe
Notify-NavLogon - (no file)
SafeBoot-Symantec Antvirus



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-26 14:35
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2010-02-26 14:37:48
ComboFix-quarantined-files.txt 2010-02-26 19:37

Pre-Run: 225,456,226,304 bytes free
Post-Run: 229,320,720,384 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[Boot Loader]
Timeout=2
Default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[Operating Systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect
c:\$win_nt$.~bt\BOOTSECT.DAT="Microsoft Windows XP Professional Setup"

Current=4 Default=4 Failed=3 LastKnownGood=1 Sets=,1,3,4
- - End Of File - - 9879A401553CF3ACBFB4645253A251BD


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:25 PM

Posted 26 February 2010 - 05:00 PM

The Combofix log needs some adjusting. Please rerun Combofix with the following instructions.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
File::
c:\windows\system32\drivers\tskE97.tmp
c:\windows\system32\drivers\tsk75B5.tmp

Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EbatesMoeMoneyMaker0]


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


Please run MBAM

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.

Thanks thumbup2.gif

Edited by m0le, 26 February 2010 - 05:01 PM.

Posted Image
m0le is a proud member of UNITE

#11 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 27 February 2010 - 01:50 AM

Hi MOle,
Had some issues so repeated last few steps from Combo-fix a few times, had to delete, start again because I had a message about NIRCMDC is not recognized as an internal or external command, operable program, or batch program. Nothing else happened.

Rebooted, but it seems I could not totally disable Armor ++ or Symantec, though nothing visible to change in lower right, and when I tried to stop processes "smc.exe and smcGui.exe" in Task Manager, which I believe are related to Symantec endpoint, they kept coming back.
So I ran anyway. When I looked for c:ComboFix.txt, seems I have 3 versions. I told you I tried a few times after trying to disable AV. When I went to upload I checked properties, they all said 0 files (empty), under
Combo-Fix
Combo-Fix14174C
Combo-Fix30773C

So: here is the cut/paste of the log.txt Notepad as follows:
ComboFix 10-02-26.01 - L. Bergus 02/27/2010 1:22.4.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.511 [GMT -5:00]
Running from: c:\documents and settings\L. Bergus\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\L. Bergus\Desktop\CFScript.txt
AV: Online Armor ++ *On-access scanning enabled* (Updated) {8A358D6D-9E8B-4685-9491-3F4817DF49A8}
AV: Symantec Endpoint Protection *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Online Armor Firewall *enabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}
FW: Symantec Endpoint Protection *enabled* {BE898FE3-CD0B-4014-85A9-03DB9923DDB6}

FILE ::
"c:\windows\system32\drivers\tsk75B5.tmp"
"c:\windows\system32\drivers\tskE97.tmp"
.

((((((((((((((((((((((((( Files Created from 2010-01-27 to 2010-02-27 )))))))))))))))))))))))))))))))
.

2010-02-27 05:25 . 2010-02-27 05:36 -------- d-----w- C:\Combo-Fix14174C
2010-02-27 04:27 . 2010-02-27 04:37 -------- d-----w- C:\Combo-Fix30773C
2010-02-27 03:42 . 2009-12-24 16:58 6515976 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\setup.exe
2010-02-27 03:42 . 2009-12-24 16:54 730032 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ar00000\install.exe
2010-02-26 19:23 . 2010-02-26 19:37 -------- d-----w- C:\Combo-Fix
2010-02-25 19:49 . 2010-02-25 19:49 -------- d-----w- c:\program files\PCHand Screen Recorder
2010-02-25 19:47 . 2010-02-26 02:09 -------- d-----w- c:\program files\PCHand Screen Capture
2010-02-19 07:59 . 2010-02-19 07:59 598368 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\EmailScanner.dll
2010-02-19 07:59 . 2010-02-19 07:59 17480 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\EmailScannerBridge.dll
2010-02-19 07:56 . 2010-02-19 07:56 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-02-19 07:56 . 2010-02-04 15:53 2954656 -c--a-w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
2010-02-18 20:20 . 2010-02-18 20:21 -------- d-----w- c:\documents and settings\All Users\Application Data\SSScanAppDataDir
2010-02-18 20:19 . 2010-02-18 20:19 -------- d-----w- c:\documents and settings\All Users\Application Data\MSScanAppDataDir
2010-02-04 22:29 . 2010-02-04 22:28 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-04 22:26 . 2010-02-04 22:26 152576 ----a-w- c:\documents and settings\L. Bergus\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2010-02-04 22:26 . 2010-02-04 22:26 79488 ----a-w- c:\documents and settings\L. Bergus\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-02-04 03:41 . 2010-01-29 22:57 166612480 ----a-w- c:\program files\HDM2009Special_ea.msi
2010-01-29 15:19 . 2010-02-04 09:18 -------- d-----w- c:\documents and settings\All Users\Application Data\OnlineArmor
2010-01-29 15:19 . 2010-01-29 15:19 -------- d-----w- c:\documents and settings\L. Bergus\Application Data\OnlineArmor
2010-01-29 15:18 . 2009-12-05 12:28 24656 ----a-w- c:\windows\system32\drivers\OAmon.sys
2010-01-29 15:18 . 2009-12-05 12:27 29776 ----a-w- c:\windows\system32\drivers\OAnet.sys
2010-01-29 15:18 . 2009-12-05 12:27 223312 ----a-w- c:\windows\system32\drivers\OADriver.sys
2010-01-29 15:18 . 2010-01-29 16:48 -------- d-----w- c:\program files\Tall Emu
2010-01-29 14:15 . 2009-12-24 16:58 6515976 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\Upgrade\setup1.exe
2010-01-29 14:15 . 2009-12-24 16:54 730032 ---ha-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\Upgrade\install1.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-27 03:43 . 2009-01-02 08:16 -------- d-----w- c:\documents and settings\L. Bergus\Application Data\mjusbsp
2010-02-25 20:13 . 2005-01-05 10:25 -------- d-----w- c:\program files\Common Files\Adobe
2010-02-19 07:56 . 2007-05-10 00:37 -------- d-----w- c:\program files\Lavasoft
2010-02-04 22:28 . 2004-12-30 03:50 -------- d-----w- c:\program files\Java
2010-02-04 16:53 . 2009-11-30 04:50 3803208 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AutoLaunch.exe
2010-02-04 15:53 . 2009-11-30 04:51 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-02-04 07:07 . 2005-11-02 06:54 -------- d-----w- c:\program files\123 Copy DVD
2010-02-04 03:49 . 2009-08-06 15:14 -------- d-----w- c:\program files\Paragon Software
2010-01-27 22:52 . 2009-11-30 04:51 8 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Savapibridge.dll
2010-01-20 08:27 . 2009-09-30 12:49 -------- d-----w- c:\program files\Microsoft Silverlight
2010-01-17 02:26 . 2009-11-29 03:14 -------- d-----w- c:\documents and settings\L. Bergus\Application Data\nCleaner
2010-01-17 02:03 . 2004-12-30 03:59 -------- d-----w- c:\program files\Common Files\AOL
2010-01-17 01:59 . 2004-12-30 03:59 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL
2010-01-16 04:23 . 2010-01-16 04:23 -------- d-----w- c:\documents and settings\Guest\Application Data\Malwarebytes
2010-01-16 01:37 . 2008-10-14 06:16 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-16 01:36 . 2008-10-18 22:16 5115824 -c--a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-01-07 21:07 . 2008-10-14 06:16 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-07 21:07 . 2008-10-14 06:16 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-05 10:00 . 2004-08-10 12:00 832512 ------w- c:\windows\system32\wininet.dll
2010-01-05 10:00 . 2004-08-10 12:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-01-05 10:00 . 2004-08-10 12:00 17408 ----a-w- c:\windows\system32\corpol.dll
2009-12-31 16:50 . 2004-08-10 12:00 353792 ----a-w- c:\windows\system32\drivers\srv.sys
2009-12-24 16:59 . 2009-12-24 16:59 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\magicJack.dll
2009-12-24 16:58 . 2009-12-24 16:58 6515976 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\setup.exe
2009-12-24 16:58 . 2009-12-24 16:58 416328 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJackLoader.exe
2009-12-24 16:58 . 2009-12-24 16:58 480608 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\octvqe1_apiw.dll
2009-12-24 16:58 . 2009-12-24 16:58 214360 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\TjVista.dll
2009-12-24 16:58 . 2009-12-24 16:58 337240 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\TjIpSys.dll
2009-12-24 16:58 . 2009-12-24 16:58 607600 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\SJHandsetMagicJack.dll
2009-12-24 16:58 . 2009-12-24 16:58 87384 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\st00000\mjsetup.exe
2009-12-24 16:57 . 2009-12-24 16:57 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\st00000\magicJack.dll
2009-12-24 16:57 . 2009-12-24 16:57 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJack.dll
2009-12-24 16:55 . 2009-12-24 16:55 12482904 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJack.exe
2009-12-24 16:54 . 2009-12-24 16:54 730032 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\install.exe
2009-12-24 16:53 . 2009-12-24 16:53 87384 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\mjsetup.exe
2009-12-24 16:53 . 2009-12-24 16:53 93016 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\magicJack.dll
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\ug00000\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\st00000\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 441704 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\in00000\magicJackSplash.exe
2009-12-24 16:52 . 2009-12-24 16:52 50520 ----a-w- c:\documents and settings\L. Bergus\Application Data\mjusbsp\cdloader2.exe
2009-12-16 18:43 . 2004-08-10 11:00 343040 ----a-w- c:\windows\system32\mspaint.exe
2009-12-14 07:08 . 2004-08-10 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2009-12-04 18:22 . 2004-08-10 12:00 455424 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2009-11-30 04:51 . 2009-11-30 04:51 283944 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Vipre.dll
2009-09-29 20:25 . 2009-09-30 23:11 115006464 ----a-w- c:\program files\PM10_Pers_ea_x32.msi
2009-08-13 17:52 . 2009-08-13 17:52 28488 ----a-w- c:\program files\mozilla firefox\plugins\atgpcdec.dll
2009-08-13 17:52 . 2009-08-13 17:52 185232 ----a-w- c:\program files\mozilla firefox\plugins\atgpcext.dll
.

((((((((((((((((((((((((((((( SnapShot@2010-02-26_19.35.36 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-02-27 04:59 . 2010-02-27 04:59 16384 c:\windows\Temp\Perflib_Perfdata_bc4.dat
+ 2010-02-27 04:55 . 2010-02-27 04:55 16384 c:\windows\Temp\Perflib_Perfdata_a90.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"cdloader"="c:\documents and settings\L. Bergus\Application Data\mjusbsp\cdloader2.exe" [2009-12-24 50520]
"AWMON"="c:\program files\Lavasoft\Ad-Aware SE Plus\Ad-Watch.exe" [2005-05-25 517632]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"UpdReg"="c:\windows\UpdReg.EXE" [2000-05-11 90112]
"UMonit"="c:\windows\system32\umonit.exe" [2003-04-21 49152]
"CTHelper"="CTHELPER.EXE" [2007-04-09 19456]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-08-25 339968]
"@OnlineArmor GUI"="c:\program files\Tall Emu\Online Armor\oaui.exe" [2009-12-05 6722760]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2010-02-04 149280]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\TALLEM~1\ONLINE~1\oaevent.dll" [2009-12-05 923336]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"
path=
backup=

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^America Online 8.0 Tray Icon.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\America Online 8.0 Tray Icon.lnk
backup=c:\windows\pss\America Online 8.0 Tray Icon.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^LocalCooling.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\LocalCooling.lnk
backup=c:\windows\pss\LocalCooling.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^MediaChecker.lnk]
backup=c:\windows\pss\MediaChecker.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^setup.exe]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\setup.exe
backup=c:\windows\pss\setup.exeCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
backup=c:\windows\pss\Windows Search.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2009-12-11 20:57 948672 ----a-r- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2009-12-18 13:58 40368 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Aim6]
2006-11-07 15:29 50736 ----a-w- c:\program files\AIM6\aim6.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AOLSoftware]
2006-09-26 00:52 50736 ----a-w- c:\program files\Common Files\AOL\1154749025\ee\aolsoftware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cdaEngine0500]
2004-09-09 22:35 1597440 ----a-w- c:\program files\AWS\WeatherBug\Weather.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ddoctorv2]
2008-04-24 17:25 202560 ----a-w- c:\program files\Comcast\Desktop Doctor\bin\sprtcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dla]
2004-11-16 05:05 127035 -c--a-w- c:\windows\SYSTEM32\dla\tfswctrl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HostManager]
2006-09-26 00:52 50736 ----a-w- c:\program files\Common Files\AOL\1154749025\ee\aolsoftware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\jusched]
2005-03-04 07:36 36975 -c--a-w- c:\program files\Java\jre1.5.0_02\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcagent]
2003-09-04 02:12 221184 ----a-w- c:\program files\Intel\Modem Event Monitor\IntelMEM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcmnhdlr]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcupdate]
2003-09-04 02:12 221184 ----a-w- c:\program files\Intel\Modem Event Monitor\IntelMEM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcvsshld]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mmtask]
2006-01-17 17:03 53248 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MMTray]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mm_tray]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MpfTray]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mscifapp]
2006-01-17 17:03 135168 -c--a-w- c:\program files\MUSICMATCH\Musicmatch Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OASClnt]
2008-04-14 00:12 1695232 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\qttask]
2004-12-30 04:00 98304 ----a-w- c:\program files\QuickTime\qttask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2004-12-30 04:00 98304 ----a-w- c:\program files\QuickTime\qttask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealPlay]
2008-08-16 00:33 26112 ----a-w- c:\program files\Real\RealPlayer\realplay.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealTray]
2008-08-16 00:33 26112 ----a-w- c:\program files\Real\RealPlayer\realplay.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\sgtray]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2005-03-04 07:36 36975 -c--a-w- c:\program files\Java\jre1.5.0_02\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdateManager]
2004-01-07 07:01 110592 ----a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Weather]
2004-09-09 22:35 1597440 ----a-w- c:\program files\AWS\WeatherBug\Weather.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YahooMessenger]
2006-12-01 02:49 4662776 ----a-w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Zinio Delivery Manager]
2006-12-01 02:49 4662776 ----a-w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLAcsd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1154749025\\ee\\aolsoftware.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Diskeeper Corporation\\Disk Performance Analyzer for Networks\\DPAN.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\123CopyDVD Gold 2009\\123CopyDVD.exe"=
"c:\\Program Files\\Symantec Client Security\\Symantec AntiVirus\\Smc.exe"=
"c:\\Program Files\\Symantec Client Security\\Symantec AntiVirus\\SNAC.EXE"=
"c:\\Program Files\\Common Files\\Symantec Shared\\ccApp.exe"=
"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"c:\\Documents and Settings\\L. Bergus\\Application Data\\mjusbsp\\magicJack.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5060:UDP"= 5060:UDP:magic jack
"443:TCP"= 443:TCP:Maja3
"10000:UDP"= 10000:UDP:MJ1
"20000:UDP"= 20000:UDP:MJ2
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service

R0 hotcore3;Hotcore helper;c:\windows\SYSTEM32\DRIVERS\hotcore3.sys [8/6/2009 10:14 AM 40560]
R0 Lbd;Lbd;c:\windows\SYSTEM32\DRIVERS\Lbd.sys [11/29/2009 11:51 PM 64288]
R1 OADevice;OADriver;c:\windows\SYSTEM32\DRIVERS\OADriver.sys [1/29/2010 10:18 AM 223312]
R1 OAmon;OAmon;c:\windows\SYSTEM32\DRIVERS\OAmon.sys [1/29/2010 10:18 AM 24656]
R1 OAnet;OAnet;c:\windows\SYSTEM32\DRIVERS\OAnet.sys [1/29/2010 10:18 AM 29776]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [8/18/2008 8:46 PM 24652]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [10/26/2009 1:43 PM 102448]
S2 CSHelper;CopySafe Helper Service;c:\windows\SYSTEM32\CSHelper.exe [5/26/2009 8:54 PM 266240]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2/4/2010 10:52 AM 1229232]
S2 NProtectService;Norton UnErase Protection;c:\progra~1\NORTON~1\NORTON~1\NPROTECT.EXE --> c:\progra~1\NORTON~1\NORTON~1\NPROTECT.EXE [?]
S2 OAcat;Online Armor Helper Service;c:\program files\Tall Emu\Online Armor\oacat.exe [1/29/2010 10:18 AM 1282248]
S2 SvcOnlineArmor;Online Armor;c:\program files\Tall Emu\Online Armor\oasrv.exe [1/29/2010 10:18 AM 3431112]
S3 brfilt;Brother MFC Filter Driver;c:\windows\SYSTEM32\DRIVERS\BrFilt.sys [1/5/2005 12:04 AM 2944]
S3 brparimg;Brother Multi Function Parallel Image driver;c:\windows\SYSTEM32\DRIVERS\BrParImg.sys [1/5/2005 12:04 AM 3168]
S3 BrParWdm;Brother WDM Parallel Driver;c:\windows\SYSTEM32\DRIVERS\BRPARWDM.SYS [1/5/2005 12:04 AM 39552]
S3 BrSerWDM;Brother Serial driver;c:\windows\SYSTEM32\DRIVERS\BrSerWdm.sys [1/5/2005 12:04 AM 60416]
S3 COH_Mon;COH_Mon;c:\windows\SYSTEM32\DRIVERS\COH_Mon.sys [7/14/2009 11:51 AM 23888]
S3 fixustor;fixustor;c:\windows\SYSTEM32\DRIVERS\fixustor.sys [4/8/2005 1:23 AM 6016]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2010-02-27 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-02-04 07:59]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
Trusted Zone: americansingles.com\www
Trusted Zone: intuit.com
Trusted Zone: magicjack.com\my
Trusted Zone: talk4free.com\reg
Trusted Zone: true.com\www
Trusted Zone: turbotax.com
DPF: {A7846ED2-9DE6-4E8A-B116-A8ACEBFA7DB1} - hxxp://rms2.invokesolutions.com/events/bin/6.2.0.1452/MILive.cab
DPF: {D8AA889B-2C65-47C3-8C16-3DCD4EF76A47} - hxxp://rms2.invokesolutions.com/events/bin/6.2.0.1450/MILive.cab
FF - ProfilePath - c:\documents and settings\L. Bergus\Application Data\Mozilla\Firefox\Profiles\gdm0ymgo.default\
FF - plugin: c:\progra~1\Yahoo!\Common\npyaxmpb.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npatgpc.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-27 01:27
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2628)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
.
Completion time: 2010-02-27 01:30:01
ComboFix-quarantined-files.txt 2010-02-27 06:29
ComboFix2.txt 2010-02-27 05:36
ComboFix3.txt 2010-02-27 04:36
ComboFix4.txt 2010-02-26 19:37

Pre-Run: 229,355,180,032 bytes free
Post-Run: 229,323,370,496 bytes free

Current=4 Default=4 Failed=3 LastKnownGood=1 Sets=,1,3,4
- - End Of File - - 3894E4DA6B4F48F702AF9545FDB6472B


Now I am running Malwarebytes... i had on computer, but updated first and check marked all drives: Log to follow





#12 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 27 February 2010 - 12:52 PM

Hi MOle

Malwarebytes still running, scanning all drives over 11 hrs so far, but has not yet found anything over 140000 files. Will report final results back next.

BUT..... Symantec auto protect and Scan ran even though I right clicked and it shows disabled in system tray.
The Symantec Auto Protect screen at 5:35 am still shows problem:
iastor.sys (logged) - same as before

The regular daily scan that started or ended at 7:01 am 2/27/10 as follows, shows 14 infections: this list continues to grow but it will only log results, cannot quarantine or repair because either
A0136890.sys
A0138219.sys
A0138152.sys
A0138197.sys
A0138198.sys
A0138199.sys
A0138200.sys
A0138201.sys
A0138202.sys
A0140308.sys
A0140312.sys
A014314.sys (missed a number)
A0142826.sys
iastor.sys

They were just shown as logged, Could not quarantine or clean for following reasons it said:
The files have been moved or deleted
You are trying to clean a compressed file in a container
You are trying to clean files in an email.

Lisa

My next email and Malwarebytes log will follow in a few minutes.

#13 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 27 February 2010 - 01:12 PM

Here's the Malwarebytes log, no problems found!!!!

Malwarebytes' Anti-Malware 1.44
Database version: 3799
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.11

2/27/2010 12:47:21 PM
mbam-log-2010-02-27 (12-47-21).txt

Scan type: Full Scan (A:\|C:\|D:\|E:\|K:\|)
Objects scanned: 272321
Time elapsed: 11 hour(s), 9 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


BELOW IS A COPY OF PREVIOUS MALWAREBYTES QUARANTINE LOG:


#14 LisaBe

LisaBe
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:25 PM

Posted 27 February 2010 - 01:38 PM

Here is log of Malwarebytes 1/15/2010, going back to when this seemed to start I think. Malwarebytes logs since then have showed no problems.

Malwarebytes' Anti-Malware 1.44
Database version: 3573
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.11

1/15/2010 11:08:10 PM
mbam-log-2010-01-15 (23-08-10).txt

Scan type: Quick Scan
Objects scanned: 186845
Time elapsed: 1 hour(s), 25 minute(s), 29 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 6
Folders Infected: 1
Files Infected: 15

Memory Processes Infected:
C:\WINDOWS\SYSTEM32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.

Memory Modules Infected:
C:\WINDOWS\SYSTEM32\helper32.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\InternetSecurity2010 (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\SYSTEM32\IS15.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\L. Bergus\Local Settings\Temporary Internet Files\Content.IE5\SD8TGDHR\SetupIS2010[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\helper32.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\L. Bergus\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Security 2010.lnk (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\L. Bergus\Start Menu\Internet Security 2010.lnk (Rogue.InternetSecurity2010) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\0000067c.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\00000705.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\00001c4c.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\00003308.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\000035ce.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\00005a5a.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\00007d1d.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\warning.html (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Edited by LisaBe, 27 February 2010 - 01:44 PM.


#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:25 PM

Posted 27 February 2010 - 05:20 PM

Symantec is flagging files that are now quarantined.

MBAM being clean is a good result but let's run an online scan. This should find some of the quarantined files that Symantec is finding but not telling you where.

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users